Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. This integration allows you to send Wazuh logs to your Logz.io SIEM account.
Configuration
Before you begin, you’ll need:
- Filebeat
- Root access
Configure Wazuh for JSON logging
In the Wazuh configuration file (/var/ossec/etc/ossec.conf), find the <logging>
tag, and set the <log_format>
property to json
.
<logging>
<log_format>json</log_format>
</logging>
Restart Wazuh.
sudo systemctl restart wazuh-manager
Download the Logz.io public certificate to your credentials server
For HTTPS shipping, download the Logz.io public certificate to your certificate authority folder.
sudo curl https://raw.githubusercontent.com/logzio/public-certificates/master/AAACertificateServices.crt --create-dirs -o /etc/pki/tls/certs/COMODORSADomainValidationSecureServerCA.crt
Add Wazuh as an input
In the Filebeat configuration file (/etc/filebeat/filebeat.yml), add Wazuh to the filebeat.inputs section.
Replace <<LOG-SHIPPING-TOKEN>>
with the token of the account you want to ship to.
Filebeat requires a file extension specified for the log input.
# ...
filebeat.inputs:
- type: filestream
paths:
- /var/ossec/logs/alerts/alerts.json
fields:
logzio_codec: json
# Your Logz.io account token. You can find your token at
# https://app.logz.io/#/dashboard/settings/manage-accounts
token: <<LOG-SHIPPING-TOKEN>>
type: wazuh
fields_under_root: true
encoding: utf-8
ignore_older: 3h
If you’re running Filebeat 7 to 8.1, paste the code block below instead:
# ...
filebeat.inputs:
- type: log
paths:
- /var/ossec/logs/alerts/alerts.json
fields:
logzio_codec: json
# Your Logz.io account token. You can find your token at
# https://app.logz.io/#/dashboard/settings/manage-accounts
token: <<LOG-SHIPPING-TOKEN>>
type: wazuh
fields_under_root: true
encoding: utf-8
ignore_older: 3h
Set Logz.io as the output
If Logz.io is not an output, add it now. Remove all other outputs.
Replace <<LISTENER-HOST>>
with the host for your region. For example, listener.logz.io
if your account is hosted on AWS US East, or listener-nl.logz.io
if hosted on Azure West Europe. The required port depends whether HTTP or HTTPS is used: HTTP = 8070, HTTPS = 8071.
# ...
output.logstash:
hosts: ["<<LISTENER-HOST>>:5015"]
ssl:
certificate_authorities: ['/etc/pki/tls/certs/COMODORSADomainValidationSecureServerCA.crt']
Start Filebeat
Start or restart Filebeat for the changes to take effect.
Check Logz.io for your logs
Give your logs some time to get from your system to ours, and then open Open Search Dashboards.
You can search for type:wazuh
to filter for your logs. Your logs should be already parsed thanks to the Logz.io preconfigured parsing pipeline.
If you still don’t see your logs, see Filebeat troubleshooting.