This article walks through how to resolve an IndexerConnector initialization failure that prevents the Wazuh Vulnerability module (and related state indexes) from starting correctly on a Wazuh Worker running inside a Docker container.
If the worker cannot authenticate to (or validate TLS with) the Wazuh Indexer, you’ll typically see repeated warnings like this in ossec.log:
ossec.log
2026/01/13 13:29:30 indexer-connector: WARNING: IndexerConnector initialization failed for index 'wazuh-states-vulnerabilities-*', retrying until the connection is successful.
This usually means one (or more) of the following:
ossec.conf
First, list containers and identify the correct Wazuh Worker container:
docker ps
Once you have the container ID, open a shell in the container:
docker exec -it container_id /bin/bash
To establish a trusted TLS connection to the Wazuh Indexer, the worker container must have the correct certificate files present under:
/var/ossec/etc/
The Wazuh Worker provisioning app should normally copy these certificates automatically. If you need to fix it manually, you must create (or copy in) the following files inside the worker container:
/var/ossec/etc/manager-key.pem
/var/ossec/etc/manager.pem
/var/ossec/etc/root-ca.pem
Important: You specifically need to copy the customer-specific manager certificates into the worker container (for example, manager.pem and manager-key.pem) and ensure the correct root CA (for example, from root-CA.PIM) is placed as root-ca.pem.
manager.pem
manager-key.pem
root-CA.PIM
root-ca.pem
From inside the container, confirm the files exist:
ls -l /var/ossec/etc/*.pem
Next, confirm that the Wazuh Vulnerability / Indexer integration is enabled and pointing to the correct Wazuh Indexer nodes.
If the container doesn’t have a text editor installed, you can install nano (example using dnf):
nano
dnf
dnf install nano -y
Open the Wazuh configuration file:
nano /var/ossec/etc/ossec.conf
Locate (or add/update) the following section and ensure the list matches your Indexer nodes, and the certificate paths match the files you created/copied into /var/ossec/etc/:
<indexer> <enabled>yes</enabled> <hosts> <host>https://10.100.102.5:9200</host> <host>https://10.100.102.6:9200</host> <host>https://10.100.102.7:9200</host> </hosts> <ssl> <certificate_authorities> <ca>/var/ossec/etc/root-ca.pem</ca> </certificate_authorities> <certificate>/var/ossec/etc/manager.pem</certificate> <key>/var/ossec/etc/manager-key.pem</key> </ssl> </indexer>
Save the file and exit (CTRL+O, Enter, then CTRL+X in nano).
CTRL+O
Enter
CTRL+X
Even with correct TLS certificates and host settings, the worker still needs valid credentials stored in the Wazuh keystore so it can authenticate to the Indexer.
From inside the worker container, add the username (commonly admin) and password to the keystore:
admin
/var/ossec/bin/wazuh-keystore -f indexer -k username -v admin
/var/ossec/bin/wazuh-keystore -f indexer -k password -v YOUR_PASSWORD
Restart Wazuh services inside the worker container:
/var/ossec/bin/wazuh-control restart
Then tail the log to verify the Indexer connector initializes successfully:
tail -f /var/ossec/logs/ossec.log
If the fix is successful, you should now see messages like:
2026/01/13 13:35:38 indexer-connector: INFO: IndexerConnector initialized successfully for index: wazuh-states-inventory-hardware-*. 2026/01/13 13:35:38 indexer-connector: INFO: IndexerConnector initialized successfully for index: wazuh-states-inventory-protocols-*. 2026/01/13 13:35:38 indexer-connector: INFO: IndexerConnector initialized successfully for index: wazuh-states-inventory-interfaces-*. 2026/01/13 13:35:38 logger-helper: INFO: InventoryHarvesterFacade module started. 2026/01/13 13:35:38 indexer-connector: INFO: IndexerConnector initialized successfully for index: wazuh-states-inventory-networks-*.
At this point, the worker should be able to initialize state indexes and support the Vulnerability module properly.
Result: Once certificates, Indexer hosts, and keystore credentials are correct, the IndexerConnector will initialize successfully and the worker will stop retrying the vulnerabilities/state indexes.
Was this article helpfu?
Thank you for voting
You are related to multiple companies. Please select the company you wish to login as.