No alerts generated #1742
-
I just reinstalled 2.3.2 from the ISO last night, and there has been no HID or NID alerts generated since then in the hunt interface. I only did minimal tuning today for some malfunctioning Talos rules that had fired a ton of FPs (see post here), but even ossec on the SO host isn't showing any activity, which there's usually something! Kibana is showing syslog incoming, so there's data there. And there's tons of PCAPs in /nsm/pcap. Running so-status shows all services OK. I have no idea where to even start to troubleshoot this. Ideas? Additional details:
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 1 reply
-
I'd ensure Wazuh and Suricata logs don't show errors. Also, does Kibana
show any of this data? Are you able to perform a manual search of
event.dataset:alert and get results back?
…On Thu, Oct 29, 2020 at 5:35 PM netsecninja ***@***.***> wrote:
I just reinstalled 2.3.2 from the ISO last night, and there has been no
HID or NID alerts generated since then in the hunt interface. I only did
minimal tuning today for some malfunctioning Talos rules that had fired a
ton of FPs (see post here
<#1727>),
but even ossec on the SO host isn't showing any activity, which there's
usually something!
Kibana is showing syslog incoming, so there's data there. And there's tons
of PCAPs in /nsm/pcap. Running so-status shows all services OK. I have no
idea where to even start to troubleshoot this. Ideas?
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#1742>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AEAM3KFR23Y67SMNX7TQRNTSNHN3HANCNFSM4TEIV4FA>
.
|
Beta Was this translation helpful? Give feedback.
-
Just an update after spending hours messing with things. I found Wazuh rules stopped working after I cleared out the example rule in /nsm/wazuh/etc/rules/local_rules.xml. It appears the missing tag was required to remain otherwise Wazuh goes nuts. I found a sample of the original example rule and replaced it, and after restarting Wazuh it began producing alerts. Thinking that one minor change is what caused that issue, I turned my attention to Suricata. The only change I made was to use the Talos ruleset, which I did during the install. So I changed the config in securityonion_standalone.sts to:
Ran In the end, I am still confused why Talos ruleset stops alerting from happening at all. Given the log output above, there were functioning rules available and the process was running. My experiences so far show that minor changes brings SO to it's knees. I'm not doing anything advanced or undocumented. I appreciate all the work the team has put in to the product, it's a welcome upgrade and I know it will just get better from here on. If you would please add some resiliency in the application, that would be appreciated. |
Beta Was this translation helpful? Give feedback.
Just an update after spending hours messing with things. I found Wazuh rules stopped working after I cleared out the example rule in /nsm/wazuh/etc/rules/local_rules.xml. It appears the missing tag was required to remain otherwise Wazuh goes nuts. I found a sample of the original example rule and replaced it, and after restarting Wazuh it began producing alerts.
Thinking that one minor change is what caused that issue, I turned my attention to Suricata. The only change I made was to use the Talos ruleset, which I did during the install. So I changed the config in securityonion_standalone.sts to:
Ran
sudo salt securityonion_standalone state.apply …