Hello Daniel,
First of all, make sure you added a remote module to your Wazuh server configuration instead of editing the already existing one (the default one is for agent connectivity).
Then, in order to check if you're actually receiving syslog traffic into your Wazuh server, you can run a tcpdump command from your Wazuh server's command line like next one:
tcpdump -s 0 -A host <SRCIPADDRHERE> and udp port 514
Just make sure to replace
<SRCIPADDRHERE>
with the actual source IP address.
In case there's no traffic reaching your manager, this command would stay like this:
root@server:/home/user# tcpdump -s 0 -A host 192.168.1.1 and udp port 514
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
In this case, you should check network connectivity / firewall configurations between your devices and the Wazuh server.
Now, if you're actually receiving syslog traffic, then you should see lots of data populating your screen. For example:
root@server:/home/user# tcpdump -s 0 -A host 192.168.1.5 and udp port 514
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on wlp2s0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
13:33:35.898101 IP 192.168.1.5.57255 > server.syslog: SYSLOG user.notice, length: 106
E....\@.?..Q.......c.....r.c<13>1
2023-01-28T13:33:36.513281-03:00 PROBOOK root - - [timeQuality
tzKnown="1" isSynced="0"] testing
13:33:40.085865 IP 192.168.1.5.57238 > server.syslog: SYSLOG user.notice, length: 106
E.....@.?..........c.....r._<13>1
2023-01-28T13:33:40.698629-03:00 PROBOOK root - - [timeQuality
tzKnown="1" isSynced="0"] testing
13:33:40.947057 IP 192.168.1.5.57194 > server.syslog: SYSLOG user.notice, length: 106
E....0@.?..}.......c.j...r..<13>1
2023-01-28T13:33:41.562493-03:00 PROBOOK root - - [timeQuality
tzKnown="1" isSynced="0"] testing
13:33:41.353253 IP 192.168.1.5.57239 > server.syslog: SYSLOG user.notice, length: 106
E....L@.?..a.......c.....r.j<13>1
2023-01-28T13:33:41.969016-03:00 PROBOOK root - - [timeQuality
tzKnown="1" isSynced="0"] testing
You can confirm this by enabling
logall_json in your Wazuh manager
/var/ossec/etc/ossec.conf file. By setting this option to
yes and after restarting your
wazuh-manager service, your Wazuh server will start saving every single event it receives into its
/var/ossec/logs/archives/archives.json. Even if your events don't trigger a rule. You could search for your incoming events there.
In case you find some events there, and if you could provide me with some samples, I can help you get started with decoders and rules.
Let me know how it goes!