Hello everyone, I have two questions that I would like to ask you.The Wazuh Wodle runs at specific intervals, which could be contributing to the observed spikes. Please verify if the interval defined in the ossec.conf for the AWS S3 Wodle for the WAF aligns with the spikes in the transmission log.
Example configuration for the AWS S3 wodle:
<wodle name="aws-s3">
<disabled>no</disabled>
<interval>10m</interval>
<run_on_start>yes</run_on_start>
<skip_on_error>yes</skip_on_error>
<bucket type="waf">
<name><WAZUH_AWS_BUCKET></name>
<path>waf</path> <!-- PUT THE S3 BUCKET PREFIX IF THE LOGS ARE NOT STORED IN THE BUCKET'S ROOT PATH -->
<aws_profile>default</aws_profile>
</bucket>
</wodle>
Regarding the log truncation, this is likely due to the default ordersize defined on the Wazuh manager for the json logs. By default, it extracts only 256 fields per event. If the logs are larger(more then 256 fields on json), you can increase the limit by setting analysisd.decoder_order_size to 512 or 1024 in the file given below: