This is the log I want to show up in Wazuh dashboard:
=======================================
{"timestamp":"2023-04-06T04:48:37.167+0000","agent":{"id":"001","name":"DC1","ip":"192.168.4.89"},"manager":{"name":"wazuh"},"id":"1680756517.22243426","full_log":"{\"win\":{\"system\":{\"providerName\":\"Microsoft-Windows-Security-Auditing\",\"providerGuid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"eventID\":\"4768\",\"version\":\"0\",\"level\":\"0\",\"task\":\"14339\",\"opcode\":\"0\",\"keywords\":\"0x8020000000000000\",\"systemTime\":\"2023-04-06T04:48:36.177656700Z\",\"eventRecordID\":\"30879856\",\"processID\":\"624\",\"threadID\":\"1552\",\"channel\":\"Security\",\"computer\":\"DC1.domain.local\",\"severityValue\":\"AUDIT_SUCCESS\",\"message\":\"\\\"A
Kerberos authentication ticket (TGT) was requested.\\r\\n\\r\\nAccount
Information:\\r\\n\\tAccount Name:\\t\\tdennis\\r\\n\\tSupplied Realm
Name:\\tdomain.local\\r\\n\\tUser
ID:\\t\\t\\tS-1-5-21-4199703994-660692394-3919416683-1105\\r\\n\\r\\nService
Information:\\r\\n\\tService Name:\\t\\tkrbtgt\\r\\n\\tService
ID:\\t\\tS-1-5-21-4199703994-660692394-3919416683-502\\r\\n\\r\\nNetwork
Information:\\r\\n\\tClient Address:\\t\\t192.168.4.100\\r\\n\\tClient
Port:\\t\\t59055\\r\\n\\r\\nAdditional Information:\\r\\n\\tTicket
Options:\\t\\t0x50000010\\r\\n\\tResult Code:\\t\\t0x0\\r\\n\\tTicket
Encryption Type:\\t0x12\\r\\n\\tPre-Authentication
Type:\\t2\\r\\n\\r\\nCertificate Information:\\r\\n\\tCertificate Issuer
Name:\\t\\t\\r\\n\\tCertificate Serial Number:\\t\\r\\n\\tCertificate
Thumbprint:\\t\\t\\r\\n\\r\\nCertificate information is only provided if
a certificate was used for
pre-authentication.\\r\\n\\r\\nPre-authentication types, ticket options,
encryption types and result codes are defined in RFC
4120.\\\"\"},\"eventdata\":{\"targetUserName\":\"dennis\",\"targetDomainName\":\"domain.local\",\"targetSid\":\"S-1-5-21-4199703994-660692394-3919416683-1105\",\"serviceName\":\"krbtgt\",\"serviceSid\":\"S-1-5-21-4199703994-660692394-3919416683-502\",\"ticketOptions\":\"0x50000010\",\"status\":\"0x0\",\"ticketEncryptionType\":\"0x12\",\"preAuthType\":\"2\",\"ipAddress\":\"192.168.4.100\",\"ipPort\":\"59055\"}}}","decoder":{"name":"windows_eventchannel"},"data":{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4768","version":"0","level":"0","task":"14339","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-04-06T04:48:36.177656700Z","eventRecordID":"30879856","processID":"624","threadID":"1552","channel":"Security","computer":"DC1.domain.local","severityValue":"AUDIT_SUCCESS","message":"\"A
Kerberos authentication ticket (TGT) was requested.\r\n\r\nAccount
Information:\r\n\tAccount Name:\t\tdennis\r\n\tSupplied Realm
Name:\tdomain.local\r\n\tUser
ID:\t\t\tS-1-5-21-4199703994-660692394-3919416683-1105\r\n\r\nService
Information:\r\n\tService Name:\t\tkrbtgt\r\n\tService
ID:\t\tS-1-5-21-4199703994-660692394-3919416683-502\r\n\r\nNetwork
Information:\r\n\tClient Address:\t\t192.168.4.100\r\n\tClient
Port:\t\t59055\r\n\r\nAdditional Information:\r\n\tTicket
Options:\t\t0x50000010\r\n\tResult Code:\t\t0x0\r\n\tTicket Encryption
Type:\t0x12\r\n\tPre-Authentication Type:\t2\r\n\r\nCertificate
Information:\r\n\tCertificate Issuer Name:\t\t\r\n\tCertificate Serial
Number:\t\r\n\tCertificate Thumbprint:\t\t\r\n\r\nCertificate
information is only provided if a certificate was used for
pre-authentication.\r\n\r\nPre-authentication types, ticket options,
encryption types and result codes are defined in RFC
4120.\""},"eventdata":{"targetUserName":"dennis","targetDomainName":"domain.local","targetSid":"S-1-5-21-4199703994-660692394-3919416683-1105","serviceName":"krbtgt","serviceSid":"S-1-5-21-4199703994-660692394-3919416683-502","ticketOptions":"0x50000010","status":"0x0","ticketEncryptionType":"0x12","preAuthType":"2","ipAddress":"192.168.4.100","ipPort":"59055"}}},"location":"EventChannel"}
=======================================
When I run this through the logtest - I get the following results:
=======================================
Starting wazuh-logtest v4.4.0
Type one log per line
{"timestamp":"2023-04-06T04:48:37.167+0000","agent":{"id":"001","name":"DC1","ip":"192.168.4.89"},"manager":{"name":"wazuh"},"id":"1680756517.22243426","full_log":"{\"win\":{\"system\":{\"providerName\":\"Microsoft-Windows-Security-Auditing\",\"providerGuid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"eventID\":\"4768\",\"version\":\"0\",\"level\":\"0\",\"task\":\"14339\",\"opcode\":\"0\",\"keywords\":\"0x8020000000000000\",\"systemTime\":\"2023-04-06T04:48:36.177656700Z\",\"eventRecordID\":\"30879856\",\"processID\":\"624\",\"threadID\":\"1552\",\"channel\":\"Security\",\"computer\":\"DC1.domain.local\",\"severityValue\":\"AUDIT_SUCCESS\",\"message\":\"\\\"A Kerberos authentication ticket (TGT) was requested.\\r\\n\\r\\nAccount Information:\\r\\n\\tAccount Name:\\t\\tdennis\\r\\n\\tSupplied Realm Name:\\tdomain.local\\r\\n\\tUser ID:\\t\\t\\tS-1-5-21-4199703994-660692394-3919416683-1105\\r\\n\\r\\nService Information:\\r\\n\\tService Name:\\t\\tkrbtgt\\r\\n\\tService ID:\\t\\tS-1-5-21-4199703994-660692394-3919416683-502\\r\\n\\r\\nNetwork Information:\\r\\n\\tClient Address:\\t\\t192.168.4.100\\r\\n\\tClient Port:\\t\\t59055\\r\\n\\r\\nAdditional Information:\\r\\n\\tTicket Options:\\t\\t0x50000010\\r\\n\\tResult Code:\\t\\t0x0\\r\\n\\tTicket Encryption Type:\\t0x12\\r\\n\\tPre-Authentication Type:\\t2\\r\\n\\r\\nCertificate Information:\\r\\n\\tCertificate Issuer Name:\\t\\t\\r\\n\\tCertificate Serial Number:\\t\\r\\n\\tCertificate Thumbprint:\\t\\t\\r\\n\\r\\nCertificate information is only provided if a certificate was used for pre-authentication.\\r\\n\\r\\nPre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.\\\"\"},\"eventdata\":{\"targetUserName\":\"dennis\",\"targetDomainName\":\"domain.local\",\"targetSid\":\"S-1-5-21-4199703994-660692394-3919416683-1105\",\"serviceName\":\"krbtgt\",\"serviceSid\":\"S-1-5-21-4199703994-660692394-3919416683-502\",\"ticketOptions\":\"0x50000010\",\"status\":\"0x0\",\"ticketEncryptionType\":\"0x12\",\"preAuthType\":\"2\",\"ipAddress\":\"192.168.4.100\",\"ipPort\":\"59055\"}}}","decoder":{"name":"windows_eventchannel"},"data":{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4768","version":"0","level":"0","task":"14339","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-04-06T04:48:36.177656700Z","eventRecordID":"30879856","processID":"624","threadID":"1552","channel":"Security","computer":"DC1.domain.local","severityValue":"AUDIT_SUCCESS","message":"\"A Kerberos authentication ticket (TGT) was requested.\r\n\r\nAccount Information:\r\n\tAccount Name:\t\tdennis\r\n\tSupplied Realm Name:\tdomain.local\r\n\tUser ID:\t\t\tS-1-5-21-4199703994-660692394-3919416683-1105\r\n\r\nService Information:\r\n\tService Name:\t\tkrbtgt\r\n\tService ID:\t\tS-1-5-21-4199703994-660692394-3919416683-502\r\n\r\nNetwork Information:\r\n\tClient Address:\t\t192.168.4.100\r\n\tClient Port:\t\t59055\r\n\r\nAdditional Information:\r\n\tTicket Options:\t\t0x50000010\r\n\tResult Code:\t\t0x0\r\n\tTicket Encryption Type:\t0x12\r\n\tPre-Authentication Type:\t2\r\n\r\nCertificate Information:\r\n\tCertificate Issuer Name:\t\t\r\n\tCertificate Serial Number:\t\r\n\tCertificate Thumbprint:\t\t\r\n\r\nCertificate information is only provided if a certificate was used for pre-authentication.\r\n\r\nPre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.\""},"eventdata":{"targetUserName":"dennis","targetDomainName":"domain.local","targetSid":"S-1-5-21-4199703994-660692394-3919416683-1105","serviceName":"krbtgt","serviceSid":"S-1-5-21-4199703994-660692394-3919416683-502","ticketOptions":"0x50000010","status":"0x0","ticketEncryptionType":"0x12","preAuthType":"2","ipAddress":"192.168.4.100","ipPort":"59055"}}},"location":"EventChannel"}
**Phase 1: Completed pre-decoding.
full event: '{"timestamp":"2023-04-06T04:48:37.167+0000","agent":{"id":"001","name":"DC1","ip":"192.168.4.89"},"manager":{"name":"wazuh"},"id":"1680756517.22243426","full_log":"{\"win\":{\"system\":{\"providerName\":\"Microsoft-Windows-Security-Auditing\",\"providerGuid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"eventID\":\"4768\",\"version\":\"0\",\"level\":\"0\",\"task\":\"14339\",\"opcode\":\"0\",\"keywords\":\"0x8020000000000000\",\"systemTime\":\"2023-04-06T04:48:36.177656700Z\",\"eventRecordID\":\"30879856\",\"processID\":\"624\",\"threadID\":\"1552\",\"channel\":\"Security\",\"computer\":\"DC1.domain.local\",\"severityValue\":\"AUDIT_SUCCESS\",\"message\":\"\\\"A Kerberos authentication ticket (TGT) was requested.\\r\\n\\r\\nAccount Information:\\r\\n\\tAccount Name:\\t\\tdennis\\r\\n\\tSupplied Realm Name:\\tdomain.local\\r\\n\\tUser ID:\\t\\t\\tS-1-5-21-4199703994-660692394-3919416683-1105\\r\\n\\r\\nService Information:\\r\\n\\tService Name:\\t\\tkrbtgt\\r\\n\\tService ID:\\t\\tS-1-5-21-4199703994-660692394-3919416683-502\\r\\n\\r\\nNetwork Information:\\r\\n\\tClient Address:\\t\\t192.168.4.100\\r\\n\\tClient Port:\\t\\t59055\\r\\n\\r\\nAdditional Information:\\r\\n\\tTicket Options:\\t\\t0x50000010\\r\\n\\tResult Code:\\t\\t0x0\\r\\n\\tTicket Encryption Type:\\t0x12\\r\\n\\tPre-Authentication Type:\\t2\\r\\n\\r\\nCertificate Information:\\r\\n\\tCertificate Issuer Name:\\t\\t\\r\\n\\tCertificate Serial Number:\\t\\r\\n\\tCertificate Thumbprint:\\t\\t\\r\\n\\r\\nCertificate information is only provided if a certificate was used for pre-authentication.\\r\\n\\r\\nPre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.\\\"\"},\"eventdata\":{\"targetUserName\":\"dennis\",\"targetDomainName\":\"domain.local\",\"targetSid\":\"S-1-5-21-4199703994-660692394-3919416683-1105\",\"serviceName\":\"krbtgt\",\"serviceSid\":\"S-1-5-21-4199703994-660692394-3919416683-502\",\"ticketOptions\":\"0x50000010\",\"status\":\"0x0\",\"ticketEncryptionType\":\"0x12\",\"preAuthType\":\"2\",\"ipAddress\":\"192.168.4.100\",\"ipPort\":\"59055\"}}}","decoder":{"name":"windows_eventchannel"},"data":{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4768","version":"0","level":"0","task":"14339","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-04-06T04:48:36.177656700Z","eventRecordID":"30879856","processID":"624","threadID":"1552","channel":"Security","computer":"DC1.domain.local","severityValue":"AUDIT_SUCCESS","message":"\"A Kerberos authentication ticket (TGT) was requested.\r\n\r\nAccount Information:\r\n\tAccount Name:\t\tdennis\r\n\tSupplied Realm Name:\tdomain.local\r\n\tUser ID:\t\t\tS-1-5-21-4199703994-660692394-3919416683-1105\r\n\r\nService Information:\r\n\tService Name:\t\tkrbtgt\r\n\tService ID:\t\tS-1-5-21-4199703994-660692394-3919416683-502\r\n\r\nNetwork Information:\r\n\tClient Address:\t\t192.168.4.100\r\n\tClient Port:\t\t59055\r\n\r\nAdditional Information:\r\n\tTicket Options:\t\t0x50000010\r\n\tResult Code:\t\t0x0\r\n\tTicket Encryption Type:\t0x12\r\n\tPre-Authentication Type:\t2\r\n\r\nCertificate Information:\r\n\tCertificate Issuer Name:\t\t\r\n\tCertificate Serial Number:\t\r\n\tCertificate Thumbprint:\t\t\r\n\r\nCertificate information is only provided if a certificate was used for pre-authentication.\r\n\r\nPre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.\""},"eventdata":{"targetUserName":"dennis","targetDomainName":"domain.local","targetSid":"S-1-5-21-4199703994-660692394-3919416683-1105","serviceName":"krbtgt","serviceSid":"S-1-5-21-4199703994-660692394-3919416683-502","ticketOptions":"0x50000010","status":"0x0","ticketEncryptionType":"0x12","preAuthType":"2","ipAddress":"192.168.4.100","ipPort":"59055"}}},"location":"EventChannel"}'
**Phase 2: Completed decoding.
name: 'json'
agent.id: '001'
agent.ip: '192.168.4.89'
agent.name: 'DC1'
data.win.eventdata.ipAddress: '192.168.4.100'
data.win.eventdata.ipPort: '59055'
data.win.eventdata.preAuthType: '2'
data.win.eventdata.serviceName: 'krbtgt'
data.win.eventdata.serviceSid: 'S-1-5-21-4199703994-660692394-3919416683-502'
data.win.eventdata.status: '0x0'
data.win.eventdata.targetDomainName: 'domain.local'
data.win.eventdata.targetSid: 'S-1-5-21-4199703994-660692394-3919416683-1105'
data.win.eventdata.targetUserName: 'dennis'
data.win.eventdata.ticketEncryptionType: '0x12'
data.win.eventdata.ticketOptions: '0x50000010'
data.win.system.channel: 'Security'
data.win.system.computer: 'DC1.domain.local'
data.win.system.eventID: '4768'
data.win.system.eventRecordID: '30879856'
data.win.system.keywords: '0x8020000000000000'
data.win.system.level: '0'
data.win.system.message: '"A Kerberos authentication ticket (TGT) was requested.
Account Information:
Account Name:
dennis
Supplied Realm Name:
domain.local
User ID:
S-1-5-21-4199703994-660692394-3919416683-1105
Service Information:
Service Name:
krbtgt
Service ID:
S-1-5-21-4199703994-660692394-3919416683-502
Network Information:
Client Address:
192.168.4.100
Client Port:
59055
Additional Information:
Ticket Options:
0x50000010
Result Code:
0x0
Ticket Encryption Type:
0x12
Pre-Authentication Type:
2
Certificate Information:
Certificate Issuer Name:
Certificate Serial Number:
Certificate Thumbprint:
Certificate information is only provided if a certificate was used for pre-authentication.
Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120."'
data.win.system.opcode: '0'
data.win.system.processID: '624'
data.win.system.providerGuid: '{54849625-5478-4994-A5BA-3E3B0328C30D}'
data.win.system.providerName: 'Microsoft-Windows-Security-Auditing'
data.win.system.severityValue: 'AUDIT_SUCCESS'
data.win.system.systemTime: '2023-04-06T04:48:36.177656700Z'
data.win.system.task: '14339'
data.win.system.threadID: '1552'
data.win.system.version: '0'
decoder.name: 'windows_eventchannel'
full_log: '{"win":{"system":{"providerName":"Microsoft-Windows-Security-Auditing","providerGuid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","eventID":"4768","version":"0","level":"0","task":"14339","opcode":"0","keywords":"0x8020000000000000","systemTime":"2023-04-06T04:48:36.177656700Z","eventRecordID":"30879856","processID":"624","threadID":"1552","channel":"Security","computer":"DC1.domain.local","severityValue":"AUDIT_SUCCESS","message":"\"A Kerberos authentication ticket (TGT) was requested.\r\n\r\nAccount Information:\r\n\tAccount Name:\t\tdennis\r\n\tSupplied Realm Name:\tdomain.local\r\n\tUser ID:\t\t\tS-1-5-21-4199703994-660692394-3919416683-1105\r\n\r\nService Information:\r\n\tService Name:\t\tkrbtgt\r\n\tService ID:\t\tS-1-5-21-4199703994-660692394-3919416683-502\r\n\r\nNetwork Information:\r\n\tClient Address:\t\t192.168.4.100\r\n\tClient Port:\t\t59055\r\n\r\nAdditional Information:\r\n\tTicket Options:\t\t0x50000010\r\n\tResult Code:\t\t0x0\r\n\tTicket Encryption Type:\t0x12\r\n\tPre-Authentication Type:\t2\r\n\r\nCertificate Information:\r\n\tCertificate Issuer Name:\t\t\r\n\tCertificate Serial Number:\t\r\n\tCertificate Thumbprint:\t\t\r\n\r\nCertificate information is only provided if a certificate was used for pre-authentication.\r\n\r\nPre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.\""},"eventdata":{"targetUserName":"dennis","targetDomainName":"domain.local","targetSid":"S-1-5-21-4199703994-660692394-3919416683-1105","serviceName":"krbtgt","serviceSid":"S-1-5-21-4199703994-660692394-3919416683-502","ticketOptions":"0x50000010","status":"0x0","ticketEncryptionType":"0x12","preAuthType":"2","ipAddress":"192.168.4.100","ipPort":"59055"}}}'
id: '1680756517.22243426'
location: 'EventChannel'
manager.name: 'wazuh'
timestamp: '2023-04-06T04:48:37.167+0000'
=======================================
It seems to parse correctly - it just doesn't show up in Wazuh Dashboard.