Observing Suricata EVE Logs
Start observing, protecting, and adapting your network with Suricata to monitor, analyze, and detect network threats in real time.
Suricata
Suricata is a high performance, open source network analysis and threat detection software used by most private and public organizations, and embedded by major vendors to protect their assets.
Suricata generates structured EVE logs collected to Wazuh, enabling centralized detection, correlation, and analysis of network security events.
Requirements (Suricata host):
- Ubuntu 16.04–24.04 (64-bit)
- x86_64/ARM64
- Root privileges
- Active network interface with AF-Packet
- CPU 4vCPU, RAM 8GB, Storage 50GB
Install Suricata:
1 | |
Configure Suricata:
1 | |
1 | |
Replace
<UBUNTU_IP>with your system’s IP address and adjust the interface nameenp0s3to match your environment.
1 | |
Suricata Rules:
1 | |
1 | |
Verify Suricata Live Check:
1 | |
1 | |
Requirements (Wazuh agent):
- Ubuntu/Debian Linux (64-bit)
- Root privileges
- Network connectivity to Wazuh server
- Wazuh agent installed and enrolled
- Read access to /var/log/suricata/eve.json
Connect to Wazuh:
1 | |
1 | |
1 | |
Verify Suricata EVE Collection:
1 | |
- Log in to Wazuh Dashboard
- Open Threat Hunting
rule.groups:suricata
Suricata alerts are collected into Wazuh, giving security teams centralized insight and the ability to monitor, analyze, and respond to security threats.