from here you can find the link below update d https://documentation.wazuh.com/current/quickstart.html
curl -sO https://packages.wazuh.com/4.8/wazuh-install.sh && sudo bash ./wazuh-install.sh -a -i -o
curl -k -u admin:XXXX “https://127.0.0.1:9200/_cat/indices?v”
curl -k -u admin:XXXX “https://127.0.0.1:9200/_cluster/allocation/explain?pretty”
curl -u admin:XXXX –cacert /etc/wazuh-indexer/certs/root-ca.pem https://localhost:9200
curl: (51) Unable to communicate securely with peer: requested domain name does not match the server’s certificate.
curl -u admin:XXXX –cacert /etc/wazuh-indexer/certs/root-ca.pem https://127.0.0.1:9200
vim /etc/hosts
/var/ossec/bin/manage_agents
check the update of the rules or database vulnerability
/var/ossec/bin/wazuh-control restart
/var/ossec/bin/wazuh-modulesd -f
Downloading the Wazuh vulnerabilities file offline
response=$(curl -s -X GET https://cti.wazuh.com/api/v1/catalog/contexts/vd_1.0.0/consumers/vd_4.8.0)
echo “$response” | jq -r ‘.data.last_snapshot_link’
echo “$response” | jq -r ‘.data.last_snapshot_at’
here to check the correct procedure
https://documentation.wazuh.com/current/user-manual/capabilities/vulnerability-detection/offline-update.html