Scaling Wazuh for Multi-Site Network Security Monitoring
🚀 Introduction: Why Multi-Site Monitoring Matters
In modern organizations, offices and data centers are often spread across regions. Centralized security visibility helps prevent blind spots and improves response times.
Wazuh’s multi-site implementation enables distributed log processing and local site autonomy — while maintaining a unified dashboard that aggregates global threat data.
🧩 1. Multi-Site System Diagram
The diagram below represents a typical Wazuh multi-site architecture from the official Wazuh model — adapted for enterprise deployments such as Cisco network monitoring.
graph TD
subgraph SiteA["🏢 Site A (Bangkok)"]
A1["Cisco Devices / Agents"] --> M1["Wazuh Manager (Master)"]
M1 --> I1["Indexer Node 1"]
M1 --> I2["Indexer Node 2"]
end
subgraph SiteB["🏭 Site B (Tokyo)"]
B1["Cisco Devices / Agents"] --> M2["Wazuh Manager (Worker)"]
M2 --> I3["Indexer Node 3"]
end
subgraph SiteC["☁️ Site C (Singapore - Cloud Backup)"]
C1["Agents / Cloud Logs"] --> M3["Wazuh Manager (Worker)"]
M3 --> I4["Indexer Node 4"]
end
I1 <--> I2
I2 <--> I3
I3 <--> I4
I4 <--> I1
subgraph HQ["🌐 Central Dashboard"]
D1["Wazuh Dashboard"] --> D2["Unified View of All Sites"]
end
I1 & I2 & I3 & I4 --> D1
Explanation:
- Each site runs its own Wazuh Manager + Indexers.
- Indexers form one replicated cluster, ensuring resilience and redundancy.
- The central dashboard connects to all indexers for global visualization.
- Sites can still operate independently even if inter-site connections drop.
⚙️ 2. Configuration Highlights from Wazuh’s Official Setup
- Generate certificates using
wazuh-certs-tool.sh -A(root CA + node certs). -
Configure
opensearch.ymlandossec.conffor each site’s nodes:<node_type>master</node_type>for the primary site<node_type>worker</node_type>for remote sites
- Use
wazuh.ymlwithip.selector: trueto let dashboard users switch between sites. - Define
opensearch.hostsinopensearch_dashboards.ymlfor all indexers. - Apply RBAC roles to limit user access per site (e.g.,
custom_read_site_a).
🛰️ 3. Cisco & SNMP Integration (Per-Site)
Each site handles its own network telemetry locally:
| Source | Collection Method | Sent To | Notes |
|---|---|---|---|
| Cisco Routers | Syslog | Local Wazuh Manager | Use site-local syslog servers |
| Cisco Switches | SNMP | Local Wazuh Manager | Add Cisco MIB rules |
| Firewalls | Agentless | Local Indexers | Use custom decoders |
| Endpoints | Wazuh Agents | Nearest Manager | Reduces WAN dependency |
🔄 4. Cross-Site Synchronization and High Availability
- Multi-node clusters replicate indices for fault tolerance.
- Site A can continue local operations if WAN to HQ is lost.
- Central dashboard reconnects automatically once connectivity resumes.
- Backups are distributed: each site retains local searchable history.
📊 5. Dashboard and Data Access Flow
sequenceDiagram
participant User as Admin
participant Dashboard as Wazuh Dashboard
participant Indexers as Cluster
participant Sites as Local Managers
User->>Dashboard: Select Site (Bangkok / Tokyo / Cloud)
Dashboard->>Indexers: Fetch Alerts for Selected Index
Indexers->>Sites: Request Log Metadata
Sites-->>Indexers: Return Parsed Alerts
Indexers-->>Dashboard: Send Aggregated Data
Dashboard-->>User: Display Unified View
🧠 6. Best Practices Summary
✅ Use site-specific index names (e.g. alerts-bkk-*, alerts-tokyo-*)
✅ Configure certificate-based trust between sites
✅ Apply ILM policies to rotate and archive old data
✅ Assign role-based access control per location
✅ Monitor cluster health via /api/status
✅ Document IPs, DNS names, and ports for inter-site connections
🔐 Conclusion
Wazuh’s multi-site model delivers a scalable, fault-tolerant solution for distributed enterprises.
By localizing data collection while maintaining global control, you gain faster threat detection, simpler management, and better resilience across your Cisco-based infrastructure.
Get in Touch with us
Related Posts
- Why Your Finance Team Spends 40% of Their Week on Work AI Can Now Do
- 用纯开源方案搭建生产级 SOC:Wazuh + DFIR-IRIS + 自研集成层实战记录
- How We Built a Real Security Operations Center With Open-Source Tools
- FarmScript:我们如何从零设计一门农业IoT领域特定语言
- FarmScript: How We Designed a Programming Language for Chanthaburi Durian Farmers
- 智慧农业项目为何止步于试点阶段
- Why Smart Farming Projects Fail Before They Leave the Pilot Stage
- ERP项目为何总是超支、延期,最终令人失望
- ERP Projects: Why They Cost More, Take Longer, and Disappoint More Than Expected
- AI Security in Production: What Enterprise Teams Must Know in 2026
- 弹性无人机蜂群设计:具备安全通信的无领导者容错网状网络
- Designing Resilient Drone Swarms: Leaderless-Tolerant Mesh Networks with Secure Communications
- NumPy广播规则详解:为什么`(3,)`和`(3,1)`行为不同——以及它何时会悄悄给出错误答案
- NumPy Broadcasting Rules: Why `(3,)` and `(3,1)` Behave Differently — and When It Silently Gives Wrong Answers
- 关键基础设施遭受攻击:从乌克兰电网战争看工业IT/OT安全
- Critical Infrastructure Under Fire: What IT/OT Security Teams Can Learn from Ukraine’s Energy Grid
- LM Studio代码开发的系统提示词工程:`temperature`、`context_length`与`stop`词详解
- LM Studio System Prompt Engineering for Code: `temperature`, `context_length`, and `stop` Tokens Explained
- LlamaIndex + pgvector: Production RAG for Thai and Japanese Business Documents
- simpliShop:专为泰国市场打造的按需定制多语言电商平台













