Good morning,
Thank you for this group - it is a huge help. I apologize if this topic has been addressed previously, sometimes my search capabilities are lacking.
I had to rebuild my Wazuh server recently. It is an "all-in-one" deployment as I'm monitoring only about 70 systems. Once I completed the rebuild, all the agents began to show up in the portal. However, although data is coming in based on the tail -f on the alerts.log in /var/ossec/logs/alerts, when I attempt to look at Security events in the dashboard it indicates "There are no results for the selected time range. Try another one." (see attached screengrab)
I didn't perform the setup on the initial server, so this may have been an issue originally but I'm uncertain how the engineer resolved it.
Below are the config files for Elasticsearch, Kibana, and Filebeat but I'm happy to provide additional configs or info if needed.
Elasticsearch.yml:
network.host: xxx.xxx.32.33
cluster.initial_master_nodes: node-1
opendistro_security.ssl.transport.pemcert_filepath: /etc/elasticsearch/certs/elasticsearch.pem
opendistro_security.ssl.transport.pemkey_filepath: /etc/elasticsearch/certs/elasticsearch.key
opendistro_security.ssl.transport.pemtrustedcas_filepath: /etc/elasticsearch/certs/root-ca.pem
opendistro_security.ssl.transport.enforce_hostname_verification: false
opendistro_security.ssl.transport.resolve_hostname: false
opendistro_security.ssl.http.enabled: true
opendistro_security.ssl.http.pemcert_filepath: /etc/elasticsearch/certs/elasticsearch_http.pem
opendistro_security.ssl.http.pemkey_filepath: /etc/elasticsearch/certs/elasticsearch_http.key
opendistro_security.ssl.http.pemtrustedcas_filepath: /etc/elasticsearch/certs/root-ca.pem
opendistro_security.nodes_dn:
- CN=node-1,OU=Docu,O=Wazuh,L=California,C=US
opendistro_security.authcz.admin_dn:
- CN=admin,OU=Docu,O=Wazuh,L=California,C=US
opendistro_security.audit.type: internal_elasticsearch
opendistro_security.enable_snapshot_restore_privilege: true
opendistro_security.check_snapshot_restore_write_privileges: true
opendistro_security.restapi.roles_enabled: ["all_access", "security_rest_api_access"]
cluster.routing.allocation.disk.threshold_enabled: false
node.max_local_storage_nodes: 3
path.data: /var/lib/elasticsearch
path.logs: /var/log/elasticsearch
Filebeat.yml:
# Wazuh - Filebeat configuration file
output.elasticsearch:
hosts: ["xxx.xxx.32.33:9200"]
protocol: https
username: "xxx"
password: "xxx"
ssl.certificate_authorities:
- /etc/filebeat/certs/root-ca.pem
ssl.certificate: "/etc/filebeat/certs/filebeat.pem"
ssl.key: "/etc/filebeat/certs/filebeat.key"
setup.template.json.enabled: true
setup.template.json.path: '/etc/filebeat/wazuh-template.json'
setup.ilm.overwrite: true
setup.ilm.enabled: false
filebeat.modules:
- module: wazuh
alerts:
enabled: true
archives:
enabled: false
Kibana.yml:
server.host: xxx.xxx.32.33
server.port: 443
elasticsearch.ssl.verificationMode: certificate
elasticsearch.username: xxxxxxxxxx
elasticsearch.password: xxxxxxxxxx
elasticsearch.requestHeadersWhitelist: ["securitytenant","Authorization"]
opendistro_security.multitenancy.enabled: false
opendistro_security.readonly_mode.roles: ["kibana_read_only"]
server.ssl.enabled: true
server.ssl.key: "/etc/kibana/certs/kibana.key"
server.ssl.certificate: "/etc/kibana/certs/kibana.pem"
elasticsearch.ssl.certificateAuthorities: ["/etc/kibana/certs/root-ca.pem"]
server.defaultRoute: /app/wazuh
Thank you in advance for your help - it's much appreciated.
Bill