To investigate this issue, the following information is required. You can obtain it as described below:
Wazuh versions (Manager, Indexer, Dashboard) and Docker image tags
Check the Docker image tags or run wazuh-manager -v inside the manager container.
Vulnerability Detection status
Review the <vulnerability-detection> section in ossec.conf on the Wazuh Manager to confirm it is enabled.
Syscollector status
Verify that <wodle name="syscollector"> is enabled in the agent configuration.
Relevant logs
Check Wazuh Manager logs for vulnerability-related messages, for example in /var/ossec/logs/ossec.log or by running docker logs wazuh-manager.
Inventory update
Confirm that agents reported updated package inventory after the server updates.
If you share me more this details, I can try to help you to identify why the vulnerability count did not change.
Below are links to the official Wazuh documentation that explain these components in detail:
The problem is that he Indexer restarted 7 hours ago, but the Manager did not. When the Indexer goes down, the Manager (specifically the filebeat service inside it) often stops sending data or gets stuck waiting for the connection to come back. Even if the Indexer comes back up, the Manager's shipping pipeline might be "stalled."
Step 1:
We need to re-establish the connection chain. Since you are on Docker, please run these commands on your host machine:
Restart the Manager to reconnect to the Indexer:
Wait 2 minutes, then check the Filebeat logs inside the manager to ensure it is talking to the indexer:
Step 2
If the restart didn't solve it after a few minutes, your Vulnerability Database inside the container might be stale.
Let's force Wazuh to delete its internal database and re-download the vulnerability definitions from scratch.
Run these commands on your Docker Host:
Enter the Manager container as root:
Stop the Wazuh service (inside the container):
Check if the database file exists:
ls -l /var/ossec/queue/vulnerabilities/cve.db
rm -f /var/ossec/queue/vulnerabilities/cve.db
It will start downloading the OVAL/NVD feeds.
Once downloaded, it will re-scan your inventory.
Hello,
Thank you for the logs and the directory list. They were very helpful.
Based on the errors you sent (Invalid element in the configuration), it looks like there are two likely causes for this issue:
Outdated Configuration: You are running Wazuh 4.13, but your ossec.conf seems to contain settings from an older version.
Permissions: The folder /var/ossec/queue/vd is owned by root. It is possible that the Wazuh user cannot write updates there.
Here is how you can try to fix both:
Step 1: Update the ConfigurationWe need to replace the old vulnerability settings with the correct ones for version 4.13.
Enter the container:
Edit the configuration file:
Search for the <vulnerability-detection> block. Delete the entire block and replace it with this standard configuration:
While you are still inside the container, run these commands to ensure Wazuh has the right permissions:
Restart the service and check if the "Invalid element" errors are gone
If the fix works, you should see a message saying Vulnerability Detection module started instead of the previous warnings.
Let me know if this clears up the errors in the log.
If this does not work: Could you please let me know if you have updated this instance from an older version in the past? If so, do you remember which version you were running before 4.13.0? This will help us understand if there are other leftover configuration files.
Hello, Since the service has just restarted successfully, the Vulnerability Detector is likely in its Initialization phase. It needs to download files from the internet.
The Possible Issue:
This download process usually takes 20 to 60 minutes. During this time, the Dashboard will not show updates, and it might seem like nothing is happening. However, if the Docker container does not have internet access, this download will fail.
To confirm if it is currently downloading in the background or if it is blocked by a firewall, please run these two commands on your host and paste the output here:
Check the Module Status (Logs): This will tell us if the download started or failed today.
Check Internet Connectivity: This verifies if the container can reach the vulnerability database servers.
Once I see these logs, I will be able to tell you if we just need to wait for the download to finish or if we need to fix a network setting.