Table of Contents

Suricata-EVE-Unixsocket

This article provides instructions for installing Suricata-Eve-Unixsocket app in Trisul Network Analytics. The Suricata-Eve app allows you to integrate Suricata IDS alerts into Trisul metrics framework.

Installation

1. Installing Suricata App

2. Installing Suricata version 5.0

Please install Suricata by running the following command,

add-apt-repository ppa:oisf/suricata-stable
sudo apt-get update
apt-get install suricata

3. Updating with latest ruleset

Use the following command to update the latest emerging-threats ruleset

sudo suricata-update

suricata-update puts the combined rules in /var/lib/suricata/rules which is owned by root. Make sure the trisul user can read this directory.

sudo chown trisul.trisul /var/lib/suricata -R 

4. Enabling EVE_unix Socket

# Extensible Event Format (nicknamed EVE) event log in JSON format
  - eve-log:
      enabled: yes
      filetype: unix_dgram  #regular| 
      filename: suricata_eve.socket
The Filename is 'suricata_eve.socket' is the name of the Unix Datagram socket file that Trisul will listen to later.

5. Starting Suricata

sudo suricata --user trisul -l /usr/local/var/lib/trisul-probe/domain0/probe0/context0/run -c /etc/suricata/suricata.yaml -i ens33 -D

6. Viewing Alerts

7. Starting Suricata Automatically

#!/bin/bash

echo "Removing PID file"
/bin/rm -f /var/run/suricata.pid

echo "Starting suricata"
/usr/bin/suricata --user trisul -l /usr/local/var/lib/trisul-probe/domain0/probe0/context0/run -c /etc/suricata/suricata.yaml -i ens18 -D

echo "Done starting suricata"
chmod +x start-suricata.sh
check process suricata with pidfile /var/run/suricata.pid
  start program = "/usr/local/etc/trisul-probe/start-suricata.sh"
systemctl restart monit