Yes, the "Agent event queue is flooded. Check the agent configuration." warning is related to delays in alerts and can explain why there's a lag between when an event occurs and when the alert appears in Wazuh.When this buffer (or queue) overflows—because too many events are generated in a short period, or because the agent/server is processing events too slowly—the "queue flooded" alert is triggered.
The Wazuh agent in your case is experiencing buffer saturation, meaning it is collecting more events than it can send to the manager. The buffer is almost full (4999 out of 5000), and only about a third of the collected messages have been sent. This suggests that the agent is not able to forward events fast enough, even though the event rate is limited to 500 events per second by default. This could be caused by a large burst of events that floods the network of the manager.
https://documentation.wazuh.com/current/user-manual/agent/agent-management/antiflooding.html#flooding-status-red-areaTo solve this issue, you can increase the queue size and reduce the event per second on the agent's configuration file.
Navigate to the Wazuh configuration directory /var/ossec/etc/ossec.conf and edit the file to reflect the changes:
<client_buffer>
<disabled>no</disabled>
<queue_size>50000</queue_size>
<events_per_second>800</events_per_second>
</client_buffer>
Save the changes.
Then restart the Wazuh components
However, increasing the queue size is not recommended as it can impact the agent's footprint and the environment's network.
Therefore, it is important to identify the root cause of the issue by understanding what kind of logs the agents are ingesting, their frequency, and when the issue began to occur.
Wazuh has a buffer mechanism on the agents to prevent a large burst of events from negatively impacting the network of the manager. More information on the anti-flooding mechanism can be found in the Wazuh documentation -
https://documentation.wazuh.com/current/user-manual/agents/antiflooding.htmlYou need to review the event logs is crucial for detecting anomalies or patterns in the generated events. This information can help reduce false positives and provide valuable insights into the underlying cause of the flooding.
You could share what your agent’s operating system is and what events are triggering the logs for it to be flooded.
https://documentation.wazuh.com/current/user-manual/agent/agent-management/antiflooding.html#flooding-status-red-areaFor Example:
A frequent culprit for this issue on Windows machines is audit failure events related to Chrome. These events (Event ID: 4673) are often harmless and can be safely filtered.
https://support.google.com/chrome/a/thread/15440066/excessive-windows-10-audit-failures-from-chrome-exe?hl=enCheck the 'C:\Program Files (x86)\ossec-agent\ossec.conf and add the EventID != 4673 with the configuration of <location>Security</location> inside <localfile> existing configuration.
<localfile>
<location>Security</location>
<log_format>eventchannel</log_format>
<query>Event/System[EventID != 5145 and EventID != 5156 and EventID != 5447 and EventID != 4656 and EventID != 4658 and EventID != 4663 and EventID != 4660 and EventID != 4670 and EventID != 4690 and EventID != 4703 and EventID != 4907 and EventID != 5152 and EventID != 5157 and EventID != 4673 ]
</query>
<localfile>
Save the config file.
Then, restart the agent and check if the alert has stopped triggering.
Restart-Service -Name wazuh
Based on your alert, you can change your event ID as mentioned above.
You can find the detailed explanation of how the agent's events are buffered in the following documentation:
https://documentation.wazuh.com/current/user-manual/agents/antiflooding.htmlAlso, ensure the agents are equal to the wazuh-manager or the wazuh-manager version is higher than the wazuh-agent.
Let me know if that works for you!