R2.html

Report generated on 24-May-2022 at 02:36:54 by pytest-html v3.1.1

Environment

Packages {"pluggy": "0.13.1", "py": "1.10.0", "pytest": "6.2.2"}
Platform Linux-4.18.0-240.1.1.el8_3.x86_64-x86_64-with-centos-8.3.2011
Plugins {"html": "3.1.1", "metadata": "1.11.0", "testinfra": "5.0.0"}
Python 3.6.8

Summary

244 tests ran in 3871.98 seconds.

242 passed, 0 skipped, 0 failed, 0 errors, 2 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_feeds/test_cpe_indexing.py 0 18 0 0
test_vulnerability_detector/test_feeds/test_download_feeds.py 0 21 1 0
test_vulnerability_detector/test_feeds/test_duplicate_feeds.py 0 7 0 0
test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py 0 7 1 0
test_vulnerability_detector/test_feeds/test_validate_feed_content.py 0 45 0 0
test_vulnerability_detector/test_general_settings/test_enabled.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_interval.py 0 4 0 0
test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py 0 1 0 0
test_vulnerability_detector/test_general_settings/test_retry_interval.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_run_on_start.py 0 2 0 0
test_vulnerability_detector/test_providers/test_enabled.py 0 44 0 0
test_vulnerability_detector/test_providers/test_missing_os.py 0 8 0 0
test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py 0 2 0 0
test_vulnerability_detector/test_providers/test_os.py 0 22 0 0
test_vulnerability_detector/test_providers/test_update_from_year.py 0 6 0 0
test_vulnerability_detector/test_providers/test_update_interval.py 0 7 0 0
test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py 0 13 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py 0 2 0 0
test_vulnerability_detector/test_scan_types/test_full_scan_type.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py 0 4 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py 0 1 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py 0 2 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py 0 2 0 0

Results

Result Time Test Description Duration Markers Links Tier
XFailed 2022-05-24 02:36:54.905067 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BIONIC] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 122.22 2
configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
try:
# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
> timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:135:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

log_monitor = None, provider_name = 'Ubuntu Bionic', timeout = 120

def check_provider_database_update_finish_log(log_monitor=None, provider_name='', timeout=vd.T_20):
"""Check the provider database update finish event in ossec.log

Args:
log_monitor (FileMonitor): Log monitor.
provider_name (str): Provider name of the downloaded feed.
timeout (int): Timeout of the event.
"""
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
callback=f"The update of the '{provider_name}' feed finished",
> error_message=f"Could not find {provider_name} feed finished log")

/usr/local/lib/python3.6/site-packages/wazuh_testing/modules/vulnerability_detector/event_monitor.py:146:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

file_monitor = <wazuh_testing.tools.monitoring.FileMonitor object at 0x7f343aa7f710>
callback = "The update of the 'Ubuntu Bionic' feed finished"
error_message = 'Could not find Ubuntu Bionic feed finished log', update_position = True
timeout = 120, prefix = '.*wazuh-modulesd:vulnerability-detector.*', accum_results = 1
file_to_monitor = '/var/ossec/logs/ossec.log'

def check_vuln_detector_event(file_monitor=None, callback='', error_message=None, update_position=True,
timeout=vd.T_60, prefix=vd.VULNERABILITY_DETECTOR_PREFIX, accum_results=1,
file_to_monitor=LOG_FILE_PATH):
"""Check if a vulnerability event occurs

Args:
file_monitor (FileMonitor): FileMonitor object to monitor the file content.
callback (str): log regex to check in Wazuh log
error_message (str): error message to show in case of expected event does not occur
update_position (boolean): filter configuration parameter to search in Wazuh log
timeout (str): timeout to check the event in Wazuh log
prefix (str): log pattern regex
accum_results (int): Accumulation of matches.
"""
file_monitor = FileMonitor(file_to_monitor) if file_monitor is None else file_monitor
error_message = f"Could not find this event in {file_to_monitor}: {callback}" if error_message is None else \
error_message

file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
> callback=make_vuln_callback(callback, prefix), error_message=error_message)

/usr/local/lib/python3.6/site-packages/wazuh_testing/modules/vulnerability_detector/event_monitor.py:55:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.FileMonitor object at 0x7f343aa7f710>
timeout = 120
callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f343eb3a8c8>
accum_results = 1, update_position = True, timeout_extra = 0
error_message = 'Could not find Ubuntu Bionic feed finished log', encoding = None

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message='', encoding=None):
"""Start the file monitoring until the stop method is called."""
try:
tailer = self.tailer if update_position else copy(self.tailer)

if encoding is not None:
tailer.encoding = encoding
tailer.start()

monitor = QueueMonitor(tailer.queue, time_step=self._time_step)
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
update_position=True, timeout_extra=timeout_extra,
> error_message=error_message).result()

/usr/local/lib/python3.6/site-packages/wazuh_testing/tools/monitoring.py:203:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f343aa7ac50>
timeout = 120
callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f343eb3a8c8>
accum_results = 1, update_position = True, timeout_extra = 0
error_message = 'Could not find Ubuntu Bionic feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find Ubuntu Bionic feed finished log

/usr/local/lib/python3.6/site-packages/wazuh_testing/tools/monitoring.py:469: TimeoutError

During handling of the above exception, another exception occurred:

configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
try:
# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

# Check that the timestamp of the feed metadata does not exceed the established threshold limit.
if metadata['update_treshold_weeks'] != 'None':
assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
except TimeoutError as e:
if metadata['provider_os'] == 'BIONIC':
> pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')
E _pytest.outcomes.XFailed: Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556

test_vulnerability_detector/test_feeds/test_download_feeds.py:150: XFailed
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:40:02 wazuh-modulesd[60134] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:40:02 wazuh-modulesd[60134] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:40:02 wazuh-modulesd[60134] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:40:02 wazuh-modulesd[60134] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:40:02 wazuh-modulesd[60134] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-05-24 01:42:04,130 - wazuh_testing - ERROR - Could not find Ubuntu Bionic feed finished log 2022-05-24 01:42:04,131 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 01:42:04,131 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Bionic feed finished log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
XFailed 2022-05-24 02:36:54.908467 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[NVD - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 2.20 server 2
configuration = {'sections': [{'elements': [{'enabled': {'value': 'yes'}}, {'run_on_start': {'value': 'yes'}}, {'provider': {'attribut...check'}, {'attributes': [{'name': 'syscollector'}], 'elements': [{'disabled': {'value': 'yes'}}], 'section': 'wodle'}]}
metadata = {'custom_feed_url': 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3', 'description': 'Ch...and parsing of JPG file as invalid feed in the NVD', 'name': 'NVD - MP3', 'provider_feed_names': ['nvd provider'], ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_import_invalid_feed_type(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check the vulnerability detector behavior when importing unexpected file types as feeds.

test_phases:
- Set a custom Wazuh configuration, with custom URL feeds which refer to files of unexpected type.
- Check the error when updating the provider data.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Configuration loaded from `configuration_template`.
- metadata:
type: dict
brief: Test case metadata.
- set_wazuh_configuration_vdt:
type: fixture
brief: Set wazuh configuration.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all CVE tables.
- restart_modulesd_function:
type: fixture
brief: Restart wazuh-modulesd daemon before starting a test, and stop it after finishing.

assertions:
- Check the error when updating the provider database.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

input_description:
- The `configuration_import_invalid_feed_type.yaml` file provides the module configuration for this test.
- The `cases_import_invalid_feed_type` file provides the test cases.

expected_output:
- r"Failed when updating '{provider_feed_name}' database"
- r"ERROR: .* CVE database could not be updated."
'''
if metadata['target'] == 'nvd':
> pytest.xfail(reason='no error reported when importing invalid NVD feed. '
'https://github.com/wazuh/wazuh/issues/5210')
E _pytest.outcomes.XFailed: no error reported when importing invalid NVD feed. https://github.com/wazuh/wazuh/issues/5210

test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py:138: XFailed
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:40 wazuh-modulesd[65269] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:40 wazuh-modulesd[65269] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:40 wazuh-modulesd[65269] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:40 wazuh-modulesd[65269] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:40 wazuh-modulesd[65269] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.900404 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_packages[WINDOWS] description: Check that the CPE helper info related to the packages data is indexed. 7.74 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:32:32 wazuh-modulesd[56536] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:32:32 wazuh-modulesd[56536] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:32:32 wazuh-modulesd[56536] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:32:32 wazuh-modulesd[56536] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:32:32 wazuh-modulesd[56536] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.900930 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_XP] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.90 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:32:40 wazuh-modulesd[56683] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:32:40 wazuh-modulesd[56683] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:32:40 wazuh-modulesd[56683] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:32:40 wazuh-modulesd[56683] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:32:40 wazuh-modulesd[56683] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:32:40 wazuh-modulesd[56683] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901050 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_VISTA] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.84 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:32:47 wazuh-modulesd[56816] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:32:47 wazuh-modulesd[56816] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:32:47 wazuh-modulesd[56816] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:32:47 wazuh-modulesd[56816] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:32:47 wazuh-modulesd[56816] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:32:47 wazuh-modulesd[56816] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901201 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_7] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.82 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:32:54 wazuh-modulesd[56917] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:32:54 wazuh-modulesd[56917] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:32:54 wazuh-modulesd[56917] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:32:54 wazuh-modulesd[56917] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:32:54 wazuh-modulesd[56917] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:32:54 wazuh-modulesd[56917] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901295 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.85 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:01 wazuh-modulesd[57008] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:01 wazuh-modulesd[57008] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:01 wazuh-modulesd[57008] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:01 wazuh-modulesd[57008] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:01 wazuh-modulesd[57008] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:01 wazuh-modulesd[57008] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901391 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.89 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:09 wazuh-modulesd[57151] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:09 wazuh-modulesd[57151] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:09 wazuh-modulesd[57151] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:09 wazuh-modulesd[57151] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:09 wazuh-modulesd[57151] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:09 wazuh-modulesd[57151] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901484 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_10] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.88 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:17 wazuh-modulesd[57254] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:17 wazuh-modulesd[57254] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:17 wazuh-modulesd[57254] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:17 wazuh-modulesd[57254] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:17 wazuh-modulesd[57254] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:17 wazuh-modulesd[57254] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901574 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_11] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.94 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:25 wazuh-modulesd[57385] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:25 wazuh-modulesd[57385] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:25 wazuh-modulesd[57385] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:25 wazuh-modulesd[57385] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:25 wazuh-modulesd[57385] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:25 wazuh-modulesd[57385] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901669 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.83 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:33 wazuh-modulesd[57518] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:33 wazuh-modulesd[57518] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:33 wazuh-modulesd[57518] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:33 wazuh-modulesd[57518] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:33 wazuh-modulesd[57518] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:33 wazuh-modulesd[57518] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901764 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.86 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:40 wazuh-modulesd[57619] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:40 wazuh-modulesd[57619] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:40 wazuh-modulesd[57619] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:40 wazuh-modulesd[57619] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:40 wazuh-modulesd[57619] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:40 wazuh-modulesd[57619] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.901858 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.93 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:47 wazuh-modulesd[57752] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:47 wazuh-modulesd[57752] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:47 wazuh-modulesd[57752] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:47 wazuh-modulesd[57752] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:47 wazuh-modulesd[57752] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:47 wazuh-modulesd[57752] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902025 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.92 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:33:55 wazuh-modulesd[57865] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:33:55 wazuh-modulesd[57865] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:33:55 wazuh-modulesd[57865] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:33:55 wazuh-modulesd[57865] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:33:55 wazuh-modulesd[57865] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:33:55 wazuh-modulesd[57865] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902126 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.87 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:34:02 wazuh-modulesd[57960] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:34:02 wazuh-modulesd[57960] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:34:02 wazuh-modulesd[57960] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:34:02 wazuh-modulesd[57960] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:34:02 wazuh-modulesd[57960] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:34:02 wazuh-modulesd[57960] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902220 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.85 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:34:09 wazuh-modulesd[58075] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:34:09 wazuh-modulesd[58075] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:34:09 wazuh-modulesd[58075] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:34:09 wazuh-modulesd[58075] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:34:09 wazuh-modulesd[58075] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:34:09 wazuh-modulesd[58075] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902304 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2016] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.88 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:34:17 wazuh-modulesd[58190] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:34:17 wazuh-modulesd[58190] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:34:17 wazuh-modulesd[58190] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:34:17 wazuh-modulesd[58190] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:34:17 wazuh-modulesd[58190] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:34:17 wazuh-modulesd[58190] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902388 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2019] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.80 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:34:24 wazuh-modulesd[58284] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:34:24 wazuh-modulesd[58284] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:34:24 wazuh-modulesd[58284] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:34:24 wazuh-modulesd[58284] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:34:24 wazuh-modulesd[58284] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:34:24 wazuh-modulesd[58284] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902474 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.83 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:34:31 wazuh-modulesd[58389] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:34:31 wazuh-modulesd[58389] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:34:31 wazuh-modulesd[58389] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:34:31 wazuh-modulesd[58389] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:34:31 wazuh-modulesd[58389] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:34:31 wazuh-modulesd[58389] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902559 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.85 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:34:39 wazuh-modulesd[58525] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:34:39 wazuh-modulesd[58525] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:34:39 wazuh-modulesd[58525] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:34:39 wazuh-modulesd[58525] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:34:39 wazuh-modulesd[58525] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 01:34:39 wazuh-modulesd[58525] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.902646 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL5] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 62.80 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:34:41 wazuh-modulesd[58572] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:34:41 wazuh-modulesd[58572] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:34:41 wazuh-modulesd[58572] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:34:41 wazuh-modulesd[58572] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:34:41 wazuh-modulesd[58572] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.902732 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL6] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 72.34 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:35:44 wazuh-modulesd[58887] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:35:44 wazuh-modulesd[58887] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:35:44 wazuh-modulesd[58887] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:35:44 wazuh-modulesd[58887] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:35:44 wazuh-modulesd[58887] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.902820 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL7] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 73.93 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:36:56 wazuh-modulesd[59195] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:36:56 wazuh-modulesd[59195] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:36:56 wazuh-modulesd[59195] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:36:56 wazuh-modulesd[59195] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:36:56 wazuh-modulesd[59195] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.902904 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 66.91 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:38:10 wazuh-modulesd[59549] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:38:10 wazuh-modulesd[59549] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:38:10 wazuh-modulesd[59549] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:38:10 wazuh-modulesd[59549] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:38:10 wazuh-modulesd[59549] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.903014 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[TRUSTY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 21.37 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:39:17 wazuh-modulesd[59845] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:39:17 wazuh-modulesd[59845] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:39:17 wazuh-modulesd[59845] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:39:17 wazuh-modulesd[59845] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:39:17 wazuh-modulesd[59845] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.903098 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[XENIAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 24.24 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:39:38 wazuh-modulesd[59992] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:39:38 wazuh-modulesd[59992] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:39:38 wazuh-modulesd[59992] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:39:38 wazuh-modulesd[59992] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:39:38 wazuh-modulesd[59992] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.905178 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[FOCAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 17.82 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:42:06 wazuh-modulesd[60294] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:42:06 wazuh-modulesd[60294] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:42:06 wazuh-modulesd[60294] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:42:06 wazuh-modulesd[60294] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:42:06 wazuh-modulesd[60294] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.905268 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[STRETCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 75.04 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:42:24 wazuh-modulesd[60451] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:42:24 wazuh-modulesd[60451] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:42:24 wazuh-modulesd[60451] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:42:24 wazuh-modulesd[60451] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:42:24 wazuh-modulesd[60451] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (stretch) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.905353 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BUSTER] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 74.97 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:43:38 wazuh-modulesd[60614] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:43:38 wazuh-modulesd[60614] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:43:38 wazuh-modulesd[60614] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:43:38 wazuh-modulesd[60614] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:43:38 wazuh-modulesd[60614] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.905438 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BULLSEYE] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 67.29 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:44:53 wazuh-modulesd[60795] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:44:53 wazuh-modulesd[60795] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:44:53 wazuh-modulesd[60795] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:44:53 wazuh-modulesd[60795] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:44:53 wazuh-modulesd[60795] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.905527 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ARCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 9.39 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:46:00 wazuh-modulesd[60962] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:46:00 wazuh-modulesd[60962] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:46:00 wazuh-modulesd[60962] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:46:00 wazuh-modulesd[60962] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:46:00 wazuh-modulesd[60962] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/05/24 01:46:00 wazuh-modulesd[60962] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.905611 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 5.76 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:46:09 wazuh-modulesd[61107] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:46:09 wazuh-modulesd[61107] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:46:09 wazuh-modulesd[61107] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:46:09 wazuh-modulesd[61107] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:46:09 wazuh-modulesd[61107] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.905712 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 4.83 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:46:15 wazuh-modulesd[61229] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:46:15 wazuh-modulesd[61229] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:46:15 wazuh-modulesd[61229] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:46:15 wazuh-modulesd[61229] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:46:15 wazuh-modulesd[61229] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.905801 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[NVD] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 483.33 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:46:20 wazuh-modulesd[61308] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:46:20 wazuh-modulesd[61308] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:46:20 wazuh-modulesd[61308] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:46:20 wazuh-modulesd[61308] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:46:20 wazuh-modulesd[61308] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/05/24 01:46:20 wazuh-modulesd[61308] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.905889 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[MSU] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.68 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:54:23 wazuh-modulesd[62110] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:54:23 wazuh-modulesd[62110] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:54:23 wazuh-modulesd[62110] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:54:23 wazuh-modulesd[62110] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:54:23 wazuh-modulesd[62110] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/05/24 01:54:23 wazuh-modulesd[62110] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.905972 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 118.76 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:54:35 wazuh-modulesd[62274] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:54:35 wazuh-modulesd[62274] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:54:35 wazuh-modulesd[62274] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:54:35 wazuh-modulesd[62274] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:54:35 wazuh-modulesd[62274] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.906054 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 185.13 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:56:33 wazuh-modulesd[62488] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:56:33 wazuh-modulesd[62488] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:56:33 wazuh-modulesd[62488] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:56:33 wazuh-modulesd[62488] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:56:33 wazuh-modulesd[62488] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.906136 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 248.41 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 01:59:38 wazuh-modulesd[62756] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 01:59:38 wazuh-modulesd[62756] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 01:59:38 wazuh-modulesd[62756] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 01:59:38 wazuh-modulesd[62756] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 01:59:38 wazuh-modulesd[62756] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.906220 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 21.17 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:03:47 wazuh-modulesd[63060] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:03:47 wazuh-modulesd[63060] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:03:47 wazuh-modulesd[63060] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:03:47 wazuh-modulesd[63060] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:03:47 wazuh-modulesd[63060] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.906305 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 58.84 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:04:09 wazuh-modulesd[63172] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:04:09 wazuh-modulesd[63172] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:04:09 wazuh-modulesd[63172] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:04:09 wazuh-modulesd[63172] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:04:09 wazuh-modulesd[63172] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.906389 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 146.76 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:05:06 wazuh-modulesd[63357] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:05:06 wazuh-modulesd[63357] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:05:06 wazuh-modulesd[63357] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:05:06 wazuh-modulesd[63357] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:05:06 wazuh-modulesd[63357] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.906474 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[RedHat] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.50 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:07:33 wazuh-modulesd[63584] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:07:33 wazuh-modulesd[63584] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:07:33 wazuh-modulesd[63584] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:07:33 wazuh-modulesd[63584] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:07:33 wazuh-modulesd[63584] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 10s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:07:33 wazuh-modulesd[63584] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2022-05-24 02:36:54.906907 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Debian] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.52 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:07:47 wazuh-modulesd[63748] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:07:47 wazuh-modulesd[63748] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:07:47 wazuh-modulesd[63748] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:07:47 wazuh-modulesd[63748] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:07:47 wazuh-modulesd[63748] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (Buster) feed. Interval: 10s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.907012 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.53 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:08:00 wazuh-modulesd[63876] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:08:00 wazuh-modulesd[63876] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:08:00 wazuh-modulesd[63876] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:08:00 wazuh-modulesd[63876] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:08:00 wazuh-modulesd[63876] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 10s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.907095 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[ALAS] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.51 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:08:14 wazuh-modulesd[64043] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:08:14 wazuh-modulesd[64043] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:08:14 wazuh-modulesd[64043] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:08:14 wazuh-modulesd[64043] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:08:14 wazuh-modulesd[64043] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 10s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/alas/custom_alas_feed.json' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.907181 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Arch] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.59 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:08:28 wazuh-modulesd[64199] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:08:28 wazuh-modulesd[64199] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:08:28 wazuh-modulesd[64199] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:08:28 wazuh-modulesd[64199] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:08:28 wazuh-modulesd[64199] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/05/24 02:08:28 wazuh-modulesd[64199] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.907272 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[MSU] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.55 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:08:42 wazuh-modulesd[64330] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:08:42 wazuh-modulesd[64330] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:08:42 wazuh-modulesd[64330] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:08:42 wazuh-modulesd[64330] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:08:42 wazuh-modulesd[64330] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/05/24 02:08:42 wazuh-modulesd[64330] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.907359 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[SUSE] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.53 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:08:55 wazuh-modulesd[64488] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:08:55 wazuh-modulesd[64488] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:08:55 wazuh-modulesd[64488] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:08:55 wazuh-modulesd[64488] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:08:55 wazuh-modulesd[64488] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 10s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.907442 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[RHEL - PDF] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.20 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:09 wazuh-modulesd[64625] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:09 wazuh-modulesd[64625] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:09 wazuh-modulesd[64625] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:09 wazuh-modulesd[64625] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:09 wazuh-modulesd[64625] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Timeout: 300s 2022/05/24 02:09:09 wazuh-modulesd[64625] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Update since: 1999 | Timeout: 300s
Passed 2022-05-24 02:36:54.907526 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Debian - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.59 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:14 wazuh-modulesd[64732] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:14 wazuh-modulesd[64732] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:14 wazuh-modulesd[64732] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:14 wazuh-modulesd[64732] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:14 wazuh-modulesd[64732] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2022-05-24 02:36:54.907619 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Canonical - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.32 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:19 wazuh-modulesd[64849] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:19 wazuh-modulesd[64849] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:19 wazuh-modulesd[64849] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:19 wazuh-modulesd[64849] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:19 wazuh-modulesd[64849] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Timeout: 300s
Passed 2022-05-24 02:36:54.907703 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[ALAS - DOC] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.55 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:24 wazuh-modulesd[64930] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:24 wazuh-modulesd[64930] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:24 wazuh-modulesd[64930] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:24 wazuh-modulesd[64930] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:24 wazuh-modulesd[64930] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.doc' | Timeout: 300s
Passed 2022-05-24 02:36:54.907814 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Arch - AVI] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.30 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:29 wazuh-modulesd[65038] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:29 wazuh-modulesd[65038] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:29 wazuh-modulesd[65038] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:29 wazuh-modulesd[65038] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:29 wazuh-modulesd[65038] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.avi' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.907908 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[MSU - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.56 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:35 wazuh-modulesd[65169] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:35 wazuh-modulesd[65169] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:35 wazuh-modulesd[65169] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:35 wazuh-modulesd[65169] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:35 wazuh-modulesd[65169] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.908560 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[SUSE - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 5.23 server 2
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:09:42 wazuh-modulesd[65344] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:09:42 wazuh-modulesd[65344] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:09:42 wazuh-modulesd[65344] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:09:42 wazuh-modulesd[65344] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:09:42 wazuh-modulesd[65344] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2022-05-24 02:36:54.908641 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Red Hat Enterprise Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.63 2
No log output captured.
Passed 2022-05-24 02:36:54.908741 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Debian] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.19 2
No log output captured.
Passed 2022-05-24 02:36:54.908820 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Arch Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.52 2
No log output captured.
Passed 2022-05-24 02:36:54.908905 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Amazon Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.59 2
No log output captured.
Passed 2022-05-24 02:36:54.908981 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[MSU] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.56 2
No log output captured.
Passed 2022-05-24 02:36:54.909057 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2002] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.48 2
No log output captured.
Passed 2022-05-24 02:36:54.909136 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2003] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.13 2
No log output captured.
Passed 2022-05-24 02:36:54.909213 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2004] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.84 2
No log output captured.
Passed 2022-05-24 02:36:54.909295 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2005] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.64 2
No log output captured.
Passed 2022-05-24 02:36:54.909375 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2006] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.74 2
No log output captured.
Passed 2022-05-24 02:36:54.909453 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2007] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.98 2
No log output captured.
Passed 2022-05-24 02:36:54.909531 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2008] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.70 2
No log output captured.
Passed 2022-05-24 02:36:54.909612 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2009] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.10 2
No log output captured.
Passed 2022-05-24 02:36:54.909718 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2010] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.17 2
No log output captured.
Passed 2022-05-24 02:36:54.909796 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2011] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.89 2
No log output captured.
Passed 2022-05-24 02:36:54.909872 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2012] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.21 2
No log output captured.
Passed 2022-05-24 02:36:54.909949 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2013] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 6.07 2
No log output captured.
Passed 2022-05-24 02:36:54.910023 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2014] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.51 2
No log output captured.
Passed 2022-05-24 02:36:54.910106 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2015] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.30 2
No log output captured.
Passed 2022-05-24 02:36:54.910181 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2016] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 6.23 2
No log output captured.
Passed 2022-05-24 02:36:54.910254 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2017] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.39 2
No log output captured.
Passed 2022-05-24 02:36:54.910329 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2018] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.32 2
No log output captured.
Passed 2022-05-24 02:36:54.910406 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2019] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.60 2
No log output captured.
Passed 2022-05-24 02:36:54.910483 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2020] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 8.62 2
No log output captured.
Passed 2022-05-24 02:36:54.910563 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2021] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 9.43 2
No log output captured.
Passed 2022-05-24 02:36:54.910659 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2022] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.75 2
No log output captured.
Passed 2022-05-24 02:36:54.910738 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.43 2
No log output captured.
Passed 2022-05-24 02:36:54.910815 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.75 2
No log output captured.
Passed 2022-05-24 02:36:54.910908 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.84 2
No log output captured.
Passed 2022-05-24 02:36:54.910985 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.56 2
No log output captured.
Passed 2022-05-24 02:36:54.911071 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.12 2
No log output captured.
Passed 2022-05-24 02:36:54.911152 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 6.60 2
No log output captured.
Passed 2022-05-24 02:36:54.911247 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 7.48 2
No log output captured.
Passed 2022-05-24 02:36:54.911326 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 7.36 2
No log output captured.
Passed 2022-05-24 02:36:54.911402 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 6.99 2
No log output captured.
Passed 2022-05-24 02:36:54.911475 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 6.87 2
No log output captured.
Passed 2022-05-24 02:36:54.911552 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.00 2
No log output captured.
Passed 2022-05-24 02:36:54.911631 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 2.67 2
No log output captured.
Passed 2022-05-24 02:36:54.911730 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian4] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 6.69 2
No log output captured.
Passed 2022-05-24 02:36:54.911805 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 13.09 2
No log output captured.
Passed 2022-05-24 02:36:54.911880 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 43.93 2
No log output captured.
Passed 2022-05-24 02:36:54.911957 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 101.94 2
No log output captured.
Passed 2022-05-24 02:36:54.912032 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 61.16 2
No log output captured.
Passed 2022-05-24 02:36:54.912119 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 128.78 2
No log output captured.
Passed 2022-05-24 02:36:54.912197 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 158.60 2
No log output captured.
Passed 2022-05-24 02:36:54.912310 test_vulnerability_detector/test_general_settings/test_enabled.py::test_enabled[enabled] description: Check that vulnerability detector is started when is set enabled yes. 10.11 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:21:28 wazuh-modulesd[66168] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:21:28 wazuh-modulesd[66168] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:21:28 wazuh-modulesd[66168] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:21:28 wazuh-modulesd[66168] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:21:38,459 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... 2022-05-24 02:21:38,460 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:21:38,460 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.912394 test_vulnerability_detector/test_general_settings/test_enabled.py::test_disabled[disabled] description: Check that vulnerability detector is not started when is set enabled no. 1.07 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:21:38 wazuh-modulesd[66241] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:21:38 wazuh-modulesd[66241] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:21:38 wazuh-modulesd[66241] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:21:38 wazuh-modulesd[66241] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-05-24 02:36:54.912477 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5s] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 2.15 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:21:40 wazuh-modulesd[66285] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:21:40 wazuh-modulesd[66285] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:21:40 wazuh-modulesd[66285] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:21:40 wazuh-modulesd[66285] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-05-24 02:36:54.912560 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5m] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.07 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:21:41 wazuh-modulesd[66319] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:21:41 wazuh-modulesd[66319] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:21:41 wazuh-modulesd[66319] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:21:41 wazuh-modulesd[66319] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-05-24 02:36:54.912665 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5h] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.07 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:21:42 wazuh-modulesd[66336] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:21:42 wazuh-modulesd[66336] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:21:42 wazuh-modulesd[66336] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:21:42 wazuh-modulesd[66336] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-05-24 02:36:54.912751 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5d] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 2.15 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:21:43 wazuh-modulesd[66353] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:21:43 wazuh-modulesd[66353] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:21:43 wazuh-modulesd[66353] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:21:43 wazuh-modulesd[66353] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-05-24 02:36:54.912835 test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py::test_min_full_scan_interval[5 seconds] description: Check that the full scan is started after passing the min_full_scan_interval time. 26.89 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:21:50 wazuh-modulesd[66467] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:21:50 wazuh-modulesd[66467] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:21:50 wazuh-modulesd[66467] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:21:50 wazuh-modulesd[66467] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:21:50 wazuh-modulesd[66467] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:21:50 wazuh-modulesd[66467] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:21:50 wazuh-modulesd[66467] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.912920 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval[5s] description: Check if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents (forcing the retry interval action). After this, the DBs are. synchronized and the scan (log) is checked to ensure that it is performed normally. 12.94 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:22:18 wazuh-modulesd[66644] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:22:18 wazuh-modulesd[66644] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:22:18 wazuh-modulesd[66644] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:22:18 wazuh-modulesd[66644] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:22:18 wazuh-modulesd[66644] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:22:18 wazuh-modulesd[66644] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:22:18 wazuh-modulesd[66644] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.913007 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval_max_retries[5s] description: Check if after exceeding the maximum number of retries for a scan (`retry_interval`) the. corresponding message is displayed indicating that the software could not be obtained for the agent. and that it will be retried at the next scan (waiting for its time interval). 26.86 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:22:30 wazuh-modulesd[66752] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:22:30 wazuh-modulesd[66752] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:22:30 wazuh-modulesd[66752] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:22:30 wazuh-modulesd[66752] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:22:30 wazuh-modulesd[66752] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:22:30 wazuh-modulesd[66752] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:22:30 wazuh-modulesd[66752] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.913095 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_enabled[enabled] description: Check that when run_on_start is enabled, the vulnerability scan starts (indicated in the log). 2.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:22:52 wazuh-modulesd[66863] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:22:52 wazuh-modulesd[66863] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:22:52 wazuh-modulesd[66863] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:22:52 wazuh-modulesd[66863] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:22:52 wazuh-modulesd[66863] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.913194 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_disabled[disabled] description: Check that when run_on_start is disabled, the vulnerability scan does not start (log does not appear). 12.26 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:22:56 wazuh-modulesd[66946] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:22:56 wazuh-modulesd[66946] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:22:56 wazuh-modulesd[66946] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:22:56 wazuh-modulesd[66946] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:22:56 wazuh-modulesd[66946] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-05-24 02:23:06,137 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan 2022-05-24 02:23:06,138 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:23:06,138 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.913280 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 1] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:07 wazuh-modulesd[67040] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:07 wazuh-modulesd[67040] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:07 wazuh-modulesd[67040] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:07 wazuh-modulesd[67040] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:07 wazuh-modulesd[67040] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913372 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.04 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:08 wazuh-modulesd[67083] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:08 wazuh-modulesd[67083] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:08 wazuh-modulesd[67083] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:08 wazuh-modulesd[67083] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:08 wazuh-modulesd[67083] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913457 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Focal] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:09 wazuh-modulesd[67102] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:09 wazuh-modulesd[67102] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:09 wazuh-modulesd[67102] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:09 wazuh-modulesd[67102] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:09 wazuh-modulesd[67102] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913565 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Bionic] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:10 wazuh-modulesd[67120] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:10 wazuh-modulesd[67120] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:10 wazuh-modulesd[67120] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:10 wazuh-modulesd[67120] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:10 wazuh-modulesd[67120] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913647 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Xenial] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:11 wazuh-modulesd[67138] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:11 wazuh-modulesd[67138] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:11 wazuh-modulesd[67138] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:11 wazuh-modulesd[67138] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:11 wazuh-modulesd[67138] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913730 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Trusty] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:12 wazuh-modulesd[67174] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:12 wazuh-modulesd[67174] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:12 wazuh-modulesd[67174] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:12 wazuh-modulesd[67174] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:12 wazuh-modulesd[67174] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913812 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:13 wazuh-modulesd[67202] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:13 wazuh-modulesd[67202] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:13 wazuh-modulesd[67202] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:13 wazuh-modulesd[67202] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:13 wazuh-modulesd[67202] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913896 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 7] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:14 wazuh-modulesd[67220] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:14 wazuh-modulesd[67220] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:14 wazuh-modulesd[67220] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:14 wazuh-modulesd[67220] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:14 wazuh-modulesd[67220] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.913976 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 6] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:15 wazuh-modulesd[67238] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:15 wazuh-modulesd[67238] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:15 wazuh-modulesd[67238] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:15 wazuh-modulesd[67238] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:15 wazuh-modulesd[67238] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914058 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 5] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:16 wazuh-modulesd[67256] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:16 wazuh-modulesd[67256] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:16 wazuh-modulesd[67256] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:16 wazuh-modulesd[67256] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:16 wazuh-modulesd[67256] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914141 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Bullseye] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:18 wazuh-modulesd[67292] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:18 wazuh-modulesd[67292] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:18 wazuh-modulesd[67292] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:18 wazuh-modulesd[67292] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:18 wazuh-modulesd[67292] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914224 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Buster] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:19 wazuh-modulesd[67320] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:19 wazuh-modulesd[67320] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:19 wazuh-modulesd[67320] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:19 wazuh-modulesd[67320] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:19 wazuh-modulesd[67320] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914305 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Stretch] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:20 wazuh-modulesd[67338] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:20 wazuh-modulesd[67338] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:20 wazuh-modulesd[67338] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:20 wazuh-modulesd[67338] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:20 wazuh-modulesd[67338] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (stretch) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914416 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Arch Linux] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:21 wazuh-modulesd[67356] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:21 wazuh-modulesd[67356] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:21 wazuh-modulesd[67356] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:21 wazuh-modulesd[67356] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:21 wazuh-modulesd[67356] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/05/24 02:23:21 wazuh-modulesd[67356] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.914501 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[NVD] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:22 wazuh-modulesd[67392] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:22 wazuh-modulesd[67392] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:22 wazuh-modulesd[67392] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:22 wazuh-modulesd[67392] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:22 wazuh-modulesd[67392] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/05/24 02:23:22 wazuh-modulesd[67392] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-05-24 02:36:54.914581 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[MSU] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:23 wazuh-modulesd[67420] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:23 wazuh-modulesd[67420] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:23 wazuh-modulesd[67420] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:23 wazuh-modulesd[67420] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:23 wazuh-modulesd[67420] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/05/24 02:23:23 wazuh-modulesd[67420] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.914668 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:24 wazuh-modulesd[67439] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:24 wazuh-modulesd[67439] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:24 wazuh-modulesd[67439] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:24 wazuh-modulesd[67439] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:24 wazuh-modulesd[67439] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914751 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:25 wazuh-modulesd[67457] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:25 wazuh-modulesd[67457] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:25 wazuh-modulesd[67457] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:25 wazuh-modulesd[67457] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:25 wazuh-modulesd[67457] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914836 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:26 wazuh-modulesd[67475] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:26 wazuh-modulesd[67475] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:26 wazuh-modulesd[67475] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:26 wazuh-modulesd[67475] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:26 wazuh-modulesd[67475] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.914921 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:27 wazuh-modulesd[67511] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:27 wazuh-modulesd[67511] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:27 wazuh-modulesd[67511] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:27 wazuh-modulesd[67511] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:27 wazuh-modulesd[67511] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.915001 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:28 wazuh-modulesd[67539] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:28 wazuh-modulesd[67539] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:28 wazuh-modulesd[67539] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:28 wazuh-modulesd[67539] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:28 wazuh-modulesd[67539] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.915084 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:30 wazuh-modulesd[67557] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:30 wazuh-modulesd[67557] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:30 wazuh-modulesd[67557] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:30 wazuh-modulesd[67557] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:23:30 wazuh-modulesd[67557] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.915184 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 1] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:31 wazuh-modulesd[67575] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:31 wazuh-modulesd[67575] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:31 wazuh-modulesd[67575] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:31 wazuh-modulesd[67575] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:23:36,166 - wazuh_testing - ERROR - Could not find Amazon Linux 1 update starting log 2022-05-24 02:23:36,166 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:23:36,167 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 1 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915298 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:36 wazuh-modulesd[67620] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:36 wazuh-modulesd[67620] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:36 wazuh-modulesd[67620] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:36 wazuh-modulesd[67620] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:23:41,276 - wazuh_testing - ERROR - Could not find Amazon Linux 2 update starting log 2022-05-24 02:23:41,277 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:23:41,277 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 2 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915399 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Focal] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.58 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:41 wazuh-modulesd[67665] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:41 wazuh-modulesd[67665] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:41 wazuh-modulesd[67665] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:41 wazuh-modulesd[67665] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:23:46,367 - wazuh_testing - ERROR - Could not find Ubuntu Focal update starting log 2022-05-24 02:23:46,368 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:23:46,368 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Focal update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915500 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Bionic] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:46 wazuh-modulesd[67710] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:46 wazuh-modulesd[67710] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:46 wazuh-modulesd[67710] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:46 wazuh-modulesd[67710] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:23:51,959 - wazuh_testing - ERROR - Could not find Ubuntu Bionic update starting log 2022-05-24 02:23:51,959 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:23:51,960 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Bionic update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915594 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Xenial] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.57 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:52 wazuh-modulesd[67741] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:52 wazuh-modulesd[67741] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:52 wazuh-modulesd[67741] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:52 wazuh-modulesd[67741] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:23:57,047 - wazuh_testing - ERROR - Could not find Ubuntu Xenial update starting log 2022-05-24 02:23:57,047 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:23:57,047 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Xenial update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915697 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Trusty] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.58 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:23:57 wazuh-modulesd[67781] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:23:57 wazuh-modulesd[67781] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:23:57 wazuh-modulesd[67781] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:23:57 wazuh-modulesd[67781] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:02,640 - wazuh_testing - ERROR - Could not find Ubuntu Trusty update starting log 2022-05-24 02:24:02,640 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:02,641 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Trusty update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915799 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:03 wazuh-modulesd[67812] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:03 wazuh-modulesd[67812] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:03 wazuh-modulesd[67812] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:03 wazuh-modulesd[67812] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:08,237 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 8 update starting log 2022-05-24 02:24:08,237 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:08,238 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 8 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915895 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 7] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:08 wazuh-modulesd[67848] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:08 wazuh-modulesd[67848] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:08 wazuh-modulesd[67848] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:08 wazuh-modulesd[67848] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:13,355 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 7 update starting log 2022-05-24 02:24:13,355 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:13,355 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 7 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.915991 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 6] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.58 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:13 wazuh-modulesd[67893] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:13 wazuh-modulesd[67893] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:13 wazuh-modulesd[67893] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:13 wazuh-modulesd[67893] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:18,448 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 6 update starting log 2022-05-24 02:24:18,448 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:18,449 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 6 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916115 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 5] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:19 wazuh-modulesd[67938] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:19 wazuh-modulesd[67938] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:19 wazuh-modulesd[67938] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:19 wazuh-modulesd[67938] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:24,037 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 update starting log 2022-05-24 02:24:24,037 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:24,037 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 5 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916215 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Bullseye] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:24 wazuh-modulesd[67969] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:24 wazuh-modulesd[67969] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:24 wazuh-modulesd[67969] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:24 wazuh-modulesd[67969] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:29,127 - wazuh_testing - ERROR - Could not find Debian Bullseye update starting log 2022-05-24 02:24:29,128 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:29,128 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Bullseye update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916314 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Buster] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:29 wazuh-modulesd[68000] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:29 wazuh-modulesd[68000] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:29 wazuh-modulesd[68000] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:29 wazuh-modulesd[68000] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:34,216 - wazuh_testing - ERROR - Could not find Debian Buster update starting log 2022-05-24 02:24:34,217 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:34,217 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Buster update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916412 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Stretch] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:34 wazuh-modulesd[68031] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:34 wazuh-modulesd[68031] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:34 wazuh-modulesd[68031] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:34 wazuh-modulesd[68031] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:39,306 - wazuh_testing - ERROR - Could not find Debian Stretch update starting log 2022-05-24 02:24:39,307 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:39,307 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Stretch update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916510 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Arch Linux] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.07 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:39 wazuh-modulesd[68062] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:39 wazuh-modulesd[68062] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:39 wazuh-modulesd[68062] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:39 wazuh-modulesd[68062] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:44,394 - wazuh_testing - ERROR - Could not find Arch Linux update starting log 2022-05-24 02:24:44,395 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:44,395 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Arch Linux update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916613 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[NVD] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.11 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:44 wazuh-modulesd[68093] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:44 wazuh-modulesd[68093] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:44 wazuh-modulesd[68093] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:44 wazuh-modulesd[68093] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:49,478 - wazuh_testing - ERROR - Could not find National Vulnerability Database update starting log 2022-05-24 02:24:49,478 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:49,479 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find National Vulnerability Database update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916713 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[MSU] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:49 wazuh-modulesd[68124] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:49 wazuh-modulesd[68124] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:49 wazuh-modulesd[68124] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:49 wazuh-modulesd[68124] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:54,583 - wazuh_testing - ERROR - Could not find Microsoft Security Update update starting log 2022-05-24 02:24:54,584 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:54,584 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Microsoft Security Update update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.916885 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.59 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:24:54 wazuh-modulesd[68155] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:24:54 wazuh-modulesd[68155] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:24:54 wazuh-modulesd[68155] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:24:54 wazuh-modulesd[68155] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:24:59,673 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 update starting log 2022-05-24 02:24:59,673 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:24:59,674 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.917012 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.58 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:25:00 wazuh-modulesd[68186] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:25:00 wazuh-modulesd[68186] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:25:00 wazuh-modulesd[68186] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:25:00 wazuh-modulesd[68186] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:25:05,268 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 update starting log 2022-05-24 02:25:05,269 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:25:05,269 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.917109 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:25:05 wazuh-modulesd[68217] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:25:05 wazuh-modulesd[68217] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:25:05 wazuh-modulesd[68217] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:25:05 wazuh-modulesd[68217] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:25:10,859 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 update starting log 2022-05-24 02:25:10,860 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:25:10,860 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.917207 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:25:10 wazuh-modulesd[68248] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:25:10 wazuh-modulesd[68248] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:25:10 wazuh-modulesd[68248] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:25:10 wazuh-modulesd[68248] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:25:15,951 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 11 update starting log 2022-05-24 02:25:15,951 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:25:15,952 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.917306 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:25:16 wazuh-modulesd[68279] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:25:16 wazuh-modulesd[68279] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:25:16 wazuh-modulesd[68279] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:25:16 wazuh-modulesd[68279] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:25:21,040 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 update starting log 2022-05-24 02:25:21,041 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:25:21,041 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.917405 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.59 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:25:21 wazuh-modulesd[68310] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:25:21 wazuh-modulesd[68310] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:25:21 wazuh-modulesd[68310] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:25:21 wazuh-modulesd[68310] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-05-24 02:25:26,142 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 update starting log 2022-05-24 02:25:26,143 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:25:26,143 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.917498 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Amazon Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 4.42 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-05-24 02:36:54.917595 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Canonical] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.63 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-05-24 02:36:54.917685 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Debian] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.67 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-05-24 02:36:54.918130 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Red Hat Enterprise Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 14.79 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-05-24 02:36:54.918219 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[National Vulnerability Database] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 18.32 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-05-24 02:36:54.918300 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Microsoft Security Update] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 21.16 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-05-24 02:36:54.918383 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Arch Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 17.97 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-05-24 02:36:54.918477 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[SUSE Linux Enterprise] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 4.68 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-05-24 02:36:54.918574 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[RedHat 8] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 13.56 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:26:51 wazuh-modulesd[71222] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:26:51 wazuh-modulesd[71222] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:26:51 wazuh-modulesd[71222] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:26:51 wazuh-modulesd[71222] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:26:51 wazuh-modulesd[71222] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:26:51 wazuh-modulesd[71222] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-05-24 02:36:54.918673 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[Debian Buster] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 17.79 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:05 wazuh-modulesd[71674] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:05 wazuh-modulesd[71674] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:05 wazuh-modulesd[71674] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:05 wazuh-modulesd[71674] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:05 wazuh-modulesd[71674] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-05-24 02:36:54.918761 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 1] description: Check if modulesd downloads the feeds for each os. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:22 wazuh-modulesd[72261] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:22 wazuh-modulesd[72261] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:22 wazuh-modulesd[72261] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:22 wazuh-modulesd[72261] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:22 wazuh-modulesd[72261] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.918850 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2] description: Check if modulesd downloads the feeds for each os. 3.22 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:26 wazuh-modulesd[72355] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:26 wazuh-modulesd[72355] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:26 wazuh-modulesd[72355] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:26 wazuh-modulesd[72355] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:26 wazuh-modulesd[72355] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.918934 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Trusty] description: Check if modulesd downloads the feeds for each os. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:28 wazuh-modulesd[72404] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:28 wazuh-modulesd[72404] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:28 wazuh-modulesd[72404] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:28 wazuh-modulesd[72404] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:28 wazuh-modulesd[72404] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919043 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Xenial] description: Check if modulesd downloads the feeds for each os. 2.15 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:30 wazuh-modulesd[72485] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:30 wazuh-modulesd[72485] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:30 wazuh-modulesd[72485] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:30 wazuh-modulesd[72485] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:30 wazuh-modulesd[72485] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919130 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Bionic] description: Check if modulesd downloads the feeds for each os. 2.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:32 wazuh-modulesd[72535] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:32 wazuh-modulesd[72535] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:32 wazuh-modulesd[72535] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:32 wazuh-modulesd[72535] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:32 wazuh-modulesd[72535] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919216 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Focal] description: Check if modulesd downloads the feeds for each os. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:34 wazuh-modulesd[72613] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:34 wazuh-modulesd[72613] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:34 wazuh-modulesd[72613] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:34 wazuh-modulesd[72613] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:34 wazuh-modulesd[72613] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919301 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Stretch] description: Check if modulesd downloads the feeds for each os. 3.25 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:38 wazuh-modulesd[72696] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:38 wazuh-modulesd[72696] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:38 wazuh-modulesd[72696] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:38 wazuh-modulesd[72696] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:38 wazuh-modulesd[72696] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (stretch) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919389 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Buster] description: Check if modulesd downloads the feeds for each os. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:40 wazuh-modulesd[72765] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:40 wazuh-modulesd[72765] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:40 wazuh-modulesd[72765] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:40 wazuh-modulesd[72765] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:40 wazuh-modulesd[72765] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919476 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Bullseye] description: Check if modulesd downloads the feeds for each os. 2.19 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:42 wazuh-modulesd[72815] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:42 wazuh-modulesd[72815] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:42 wazuh-modulesd[72815] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:42 wazuh-modulesd[72815] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:42 wazuh-modulesd[72815] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919567 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 5] description: Check if modulesd downloads the feeds for each os. 3.24 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:45 wazuh-modulesd[72917] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:45 wazuh-modulesd[72917] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:45 wazuh-modulesd[72917] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:45 wazuh-modulesd[72917] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:45 wazuh-modulesd[72917] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919652 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 6] description: Check if modulesd downloads the feeds for each os. 2.16 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:47 wazuh-modulesd[72953] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:47 wazuh-modulesd[72953] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:47 wazuh-modulesd[72953] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:47 wazuh-modulesd[72953] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:47 wazuh-modulesd[72953] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919739 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 7] description: Check if modulesd downloads the feeds for each os. 2.16 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:50 wazuh-modulesd[73022] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:50 wazuh-modulesd[73022] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:50 wazuh-modulesd[73022] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:50 wazuh-modulesd[73022] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:50 wazuh-modulesd[73022] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919826 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 8] description: Check if modulesd downloads the feeds for each os. 2.19 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:52 wazuh-modulesd[73072] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:52 wazuh-modulesd[73072] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:52 wazuh-modulesd[73072] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:52 wazuh-modulesd[73072] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:52 wazuh-modulesd[73072] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.919928 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Arch Linux] description: Check if modulesd downloads the feeds for each os. 2.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:54 wazuh-modulesd[73145] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:54 wazuh-modulesd[73145] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:54 wazuh-modulesd[73145] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:54 wazuh-modulesd[73145] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:54 wazuh-modulesd[73145] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/05/24 02:27:54 wazuh-modulesd[73145] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.920015 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[National Vulnerability Database] description: Check if modulesd downloads the feeds for each os. 1.53 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:56 wazuh-modulesd[73200] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:56 wazuh-modulesd[73200] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:56 wazuh-modulesd[73200] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:56 wazuh-modulesd[73200] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:56 wazuh-modulesd[73200] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/05/24 02:27:56 wazuh-modulesd[73200] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-05-24 02:36:54.920114 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Microsoft Security Update] description: Check if modulesd downloads the feeds for each os. 1.52 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:27:58 wazuh-modulesd[73260] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:27:58 wazuh-modulesd[73260] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:27:58 wazuh-modulesd[73260] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:27:58 wazuh-modulesd[73260] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:27:58 wazuh-modulesd[73260] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/05/24 02:27:58 wazuh-modulesd[73260] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.920197 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds for each os. 3.26 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:00 wazuh-modulesd[73343] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:00 wazuh-modulesd[73343] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:00 wazuh-modulesd[73343] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:00 wazuh-modulesd[73343] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:00 wazuh-modulesd[73343] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920282 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds for each os. 2.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:02 wazuh-modulesd[73390] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:02 wazuh-modulesd[73390] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:02 wazuh-modulesd[73390] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:02 wazuh-modulesd[73390] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:02 wazuh-modulesd[73390] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920365 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds for each os. 2.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:05 wazuh-modulesd[73459] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:05 wazuh-modulesd[73459] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:05 wazuh-modulesd[73459] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:05 wazuh-modulesd[73459] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:05 wazuh-modulesd[73459] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920447 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds for each os. 2.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:07 wazuh-modulesd[73521] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:07 wazuh-modulesd[73521] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:07 wazuh-modulesd[73521] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:07 wazuh-modulesd[73521] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:07 wazuh-modulesd[73521] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920526 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds for each os. 3.25 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:10 wazuh-modulesd[73599] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:10 wazuh-modulesd[73599] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:10 wazuh-modulesd[73599] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:10 wazuh-modulesd[73599] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:10 wazuh-modulesd[73599] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920610 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds for each os. 3.20 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:13 wazuh-modulesd[73684] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:13 wazuh-modulesd[73684] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:13 wazuh-modulesd[73684] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:13 wazuh-modulesd[73684] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:13 wazuh-modulesd[73684] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920694 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[RedHat] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.48 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:16 wazuh-modulesd[73739] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:16 wazuh-modulesd[73739] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:16 wazuh-modulesd[73739] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:16 wazuh-modulesd[73739] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:16 wazuh-modulesd[73739] wmodules-vuln-detector.c:978 at wm_vuldet_read_provider_content(): INFO: 'update_from_year' option at module 'vulnerability-detector' is deprecated. Use 'os' instead. 2022/05/24 02:28:16 wazuh-modulesd[73739] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920798 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Canonical] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.49 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:17 wazuh-modulesd[73789] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:17 wazuh-modulesd[73789] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:17 wazuh-modulesd[73789] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:17 wazuh-modulesd[73789] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:17 wazuh-modulesd[73789] wmodules-vuln-detector.c:992 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'canonical' provider at 'vulnerability-detector' 2022/05/24 02:28:17 wazuh-modulesd[73789] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (20) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920887 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Debian] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.14 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:18 wazuh-modulesd[73862] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:18 wazuh-modulesd[73862] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:18 wazuh-modulesd[73862] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:18 wazuh-modulesd[73862] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:18 wazuh-modulesd[73862] wmodules-vuln-detector.c:992 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'debian' provider at 'vulnerability-detector' 2022/05/24 02:28:18 wazuh-modulesd[73862] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (10) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.920969 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[NVD] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.23 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:21 wazuh-modulesd[73927] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:21 wazuh-modulesd[73927] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:21 wazuh-modulesd[73927] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:21 wazuh-modulesd[73927] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:21 wazuh-modulesd[73927] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/05/24 02:28:21 wazuh-modulesd[73927] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-05-24 02:36:54.921055 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[MSU] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.15 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:23 wazuh-modulesd[73987] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:23 wazuh-modulesd[73987] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:23 wazuh-modulesd[73987] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:23 wazuh-modulesd[73987] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:23 wazuh-modulesd[73987] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/05/24 02:28:23 wazuh-modulesd[73987] wmodules-vuln-detector.c:981 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'msu' provider. 2022/05/24 02:28:23 wazuh-modulesd[73987] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.921143 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[SUSE] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 2.53 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:25 wazuh-modulesd[74042] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:25 wazuh-modulesd[74042] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:25 wazuh-modulesd[74042] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:25 wazuh-modulesd[74042] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:25 wazuh-modulesd[74042] wmodules-vuln-detector.c:992 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'suse' provider at 'vulnerability-detector' 2022/05/24 02:28:25 wazuh-modulesd[74042] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.921227 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Amazon_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:27 wazuh-modulesd[74081] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:27 wazuh-modulesd[74081] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:27 wazuh-modulesd[74081] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:27 wazuh-modulesd[74081] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:27 wazuh-modulesd[74081] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.921307 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[RedHat] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.48 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:34 wazuh-modulesd[74172] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:34 wazuh-modulesd[74172] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:34 wazuh-modulesd[74172] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:34 wazuh-modulesd[74172] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:34 wazuh-modulesd[74172] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.921389 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Canonical] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.57 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:41 wazuh-modulesd[74267] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:41 wazuh-modulesd[74267] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:41 wazuh-modulesd[74267] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:41 wazuh-modulesd[74267] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:41 wazuh-modulesd[74267] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.921475 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Debian] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.52 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:48 wazuh-modulesd[74362] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:48 wazuh-modulesd[74362] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:48 wazuh-modulesd[74362] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:48 wazuh-modulesd[74362] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:48 wazuh-modulesd[74362] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.921557 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[NVD] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.48 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:28:54 wazuh-modulesd[74451] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:28:54 wazuh-modulesd[74451] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:28:54 wazuh-modulesd[74451] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:28:54 wazuh-modulesd[74451] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:28:54 wazuh-modulesd[74451] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/05/24 02:28:54 wazuh-modulesd[74451] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.921641 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Arch_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.48 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:29:01 wazuh-modulesd[74529] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:29:01 wazuh-modulesd[74529] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:29:01 wazuh-modulesd[74529] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:29:01 wazuh-modulesd[74529] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:29:01 wazuh-modulesd[74529] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/05/24 02:29:01 wazuh-modulesd[74529] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-05-24 02:36:54.921746 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[SUSE] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.51 server 0
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:29:07 wazuh-modulesd[74607] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:29:07 wazuh-modulesd[74607] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:29:07 wazuh-modulesd[74607] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:29:07 wazuh-modulesd[74607] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:29:07 wazuh-modulesd[74607] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-05-24 02:36:54.921829 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[WINDOWS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 8.47 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:29:18 wazuh-modulesd[74765] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:29:18 wazuh-modulesd[74765] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:29:18 wazuh-modulesd[74765] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:29:18 wazuh-modulesd[74765] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:29:18 wazuh-modulesd[74765] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.921916 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[MACOS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 8.93 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:29:27 wazuh-modulesd[74879] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:29:27 wazuh-modulesd[74879] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:29:27 wazuh-modulesd[74879] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:29:27 wazuh-modulesd[74879] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:29:27 wazuh-modulesd[74879] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922003 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[RHEL] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.93 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:29:40 wazuh-modulesd[75047] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:29:40 wazuh-modulesd[75047] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:29:40 wazuh-modulesd[75047] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:29:40 wazuh-modulesd[75047] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:29:40 wazuh-modulesd[75047] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922085 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[UBUNTU] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.88 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:29:47 wazuh-modulesd[75126] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:29:47 wazuh-modulesd[75126] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:29:47 wazuh-modulesd[75126] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:29:47 wazuh-modulesd[75126] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:29:47 wazuh-modulesd[75126] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922167 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[DEBIAN] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.88 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:29:55 wazuh-modulesd[75269] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:29:55 wazuh-modulesd[75269] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:29:55 wazuh-modulesd[75269] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:29:55 wazuh-modulesd[75269] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:29:55 wazuh-modulesd[75269] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922253 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ARCH] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.82 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:02 wazuh-modulesd[75360] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:02 wazuh-modulesd[75360] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:02 wazuh-modulesd[75360] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:02 wazuh-modulesd[75360] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:02 wazuh-modulesd[75360] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922333 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALAS] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.83 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:09 wazuh-modulesd[75474] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:09 wazuh-modulesd[75474] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:09 wazuh-modulesd[75474] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:09 wazuh-modulesd[75474] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:09 wazuh-modulesd[75474] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922415 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.86 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:16 wazuh-modulesd[75582] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:16 wazuh-modulesd[75582] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:16 wazuh-modulesd[75582] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:16 wazuh-modulesd[75582] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:16 wazuh-modulesd[75582] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922500 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.80 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:23 wazuh-modulesd[75671] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:23 wazuh-modulesd[75671] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:23 wazuh-modulesd[75671] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:23 wazuh-modulesd[75671] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:23 wazuh-modulesd[75671] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922599 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.80 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:30 wazuh-modulesd[75781] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:30 wazuh-modulesd[75781] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:30 wazuh-modulesd[75781] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:30 wazuh-modulesd[75781] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:30 wazuh-modulesd[75781] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922683 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.85 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:37 wazuh-modulesd[75872] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:37 wazuh-modulesd[75872] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:37 wazuh-modulesd[75872] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:37 wazuh-modulesd[75872] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:37 wazuh-modulesd[75872] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922765 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.85 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:44 wazuh-modulesd[75996] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:44 wazuh-modulesd[75996] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:44 wazuh-modulesd[75996] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:44 wazuh-modulesd[75996] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:44 wazuh-modulesd[75996] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922848 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.88 server
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:52 wazuh-modulesd[76118] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:52 wazuh-modulesd[76118] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:52 wazuh-modulesd[76118] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:52 wazuh-modulesd[76118] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:52 wazuh-modulesd[76118] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.922933 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.93 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:30:58 wazuh-modulesd[76218] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:30:58 wazuh-modulesd[76218] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:30:58 wazuh-modulesd[76218] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:30:58 wazuh-modulesd[76218] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:30:58 wazuh-modulesd[76218] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:30:58 wazuh-modulesd[76218] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:30:58 wazuh-modulesd[76218] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923019 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.91 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:31:07 wazuh-modulesd[76336] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:31:07 wazuh-modulesd[76336] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:31:07 wazuh-modulesd[76336] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:31:07 wazuh-modulesd[76336] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:31:07 wazuh-modulesd[76336] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:31:07 wazuh-modulesd[76336] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923105 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 11.98 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:31:19 wazuh-modulesd[76515] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:31:19 wazuh-modulesd[76515] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:31:19 wazuh-modulesd[76515] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:31:19 wazuh-modulesd[76515] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:31:19 wazuh-modulesd[76515] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:31:19 wazuh-modulesd[76515] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923189 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 9.95 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:31:29 wazuh-modulesd[76649] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:31:29 wazuh-modulesd[76649] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:31:29 wazuh-modulesd[76649] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:31:29 wazuh-modulesd[76649] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:31:29 wazuh-modulesd[76649] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2022/05/24 02:31:29 wazuh-modulesd[76649] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923275 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.92 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:31:38 wazuh-modulesd[76750] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:31:38 wazuh-modulesd[76750] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:31:38 wazuh-modulesd[76750] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:31:38 wazuh-modulesd[76750] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:31:38 wazuh-modulesd[76750] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 02:31:38 wazuh-modulesd[76750] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923356 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.43 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:31:47 wazuh-modulesd[76868] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:31:47 wazuh-modulesd[76868] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:31:47 wazuh-modulesd[76868] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:31:47 wazuh-modulesd[76868] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:31:47 wazuh-modulesd[76868] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:31:47 wazuh-modulesd[76868] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923462 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.93 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:31:56 wazuh-modulesd[76995] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:31:56 wazuh-modulesd[76995] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:31:56 wazuh-modulesd[76995] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:31:56 wazuh-modulesd[76995] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:31:56 wazuh-modulesd[76995] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:31:56 wazuh-modulesd[76995] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:31:56 wazuh-modulesd[76995] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923546 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.86 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:32:05 wazuh-modulesd[77108] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:32:05 wazuh-modulesd[77108] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:32:05 wazuh-modulesd[77108] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:32:05 wazuh-modulesd[77108] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:32:05 wazuh-modulesd[77108] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:32:05 wazuh-modulesd[77108] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923637 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.91 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:32:13 wazuh-modulesd[77230] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:32:13 wazuh-modulesd[77230] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:32:13 wazuh-modulesd[77230] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:32:13 wazuh-modulesd[77230] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:32:13 wazuh-modulesd[77230] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:32:13 wazuh-modulesd[77230] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923722 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 9.98 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:32:23 wazuh-modulesd[77357] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:32:23 wazuh-modulesd[77357] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:32:23 wazuh-modulesd[77357] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:32:23 wazuh-modulesd[77357] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:32:23 wazuh-modulesd[77357] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2022/05/24 02:32:23 wazuh-modulesd[77357] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923806 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.92 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:32:32 wazuh-modulesd[77450] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:32:32 wazuh-modulesd[77450] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:32:32 wazuh-modulesd[77450] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:32:32 wazuh-modulesd[77450] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:32:32 wazuh-modulesd[77450] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/05/24 02:32:32 wazuh-modulesd[77450] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923895 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.88 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:32:41 wazuh-modulesd[77577] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:32:41 wazuh-modulesd[77577] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:32:41 wazuh-modulesd[77577] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:32:41 wazuh-modulesd[77577] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:32:41 wazuh-modulesd[77577] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:32:41 wazuh-modulesd[77577] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.923983 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 22.97 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:32:51 wazuh-modulesd[77716] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:32:51 wazuh-modulesd[77716] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:32:51 wazuh-modulesd[77716] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:32:51 wazuh-modulesd[77716] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:32:51 wazuh-modulesd[77716] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:32:51 wazuh-modulesd[77716] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:32:51 wazuh-modulesd[77716] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924077 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 23.03 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:33:14 wazuh-modulesd[77903] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:33:14 wazuh-modulesd[77903] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:33:14 wazuh-modulesd[77903] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:33:14 wazuh-modulesd[77903] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:33:14 wazuh-modulesd[77903] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:33:14 wazuh-modulesd[77903] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924166 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 17.98 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:33:37 wazuh-modulesd[78077] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:33:37 wazuh-modulesd[78077] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:33:37 wazuh-modulesd[78077] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:33:37 wazuh-modulesd[78077] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:33:37 wazuh-modulesd[78077] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:33:37 wazuh-modulesd[78077] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:33:37 wazuh-modulesd[78077] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924258 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 21.89 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:33:54 wazuh-modulesd[78222] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:33:54 wazuh-modulesd[78222] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:33:54 wazuh-modulesd[78222] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:33:54 wazuh-modulesd[78222] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:33:54 wazuh-modulesd[78222] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:33:54 wazuh-modulesd[78222] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924340 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_start[RHEL] description: Check that the baseline scan starts. 6.86 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:34:16 wazuh-modulesd[78387] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:34:16 wazuh-modulesd[78387] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:34:16 wazuh-modulesd[78387] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:34:16 wazuh-modulesd[78387] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:34:16 wazuh-modulesd[78387] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:34:16 wazuh-modulesd[78387] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:34:16 wazuh-modulesd[78387] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924448 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_alert[RHEL] description: Check that the baseline scan detects vulnerabilities, and reports them as alerts. 6.86 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:34:23 wazuh-modulesd[78496] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:34:23 wazuh-modulesd[78496] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:34:23 wazuh-modulesd[78496] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:34:23 wazuh-modulesd[78496] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:34:23 wazuh-modulesd[78496] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:34:23 wazuh-modulesd[78496] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:34:23 wazuh-modulesd[78496] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924532 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_start[RHEL] description: Check that the full scan starts. 6.83 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:34:30 wazuh-modulesd[78599] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:34:30 wazuh-modulesd[78599] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:34:30 wazuh-modulesd[78599] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:34:30 wazuh-modulesd[78599] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:34:30 wazuh-modulesd[78599] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:34:30 wazuh-modulesd[78599] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:34:30 wazuh-modulesd[78599] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924636 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_no_alert_after_no_changes[RHEL] description: Check that the full scan does not report previously reported vulnerabilities. 18.46 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:34:37 wazuh-modulesd[78679] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:34:37 wazuh-modulesd[78679] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:34:37 wazuh-modulesd[78679] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:34:37 wazuh-modulesd[78679] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:34:37 wazuh-modulesd[78679] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:34:37 wazuh-modulesd[78679] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:34:37 wazuh-modulesd[78679] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-05-24 02:34:49,842 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2022-05-24 02:34:49,843 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:34:49,843 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.924725 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_alert_after_changes[RHEL] description: Check that the full scan reports a new vulnerability from the latest scan. 12.97 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:34:56 wazuh-modulesd[78863] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:34:56 wazuh-modulesd[78863] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:34:56 wazuh-modulesd[78863] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:34:56 wazuh-modulesd[78863] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:34:56 wazuh-modulesd[78863] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:34:56 wazuh-modulesd[78863] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:34:56 wazuh-modulesd[78863] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924815 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_remove_vulnerability_alert[RHEL] description: Check that the full scan reports removed vulnerabilities. 12.95 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:35:09 wazuh-modulesd[79023] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:35:09 wazuh-modulesd[79023] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:35:09 wazuh-modulesd[79023] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:35:09 wazuh-modulesd[79023] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:35:09 wazuh-modulesd[79023] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:35:09 wazuh-modulesd[79023] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:35:09 wazuh-modulesd[79023] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.924899 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_start[RHEL] description: Check that the partial scan starts. 7.86 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:35:22 wazuh-modulesd[79158] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:35:22 wazuh-modulesd[79158] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:35:22 wazuh-modulesd[79158] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:35:22 wazuh-modulesd[79158] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:35:22 wazuh-modulesd[79158] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:35:22 wazuh-modulesd[79158] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:35:22 wazuh-modulesd[79158] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.925005 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_no_alert_after_no_changes[RHEL] description: Check that the partial scan does not report previously reported vulnerabilities. 21.83 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:35:29 wazuh-modulesd[79252] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:35:29 wazuh-modulesd[79252] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:35:29 wazuh-modulesd[79252] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:35:29 wazuh-modulesd[79252] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:35:29 wazuh-modulesd[79252] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:35:29 wazuh-modulesd[79252] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:35:29 wazuh-modulesd[79252] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-05-24 02:35:45,575 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2022-05-24 02:35:45,576 - wazuh_testing - ERROR - Results accumulated: 0 2022-05-24 02:35:45,576 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-05-24 02:36:54.925090 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_alert_after_changes[RHEL] description: Check that the partial scan reports a new vulnerability from the latest scan. 17.32 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:35:51 wazuh-modulesd[79380] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:35:51 wazuh-modulesd[79380] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:35:51 wazuh-modulesd[79380] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:35:51 wazuh-modulesd[79380] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:35:51 wazuh-modulesd[79380] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:35:51 wazuh-modulesd[79380] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:35:51 wazuh-modulesd[79380] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.925178 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_remove_vulnerability_alert[RHEL] description: Check that the partial scan reports removed vulnerabilities. 12.37 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:36:08 wazuh-modulesd[79523] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:36:08 wazuh-modulesd[79523] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:36:08 wazuh-modulesd[79523] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:36:08 wazuh-modulesd[79523] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:36:08 wazuh-modulesd[79523] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:36:08 wazuh-modulesd[79523] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:36:08 wazuh-modulesd[79523] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.925290 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py::test_vulnerability_inserted_baseline_scan[RHEL] description: Check that the baseline scan inserts the detected vulnerabilities 9.94 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:36:24 wazuh-modulesd[79701] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:36:24 wazuh-modulesd[79701] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:36:24 wazuh-modulesd[79701] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:36:24 wazuh-modulesd[79701] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:36:24 wazuh-modulesd[79701] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:36:24 wazuh-modulesd[79701] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:36:24 wazuh-modulesd[79701] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.925377 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_inserted_full_scan[RHEL] description: Check that the full scan inserts the detected vulnerabilities 7.91 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:36:32 wazuh-modulesd[79832] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:36:32 wazuh-modulesd[79832] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:36:32 wazuh-modulesd[79832] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:36:32 wazuh-modulesd[79832] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:36:32 wazuh-modulesd[79832] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:36:32 wazuh-modulesd[79832] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:36:32 wazuh-modulesd[79832] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.925461 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_removed_full_scan[RHEL] description: Check that the full scan removes the obsolete vulnerabilities from the inventory. 6.85 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:36:38 wazuh-modulesd[79933] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:36:38 wazuh-modulesd[79933] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:36:38 wazuh-modulesd[79933] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:36:38 wazuh-modulesd[79933] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:36:38 wazuh-modulesd[79933] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:36:38 wazuh-modulesd[79933] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:36:38 wazuh-modulesd[79933] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.925546 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_inserted_partial_scan[RHEL] description: Check that the partial scan inserts the detected vulnerabilities. 6.90 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:36:45 wazuh-modulesd[80039] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:36:45 wazuh-modulesd[80039] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:36:45 wazuh-modulesd[80039] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:36:45 wazuh-modulesd[80039] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:36:45 wazuh-modulesd[80039] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:36:45 wazuh-modulesd[80039] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:36:45 wazuh-modulesd[80039] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-05-24 02:36:54.925631 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_removed_partial_scan[RHEL] description: Check that the partial scan removes the obsolete vulnerabilities from the inventory. 6.84 server 1
-----------------------------Captured stderr setup------------------------------
2022/05/24 02:36:52 wazuh-modulesd[80149] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/05/24 02:36:52 wazuh-modulesd[80149] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/05/24 02:36:52 wazuh-modulesd[80149] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/05/24 02:36:52 wazuh-modulesd[80149] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/05/24 02:36:52 wazuh-modulesd[80149] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/05/24 02:36:52 wazuh-modulesd[80149] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/05/24 02:36:52 wazuh-modulesd[80149] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/root/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s