Automate Wazuh Alert Triage and Reporting with GPT-4o-mini and Telegram

🚨Are alert storms overwhelming your Security Operations workflows?

This n8n workflow supercharges your SOC by fully automating triage, analysis, and notification for Wazuh alerts—blending event-driven automation, OpenAI-powered contextual analysis, and real-time collaboration for incident response.

🔑 Key Features:

✅ Automated Triage: Instantly filters Wazuh alerts by severity to focus analyst effort on the signals that matter.

🤖 AI-Driven Investigation Reports: Uses OpenAI's GPT-4o-mini to auto-generate context-rich incident reports, including: MITRE Tactic & Technique mapping
Impacted scope (IP addresses, hostnames)
External artifact reputation checks
Actionable security recommendations
Fully customizable prompt format aligned with your SOC playbooks

📡 Multi-Channel Notification Delivers clean, actionable reports directly to your SOC team via Telegram. Easily extendable to Slack, Outlook, Gmail, Discord, or any other preferred channel.

🔇 Noise Reduction Eliminates alert fatigue using smart filters and custom AI prompts that suppress false positives and highlight real threats.

🔧 Fully Customizable Tweak severity thresholds, update prompt logic, or integrate additional data sources and channels — all with minimal effort

⚙️ How It Works

Webhook
Listens for incoming Wazuh alerts in real time.

If Condition
Filters based on severity (1 low, 2 medium, etc.) or other logic you define.

AI Investigation (LangChain + OpenAI)
Summarizes full alert logs and context using custom prompts to generate: Incident Overview
Key Indicators
Log Analysis
Threat Classification
Risk Assessment
Security Recommendations

Notification Delivery
The report is parsed, cleaned, and sent to your SOC team in real-time, enabling rapid response — even during high-alert volumes.

No-Op Path
Efficiently discards irrelevant alerts without breaking the flow.

🧠 Why n8n + AI?

Traditional alert triage is manual, slow, and error-prone — leading to analyst burnout and missed critical threats.

This workflow shows how combining workflow automation with a tailored AI model enables your SOC to shift from reactive to proactive. Analysts can now: Focus on critical investigations Respond to alerts faster Eliminate copy-paste fatigue Get instant contextual summaries

> ⚠️ Note: We learned that generic AI isn’t enough. Context-rich prompts and alignment with your actual SOC processes are key to meaningful, scalable automation.

🚀 Ready to build a smarter, less stressful SOC?

Clone this workflow, adapt it to your processes, and never miss a critical alert again.

📬 Contributions welcome!
Feel free to raise PRs, suggest new enhancements, or fork for your own use cases.

Created by Mariskarthick M
Senior Security Analyst | Detection Engineer | Threat Hunter | Open-Source Enthusiast

0
Downloads
3
Views
7.53
Quality Score
beginner
Complexity
Author:mariskarthick(View Original →)
Created:8/13/2025
Updated:11/18/2025

🔒 Please log in to import templates to n8n and favorite templates

Workflow Visualization

Loading...

Preparing workflow renderer

Comments (0)

Login to post comments