Hello, Fadi,
Please tell us what problems you encountered when installing Wazuh in a virtual machine. We will help you.
Also you can also use OVA or OVF to deploy if you wish.
If you need to update your OVA virtual machine, you can check out
this article. We also recommend updating the repositories using the
yum update command.
https://documentation.wazuh.com/3.7/installation-guide/upgrading/latest_wazuh3_minor.html#upgrading-latest-minorOn the other hand, wazuh have natively supported Suricata alerts. You can use Suricata to analyze your pcap files and then Wazuh will get them on the fly.
Suricata is one such NIDS solution, which is open source and can be quickly deployed either on dedicated hardware for monitoring one or more transit points on your network, or directly on existing *nix hosts to monitor just their own network traffic. Because Suricata is capable of generating JSON logs of NIDS events, it integrates perfectly with Wazuh.
Here is an example to and a lab to integrate Wazuh and Suricata
https://documentation.wazuh.com/3.10/learning-wazuh/suricata.html?highlight=suricataLeet's try a PoC using .pcap sample of emotet malware:
Once the Suricata and Wazuh are configured to work together, you can pointSuricata to analyze all the files that are in a specific folder. You can do this by using the -r parameter
# suricata -r Downloads/pcap/ -c /etc/suricata/suricata.yaml
At the same time you can control the log file of suricata
# tail -n1 -f /var/log/suricata/fast.log

Then search Kibana for
rule.id:86601. That is the rule that notices Suricata alerts.

Here you can check our documentation about the JSON decoder functionality:.
https://documentation.wazuh.com/3.10/user-manual/ruleset/json-decoder.html?highlight=suricataLet me know if you have any question.
Regards
Emiliano