Cleaned up two logs to use as an example…
suricata[152149]: {'timestamp': '2024-06-05T15:10:21.802788+0000', 'flow': {'bytes_toserver': 72308119, 'pkts_toserver': 49789, 'pkts_toclient': 9741, 'bytes_toclient': 642906, 'start': '2024-06-05T15:10:16.676392+0000'}, 'src_ip': '10.x.x.x', 'proto': 'TCP', 'flow_id': 829409721864744, 'event_type': 'alert', 'packet': 'x=', 'dest_ip': '10.x.x.x', 'in_iface': 'enp101s0f1', 'payload_printable': 'xyz', 'vlan': [1], 'stream': 0, 'src_port': 38840, 'dest_port': 514, 'alert': {'action': 'allowed', 'metadata': {'attack_target': ['Client_and_Server'], 'updated_at': ['2019_07_26'], 'signature_severity': ['Critical'], 'performance_impact': ['Low'], 'deployment': ['Datacenter', 'Perimeter'], 'created_at': ['2016_09_15'], 'affected_product': ['Windows_XP_Vista_7_8_10_Server_32_64_Bit']}, 'gid': 1, 'signature_id': 2023221, 'severity': 1, 'rev': 1, 'signature': 'ET MALWARE Windows WMIC PROCESS get Microsoft Windows DOS prompt command exit OUTBOUND', 'category': 'A Network Trojan was detected'}, 'payload': 'xyz=', 'packet_info': {'linktype': 1}}
suricata[29683]: {'src_ip': '10.x.x.x', 'timestamp': '2024-06-05T02:33:28.618360+0000', 'event_type': 'alert', 'packet_info': {'linktype': 1}, 'dest_port': 443, 'payload': '', 'flow_id': 1039978255118200, 'src_port': 46142, 'in_iface': 'enp1s0f1', 'vlan': [1], 'dest_ip': '103.x.x.x', 'proto': 'TCP', 'stream': 0, 'alert': {'action': 'allowed', 'gid': 1, 'signature_id': 50150081, 'signature': 'AVERT Connection to known cryptomining node 81', 'rev': 1, 'category': 'Misc Attack', 'severity': 2}, 'payload_printable': '', 'flow': {'pkts_toserver': 1, 'pkts_toclient': 0, 'bytes_toserver': 74, 'bytes_toclient': 0, 'start': '2024-06-05T02:33:28.618360+0000'}, 'packet': 'xyz='}
The first log starts with the timestamp, while the second has the source IP first. These logs are from two different servers.
Editing to also mention the fields are mostly identical between the logs, just in a different order.