Hi Daniel,
According to the Akamai documentation, this is the event flow:
Security events generated in Akamai
Akamai security events collector + API
Connector
Your SIEM
It looks like you need a connector that will use Akamai’s SIEM API to retrieve security events in JSON format from the Akamai Security Events Collector. The connector converts the format (it will not be necessary since Wazuh decoded JSON automatically) and sends security events to Wazuh.
https://techdocs.akamai.com/siem-integration/docs/akamai-siem-integration-for-splunk-and-cef-syslog
https://techdocs.akamai.com/siem-integration/reference/api
Decide where you want to run the collector: in a Wazuh agent or in the Wazuh manager.
https://documentation.wazuh.com/current/installation-guide/wazuh-agent/index.html
Create a script to pull the data every X minutes using the API.
The script can send the data to:
A file: Then, you can read this file with Wazuh.
https://documentation.wazuh.com/current/user-manual/capabilities/log-data-collection/index.html
Finally, since the events are in JSON, they would be decoded automatically. So, you only will need to create the rules.
https://documentation.wazuh.com/current/user-manual/ruleset/ruleset-xml-syntax/rules.html
https://documentation.wazuh.com/current/user-manual/ruleset/rules/custom.html#custom-rules
https://wazuh.com/blog/creating-decoders-and-rules-from-scratch/
I have seen that connector sample on GitHub, but can't ensure that it will work. I suggest you to create your own.
https://github.com/akamai/lds-connector
Let me know if you need further assistance.