Because now the problem is we have new log files created daily. Is this 
something OSSEC is not capable of?

On Wednesday, January 27, 2016 at 10:43:52 AM UTC-5, Greg Burns wrote:
>
> That worked! I think I was not testing it properly. I used the tail -f as 
> you said and added the line with the alert. I really appreciate your help. 
>
> I have one more question. Is there anyway to monitor new log files as they 
> appear? 
>
> This is the naming convention:
> BatchLog_LT_01192016203220
>
> In the config file could I put something like  ? Would that look at all 
> files with that name convention? It seems the last 6 numbers may change 
>  
>  <localfile>
>     <location>C:\logs\Batch_Log_LT_%m%d%y</location>
>     <log_format>syslog</log_format>
>   </localfile>
>
>
> On Tuesday, January 26, 2016 at 10:46:06 AM UTC-5, LostInThe Tubez wrote:
>>
>> Great, so we know OSSEC is matching against your custom rule. Next step 
>> would be to make sure the alert is showing up in 
>> /var/ossec/logs/alerts/alerts.log on the OSSEC manager. Double check you’ve 
>> restarted the manager since you made the edit to local_rules.xml. If your 
>> OSSEC manager isn’t too busy, I find the easiest way to do a live test of a 
>> rule is to tail –f the alerts.log on the server so you can watch as new 
>> logs are written to it. Then, on the agent, copy/paste your test log line 
>> into C:\logs\BatchLog_LT_01192016203220. After a moment or two, you should 
>> see it show up in the tailed alerts.log file on the manager. In that alert 
>> entry it will indicate whether an email was generated or not. The header 
>> for the alert will look something like this: “** Alert 1453814129.49577: 
>> mail  - local,syslog,”. “mail” being the keyword you’re looking for.
>>
>>  
>>
>> If you see a mail was generated, you know you are dealing with an email 
>> delivery problem and not an OSSEC detection problem.
>>
>>  
>>
>>  
>>
>> *From:* ossec...@googlegroups.com [mailto:ossec...@googlegroups.com] *On 
>> Behalf Of *Greg Burns
>> *Sent:* Tuesday, January 26, 2016 8:28 AM
>> *To:* ossec-list <ossec...@googlegroups.com>
>> *Subject:* Re: [ossec-list] Log file not triggering alert
>>
>>  
>>
>> Thanks for the response.
>>
>>  
>>
>> I ran log test with the following output:
>>
>>  
>>
>> ossec-testrule: Type one log per line.
>>
>>  
>>
>> 2016-01-20T17:49:19            Error validating xml data against the 
>> schema on line 272
>>
>> Content of element "litleTxnId" is incomplete
>>
>>  
>>
>> **Phase 1: Completed pre-decoding.
>>
>>        full event: '2016-01-20T17:49:19           Error validating xml 
>> data against the schema on line 272'
>>
>>        hostname: 'kali'
>>
>>        program_name: '(null)'
>>
>>        log: '2016-01-20T17:49:19         Error validating xml data 
>> against the schema on line 272'
>>
>>  
>>
>> **Phase 2: Completed decoding.
>>
>>        No decoder matched.
>>
>>  
>>
>> **Phase 3: Completed filtering (rules).
>>
>>        Rule id: '8888'
>>
>>        Level: '12'
>>
>>        Description: 'An error was found in an order'
>>
>> **Alert to be generated.
>>
>>  
>>
>>
>> On Friday, January 22, 2016 at 7:31:23 PM UTC-5, LostInThe Tubez wrote:
>>
>> Have you run your log entry through ossec-logtest on the server? This 
>> will tell you if an alert should be generated or not. It is always possible 
>> that another rule is matching first or perhaps your rule isn’t working as 
>> expected. There are a couple potential issues with your rule, but I would 
>> suggest checking ossec-logtest and reporting back before you get too far 
>> into the nitty gritty.
>>
>>  
>>
>> You can use %Y, %m, and %d in your filenames to represent the year, month 
>> and day, respectively. The file has to exist before the agent starts, 
>> otherwise it won’t be monitored. IIRC, wildcards (asterisks) do not work 
>> with the Windows agent for some strange reason.
>>
>>  
>>
>>  
>>
>> *From:* ossec...@googlegroups.com [mailto:ossec...@googlegroups.com] *On 
>> Behalf Of *Greg Burns
>> *Sent:* Friday, January 22, 2016 1:08 PM
>> *To:* ossec-list <ossec...@googlegroups.com>
>> *Subject:* [ossec-list] Log file not triggering alert
>>
>>  
>>
>> I wrote a rule in OSSEC to send an email alert anytime the following 
>> string appears in a log (its a flat log file with no extension):
>>
>>  
>>
>> 2016-01-20T17:49:19            Error validating xml data against the 
>> schema on line 272 Content of element "litleTxnId" is incomplete 
>>
>>  
>>
>> the rule should be triggered anytime the word "error validating" appear. 
>> Below is the rule:
>>
>>  
>>
>> <!-- Syslog errors. -->
>>
>> <group name="syslog,errors,">
>>
>>   <rule id="8888" level="12">
>>
>>     <match>error validating</match>
>>
>>     <options>alert_by_email</options>
>>
>>     <description>An error was found in an order</description>
>>
>>   </rule>
>>
>>  
>>
>>  
>>
>> For testing purposes placed a log file in C:\logs and set the 
>> configuration file to look in that directory- its the fourth one down
>>
>>  
>>
>> <ossec_config>
>>
>>  
>>
>>   <!-- One entry for each file/Event log to monitor. -->
>>
>>   <localfile>
>>
>>     <location>Application</location>
>>
>>     <log_format>eventlog</log_format>
>>
>>   </localfile>
>>
>>  
>>
>>   <localfile>
>>
>>     <location>Security</location>
>>
>>     <log_format>eventlog</log_format>
>>
>>   </localfile>
>>
>>  
>>
>>   <localfile>
>>
>>     <location>System</location>
>>
>>     <log_format>eventlog</log_format>
>>
>>   </localfile>
>>
>>  
>>
>>   <localfile>
>>
>>     <location>C:\logs\BatchLog_LT_01192016203220</location>
>>
>>     <log_format>syslog</log_format>
>>
>>   </localfile>
>>
>>  
>>
>> However it does not seem to be working. When I go in and restart the 
>> agent it appears to successfully analyze the logs except it does not 
>> trigger an alert. below is the ossec.log after restarting:
>>
>>  
>>
>> 2016/01/22 15:04:28 ossec-agent: INFO: Started (pid: 7268).
>>
>>  
>>
>> 2016/01/22 15:04:29 ossec-agent(4102): INFO: Connected to the server (
>> 10.8.216.157:1514).
>>
>>  
>>
>> 2016/01/22 15:04:29 ossec-agent: INFO: System is Vista or newer 
>> (Microsoft Windows 7 Business Edition Professional Service Pack 1 (Build 
>> 7601) - OSSEC HIDS v2.8.3).
>>
>>  
>>
>> 2016/01/22 15:04:29 ossec-agent(1951): INFO: Analyzing event log: 
>> 'Application'.
>>
>>  
>>
>> 2016/01/22 15:04:29 ossec-agent(1951): INFO: Analyzing event log: 
>> 'Security'.
>>
>>  
>>
>> 2016/01/22 15:04:29 ossec-agent(1951): INFO: Analyzing event log: 
>> 'System'.
>>
>>  
>>
>> 2016/01/22 15:04:30 ossec-agent(1950): INFO: Analyzing file: 
>> 'C:\logs\BatchLog_LT_01192016203220'.
>>
>>  
>>
>> 2016/01/22 15:04:30 ossec-agent: INFO: Started (pid: 7268).
>>
>>  
>>
>> Any idea's? Is my config on the agent not right? - Also what if I wanted 
>> to look in a specific folder and analyze all logs in that folder? such as 
>> <location>C:\logs\Batch*</location> - will this work to view all log files 
>> that begin with 'Batch"?
>>
>>  
>>
>> Thanks!
>>
>>  
>>
>>  
>>
>> -- 
>>
>> --- 
>> You received this message because you are subscribed to the Google Groups 
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to ossec-list+...@googlegroups.com.
>> For more options, visit https://groups.google.com/d/optout.
>>
>> -- 
>>
>> --- 
>> You received this message because you are subscribed to the Google Groups 
>> "ossec-list" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to ossec-list+...@googlegroups.com.
>> For more options, visit https://groups.google.com/d/optout.
>>
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to ossec-list+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to