Suricata and Wazuh form the backbone of many open-source OT security deployments. Suricata watches the wire — detecting threats at the network level via signature matching and protocol analysis. Wazuh watches the hosts — monitoring file integrity, collecting system logs, and correlating events across the environment. Together they close the gap between network visibility and endpoint awareness.
Suricata outputs alerts and protocol metadata in EVE JSON format to a log file or Unix socket. Wazuh's agent or a Filebeat shipper picks up these JSON events and forwards them to the Wazuh manager, where they're parsed, enriched with threat intelligence, and correlated against host-level events.
Network Traffic → Suricata (IDS/IPS) → EVE JSON logs
↓
Wazuh Agent / Filebeat
↓
Wazuh Manager (SIEM)
↓
Wazuh Dashboard (Kibana)
suricata.yaml (default: /var/log/suricata/eve.json)