[Oisf-users] Inconsistent results from fast.log file

Peter Manev petermanev at gmail.com
Tue Mar 14 22:37:09 UTC 2017


On Tue, Mar 14, 2017 at 8:54 PM,  <secres at linuxmail.org> wrote:
>
> Do you use rules with threshold?
>
> Yes, there are a few rules with thresholds but I'm not sure how that would
> vary the alert count since its the same PCAP being read in each time.
>

It seems related to -
https://redmine.openinfosecfoundation.org/issues/1772

(please include the list in your reply :) )

> Sent: Tuesday, March 14, 2017 at 12:39 PM
> From: "Peter Manev" <petermanev at gmail.com>
> To: secres at linuxmail.org
> Cc: oisf-users at lists.openinfosecfoundation.org
> Subject: Re: [Oisf-users] Inconsistent results from fast.log file
>
>
> On 14 Mar 2017, at 18:03, secres at linuxmail.org wrote:
>
>
>> /opt/suricata/bin/suricata -V
> This is Suricata version 3.2beta1 RELEASE
>
> /opt/suricata/bin/suricata -c /opt/suricata/etc/suricata/suricata.yaml -k
> none -r $PCAP -S $FILE
>
> I've  been testing out Suricata for a little bit now and I've noticed some
> inconsistent results from alerts in the fast.log file.  When I read in a
> pcap using -r I end up with a total alert count of 68-72 alerts in the file.
> I have been using the same PCAP file and same rules duing each test.  I
> pulled some information from the stats.log file and noticed along with the
> detect.alert changing, some of the other values changed.  I would think that
> reading in a PCAP would result in the same information each time.  Is this
> typical, an error, or just some kind of misconfiguration in the
> suricata.yaml fille.
>
>
>
> Do you use rules with threshold?
>
>
> Also,  I added --simulated-ips to the command line option and on the same
> PCAP and rules file I end up with 128-132 alerts.  It still varies the same
> way as before but there's a much greater number of alerts, any ideas?
>
>
> Date: 3/14/2017 -- 09:12:45 (uptime: 0d, 00h 00m 00s)
> ...
> detect.alert                               | Total                     | 68
> ...
> app_layer.flow.http                    | Total                     | 62
> ...
> flow.spare                                 | Total                     |
> 9996
> flow_mgr.flows_checked             | Total                     | 23
> flow_mgr.flows_notimeout          | Total                     | 23
> flow_mgr.rows_checked             | Total                     | 65536
> flow_mgr.rows_skipped              | Total                     | 65513
> flow_mgr.rows_maxlen               | Total                     | 1
> tcp.memuse                               | Total                     |
> 819200
> tcp.reassembly_memuse             | Total                     | 12320544
> flow.memuse                              | Total                     |
> 7175616
>
>
> Date: 3/14/2017 -- 09:50:02 (uptime: 0d, 00h 00m 00s)
> ...
> detect.alert                               | Total                     | 72
> ...
> app_layer.flow.http                    | Total                     | 64
> ...
> flow.spare                                 | Total                     |
> 9995
> flow_mgr.flows_checked             | Total                     | 19
> flow_mgr.flows_notimeout           | Total                     | 19
> flow_mgr.rows_checked               | Total                     | 65536
> flow_mgr.rows_skipped                | Total                     | 65517
> flow_mgr.rows_maxlen                 | Total                     | 1
> tcp.memuse                                 | Total                     |
> 819200
> tcp.reassembly_memuse               | Total                     | 12320544
> flow.memuse                                | Total                     |
> 7180056
>
> Thanks!
>
>
> _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users



-- 
Regards,
Peter Manev



More information about the Oisf-users mailing list