Suricata - IDS/IPS. Observe Protect Adapt
Start observing, protecting, and adapting your network with Suricata to monitor, analyze, and detect network threats in real time.
Suricata
Suricata is a high performance, open source network analysis and threat detection software used by most private and public organizations, and embedded by major vendors to protect their assets.
Suricata generates structured EVE logs collected to Wazuh, enabling centralized detection, correlation, and analysis of network security events.
Requirements (Suricata host):
- Wazuh XDR/SIEM installed
- Ubuntu 16.04–24.04 (64-bit)
- x86_64/ARM64
- Root privileges
- CPU 4vCPU, RAM 8GB, Storage 50GB
Install Suricata:
1 | |
Configure Suricata host:
1 | |
1 | |
Replace
<UBUNTU_IP>with your system’s IP address and adjust the interface nameenp0s3to match your environment.
1 | |
Configure Suricata rules:
1 | |
1 | |
Review Suricata status:
1 | |
1 | |
Requirements (Wazuh agent):
- Ubuntu/Debian Linux (64-bit)
- Root privileges
Configure Wazuh agent:
1 | |
1 | |
1 | |
Review Suricata via Wazuh dashboard:
1 | |
- Log in to Wazuh dashboard
- Open Threat Hunting
rule.groups:suricata
Suricata alerts are collected into Wazuh, giving security teams centralized insight and the ability to monitor, analyze, and respond to security threats.