The Vulnerability Detection (VD) module generates alerts when new vulnerabilities are found or existing ones are resolved due to package installation, removal, or upgrade. However, not every detected change leads to an alert, generation depends on the context of detection.
1. Operating System AlertsAlerts are not triggered during the initial scan.
When an agent syncs with the manager for the first time, it simply reports the current OS version and patch level — no “new event” is detected.
Alerts only appear in subsequent scans, when the OS version or patch state changes.
Generated only when a package installation or removal adds or removes a vulnerability from the inventory.
The change must occur while the agent is running, and it must be captured during a scheduled Syscollector scan. (Deltas messages)
If the change happens while the agent is stopped or is only detected after a restart, no alert will be generated.
Cluster environments:
When an agent connects to a different manager node, the inventory syncs but no alerts are generated during that initial synchronization.
Content updates:
When new CVE definitions or vulnerability mappings are downloaded, all agents are re-scanned to refresh their inventory. This re-scan does not generate alerts, even if changes are found.
To confirm that alerts are being forwarded correctly, we need to verify that Filebeat is functioning as expected.
Please run the following command on the Wazuh manager:
This will check whether Filebeat can successfully connect to the Wazuh-Indexer instance.
Aditionally, can you enable debug mode by setting the following parameter in /var/ossec/etc/internal_options.conf:
Restart the Wazuh Manager to apply the changes:
Then, share the ossec.log file for further analysis. Ensure that any sensitive information is removed before sharing. You can use my personal email.
Try please to reproduce this scenario of the kernel with the debug mode enabled
Thanks for the logs!
I reviewed them, and everything appears correct — I can see at least 10,000 alerts being generated.
For example, one of the alert messages looks like this:
This type of report should generate an alert in the following locations:
/var/ossec/logs/alerts/alerts.json
/var/ossec/logs/alerts/alerts.log
Additionally, it should trigger Filebeat to index the event, allowing you to find it under the wazuh-alerts-* indices in Wazuh-Indexer.
If you confirm that this entry exists in alerts.json or alerts.log, the next step is to verify the number of indices currently created in Wazuh Indexer. A shard or index limit may be preventing new data from being written.
You can review and tune these settings here: Wazuh Indexer Tuning — Shards and Replicas
Did you make any recent changes to the alert configuration? Also, could you please verify if there is any filter or rule in place that might be blocking the alerts?
When you have a moment, could you repeat the test and share with me the alerts.json file corresponding to the day of the test? That will help me review the event flow in detail.
Hi MaP,
I was on PTO until today.
It’s likely that the decoder is causing the alerts to be blocked. Could you please check it and perform a test with the decoder disabled in order to confirm?
Hi MaP,
The issue you mentioned does not appear to be related to your current problem. If you can run the test I mentioned earlier, it will help the team identify a possible root cause.
If alerts are being generated, the next step is to check Filebeat. If Filebeat is working correctly, we should verify the connectivity with the indexer. If connectivity is fine, then we should confirm that the indexer is allowing the creation of new documents.