Hello again!
The log you provided has no timestamp(this should match even when the decoder does not) and does not follow the expected decoder format.
root@manager:/home/vagrant# /var/ossec/bin/wazuh-logtest
Starting wazuh-logtest v4.2.5
Type one log per line
date= 2022-04-29 time=10:10:14 devname="FW1" devid="FG100ETK20008071" eventtim e=1651216214342718179 tz="+0300" logid="1059028704" type="utm" subtype="a pp-ctrl" eventtype="signature" level="information" vd="root" appid=40568 srcip=192.168.150.52 dstip=xxxxxxxxxx srcport=52939 dstport=443 srcintf="V LAN_150" srcintfrole="lan" dstintf="wan1" dstintfrole="wan" proto=6 servi ce="SSL" direction="incoming" policyid=3 sessionid=97877004 applist="defaul t" action="pass" appcat="Web.Client" app="HTTPS.BROWSER" hostname="xxxxxxx" incidentserialno=271766913 url="/" msg="Web.Client: H TTPS.BROWSER," apprisk="medium" scertcname="xxxxxxxxx"
**Phase 1: Completed pre-decoding.
full event: 'date= 2022-04-29 time=10:10:14 devname="FW1" devid="FG100ETK20008071" eventtim e=1651216214342718179 tz="+0300" logid="1059028704" type="utm" subtype="a pp-ctrl" eventtype="signature" level="information" vd="root" appid=40568 srcip=192.168.150.52 dstip=xxxxxxxxxx srcport=52939 dstport=443 srcintf="V LAN_150" srcintfrole="lan" dstintf="wan1" dstintfrole="wan" proto=6 servi ce="SSL" direction="incoming" policyid=3 sessionid=97877004 applist="defaul t" action="pass" appcat="Web.Client" app="HTTPS.BROWSER" hostname="xxxxxxx" incidentserialno=271766913 url="/" msg="Web.Client: H TTPS.BROWSER," apprisk="medium" scertcname="xxxxxxxxx"
'
**Phase 2: Completed decoding.
No decoder matched.
You can follow this workaround:
localfile block in the ossec.conf file. Adding the timestamp, so now it has the expected syslog timestamp, a brief descriptive Fortigate string, and the expected hostd. <localfile>
<log_format>syslog</log_format>
<location>/var/log/example.log</location>
<out_format>$(timestamp) Fortigate hostd: $(log)</out_format>
</localfile>
devid should be device_id, for example. As you can see in the parent decoder. <decoder name="fortigate-firewall-v3">
<type>syslog</type>
<prematch>date=\S+ time=\.+ devname=\S+ device_id=FG\w+ log_id=\d+ type=\S+ subtype=\S+ pri=\S+ vd=</prematch>
</decoder>
If you need some help creating this custom decoder, feel free to ask for help. Here you have some information about adding custom decoders and decoders syntax.
Have a nice weekend.
Hope this helps you,
Luis.
Hi All,
We are in the process of upgrading Wazuh from 4.0 to 4.1
While upgrading we haven’t received any error messages. Also while upgrading to 4.1, it automatically selects the latest version. We have tried with version but says invalid package.
We couldn’t login to Kibana Dashboard. It shows Wazuh API mismatch error.
Attached screenshots for ref.
Please help
We have used below link for the upgrade.
https://documentation.wazuh.com/4.0/upgrade-guide/upgrading-wazuh.html.
Thanks in advance.
Sharo