Hello,
Checking the "full_log" field of every line of your archives.json you will get the raw events. In your case:
> 2023-01-20T11:39:18.664244+05:30 NTNX-96SM6G511379-D-CVM audispd[8623]: node=ntnx-96SM6G511379-d-cvm type=SYSCALL msg=audit(1674194958.663:18514813): arch=c000003e syscall=90 success=yes exit=0 a0=5971970 a1=1a0 a2=1 a3=0 items=1 ppid=11549 pid=11573 auid=4294967295 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=4294967295 comm=\"python2.7\" exe=\"/usr/bin/python2.7\" subj=unconfined_u:unconfined_r:unconfined_t:s0 key=\"nutanix_config_modified\"
> 2023-01-20T11:39:18.664768+05:30 NTNX-96SM6G511379-D-CVM audispd[8623]: node=ntnx-96SM6G511379-d-cvm type=PATH msg=audit(1674194958.663:18514813): item=0 name=\"/home/nutanix/config/tmpjj5Qwx\" inode=524354 dev=08:03 mode=0100600 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:user_home_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
Now, you can use the /var/ossec/bin/wazuh-logtest binary to see what is missing (decoders, rules, or both):
# /var/ossec/bin/wazuh-logtest
Starting wazuh-logtest v4.3.6
Type one log per line
2023-01-20T11:39:18.664768+05:30 NTNX-96SM6G511379-D-CVM audispd[8623]: node=ntnx-96SM6G511379-d-cvm type=PATH msg=audit(1674194958.663:18514813): item=0 name=\"/home/nutanix/config/tmpjj5Qwx\" inode=524354 dev=08:03 mode=0100600 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:user_home_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
**Phase 1: Completed pre-decoding.
full event: '2023-01-20T11:39:18.664768+05:30 NTNX-96SM6G511379-D-CVM audispd[8623]: node=ntnx-96SM6G511379-d-cvm type=PATH msg=audit(1674194958.663:18514813): item=0 name=\"/home/nutanix/config/tmpjj5Qwx\" inode=524354 dev=08:03 mode=0100600 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:user_home_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0'
timestamp: '2023-01-20T11:39:18.664768+05:30'
program_name: 'audispd'
**Phase 2: Completed decoding.
No decoder matched.
As you can see you need both, decoders and rules. For that reason you don't see them in the dashboard: Only alerts with levels higher than 2 are indexed by default.
That said, in your case, you are forwarding auditd events:
2023-01-20T11:39:18.664768+05:30 NTNX-96SM6G511379-D-CVM audispd[8623]: node=ntnx-96SM6G511379-d-cvm type=PATH msg=audit(1674194958.663:18514813): item=0 name=\"/home/nutanix/config/tmpjj5Qwx\" inode=524354 dev=08:03 mode=0100600 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:user_home_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
If you paste the auditd event (red part) to logtest, you will see that we have decoders and alerts by default:
type=PATH msg=audit(1674194958.663:18514813): item=0 name=\"/home/nutanix/config/tmpjj5Qwx\" inode=524354 dev=08:03 mode=0100600 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:user_home_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0
**Phase 1: Completed pre-decoding.
full event: 'type=PATH msg=audit(1674194958.663:18514813): item=0 name=\"/home/nutanix/config/tmpjj5Qwx\" inode=524354 dev=08:03 mode=0100600 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:user_home_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0'
**Phase 2: Completed decoding.
name: 'auditd'
audit.gid: '1000'
audit.id: '18514813'
audit.type: 'PATH'
**Phase 3: Completed filtering (rules).
id: '80700'
level: '0'
description: 'Audit: Messages grouped.'
groups: '['audit']'
firedtimes: '1'
mail: 'False'
So, I think you have two options:
- Create your own decoders/rules
- Modify the event in rsyslog to remove the blue part, so the auditd events will match the current ruleset
Let me know if you need more help.
Regards.