┌─────────────────────────────────┐
│ Wazuh Manager :1514 / :55000 │
│ Wazuh Indexer :9200 │
│ Wazuh Dashboard :5601 │
│ NGINX (optional reverse proxy) │
└─────────────────────────────────┘ ↑ agents on port 1514
Linux servers · Windows servers · Docker hosts · vCenter ↑ log forwarding
AWS CloudTrail (S3) · GCP Pub/Sub
┌─────────────────────────────────┐
│ Wazuh Manager :1514 / :55000 │
│ Wazuh Indexer :9200 │
│ Wazuh Dashboard :5601 │
│ NGINX (optional reverse proxy) │
└─────────────────────────────────┘ ↑ agents on port 1514
Linux servers · Windows servers · Docker hosts · vCenter ↑ log forwarding
AWS CloudTrail (S3) · GCP Pub/Sub
┌─────────────────────────────────┐
│ Wazuh Manager :1514 / :55000 │
│ Wazuh Indexer :9200 │
│ Wazuh Dashboard :5601 │
│ NGINX (optional reverse proxy) │
└─────────────────────────────────┘ ↑ agents on port 1514
Linux servers · Windows servers · Docker hosts · vCenter ↑ log forwarding
AWS CloudTrail (S3) · GCP Pub/Sub
# Deploy to all Linux hosts in inventory
ansible-playbook -i inventories/production playbooks/deploy-linux-agent.yml # Windows too (via WinRM)
ansible-playbook -i inventories/production playbooks/deploy-windows-agent.yml
# Deploy to all Linux hosts in inventory
ansible-playbook -i inventories/production playbooks/deploy-linux-agent.yml # Windows too (via WinRM)
ansible-playbook -i inventories/production playbooks/deploy-windows-agent.yml
# Deploy to all Linux hosts in inventory
ansible-playbook -i inventories/production playbooks/deploy-linux-agent.yml # Windows too (via WinRM)
ansible-playbook -i inventories/production playbooks/deploy-windows-agent.yml
make onboard SUBNET=10.0.0.0/24
make onboard SUBNET=10.0.0.0/24
make onboard SUBNET=10.0.0.0/24
git clone https://github.com/GiulioSavini/wazuh-docker-monitoring-platform.git
cd wazuh-docker-monitoring-platform make preflight # validate Docker, kernel params, disk, ports
cp .env.example .env # set your passwords
make init # generate TLS certs
make deploy # bring up the stack
git clone https://github.com/GiulioSavini/wazuh-docker-monitoring-platform.git
cd wazuh-docker-monitoring-platform make preflight # validate Docker, kernel params, disk, ports
cp .env.example .env # set your passwords
make init # generate TLS certs
make deploy # bring up the stack
git clone https://github.com/GiulioSavini/wazuh-docker-monitoring-platform.git
cd wazuh-docker-monitoring-platform make preflight # validate Docker, kernel params, disk, ports
cp .env.example .env # set your passwords
make init # generate TLS certs
make deploy # bring up the stack
docker compose -f docker-compose.yml -f docker-compose.lab.yml up -d
docker compose -f docker-compose.yml -f docker-compose.lab.yml up -d
docker compose -f docker-compose.yml -f docker-compose.lab.yml up -d - Detection rules tuned for Docker container abuse (privileged runs, suspicious mounts, crypto-mining)
- VMware vCenter monitoring — snapshot abuse, vMotion events, auth brute force
- AWS CloudTrail and GCP Audit Log anomalies mapped to Wazuh rules
- A way to deploy agents at scale without SSHing into 30 machines one by one
- Something that works in both a lab (4GB RAM) and production - Container exec events
- Privileged container creation
- Host namespace abuse (--pid=host, --network=host)
- Suspicious bind mounts (/etc, /var/run/docker.sock)
- Crypto-mining signatures - VM power state changes
- Snapshot creation/deletion (ransomware indicator)
- Host disconnect events
- vCenter login brute force - IAM policy changes
- Security group opened to 0.0.0.0/0
- Console login without MFA
- CloudTrail disabled or deleted - Public bucket created
- Firewall rule opened to 0.0.0.0/0
- IAM policy changes
- Compute instance created outside allowed regions - Wazuh cluster mode (multi-node manager)
- Kubernetes Helm chart
- SOAR integration (Shuffle / TheHive)
- Sigma rule auto-import
- Automated compliance dashboards (PCI-DSS, CIS)