This article provides instructions for installing Suricata-Eve-Unixsocket app in Trisul Network Analytics. The Suricata-Eve app allows you to integrate Suricata IDS alerts into Trisul metrics framework.
Please install Suricata by running the following command,
add-apt-repository ppa:oisf/suricata-stable sudo apt-get update apt-get install suricata
Use the following command to update the latest emerging-threats ruleset
sudo suricata-update
suricata-update puts the combined rules in /var/lib/suricata/rules
which is owned by root. Make sure the trisul user can read this directory.
sudo chown trisul.trisul /var/lib/suricata -R
# Extensible Event Format (nicknamed EVE) event log in JSON format - eve-log: enabled: yes filetype: unix_dgram #regular| filename: suricata_eve.socket
sudo suricata --user trisul -l /usr/local/var/lib/trisul-probe/domain0/probe0/context0/run -c /etc/suricata/suricata.yaml -i ens33 -D
#!/bin/bash echo "Removing PID file" /bin/rm -f /var/run/suricata.pid echo "Starting suricata" /usr/bin/suricata --user trisul -l /usr/local/var/lib/trisul-probe/domain0/probe0/context0/run -c /etc/suricata/suricata.yaml -i ens18 -D echo "Done starting suricata"
chmod +x start-suricata.sh
check process suricata with pidfile /var/run/suricata.pid start program = "/usr/local/etc/trisul-probe/start-suricata.sh"
systemctl restart monit