Skip to main content

Log Processor No Alerts

The Log Processor No Alerts issue appears when a specific Log Processor is running and communicating with the Local API but hasn't generated any alerts in the last 48 hours.

This is similar to Security Engine No Alerts but applies to individual Log Processor instances in distributed setups.

What Triggers This Issue

  • Trigger condition: Log Processor online but no alerts for 48 hours
  • Criticality: ⚠️ High
  • Impact: Detection may not be working on this specific agent

Common Root Causes

  • Scenarios in simulation mode: Detection scenarios are installed but running in simulation mode on this agent.
  • Low-activity monitored service: The service monitored by this Log Processor may genuinely have no malicious activity.

Other Issues

  • 🔗 No logs being read: The acquisition configuration on this specific Log Processor may be missing, disabled, or pointing to empty sources.
  • 🔗 No logs being parsed: Logs are being read but parsers can't process them due to format mismatches or missing collections.

If it's not due to other issues above, continue with the diagnosis and resolutions below.

Diagnosis & Resolution

Refer to the Security Engine No Alerts section.

Distributed Setup Considerations

In multi-agent deployments:

  • Each agent processes its own logs independently
  • Agents forward alerts to the Local API
  • One agent having no alerts doesn't affect others

If multiple agents show no alerts, review:

  • Common configuration issues (e.g., centralized config management problems)
  • Network connectivity between agents and LAPI
  • Synchronized collection installations across all agents

Getting Help

If you've verified logs are being read and parsed but still see no alerts:

  • Share your setup details on Discourse
  • Ask on Discord with cscli metrics output