End-to-end integration of Minecraft anti-cheat telemetry with Wazuh SIEM for real-time X-ray detection monitoring and dashboard visualization.
Boot a PaperMC instance locally using the server JAR to host a test world for telemetry.
Compile the full Sentinel plugin and prepare the output JAR for deployment on the server.
Place the plugin JAR at plugins/sentinelsnapshot.jar
; verify it loads cleanly on server start.
Leverage the existing Wazuh SIEM from a prior lab. Create a dedicated group (e.g., sentinel-mc-server) to isolate Minecraft telemetry.
Deploy the agent on the same machine as the server to ship JSON logs produced by Sentinel.
Update the agent configuration to monitor the Sentinel JSON log and forward events to the Wazuh server’s IP.
Enroll the host in Wazuh and assign it to the sentinel-mc-server group for policy and views.
Disable unnecessary modules and tune log collection to focus on Sentinel’s JSON output for efficient parsing.
Enter the world and intentionally simulate suspicious mining to validate detections.
Observe alerts flowing into Wazuh—initially unstructured for gameplay analytics use‑cases.
Adjust mappings (e.g., cast suspicion score to an integer) to make metrics aggregable and sortable.
Design views by player, time window, and severity to track behavior across a live server.
Add a time series panel to chart total detections by interval for easy spotting of spikes.
Combine the visualizations into a single, simple dashboard purpose‑built for gameplay oversight.