Enterprise-Grade Security Infrastructure with Zero Vendor Lock-in
A privacy-first solution for aggregating over 14,000,000+ logs per week into locally hosted Security Onion/Azure Sentinel with local/cloud EDR capabilities.
| ❌ Current State | ✅ Our Solution |
|---|---|
| Fragmented visibility between cloud and on-prem systems | Unified logging across hybrid environments |
| Blind spots for attackers | Complete visibility with zero-trust architecture |
| Commercial solutions cost $15k+/month | $0 licensing - only infrastructure costs |
| Vendor lock-in and data egress fees | Full data ownership - no third-party routing |
graph TB
A[🌐 NetBird Server<br/>AWS VPS Ubuntu 22.04] --> B[🛡️ Security Onion SIEM<br/>Oracle Linux 9]
A --> C[☁️ Azure Sentinel<br/>Cloud SIEM]
A --> D[🍯 Honeypots<br/>Local + Cloud]
A --> E[📊 Elastic Fleet Agents<br/>15+ Endpoints]
B --> F[📈 Log Aggregation<br/>4.8M+ Events]
C --> F
D --> F
E --> F
style A fill:#4CAF50,stroke:#2E7D32,stroke-width:3px
style B fill:#FF9800,stroke:#E65100,stroke-width:3px
style C fill:#2196F3,stroke:#1565C0,stroke-width:3px
style D fill:#9C27B0,stroke:#6A1B9A,stroke-width:3px
style E fill:#607D8B,stroke:#37474F,stroke-width:3px
style F fill:#F44336,stroke:#C62828,stroke-width:3px
Network architecture diagram - Self-hosted NetBird connecting hybrid infrastructure
- Self-hosted NetBird management server on AWS VPS Ubuntu 22.04
- Secure WireGuard tunnels connecting:
- Security Onion SIEM (local Oracle Linux 9 deployment) as Guest on a local Host machine
- Azure Sentinel (cloud-based SIEM for cross-validation)
- Multiple honeypots (local + cloud-based)
- Elastic Fleet Agents on 15+ endpoints for EDR
- NetBird Bringing all the networks subnets together (each endpoints Ping-able with proper Access Control)
- Deployed Elastic Agents on 15+ endpoints (local VMs, cloud honeypots, RDPs/VPS)
- Zero-trust telemetry flow over NetBird VPN (no public-facing ports)
- Complete log visibility across hybrid environments (on-prem + cloud)
- Eliminated custom scripting with Elastic fleet's secure, scalable agent model
| Metric | Value | Status |
|---|---|---|
| Daily Volume | 2.1M security events | ✅ Active |
| Weekly Volume | 14.7M security events | ✅ Verified |
| Peak Processing | 350+ events/second | ✅ During attacks |
| Data Freshness | 95% within 15 seconds | ✅ Real-time |
| Reliability | 99.998% delivery rate | ✅ Zero data loss |
| Component | CPU Usage | Memory | Status |
|---|---|---|---|
| NetBird Server | 45% | 1.8GB RAM | ✅ Optimal |
| Elastic Agents | <5% | Minimal | ✅ Efficient |
| Network Performance | 8.2 Mbps | 45ms latency | ✅ Excellent |
| System Uptime | 99.98% | 7-day period | ✅ Stable |
Note: These metrics represent realistic security telemetry from a hybrid environment including cloud honeypots receiving 127+ SSH brute-force attempts daily and Windows/macOS systems logging 100,000+ failed logon attempts.
Our internet-facing honeypots are actively targeted by real attackers — proving the need for secure, reliable log aggregation.
54,000+ Authentication failed Windows logon attempts (Event ID 4625) in 7 days
| Country | IP Range | Attempts | Global Reports |
|---|---|---|---|
| 🇳🇬 Nigeria | 102.88.1X7.X | 12,700+ | 98 times |
| 🇻🇳 Vietnam | 80.94.X.X | 12,600+ | 515 times |
| 🇦🇷 Argentina | 200.41.47.XXX | 6,200+ | 25 times |
| 🇩🇪 Germany | 152.53.XX.XX | 5,777+ | 15 times |
| 🇨🇱 Chile | 188.67.XXX.XX | 5,510+ | 12 times |
Real RDP brute-force attempts from global attackers (Kibana visualization)
# Sample attack data (CSV format)
data/sample-data/kibana-4625-attacks.csvOpen SSH/RDP ports are magnets for automated attacks. Within hours of exposing services, thousands of brute-force attempts from diverse global sources were detected.
- 95% of attacks are automated scanning bots
- Three IPs accounted for 25% of all attacks in our honeypot
- Services like RDP should never be exposed directly to the internet
- NetBird provides secure access without exposing attack surfaces
Real screenshots from our production SIEM environment
| View | Screenshot | Description |
|---|---|---|
| Windows 4625 Events | ![]() |
Failed Windows logon analysis |
| Network Logon Events | ![]() |
Network authentication monitoring |
| Kibana Overview | ![]() |
Elastic stack dashboard |
| Feature | Tailscale (Paid) | Self-Hosted NetBird |
|---|---|---|
| 💰 Cost | $7/user/month (minimum) | $0 - Only infrastructure |
| 🔐 Data Ownership | ❌ Traffic routed through third-party | ✅ Full control - All traffic stays within your infrastructure |
| 🎛️ Management | ✅ Polished UI | ✅ Modern UI with self-hosted control |
| 🌐 Traffic Flow | Traffic egresses to Tailscale infrastructure | 🌐 Direct peer-to-peer - No third-party egress |
| ⚙️ Customization | Limited customization | ⚙️ Full customization - Modify to meet specific security requirements |
| 📋 Compliance | Depends on Tailscale's compliance | 📋 Your Compliance - Full audit control |
- 🔓 No vendor lock-in: Full control over the entire infrastructure
- 💰 Predictable costs: Only pay for cloud hosting (~$15-25/month)
- 🔐 Customizable security policies: Implement granular access controls
- 📡 No data egress fees: All traffic stays within your controlled network
- 🎯 Reduced attack surface: No public-facing management interfaces
- 📊 Complete audit trail: Full visibility into all network connections
- 🔗 Integration flexibility: Easy integration with existing SIEM and monitoring tools
- ✅ Zero-trust implementation: Every connection is authenticated and encrypted
allyship-securitylab-VpNSIEM/
├── ⚙️ config/ # Configuration examples
│ ├── netbird-management.json
│ └── wireguard-config.conf
├── 📊 data/ # Datasets and evidence files
│ ├── sample-data/
│ └── README.md
├── 🖥️ frontend/ # Public website (pure HTML/CSS/JS)
│ ├── assets/
│ │ ├── asl-logo-full.png
│ │ ├── asl-logo-mark.png
│ │ ├── favicon.png
│ │ └── favicon.svg
│ ├── index.html
│ ├── script.js
│ ├── styles.css
│ └── README.md
├── 🖼️ images/ # Architecture and evidence
│ ├── architecture/
│ ├── branding/
│ └── evidence/
├── 🛠️ scripts/
│ └── manage-large-files.sh
├── .gitignore
├── LICENSE
└── README.md
"Don't just collect logs — own the pipeline."
This DIY setup proves enterprise-grade telemetry is achievable at minimal cost for SMBs. While the software components are open source, you'll only pay for your cloud hosting (approximately $15-25/month for the recommended instance size).
- Huge thanks to the NetBird team for open-sourcing this solution (MIT Licensed)
- Inspired by Google Cybersecurity Certificate's defensive security frameworks
This project demonstrates a self-hosted implementation of NetBird by Allyship Security Lab. NetBird® is a registered trademark of NetBird, Inc. This implementation is operated independently and is not affiliated with, endorsed by, or connected to NetBird, Inc. The use of "asl" in the subdomain is for descriptive purposes only to indicate the Allyship Security Lab implementation.
Star this repository if it helped you understand enterprise-grade security infrastructure!
Built with ❤️ by Robert for Allyship Security Lab
Empowering security teams with open-source solutions








