integrate logzio wazuh ossec hids

This series of articles will explore the benefits and the technical instructions for integrating OSSEC with the ELK Stack for implementing advanced security and compliance protocols.

  • Part 1 of the series describes below how to setup the integration — installing the Wazuh OSSEC manager and agents along with shipping the triggered alerts into the ELK Stack or your own ELK deployment
  • Part 2 will focus on the visualization and analysis part and will explain how to build a comprehensive dashboard
  • Part 3 will be a bit more and will describe how to use our built-in alerting mechanism to get notified on alerts triggered by OSSEC

About OSSEC and Wazuh

OSSEC is a comprehensive platform used for monitoring and controlling systems. It contains a mixture of HIDS (host intrusion detection), logging and SIEM (security incident and event management) in one easy-to-deploy package.

OSSEC is used for implementing a variety of security and compliance protocols including SIEM and PCI-DSS and is a fully open source and supported by both leading security vendors and a growing community of contributors. Wazuh is a fork of OSSEC that adds additional management features and extended logging capabilities as well as built-in integration with the ELK Stack and RESTful API.

OSSEC is based on both log message decoders and sets of rules that trigger alerts. This signature-based approach is used to detect attacks, intrusions, configuration or application errors, system anomalies, and so forth.

Integration with ELK makes OSSEC a complete solution — it enables centralized analysis and visualization of the data shipped by the various agents in your system reporting to your main OSSEC manager and also allows you to retain the data for a longer period of time.

Alerting is another element ELK can add to OSSEC. If you are using the ELK Stack, alerting is included out-of-the-box so as soon as an OSSEC alert is fired, and you can get alerted via your preferred channel. If you are using your own ELK deployment, you will need to add and pay for X-Pack to use Watcher.

Installing ELK

Installing ELK is out of the scope for this series of articles. (You can see our complete guide here.) This means that to follow through on the steps outlined here, you either need to have your own running ELK deployment or a account.

If you are a Docker user and do not have ELK set up, check out this OSSEC-ELK container. It will help you set up the entire solution, albeit with an older version of ELK.

Installing Wazuh OSSEC

OSSEC’s architecture consists of two main components — an OSSEC manager and OSSEC agents.

The manager (also knows as “server”) is the main focal point of an OSSEC deployment — it stores the main configuration files, rules, logs, and events. The agent is a smaller program that you install on the system you want to monitor. The agent collects the information and forwards it to the manager.

You can read up on OSSEC architecture here.

Installing the manager

To start with, you first need to set up the correct compilation environment by installing some development tools and compilers.

Since I’m using Ubuntu 16.04, the command for this is:

Next, we are going to clone the Wazuh repository and use the supplied script to setup OSSEC:

The installation process will prompt you for some input. You can answer “y” to all these, but when asked for the installation type, you need to enter “server” since this is the OSSEC manager.

Once finished, start OSSEC with:

Your OSSEC manager is ready. You can verify all is working as expected with the following command:

You should see a similar output to this:

Installing an agent

Before you set up OSSEC on the system you wish to monitor, you need to retrieve an agent key from the manager.

Retrieving the agent key

So, on the OSSEC manager, run:

When asked, enter “A” to add an agent, and then enter a name, IP address, and ID for the agent. Try and keep in mind that you will most likely add additional agents, so make the naming logical and clear as possible.


Once added, you will be taken to the manage_agents main menu again, where this time you will enter “E”.

From the list of displayed agents (you should have only one), enter the ID for the agent, and an agent key is displayed. Copy it for the next step.

Configuring a new agent

Install Wazuh OSSEC on the system you wish to monitor using the steps outlined above, only this time enter ‘agent’ when asked to enter the type of installation.

In the agent configuration file (/var/ossec/etc/ossec.conf) make sure you define the server IP of the OSSEC manager:

Then, run:

Enter “I”, and add the agent key you retrieved earlier.

Confirm the addition of the agent key and then restart the agent with:

Shipping Into ELK

Alerts triggered by the OSSEC agents are recorded in JSON format in the manager (/var/ossec/logs/alerts/…).

To ship the alerts into ELK, you can use the Logstash file input. A detailed Logstash configuration for receiving an input of alerts from OSSEC is detailed here. (Note: Since version 5, Logstash configurations have changed somewhat, so the Logstash configuration used in that example might not work properly.)

A more lightweight option is to use Filebeat.

Installing Filebeat

Again, I’m using Ubuntu 16.04, so to install Filebeat, I used:

Configuring Filebeat

Below are two Filebeat configurations — one for shipping into, the other for shipping into your own ELK deployment.

First, download an SSL certificate and copy it to the correct location:

Then, use the Filebeat configuration wizard to configure the Filebeat YAML file.

Here is an example of what a configuration would look like:

Copy this configuration to the Filebeat configuration file (/etc/filebeat/filebeat.yml) and start Filebeat with:

Within seconds, you should be seeing OSSEC alerts in

ossec alerts

Open source ELK

If you have your own ELK deployment, the Filebeat configuration will look somewhat different. You do not need the token, for example, and you will not necessarily want to use SSL to encrypt the data.

So, define the prospector and the correct output — either a Logstash or Elasticsearch instance.

An Elasticsearch example:

Copy the configuration to the Filebeat configuration file (/etc/filebeat/filebeat.yml) and start Filebeat with:

OSSEC’s architecture makes it extremely simple to get your HIDS environment set up in a matter of minutes. If you have ELK already installed, shipping the alerts is also pretty straightforward.


Extra work will most likely be needed if you want to massage the logs and enhance them with Logstash (if you are using, your OSSEC alerts will be parsed automatically). The next part of the series will describe what to do with the data once shipped. is Proud to Offer a Variety of Integrations with Many of your Favorite DevOps Tools and Platforms!