Hello Madiartumarbayev,
If you have correctly configured both the Mikrotik to send the logs, and the wazuh-manager to receive them, then you will see the logs stored as events in the file /var/ossec/logs/archives/archives.log.
This file contains all the events received by the wazuh-manager (Even if they do not match any rule or decoder), so in case you have more agents connected, it might be easier to filter this file by the device hostname or IP address. For example:
# grep <firewall_ip> var/ossec/logs/archives/archives.logBy default, the option to store these events in the archives.log file is disabled, as, in environments where there are many agents and events per second, this can cause the disk to fill up in a short time. To enable it you will have to change in the /var/ossec/etc/ossec.conf the option "<logall>":
<logall>no</logall>And then, restart the wazuh-manager
# systemctl restart wazuh-manager
After this, you will be able to see if the wazuh-manager is receiving the device logs correctly by checking if any event corresponding to the firewall is stored in the /var/ossec/logs/archives/archives.log.
NOTE: remember to disable the "logall" option in the manager and restart the service after finishing the troubleshooting.
As mentioned previously, in this case, you will have to create custom decoders and rules to generate alerts when these logs arrive in the manager. These generated alerts are the events you will see on the discover page of Kibana.
To create custom decoders and rules you can have a look at the following documentation links:
Once you have created them, try using the logtest tool to verify that the logs will generate alerts properly when they arrive to the manager. This tool is located at
/var/ossec/bin/wazuh-logtest. Reference:
wazuh-logtest.
I hope this information helps. Please let us know if you have any other questions.