fever
Event processor
A fast and extensible system for processing JSON events from security monitoring tools
fast, extensible, versatile event router for Suricata's EVE-JSON format
50 stars
6 watching
8 forks
Language: Go
last commit: 5 months ago
Linked from 1 awesome list
bloom-filterevegolangintrusion-detectionjsonmonitoringnetsecpdnssecuritysuricata
Related projects:
Repository | Description | Stars |
---|---|---|
fhussonnois/kafkastreams-cep | A library that provides a DSL to select complex event sequences from Kafka Streams | 308 |
mchmarny/preprocessd | A Cloud Run service that pre-processes raw events from PubSub before publishing them to a new topic | 5 |
espertechinc/esper | A Java-based system for analyzing and reacting to patterns in event data streams | 840 |
dcso/slinkwatch | Automates Suricata monitoring interface configuration and detection thread allocation based on real-time network interface status changes. | 11 |
eosio/demux-js | A library that provides a backend infrastructure pattern for sourcing blockchain events to update queryable datastores and trigger side effects. | 307 |
nathanmarz/storm-contrib | A collection of reusable building blocks and tools for developing distributed event-driven systems | 579 |
sinhashubham95/jsonic | A comprehensive set of utilities to handle JSON data in Go. | 11 |
aphistic/gomol-json | A logger for networked JSON messages in Go | 0 |
sensorstorm/stormcv | Enables distributed video processing using computer vision operations | 167 |
getsentry/relay | A service that forwards and ingests Sentry events from various SDKs and servers. | 321 |
numaproj/numaflow | A platform for running scalable and reliable event-driven applications in Kubernetes | 1,291 |
demisto/cops | Standardized framework for creating and sharing incident response processes in a shared language | 150 |
ismtv/bash_cata | Automates processing of network alerts from Suricata and adds IP addresses to MikroTik address lists. | 9 |
droe/xnumon | Monitors macOS systems for malicious activity by tracking process activity and system calls | 230 |
jpcertcc/sysmonsearch | Analyzes Sysmon event logs to detect suspicious activity and visualize process and network correlations. | 417 |