Hello Diwahar,
From what I understand, Graylog is receiving raw events, but not necessarily Wazuh alerts. Alerts are generated only after the manager processes incoming logs via decoding and rule matching. Meanwhile, events that do not trigger an alert can still be stored in the archives files, so seeing raw logs in Graylog does not always mean that Wazuh is producing alerts for them. Verify the following in the Wazuh server:
- Confirm that Wazuh is actually generating alerts locally in alerts.json.
- Check that log_alert_level is not set too high; lower-level alerts will not be written to alerts.json.
- Make sure jsonout_output is enabled in /var/ossec/etc/ossec.conf
- If your sample logs are not triggering alerts, test them with wazuh-logtest to confirm whether they match any decoders or rules.
- If they do not match any decoder/rule, you may need to create a custom decoder/rule for those logs.
Also note that if Fluent Bit forwards raw logs instead of Wazuh-generated alerts, Graylog/SocFortress will process them as simple logs and not as Wazuh alerts.