Hello everyone! I hope you're all doing well!
After upgrading my single-node server from version 4.4.5 to version 4.8.2, we're receiving the warning ‘Vulnerability detection seems to be disabled or has a problem.’
We’ve tried the following actions without success:
Checking the /var/ossec/etc/ossec.conf file to confirm the addition of the <vulnerability-detection> parameters.
Disabling <vulnerability-detection> by setting <enable> to ‘no’. The same for <indexer>, followed by a reboot, re-enabling, and another reboot.
Adjusting the indexer to match the address specified in the /etc/filebeat/filebeat.yml file.
Evaluating the certificates, and they appear to be correctly configured.
Forcing credentials again using the following commands:
/var/ossec/bin/wazuh-keystore -f indexer -k username -v admin
/var/ossec/bin/wazuh-keystore -f indexer -k password -v <password>
Output from the command: curl -u admin:tEfOZiksFuDBTR09ipkf80zUvqJ6SXjY --cacert /etc/filebeat/certs/root-ca.pem --cert /etc/filebeat/certs/filebeat.pem --key /etc/filebeat/certs/filebeat-key.pem -X GET "https://127.0.0.1:9200/_cluster/health"
Output from the command: curl -u "admin:tEfOZiksFuDBTR09ipkf80zUvqJ6SXjY" --cacert /etc/filebeat/certs/root-ca.pem --cert /etc/filebeat/certs/filebeat.pem --key /etc/filebeat/certs/filebeat-key.pem -X GET "https://127.0.0.1:9200"
Output from the command: openssl verify -verbose -CAfile /etc/filebeat/certs/root-ca.pem /etc/filebeat/certs/filebeat.pem
Output from the command: openssl rsa -check -noout -in /etc/filebeat/certs/filebeat-key.pem
ossec.log file attached
Server resources:
Can someone give us some guidance? We’re at a loss on what to do next =/
Hi Stuti,
I sincerely thank you in advance for your guidance!
I have attached my ossec.log file.
Here is the output of the command: curl -XGET -k -u admin:admin https://localhost:9200/_cat/shards?
I tried to proceed with the removal, but I'm getting the following response:
Here is the output of this command: curl -XGET -k 'https://127.0.0.1:9200/_cluster/allocation/explain?pretty' -u admin:password
Any idea what it could be?

Hello!
Thank you very much for your response. I removed the database files and restarted the services as suggested. However, it didn't work; I still receive the warning 'Vulnerability detection seems to be disabled or has a problem.' :'(

I would like to point out that my cluster has never entered the green status and remains in the yellow status. There are 9 unassigned_shards that I cannot proceed with removing, and I receive the following message when I try to delete them:

Hello Stuti,
I forced the credentials again using the commands you mentioned and restarted the Wazuh Manager, but I’m still receiving the indexerConnector error.
I also noticed this warning: ‘The SSL peer certificate or remote SSH key was not OK.’

Do you know if this is related?
I validated the certificate paths, and they are correctly configured in the filebeat.yml and ossec.conf files.


Hello,
I took the opportunity to update my Wazuh from version 4.8 to version 4.9, hoping that my Vulnerability Detection module would resume normal operation. However, I am still receiving the error 'Vulnerability detection seems to be disabled or has a problem.'
My cluster is still in yellow status:

I have UNASSIGNED shards:

And I am still unable to delete them, receiving the following permission error:


Hello, Sebastian Pleasure to meet you! Thank you very much for your contribution.
I did some checks based on the link you shared, but I wasn't very successful in resolving the status of my cluster.
When I try to delete these unassigned shards, I receive a warning that my admin user does not have permission to perform this action.


Have you ever experienced this at any point? Would you know how to guide me in removing these shards? I don't mind losing them.
Thank you very much for your help and attention.






I followed the steps you provided, Stuti, and managed to adjust the replicas of some shards, while I had to delete the others. I had to set the replica value to 1 for my vulnerability template. I'm not sure if that enables the template, but it was previously set to 0.
I'm very grateful for all the help you’ve provided!