Hi Team,
I am currently working on integrating AWS log ingestion with Wazuh (via S3/CloudTrail), and I need to implement network-level whitelisting from the Wazuh Manager.
The challenge I am facing is identifying the exact AWS domains/endpoints that need to be whitelisted.
What I’ve tried:Used tcpdump on the Wazuh Manager to capture outbound traffic during AWS log ingestion
Captured both HTTPS (port 443) and DNS (port 53) traffic
Extracted domain names using strings/grep (e.g., filtering for "amazonaws")
I can see multiple AWS-related domains (e.g., *.amazonaws.com), but the list is not very precise
Due to HTTPS encryption, it’s difficult to reliably extract all required endpoints
AWS IP ranges are dynamic, so IP-based whitelisting is not ideal
Is there an official or recommended list of AWS endpoints required for Wazuh AWS integrations (S3, CloudTrail, etc.)?
Does Wazuh documentation specify minimum required domains/services for this setup?
Any guidance would be really helpful.
Thanks!
Hi,
Based on your input, it seems you are trying to tighten network security by restricting outbound traffic.
Using tcpdump will not provide all the required details in this case, as most of the communication is over TLS and the payload is encrypted.
AWS SDKs resolve service endpoints dynamically, meaning DNS responses can change over time. Because of this, static IP-based whitelisting is not reliable. Additionally, AWS services are region-based, so endpoints vary depending on the region. Some SDK operations may also use global or regional endpoints, making strict endpoint whitelisting difficult to maintain.
Since you are integrating Wazuh with AWS services such as S3 and CloudTrail, the integration does not rely on a single service. It typically requires access to multiple AWS services, including:
Because of this, restricting outbound traffic to a fixed set of IPs or endpoints may cause failures in log collection.
This approach:
If you apply strict whitelisting and AWS endpoints change (which is common), the Wazuh manager may fail to fetch logs from AWS services. A broader allow rule is more reliable for maintaining integration stability.
You can refer to the Wazuh AWS integration documentation for more details on configuring S3 and CloudTrail integrations.