fever

Event processor

A fast and extensible system for processing JSON events from security monitoring tools

fast, extensible, versatile event router for Suricata's EVE-JSON format

GitHub

50 stars
6 watching
8 forks
Language: Go
last commit: 5 months ago
Linked from 1 awesome list

bloom-filterevegolangintrusion-detectionjsonmonitoringnetsecpdnssecuritysuricata

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
fhussonnois/kafkastreams-cep A library that provides a DSL to select complex event sequences from Kafka Streams 308
mchmarny/preprocessd A Cloud Run service that pre-processes raw events from PubSub before publishing them to a new topic 5
espertechinc/esper A Java-based system for analyzing and reacting to patterns in event data streams 840
dcso/slinkwatch Automates Suricata monitoring interface configuration and detection thread allocation based on real-time network interface status changes. 11
eosio/demux-js A library that provides a backend infrastructure pattern for sourcing blockchain events to update queryable datastores and trigger side effects. 307
nathanmarz/storm-contrib A collection of reusable building blocks and tools for developing distributed event-driven systems 579
sinhashubham95/jsonic A comprehensive set of utilities to handle JSON data in Go. 11
aphistic/gomol-json A logger for networked JSON messages in Go 0
sensorstorm/stormcv Enables distributed video processing using computer vision operations 167
getsentry/relay A service that forwards and ingests Sentry events from various SDKs and servers. 321
numaproj/numaflow A platform for running scalable and reliable event-driven applications in Kubernetes 1,291
demisto/cops Standardized framework for creating and sharing incident response processes in a shared language 150
ismtv/bash_cata Automates processing of network alerts from Suricata and adds IP addresses to MikroTik address lists. 9
droe/xnumon Monitors macOS systems for malicious activity by tracking process activity and system calls 230
jpcertcc/sysmonsearch Analyzes Sysmon event logs to detect suspicious activity and visualize process and network correlations. 417