Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
aws.data.client_ip
field. Thanks to @rh0dy. (#16198)status_code
field to GET /agents
response. (#19726)WazuhException
class that disrupted the API executor subprocess. (#16914)PUT /vulnerability
, GET /vulnerability/{agent_id}
, GET /vulnerability/{agent_id}/last_scan
and GET /vulnerability/{agent_id}/summary/{field}
API endpoints. In future versions, the Wazuh indexer REST API can be used instead. (#20126)OSHash_GetIndex()
. (#17040)netsh
. (#14804)send_request
method so that timeouts are treated as exceptions and not as responses. (#15220)origin_module
variable value when sending API or framework messages to core sockets. (#14408)agent_upgrade
CLI when used from worker nodes. (#15487)agent_upgrade
CLI when displaying upgrade result. (#18047)dapi_err
command could not be sent to peers. (#15298)--prefix
parameter to Azure Storage integration. (#14768)ignore
and restrict
to logcollector. (#14782).aws/config
file. (#16531)Skipping file with another prefix
message in debug mode. (#15009)Config
and VPCFlow
AWS integrations. (#16325)ossec.conf
. (#14993)#2
for the SIGINT signal within the AWS integration. (#14850)discard_regex
functionality for the AWS GuardDuty integration. (#14740)ClientError
. (#14500)check_bucket
method in AWS integration to be able to find logs without a folder in root. (#16116)last_date.json
in Azure Storage integration. (#16360)local_ip
for agent configuration has been deleted. (#13878)AWSBucket
and reuse inherited ones from WazuhIntegration
. (#15031)POST /events
API endpoint to ingest logs through the API. (#17670)query
, select
and distinct
parameters to multiple endpoints. (#17865)relative_dirname
parameter to GET, PUT and DELETE methods of the /decoder/files/{filename}
and /rule/files/{filename}
endpoints. (#15994)allow_higher_version
setting. (#18212)q
and select
parameters in some endpoints. (#13421)GET /agents/upgrade_result
endpoint internal error with code 1814 in large environments. (#15152)GET /rules
when variables are used inside id
or level
ruleset fields. (#16310)PUT /syscheck
and PUT /rootcheck
endpoints to exclude exception codes properly. (#16248)/var/agents/db
. (#15934)aws.data.client_ip
field. Thanks to @rh0dy. (#16198)status_code
field to GET /agents
response. (#19726)WazuhException
class that disrupted the API executor subprocess. (#16914)OSHash_GetIndex()
. (#17040)aws.data.client_ip
field. Thanks to @rh0dy. (16198)WazuhException
class that disrupted the API executor subprocess. (#16914)OSHash_GetIndex()
. (#17040)$
symbol in query values. (#18509)@
symbol in query values. (#18346)q
API parameter. (#18493)force
flag message in the agent_upgrade
CLI. (#18432)GET /rules/groups
. (#18362)condition=all
in GET /sca/{agent_id}/checks/{policy_id}
. (#18434)discard_regex
functionality to Inspector and CloudWatchLogs AWS integrations. (#17748)InvalidRange
error in Azure Storage integration when trying to get data from an empty blob. (#17524)PUT /agents/upgrade_custom
endpoint to validate that the file extension is .wpk
. (#17632)labels
and reports
active configuration from managers. (#17660)discard_regex
functionality to Inspector and CloudWatchLogs AWS integrations. (#17748)InvalidRange
error in Azure Storage integration when trying to get data from an empty blob. (#17524)PUT /agents/upgrade_custom
endpoint to validate that the file extension is .wpk
. (#17632)labels
and reports
active configuration from managers. (#17660)