We are experiencing issues with Wazuh not functioning as expected in a multi-account AWS environment integrated with AWS Control Tower. Specifically:
Key Expiration Issue:
Wazuh is failing to maintain continuous AWS log ingestion because the
role session expires after a default interval (e.g., 3600 seconds), and
it does not seamlessly re-assume the AWS role after expiration.
Error Details:
Logs show this error:
ClientError('An error occurred (ExpiredToken) when calling the GetObject operation: The provided token has expired.')
This means that the token used by Wazuh to access AWS S3 has expired, and Wazuh is unable to re-assume the role and fetch logs. The other problem is that it only collects a single account, even though we have several accounts in our Controltour Cloudtrail logs.