Hi MaP! Hope you're doing well.
Could you let me know the steps you’re following for the offline update? Has this behavior started happening recently?
Additionally, could you share the ossec.log file with me so I can review it? Please make sure to hide any sensitive information before sharing.
Have a great day!
Hi MaP! Hope you're doing well.
My actual question is/was, can I see what status the vulnerability module or the downloaded CVE information is at? In other words, when were vulnerability updates last downloaded?
This information should be available in the ossec.log. Each time a content update is performed, the ossec.log records the current offset. To check this more effectively, we can enable debug mode (Addig wazuh_modules.debug=2 on /var/ossec/etc/internal_options.conf), restart the manager, and then look for the relevant entries in the log.
Can I see the snapshot version or snapshot date of the vulnerability signature somewhere in the dashboard?
Unfortunately, this is not currently possible through the dashboard. However, we can use the ldb tool (RocksDB’s database access utility) to explore the local database and retrieve the current offset information for the vulnerability signature.
Then the problem with the files in /var/ossec/queue/vd_updater/tmp/contents. How can I find out why the files are not deleted automatically?
Is the module functioning as expected? Have you checked for any errors or warnings in the ossec.log? These logs can provide insights into why the files may not be deleted automatically.
Let me know if you need further assistance or clarification!
Nice day!
Hi MaP! Hope you're doing well.
Hi MaP! Hope you're doing well.
Apologies for the delay. I conducted some tests and was able to confirm this behavior. We’ve created an issue for further research: Wazuh Issue #27691.
As a temporary solution, you can avoid restarting the manager and manually delete the file inside the tmp/content directory.
Please let me know if this workaround resolves the issue for you!