The Witnesses · Martyria · Node II

The Overseer.
Live packet witness.

Elisha decapsulates TZSP streams from certified SoftSol MikroTik routers, inspects traffic with Suricata and Emerging Threats rules, and whispers alerts to Baruch in real time. Cloud Core and other higher-end RouterOS platforms are supported. This node runs telemetry only — all web content is served from Baruch.

elisha@overseer $ docker ps --format '{{.Names}}'
elisha-suricata
elisha-wazuh-agent
elisha@overseer $ ss -ulnp | grep 37008
UNCONN *:37008 tzsp2pcap → dummy0 → suricata
agent Connected to 172.17.12.34:1514
172.17.12.35Overseer IP
37008TZSP UDP
66k+IDS rules
001Wazuh agent ID

What Elisha watches

Named for the prophet who saw the chariots of fire — Elisha is the eyewitness layer. Routers mirror edge traffic via TZSP; Suricata evaluates every frame and writes structured alerts to eve.json.

TZSP

Packet decapsulation

MikroTik mangle rules stream TZSP to UDP 37008. tzsp2pcap replays frames onto dummy0 for Suricata af-packet capture.

Suricata 7

Network IDS

Emerging Threats open ruleset refreshed on container start. Alerts, DNS, TLS, and flow metadata logged to eve.json.

Wazuh agent

Sidecar forwarder

Agent tails eve.json and streams JSON alerts to Baruch manager — the whisper pipeline.

Whisper pipeline

Router → TZSP → Elisha Suricata → eve.json → Wazuh agent → Baruch archive. No inbound management exposure on the overseer beyond telemetry ports.

SoftSol MikroTik

Certified edge router · sniff-tzsp → 172.17.12.35:37008

Elisha Suricata

/var/log/suricata/eve.json

Baruch Manager

172.17.12.34:1514/tcp

Router configuration

Example MikroTik mangle rules for certified SoftSol routers on the WireGuard VPN. Cloud Core and other higher-end platforms use the same profile.

/ip firewall mangle add chain=prerouting action=sniff-tzsp sniff-target=172.17.12.35 sniff-target-port=37008
/ip firewall mangle add chain=postrouting action=sniff-tzsp sniff-target=172.17.12.35 sniff-target-port=37008