Hi,
You should review the full event pipeline to find the issue: collecting, reception, rule matching, and indexing.
Collecting
Review if your agent is reading the log that you are configuring. You can read the ossec.log file and search for "localfile" entries. It could be a good idea to enable debug mode.
According to the
documentation:
> Wildcards can be used on Linux and Windows systems, if the log file doesn’t exist at ossec-logcollector start time, such log will be re-scanned after logcollector.vcheck_files seconds.
Reception
You can review the events that the manager receives by enabling the
logall_json setting. Enable it and verify that you see the events in the
/var/ossec/logs/archives/archives.json file.
Rule matching
Once you know that you are receiving the events, you should review if the event is properly decoded and matching a rule. To do this, you can paste the raw events (from the archives.json file) to the tool logtest under /var/ossec/bin.
If any rule is triggered, you should review the decoders/rules in order to fix them or create new ones.
Indexing
Finally, if the alert generated has a level equal to or higher than 3, you should be able to see it in Kibana > Discover section. If you can't find them, review the filebeat/logstash/elasticsearch logs, it could be an issue with the index template.
Please, try to identify where is the issue and we will try to help you.
I hope it helps.