[Discussion] Barnyard2

John Hally JHally at EBSCO.COM
Fri Oct 3 13:32:50 UTC 2014


Sorry about that.  I saw this and thought I¹d start here:

https://www.openinfosecfoundation.org/index.php/component/content/article/1
-latest-news/125-oisf-to-support-barnyard2


I¹ll  move on to another list.

Thanks,

John.

On 10/3/14, 9:30 AM, "Victor Julien" <lists at inliniac.net> wrote:

>On 10/03/2014 03:27 PM, John Hally wrote:
>> Hi All,
>> 
>> I¹m trying to get snort and/or barnyard2 to send full alerts to a remote
>> syslog server for analysis with thinks like splunk, etc.  I think I may
>>have
>> found a bug in barnyard2, but I wanted to put it out to the list to see
>>if
>> anyone else is successful at this.  I¹m trying to send it to LOCAL3 so
>>that
>> I can parse off the logs into its own file in rsylog.conf.
>> 
>> No matter what I try, I will only get Œfast¹ alert data in
>>/var/log/messages
>> on my rsyslog server (not the local3.* entry as expected).   The
>> "operation_mode complete² switch is supposed to set the alerts to full
>> logging, but it doesn¹t work remote or locally.
>> 
>> In barnyard2 config:
>> 
>> output alert_syslog_full: sensor_name snortSensor, server x.x.x.x,
>>protocol
>> udp, port 514, operation_mode complete, log_priority LOG_ALERT,
>>log_facility
>> LOG_LOCAL3
>> 
>> /etc/rsylog.conf entry:
>> 
>> local3.*
>> /var/log/snortsyslog/snort.log
>> 
>> 
>> Output from messages after barnyard2 startup:
>> 
>> Oct 1 12:46:50 sensor barnyard2: Barnyard2 spooler: Event cache size
>>set to
>> [2048]
>> Oct 1 12:46:50 sensor barnyard2: Log directory = /var/log/snort
>> Oct 1 12:46:50 sensor barnyard2: INFO database: Defaulting
>> Reconnect/Transaction Error limit to 10
>> Oct 1 12:46:50 sensor barnyard2: INFO database: Defaulting Reconnect
>>sleep
>> time to 5 second
>> Oct 1 12:46:50 sensor barnyard2: using operation_mode: complete
>> Oct 1 12:46:50 sensor barnyard2: Using default delimiters for syslog
>> messages "|"
>> Oct 1 12:46:50 sensor barnyard2: Using default field separators for
>>syslog
>> messages " "
>> Oct 1 12:46:50 sensor barnyard2: spo_syslog_full config:
>> Oct 1 12:46:50 sensor barnyard2: #011Detail Level: Fast
>> Oct 1 12:46:50 sensor barnyard2: #011Syslog Server: x.x.x.x:514
>> Oct 1 12:46:50 sensor barnyard2: #011Reporting Protocol: udp
>> Oct 1 12:46:50 sensor barnyard2: Initializing daemon mode
>> Oct 1 12:46:50 sensor barnyard2: Daemon parent exiting
>> Oct 1 12:46:50 sensor barnyard2: Daemon initialized, signaled parent
>>pid:
>> 13339
>> Oct 1 12:46:50 sensor barnyard2: PID path stat checked out ok, PID path
>>set
>> to /var/run/
>> Oct 1 12:46:50 sensor barnyard2: Writing PID "13340" to file
>> "/var/run//barnyard2_eth1.pid"
>> 
>> 
>> Sample syslog entry:
>> 
>> Oct  1 11:59:51 sensor | [SNORTIDS[ALERT]: [sensor-eth1] ] || 2014-10-01
>> 11:59:54.967+-04 1 [1:1000022:1] LOCAL-RULE Possible login.aspx Brute
>>Force
>> Account Access || web-application-attack || 6 x.x.x.x y.y.y.y || 20175
>>80 ||
>> #012 |
>> 
>> 
>> The output in unified2/mysql is the full payload and you can see the
>>full
>> HTTP POST.
>> 
>> Am I missing something?
>
>As this list is about OISF/Suricata, I would suggest asking your
>question on the barnyard2 list, and/or on the snort users list. See:
>
>https://groups.google.com/forum/#!forum/barnyard2-users
>https://lists.sourceforge.net/lists/listinfo/snort-users
>
>-- 
>---------------------------------------------
>Victor Julien
>http://www.inliniac.net/
>PGP: http://www.inliniac.net/victorjulien.asc
>---------------------------------------------
>
>_______________________________________________
>Discussion mailing list
>Discussion at lists.openinfosecfoundation.org
>https://lists.openinfosecfoundation.org/mailman/listinfo/discussion




More information about the Discussion mailing list