Hello digvijay!!
I imagine you are using our integration with GCP, if not, I attach the documentation:
The basic flow would be as follows:
1. Wazuh collects GCP events through its integration.
2. Wazuh analyzes the events and through its decoders and rules generates the alerts.
3. Filebeat sends the alerts to Elasticsearch where they can be viewed through Kibana.
Rules can be found in the following links:
To answer your original question, let's differentiate between alerts and events:
Alerts
- You can view your GCP alerts in the alerts file alerts.json, located by default at /var/ossec/logs/alerts/alerts.json. This file contains all the alerts generated by the Wazuh manager, including those coming from GCP.
- You can view your GCP alerts in Kibana (discover, security events in WUI, for example). A possible filter to find the alerts can be to filter by rule group: rule.group: gcp
Events
- It is possible that not all events collected by Wazuh GCP integration will generate an alert. These logs can be stored in the
archives.json file in
/var/ossec/logs/alerts/archives.json. To be able to store these events you should activate the setting
logall_json in your manager configuration. If you enable this option the space used will be increased on your disk, on average, for each generated alert 10 events are analyzed. If you choose to store the events, your storage will increase considerably.
- If you enable archives.json you can also configure Filebeat to send these events to Elasticsearch and create an index-pattern to display the events in Kibana.
I hope I have solved your doubts. Do not hesitate to ask us anything.
Best regards,
Alfonso Ruiz-Bravo