Closed juliamagan closed 2 years ago
I've followed the Quickstart guide and set up an all-in-one environment.
Install type | OS | CPU | RAM |
---|---|---|---|
All-in-one | CentOS 8 | 2 | 4096 |
We have created an app in Slack and added the following configuration:
<integration>
<name>slack</name>
<hook_url>${replace_by_SlackHook}</hook_url>
<level>10</level>
<alert_format>json</alert_format>
</integration>
Finally, we have restarted the manager.
We will receive a message in Slack when a level 10 or higher alert is triggered, so we have generated a brute force attack alert.
/var/ossec/logs/integrations.log
:Wed May 11 12:29:20 UTC 2022 /tmp/slack-1652272160-917609775.alert <SlackHook> > /dev/null 2>&1
alerts.json
Description
In this issue, we will study the Slack test case described here. All the info obtained will be used in the future for the design and implementation of E2E tests.
Tasks
Conclusion
We just need one manager and a Slack app.