Imperva Cloud WAF is a web application security firewall that protects against security threats, including OWASP Top 10, such as cross-site scripting, illegal resource access, and remote file inclusion. Web applications are common targets for cybercriminals who aim to exploit vulnerabilities and gain unauthorized access.
Wazuh is a free and open source SIEM and XDR platform that offers protection against security threats for various platforms including virtualized, cloud, and containerized environments.
In this blog post, we show the integration of Imperva CWAF with Wazuh. This integration enhances visibility into web application events by creating custom rules that alert on critical incidents and highlight trends in malicious activities.
Requirements
We use the following infrastructure to demonstrate the integration of Imperva cloud WAF with Wazuh:
- Wazuh 4.8.1 central components (Wazuh server, Wazuh indexer, Wazuh dashboard) installed using the quickstart guide on an Ubuntu server.
- An Ubuntu 22.04 endpoint with Wazuh agent 4.8.1 installed and enrolled to the Wazuh server. This endpoint will serve as a log collector for the Imperva CWAF logs.
- An Imperva cloud platform and a user with administrator privileges to create API credentials.
Configuration
Follow the steps below to integrate Imperva with Wazuh.
- Enable logging of events gathered by Imperva and set the connection mode in which logs can be collected from Imperva.
- Configure the Wazuh server to decode and alert for Imperva CWAF-related events by creating custom decoders and rules.
- Configure the Wazuh agent on the Ubuntu endpoint to act as a log collector to store Imperva CWAF logs and send them to the Wazuh server for analysis.
Note: Depending on the number of applications you have onboarded with Imperva, you may require additional computational resources for Wazuh. Be aware that insufficient resources may lead to complications, such as the flooding of the Wazuh agent queue, which can disrupt log processing.
Imperva web user interface
Enable logging
Follow the steps below to enable logging for your organization on your Imperva CWAF account.
1. Log into your Imperva account.
2. Click Account > Account Management on the top menu bar.
3. Click SIEM Logs > WAF Log Setup on the sidebar.
4. Click Activate logs.
5. Select Imperva API as the pull connection mode.
6. Copy the API Key before exiting the window under Connection. You will need it later. If you forget to copy the key, you can return to this window later and click Generate API Key to create a new one.
7. Confirm the log format as CEF (Common Event Format).

Wazuh server
Create custom decoders for Imperva CWAF logs and create custom rules to trigger alerts for events generated by Imperva CWAF.
Custom decoders
1. Create a decoder file /var/ossec/etc/decoders/imperva_waf_decoders.xml and add the following decoders:
<decoder name="imperva-waf">
<prematch>CEF:0\|Incapsula\|SIEMIntegration</prematch>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>\|SIEMIntegration\|\.\|\.\|(\.+)\|</regex>
<order>waf.event</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>\|\.\|\.\|\.+\|(\d+)\|\sfileId=</regex>
<order>waf.eventcode</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>fileId=(\.+)\s</regex>
<order>waf.fileID</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>sourceServiceName=(\.+)\ssiteid=</regex>
<order>waf.sourceServiceName</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>siteid=(\.+)\suid=</regex>
<order>waf.siteid</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>requestClientApplication=(\.+)\sdeviceFacility=</regex>
<order>waf.requestClientApplication</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>deviceFacility=(\.+)\scs2=</regex>
<order>waf.deviceFacility</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs2=(\.+)\scs2Lable=</regex>
<order>waf.javascript.support</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs3=(\.+)\scs3Label=</regex>
<order>waf.co.support</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs1=(\.+)\scs1Label=</regex>
<order>waf.cap.support</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs4=(\.+)\scs4Lable=</regex>
<order>cs4</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs5=(\.+)\scs5Lable=</regex>
<order>waf.clappsig</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>dproc=(\.+)\scs6=</regex>
<order>waf.browser.type</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs6=(\.+)\scs6Lable=</regex>
<order>waf.clapp</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>ccode=(\.+)\s</regex>
<order>waf.country.code</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cicode=(\.+)\scs7=</regex>
<order>waf.city.code</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs7=(\.+)\scs7Label=</regex>
<order>waf.latitude</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs8=(\.+)\scs8Label=</regex>
<order>waf.longitude</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>customer=(\.+)\sstart=</regex>
<order>waf.customer</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>start=(\.+)\srequest=</regex>
<order>waf.start</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>request=(\.+)\s</regex>
<order>waf.request</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>ref=(\.+)\srequestMethod=</regex>
<order>waf.ref</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>requestMethod=(\.+)\s</regex>
<order>waf.requestMethod</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cn1=(\.+)\s</regex>
<order>waf.http.code</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>app=(\.+)\sact=</regex>
<order>waf.app</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>act=(\.+)\sdeviceExternalId=</regex>
<order>waf.act</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>deviceExternalId=(\.+)\spt=</regex>
<order>waf.deviceExternalId</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cpt=(\.+)\ssrc=</regex>
<order>waf.cpt</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>src=(\.+)\s=ver</regex>
<order>waf.src</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>ver=(\.+)\send=</regex>
<order>waf.ver</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>fileType=(\.+)\sfilePermission=</regex>
<order>waf.fileType</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>filePermission=(\.+)\scs9=</regex>
<order>waf.filePermission</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs9=(\.+)\scs9Label=</regex>
<order>waf.rulename</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>xff=(\.*)\s</regex>
<order>waf.xff</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>sip=(\.*)\s</regex>
<order>waf.sip</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>spt=(\.*)\s</regex>
<order>waf.spt</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent>
<regex>cs11=(\.*)\s</regex>
<order>waf.rule.info</order>
</decoder>
<decoder name="imperva_fields">
<parent>imperva-waf</parent> <regex>cs11=[{"api_specification_violation_type":"(\w+)"</regex>
<order>waf.rule.violation</order>
</decoder>
2. Change the ownership and permissions of the /var/ossec/etc/decoders/imperva_waf_decoders.xml file:
# chown wazuh:wazuh /var/ossec/etc/decoders/imperva_waf_decoders.xml # chmod 660 /var/ossec/etc/decoders/imperva_waf_decoders.xml
Custom rules
1. Create a rule file /var/ossec/etc/rules/imperva_waf_rules.xml and add the following rules:
<group name="ImpervaWAF">
<!-- Imperva -->
<rule id="100550" level="2">
<decoded_as>imperva-waf</decoded_as>
<description>Imperva WAF learning log: $(waf.event)</description>
</rule>
<rule id="100551" level="9" ignore="60">
<if_sid>100550</if_sid>
<field name="waf.eventcode">^8$</field>
<field name="waf.event">^DDoS$</field>
<description>Imperva WAF: DDoS detected.</description>
<mitre>
<id>T1498</id>
</mitre>
</rule>
<rule id="100552" level="10">
<if_sid>100550</if_sid>
<field name="waf.eventcode">^10$</field>
<field name="waf.event">^RFI$</field>
<description>Imperva WAF: RFI detected.</description>
<mitre>
<id>T1190</id>
</mitre>
</rule>
<rule id="100553" level="4">
<if_sid>100550</if_sid>
<field name="waf.eventcode">^3$</field>
<field name="waf.event">^ACL (block country/IP/URL)$</field>
<description>Imperva WAF: ACL (block country/IP/URL) detected.</description>
</rule>
<rule id="100554" level="7">
<if_sid>100550</if_sid>
<field name="waf.eventcode">^4$</field>
<field name="waf.event">^Bot Access Control$</field>
<description>Rule Triggered: $(waf.rulename)</description>
<mitre>
<id>T1089</id>
</mitre>
</rule>
<rule id="100555" level="5">
<if_sid>100550</if_sid>
<field name="waf.eventcode">^3$</field>
<field name="waf.act" negate="yes">^REQ_BLOCKED_</field>
<field name="waf.event">Illegal Resource Access</field>
<description>$(waf.act) to $(waf.request)</description>
<mitre>
<id>T1199</id>
</mitre>
</rule>
<rule id="100556" level="5">
<if_sid>100550</if_sid>
<field name="waf.act" negate="yes">^REQ_BLOCKED</field>
<field name="waf.event">^Cross Site Scripting$</field>
<description>Imperva WAF: $(waf.event)</description>
</rule>
<rule id="100557" level="4" ignore="60">
<if_sid>100550</if_sid>
<field name="waf.act" negate="yes">^REQ_BLOCKED_SESSION$</field>
<field name="waf.event">^SQL Injection$</field>
<description>Imperva WAF: $(waf.event)</description>
</rule>
<rule id="100558" level="8" ignore="60">
<if_sid>100550</if_sid>
<field name="waf.eventcode">^9$</field>
<field name="waf.event">^Backdoor Protect$</field>
<description>Imperva WAF: $(waf.event)</description>
</rule>
<rule id="100559" level="2">
<if_sid>100550</if_sid>
<field name="waf.http.code">^200$|^304$|^302$|^301$</field>
<field name="waf.event">^API Specification Violation$</field>
<description>API Specification Violation detected by Incapsula - Http codes</description>
</rule>
</group>
2. Set the ownership and permissions of the /var/ossec/etc/rules/imperva_waf_rules.xml file:
# chown wazuh:wazuh /var/ossec/etc/rules/imperva_waf_rules.xml # chmod 660 /var/ossec/etc/rules/imperva_waf_rules.xml
3. Restart the Wazuh manager service to apply the changes made:
# systemctl restart wazuh-manager
Ubuntu
The Ubuntu endpoint serves as a log collector where all the Imperva cloud WAF logs will be downloaded. Follow the steps below to collect logs from Imperva CWAF and forward them to the Wazuh server.
1. Install the git utility to clone GitHub repositories and python3-pip package installer for Python 3:
# apt update # apt install git python3-pip
2. Clone the incapsula-logs-downloader GitHub repository to the root / directory:
# cd / # git clone https://github.com/imperva/incapsula-logs-downloader.git /incapsula-logs-downloader
3. Navigate to the /incapsula-logs-downloader/script directory where the LogsDownloader.py file is present:
# cd /incapsula-logs-downloader/script
4. Replace the existing /incapsula-logs-downloader/script/LogsDownloader.py file with the script below. The changes in this script ensure that the logs downloaded are saved into one log file /var/log/IncapsulaWAF.log that Wazuh can analyze:
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# Author: Doron Lehmann, Incapsula, Inc.
# Date: 2015
# Description: Logs Downloader Client
#
# ************************************************************************************
# Copyright (c) 2015, Incapsula, Inc.
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
#
# * Redistributions of source code must retain the above copyright notice, this
# list of conditions and the following disclaimer.
#
# * Redistributions in binary form must reproduce the above copyright notice,
# this list of conditions and the following disclaimer in the documentation
# and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
#
# ************************************************************************************
#
import base64
import datetime
import getopt
import hashlib
from logging import handlers
import os
import signal
import sys
import threading
import time
import traceback
import zlib
import logging
from Config import Config
from FileDownloader import FileDownloader
from HandlingLogs import HandlingLogs
from LastFileId import LastFileId
from LogsFileIndex import LogsFileIndex
from multiprocessing.pool import ThreadPool
from threading import active_count
"""
Main class for downloading log files
"""
class LogsDownloader:
# the LogsDownloader will run until external termination
RUNNING = True
_start_total = None
pool = ThreadPool()
downloaded = []
def __init__(self, config_path, system_log_path, log_level):
# set a log file for the downloader
self.logger = logging.getLogger("logsDownloader")
# default log directory for the downloader
log_dir = system_log_path
# create the log directory if needed
if not os.path.exists(log_dir):
os.makedirs(log_dir)
# Set logging level
if log_level == "DEBUG":
self.logger.setLevel(logging.DEBUG)
elif log_level == "INFO":
self.logger.setLevel(logging.INFO)
elif log_level == "ERROR":
self.logger.setLevel(logging.ERROR)
logging.basicConfig(
level=log_level,
# keep logs history for 7 days
handlers=[logging.handlers.TimedRotatingFileHandler(os.path.join(log_dir, "logs_downloader.log"),
when='midnight', backupCount=7),
logging.StreamHandler(sys.stdout)],
format="%(asctime)s %(threadName)s %(levelname)s %(message)s"
)
self.logger.debug("Initializing LogsDownloader")
self.config_path = config_path
self.config_reader = Config(self.config_path, self.logger)
try:
# read the configuration file and load it
self.config = self.config_reader.read()
except Exception:
self.logger.error(
"Exception while getting LogsDownloader config file - Could Not find Configuration file - %s",
traceback.format_exc())
sys.exit("Could Not find Configuration file")
# Create the needed directories for handling the logs incoming, process, archive
if not os.path.exists(self.config.INCOMING_DIR):
os.makedirs(self.config.INCOMING_DIR)
else:
for file in os.listdir(self.config.INCOMING_DIR):
os.remove(os.path.join(self.config.INCOMING_DIR, file))
if not os.path.exists(self.config.PROCESS_DIR):
os.makedirs(self.config.PROCESS_DIR)
if not os.path.exists(self.config.ARCHIVE_DIR):
os.makedirs(self.config.ARCHIVE_DIR)
# create a file downloader handler
self.file_downloader = FileDownloader(self.config, self.logger)
# create a last file id handler
self.last_known_downloaded_file_id = LastFileId(self.config_path)
# create a logs file index handler
self.logs_file_index = LogsFileIndex(self.config, self.logger, self.file_downloader, self.config_path)
# Configure the remote logger, whether it be SYSLOG or Splunk HEC
if self.config.SYSLOG_ENABLE == 'YES' or self.config.SPLUNK_HEC == 'YES':
self.file_watcher = HandlingLogs(self.config, self.logger)
self.file_watcher_thread = threading.Thread(target=self.file_watcher.watch_files, name="file_watcher_thread")
self.file_watcher_thread.start()
self.logger.info("LogsDownloader initializing is done")
"""
Download the log files.
If this is the first time, we get the logs.index file, scan it, and download all of the files in it.
It this is not the first time, we try to fetch the next log file.
"""
def get_index_file(self):
while self.RUNNING:
try:
# download the logs.index file
self.logs_file_index.download()
# Start a timer and start processing the index
self._start_total = time.perf_counter()
self.start_log_processing()
except Exception as e:
self.logger.error(
"Failed to downloading index file and starting to download all the log files in it - %s, %s", e,
traceback.format_exc())
# wait for 5 seconds between each iteration
self.logger.info("Sleeping for 10 seconds before trying to fetch logs again...")
time.sleep(10)
self.logger.info("Exiting get_index_file.")
"""
Scan the logs.index file, and download all the log files in it
"""
def start_log_processing(self):
# Get the list of file names from the index file and compare with the current processed index list
logs_in_index = self.logs_file_index.indexed_logs()
self.downloaded = self.get_indexed()
additions = [x for x in logs_in_index if x not in self.downloaded]
deletion = [x for x in self.downloaded if x not in logs_in_index]
completed = [x for x in logs_in_index if x not in deletion]
if len(deletion) > 0:
self.logger.info("Clean up the passed/purged indexes.")
self.update_complete_file(completed)
self.logger.info("Pre and post index length: {} - {}".format(len(self.downloaded), len(self.get_indexed())))
if len(additions) == 0:
self.logger.info("{} new logs to download.".format(len(additions)))
time.sleep(3)
return
# for each file
self.logger.info("{} new logs to download.".format(len(additions)))
for log_file_name in additions:
if not self.RUNNING:
self.logger.warning("Exiting the 'for log_file_name' loop in start_log_processing function.")
break
if LogsFileIndex.validate_log_file_format(str(log_file_name.rstrip('\r\n'))):
try:
res = self.pool.apply_async(self.handle_file, (log_file_name,), callback=self.update_index)
res.wait(15)
except Exception as e:
self.logger.error("start_log_processing {}".format(e))
break
self.logger.debug("It took {} seconds to download {} files.".format(time.perf_counter() - self._start_total,
additions.__len__()))
# Get the missed indexes where we had issue, downloading or processing.
self.log_missed_indexes()
"""
Check the currently downloaded "LOGS.INDEX" against the local complete.log and remove items that no longer exist
prior to the first item in the "LOGS.INDEX"
"""
def update_complete_file(self, completed):
self.logger.info("Update the complete.log with downloaded file(s).")
with open(os.path.join(self.config_path, "complete.log"), "wt", encoding="utf-8") as fw:
for item in completed:
try:
fw.writelines("{}\n".format(item.split(".")[0].split("_")[1]))
except OSError as e:
self.logger.error("Updating file {}.".format(os.path.join(self.config_path, "complete.log"), e))
"""
Update the complete.log with the last downloaded log.
"""
def update_index(self, result):
if result[0]:
self.logger.info("Downloaded {}".format(result[1]))
current_index = self.logs_file_index.indexed_logs()
if result[1] in current_index:
self.downloaded.append(result[1])
self.update_complete_file(self.downloaded)
else:
self.logger.error("Downloading {}".format(result[1]))
def handle_file(self, logfile) -> tuple:
# if the downloader was stopped
if not self.RUNNING:
self.logger.warning("Shutting down handle_file function.")
return False, logfile
else:
# download the file
result = self.download_log_file(logfile)
# if we got it
if result[0] == "OK":
try:
# we decrypt the file
decrypted_file = self.decrypt_file(result[1], logfile)
# handle the decrypted content
self.handle_log_decrypted_content(logfile, decrypted_file)
return True, logfile
# if an exception occurs during the decryption or handling the decrypted content,
# we save the raw file to a "fail" folder
except Exception as e:
self.logger.error("Saving file %s locally: %s %s", logfile, e, traceback.format_exc())
else:
self.logger.error("Downloading file %s.", logfile)
return False, logfile
"""
Saves the decrypted file content to a log file in the filesystem
"""
def handle_log_decrypted_content(self, filename, decrypted_file):
decrypted_file = decrypted_file.decode('utf-8')
log_file_path = "/var/log/incapsulaWAF.log" # Path to the single log file
with open(log_file_path, "a", encoding="utf-8") as log_file:
log_file.write(decrypted_file)
self.logger.info("Logs saved successfully to %s", log_file_path)
"""
Decrypt a file content
"""
def decrypt_file(self, file_content, filename):
# each log file is built from a header section and a content section, the two are divided by a |==| mark
file_split_content = file_content.split(b"|==|\n")
# get the header section content
file_header_content = file_split_content[0].decode('utf-8')
# get the log section content
file_log_content = file_split_content[1]
# if the file is not encrypted - the "key" value in the file header is '-1'
file_encryption_key = file_header_content.find("key:")
if file_encryption_key == -1:
# uncompress the log content
try:
uncompressed_and_decrypted_file_content = zlib.decompressobj().decompress(file_log_content)
except zlib.error:
uncompressed_and_decrypted_file_content = file_log_content
# if the file is encrypted
else:
content_encrypted_sym_key = file_header_content.split("key:")[1].splitlines()[0]
# we expect to have a 'keys' folder that will have the stored private keys
self.logger.info('Keys Dir: %s', os.path.join(self.config_path, "keys"))
if not os.path.exists(os.path.join(self.config_path, "keys")):
self.logger.error("No encryption keys directory was found and file %s is encrypted", filename)
raise Exception("No encryption keys directory was found")
# get the public key id from the log file header
public_key_id = file_header_content.split("publicKeyId:")[1].splitlines()[0]
# get the public key directory in the filesystem - each time we upload a new key this id is incremented
public_key_directory = os.path.join(os.path.join(self.config_path, "keys"), public_key_id)
# if the key directory does not exists
if not os.path.exists(public_key_directory):
self.logger.error("Failed to find a proper certificate for : %s who has the publicKeyId of %s",
filename, public_key_id)
raise Exception("Failed to find a proper certificate")
# get the checksum
checksum = file_header_content.split("checksum:")[1].splitlines()[0]
# get the private key
private_key = open(os.path.join(public_key_directory, "Private.key"), "rb").read()
try:
from M2Crypto import RSA
from Crypto.Cipher import AES
rsa_private_key = RSA.load_key_string(private_key)
content_decrypted_sym_key = rsa_private_key.private_decrypt(
base64.b64decode(bytes(content_encrypted_sym_key, 'utf-8')), RSA.pkcs1_padding)
decrypted_file_content = AES.new(base64.b64decode(bytearray(content_decrypted_sym_key)), AES.MODE_CBC,
16 * b'\x00').decrypt(file_log_content)
except Exception as e:
self.logger.error("Error while trying to decrypt the file %s: %s", filename, e)
raise Exception("Error while trying to decrypt the file" + filename)
try:
uncompressed_and_decrypted_file_content = zlib.decompressobj().decompress(decrypted_file_content)
except zlib.error:
uncompressed_and_decrypted_file_content = decrypted_file_content
return uncompressed_and_decrypted_file_content
"""
Downloads a log file
"""
def download_log_file(self, filename):
# get the file name
filename = str(filename.rstrip("\r\n"))
try:
# download the file
file_content = self.file_downloader.request_file_content(self.config.BASE_URL + filename)
# if we received a valid file content
if file_content != "":
return "OK", file_content
# if the file was not found
else:
return "NOT_FOUND", file_content
except Exception:
self.logger.error("Error while trying to download file")
return "ERROR"
"""
Validates a checksum
"""
@staticmethod
def validate_checksum(checksum, uncompressed_and_decrypted_file_content):
m = hashlib.md5()
m.update(uncompressed_and_decrypted_file_content)
if m.hexdigest() == checksum:
return True
else:
return False
"""
Handle a case of process termination
"""
def set_signal_handling(self, sig, frame):
current_threads = active_count()
if sig == signal.SIGINT.value:
self.logger.info("Got a termination signal, will now shutdown and exit gracefully")
self.logger.debug("Terminating {} worker threads in thread pool.".format(current_threads))
if self.config.SYSLOG_ENABLE == 'YES' or self.config.SPLUNK_HEC == 'YES':
self.file_watcher.RUNNING = False
self.logger.warning("File Watcher Pool Running set to False.")
self.file_watcher.pool.terminate()
self.logger.warning("File Watcher Pool Terminated.")
self.file_watcher.pool.join()
self.logger.warning("File Watcher Pool Joined.")
self.RUNNING = False
self.logger.warning("Pool Set to False.")
self.pool.terminate()
self.logger.warning("Pool Terminated.")
self.pool.join()
self.logger.warning("Pool Joined.")
self.logger.debug("Thread worker pool termination complete")
while active_count() > 1:
time.sleep(1)
self.logger.debug("Shutdown Complete.")
"""
Gets the next log file name that we should download
"""
@staticmethod
def get_counter_from_file_name(file_name):
curr_log_file_name_arr = file_name.split("_")
return int(curr_log_file_name_arr[1].rstrip(".log"))
def get_missed_indexes(self) -> list:
if not os.path.exists(os.path.join(self.config_path, "complete.log")):
return []
with open(os.path.join(self.config_path, "complete.log"), "rb") as fp:
content = fp.read().decode("utf-8")
lst = list(map(int, content.splitlines()))
lst.sort()
return sorted(set(range(lst[0], lst[-1])) - set(lst))
def log_missed_indexes(self):
missed_index = self.get_missed_indexes()
self.logger.debug("Updating missed_indexes with {} indexes.".format(missed_index.__len__()))
account_id = self.config.BASE_URL.split("/")[3].split("_")[0]
with open(os.path.join(self.config_path, "missed_indexes.log"), "wt", encoding="utf-8") as fp:
for index in missed_index:
fp.write("{}: {}_{}.log\n".format(datetime.datetime.utcnow(), account_id, index))
def get_indexed(self) -> list:
if not os.path.exists(os.path.join(self.config_path, "complete.log")):
return []
lst = []
account_id = self.config.BASE_URL.split("/")[3].split("_")[0]
with open(os.path.join(self.config_path, "complete.log"), "rb") as fp:
content = fp.read().decode("utf-8")
for index in content.splitlines():
lst.append("{}_{}.log".format(account_id, index))
return lst
if __name__ == "__main__":
# default paths
path_to_config_folder = "/etc/incapsula/logs/config"
path_to_system_logs_folder = "/var/log/incapsula/logsDownloader/"
# default log level
system_logs_level = "INFO"
# read arguments
try:
opts, args = getopt.getopt(sys.argv[1:], 'c:l:v:h', ['configpath=', 'logpath=', 'loglevel=', 'help'])
except getopt.GetoptError:
print("Error starting Logs Downloader. The following arguments should be provided:" \
" \n '-c' - path to the config folder" \
" \n '-l' - path to the system logs folder" \
" \n '-v' - LogsDownloader system logs level" \
" \n Or no arguments at all in order to use default paths")
sys.exit(2)
for opt, arg in opts:
if opt in ('-h', '--help'):
print('LogsDownloader.py -c <path_to_config_folder> -l <path_to_system_logs_folder> -v <system_logs_level>')
sys.exit(2)
elif opt in ('-c', '--configpath'):
path_to_config_folder = arg
elif opt in ('-l', '--logpath'):
path_to_system_logs_folder = arg
elif opt in ('-v', '--loglevel'):
system_logs_level = arg.upper()
if system_logs_level not in ["DEBUG", "INFO", "ERROR"]:
sys.exit("Provided system logs level is not supported. Supported levels are DEBUG, INFO and ERROR")
# init the LogsDownloader
logsDownloader = LogsDownloader(path_to_config_folder, path_to_system_logs_folder, system_logs_level)
# set a handler for process termination
signal.signal(signal.SIGINT, logsDownloader.set_signal_handling)
try:
# start a dedicated thread that will run the LogsDownloader logs fetching logic
process_thread = threading.Thread(target=logsDownloader.get_index_file, name="process_thread", daemon=True)
# start the thread
process_thread.start()
while process_thread.is_alive():
time.sleep(5)
exit(0)
except Exception:
sys.exit("Error starting Logs Downloader - %s" % traceback.format_exc())
5. Create a new config directory in /incapsula-logs-downloader/script and copy /incapsula-logs-downloader/config/Settings.Config.template file as Settings.Config. This step ensures the credentials are found when the log downloader script is run:
# mkdir /incapsula-logs-downloader/script/config # cp /incapsula-logs-downloader/config/Settings.Config.template /incapsula-logs-downloader/script/config/Settings.Config
6. Configure the parameter values for the /incapsula-logs-downloader/config/Settings.Config configuration file. This configuration file stores parameters for authentication and other optional parameters :
[SETTINGS] IMPERVA_API_ID=<IMPERVA_API_ID> IMPERVA_API_KEY=<IMPERVA_API_KEY> IMPERVA_API_URL=<IMPERVA_API_URL> IMPERVA_INCOMING_DIR= IMPERVA_PROCESS_DIR= IMPERVA_ARCHIVE_DIR= IMPERVA_USE_PROXY= IMPERVA_PROXY_SERVER= IMPERVA_USE_CUSTOM_CA_FILE= IMPERVA_CUSTOM_CA_FILE= IMPERVA_SYSLOG_ENABLE= IMPERVA_SYSLOG_CUSTOM= IMPERVA_SYSLOG_ADDRESS= IMPERVA_SYSLOG_PORT= IMPERVA_SYSLOG_PROTO= IMPERVA_SYSLOG_SECURE= IMPERVA_SYSLOG_SENDER_HOSTNAME= IMPERVA_SPLUNK_HEC= IMPERVA_SPLUNK_HEC_IP= IMPERVA_SPLUNK_HEC_PORT= IMPERVA_SPLUNK_HEC_TOKEN= IMPERVA_SPLUNK_HEC_SRC_HOSTNAME= IMPERVA_SPLUNK_HEC_INDEX= IMPERVA_SPLUNK_HEC_SOURCE= IMPERVA_SPLUNK_HEC_SOURCETYPE=
Replace:
<IMPERVA_API_ID>with the API ID from your Imperva console.<IMPERVA_API_KEY>with the API KEY from your Imperva console.<IMPERVA_API_URL>with the LOG URL from your Imperva console.
7. Configure the Wazuh agent to monitor the /var/log/incapsulaWAF.log file. Add the following block within the <ossec_config> block at the end of the Wazuh agent /var/ossec/etc/ossec.conf configuration file:
<localfile>
<location>/var/log/incapsulaWAF.log</location>
<log_format>syslog</log_format>
</localfile>
8. Depending on your environment size, you may need to increase the Wazuh agent’s <queue_size> and <events_per_second> in your /var/ossec/etc/ossec.conf configuration file. This is to avoid triggering the Wazuh agent anti-flooding mechanisms and losing events:
<client_buffer>
<!-- Agent buffer options -->
<disabled>no</disabled>
<queue_size>80000</queue_size>
<events_per_second>1000</events_per_second>
</client_buffer>
You can get more information on the anti-flooding mechanism in our documentation.
9. Restart the Wazuh agent service to apply the changes:
# systemctl restart wazuh-agent
10. Run the following command to start the /incapsula-logs-downloader/script/LogsDownloader.py script to retrieve logs. You can stop the script from running with Ctrl + Z:
# python3 /incapsula-logs-downloader/script/LogsDownloader.py -c /incapsula-logs-downloader/script/config -l /incapsula-logs-downloader/script/output -v info
Where:
configis the directory that stores theSettings.Configcredentials file.outputis the directory that stores theLogsDownloader.pyscript log messages.infospecifies the system logs level as informational to be pulled from the Imperva console.
Note: You can configure the LogDownloader.py script to run as a service. Follow the guide highlighted in running the script as a service.
Log management
It is important to have a log rotation/retention policy for the /var/log/incapsulaWAF.log, as it tends to get very large as more logs are pulled from your Imperva cloud WAF. Depending on your organization’s policy, you can use the logrotate utility or any other of your choice in Linux endpoints to set a fitting policy.
Visualizing alerts
When an Imperva WAF event that matches any of our custom rules occurs, we see alerts on the Wazuh dashboard. Navigate to Overview > Threat Hunting to view the alerts.





Conclusion
This blog post demonstrates how to integrate Imperva Cloud WAF with Wazuh. This integration helps to streamline your security monitoring activities by offering a unified view of your web application security events. It also gives administrators and security analysts deeper insights into web application security events.
Wazuh is a free and open source SIEM and XDR solution that can be deployed and managed on-premises or in the Wazuh cloud. Check out our community for support and updates.
References
- Cloud WAF log integration | Imperva
- Incapsula logs downloader | Github
- Install Logrotate to Manage Log Rotation in Linux | Tecmint
- Wazuh Configuration Reference | Wazuh documentation
- Onboarding Imperva WAF to Wazuh | Infopercept
- Log File Structure | Imperva documentation
- Custom decoders
- Rules Syntax – Ruleset XML syntax · Wazuh documentation