Hi Neal,
if you want to do NIDS, my advice would be to use Suricata. It is a great complement to a HIDS.
I've actually seen prod environments where same attack is detected both at a network level by Suricata (the NIDS), and at a host level by Wazuh (the HIDS). In addition we do have rules and decoders for Suricata, meaning that you can use the Wazuh agents to collect Suricata alerts, the Wazuh managers to enrich them and send them to Elastic, where those would be indexed.
Here you can find Suricata rules:
They make use of the JSON decoder (since Suricata supports JSON output). See also attached an example screenshot of Suricata alerts in Wazuh Kibana plugin.
Regards,
Santiago.