Hi Saddique Khan,
Hope you are doing well. Thank you for using Wazuh.
The example shared in the documentation is for this following format.
redhat-feed10.json
<provider name="redhat">
<enabled>yes</enabled>
<path>/local_path/rh-feed/redhat-feed[[:digit:]]\+\.json$</path>
<update_interval>1h</update_interval>
</provider>
The wildcard option using * does not seems to be working. Also, the pattern of the regex in the path option is also different from the option for the ruleset of Wazuh. You can try the following workaround.
For pattern
cve_2000_page_20.json
cve_1999_page_10.json
<path>/local_path/rh-feed/cve_[[:digit:]]\+_page_[[:digit:]]\+\.json$</path>
Or
<path>/local_path/rh-feed/cve_2000_page_[[:digit:]]\+\.json$</path>
<path>/local_path/rh-feed/cve_1999_page_[[:digit:]]\+\.json$</path>
Please let me know if this solves your issue.
Regards
Md. Nazmur Sakib

Hi Saddique Khan,
Based on the file path and file names, the path should be similar to
<path>/var/ossec/feeds/cve_[[:digit:]]\+_page_[[:digit:]]\+\.json$</path>
Regards
Md. Nazmur Sakib
Hi Saddique Khan,
Hope you are doing well.
What is the status of the vulnerability feed update for Red Hat?
Check osssec.log
cat /var/ossec/logs/ossec.log | grep wazuh-modulesd
There should be a similar log if your feed is updated successfully.
2023/10/04 10:03:47 wazuh-modulesd:vulnerability-detector: INFO: (5430): The update of the 'JSON Red Hat Enterprise Linux' feed finished successfully.
Are you getting the same warning that you have shared previously?
2023/10/12 11:09:41 wazuh-modulesd: INFO: (5586): No feeds specified for 'redhat' provider. Enabling all the available ones.
Thu, Oct 12 2023 1:09:41 pm
2023/10/12 11:09:41 wazuh-modulesd: WARNING: (5587): Feed conflict. Only 'jredhat' will be updated offline.
Looking forward to your response.
Regards
Md. Nazmur Sakib
Hi Saddique Khan,
I was trying to reproduce the issue following the document. However, I was unable to produce the error.
Redhat vulnerability configuration:
<!-- RedHat OS vulnerabilities -->
<provider name="redhat">
<enabled>yes</enabled>
<path>/local_path/rh-feed/redhat-feed[[:digit:]]\+\.json$</path>
<update_interval>5m</update_interval>
</provider>
My folder location:
Status of vulnerability feed update:
Also as you can see the physical scan was done based on the offline vulnerability JSON data.
Regards
Md. Nazmur Sakib
Hi Saddique Khan,
Hope you are doing well. Sorry for the late reply.
I have tried this without an internet connection and this is my result. As you can see the JSON Red Hat Enterprise Linux database was updated successfully with an offline feed.
<provider name="redhat">
<enabled>yes</enabled>
<path>/local_path/rh-feed/redhat-feed[[:digit:]]\+\.json$</path>
<update_interval>1h</update_interval>
</provider>
Next, I used the relevant path inside /var/ossec and was unable to update using the relevant path.
I could only reproduce your issue when Wazuh could not read the JSON files, the regex format was incorrect, or the JSON file was missing inside the path.
I think the issue is either one of these.
The regex type used to open the feed files is POSIX regex. Recheck if you are using the write regex pattern.
Try updating the file permission so that Wazuh can read from those files.
Also if you are loading the OVAL feed from a local path. To achieve this, use the path attribute as this example shows.
<provider name="redhat">
<enabled>yes</enabled>
<os path="/local_path/com.redhat.rhsa-RHEL5.xml.bz2">5</os>
<os path="/local_path/rhel-6-including-unpatched.oval.xml.bz2">6</os>
<os path="/local_path/rhel-7-including-unpatched.oval.xml.bz2">7</os>
<os path="/local_path/rhel-8-including-unpatched.oval.xml.bz2">8</os>
<os path="/local_path/rhel-9-including-unpatched.oval.xml.bz2">9</os>
<update_interval>1h</update_interval>
</provider>
I hope this helps. Please let me know if you need any further assistance.
Regards
Md. Nazmur Sakib