[Oisf-users] FW: [EXTERNAL] Suricata EVE logging
Peter Manev
petermanev at gmail.com
Thu May 9 19:16:01 UTC 2019
> On 8 May 2019, at 01:45, David Decker <x.faith at gmail.com> wrote:
>
> I think I am having sort of the same problem, side note I am using SecurityOnion.
> but wanted to switch the output to JSON (eve.json) which is being created, but the alerts are not being populated.
The should be present in the JSON log as “event_type”:”alert” is that the case ?
What is the output of “suricata —build-info”?
> I believe that they are still being populated for the Barnyard files (per SO). I know I had them both working for a few minutes but currently not getting any thing. here is the part from my suricata.yaml
>
> # Extensible Event Format (nicknamed EVE) event log in JSON format
> - eve-log:
> enabled: yes
> filetype: regular #regular|syslog|unix_dgram|unix_stream|redis
> filename: suricata.json
> #prefix: "@cee: " # prefix to prepend to each log entry
> # the following are valid when type: syslog above
> #identity: "suricata"
> #facility: local5
> #level: Info ## possible levels: Emergency, Alert, Critical,
> ## Error, Warning, Notice, Info, Debug
> #redis:
> # server: 127.0.0.1
> # port: 6379
> # async: true ## if redis replies are read asynchronously
> # mode: list ## possible values: list|lpush (default), rpush, channel|publish
> # ## lpush and rpush are using a Redis list. "list" is an alias for lpush
> # ## publish is using a Redis channel. "channel" is an alias for publish
> # key: suricata ## key or channel to use (default to suricata)
> # Redis pipelining set up. This will enable to only do a query every
> # 'batch-size' events. This should lower the latency induced by network
> # connection at the cost of some memory. There is no flushing implemented
> # so this setting as to be reserved to high traffic suricata.
> # pipelining:
> # enabled: yes ## set enable to yes to enable query pipelining
> # batch-size: 10 ## number of entry to keep in buffer
>
> # Include top level metadata. Default yes.
> metadata: yes
>
> # include the name of the input pcap file in pcap file processing mode
> pcap-file: false
>
>> On Tue, May 7, 2019 at 4:10 PM Chris Ford <crford at gmail.com> wrote:
>> Make sure that you have libjannson installed and that you have alerts enabled under the eve-log output section.
>>
>> https://suricata.readthedocs.io/en/suricata-4.1.3/output/eve/eve-json-output.html
>> --
>> Chris Ford - crford at gmail.com
>> GPG Key - https://keybase.io/crford
>>
>>
>>> From: Oisf-users [mailto:oisf-users-bounces at lists.openinfosecfoundation.org] On Behalf Of Nafisa Mandliwala
>>> Sent: Tuesday, May 7, 2019 5:10 PM
>>> To: oisf-users at lists.openinfosecfoundation.org
>>> Subject: [Oisf-users] Suricata EVE logging
>>>
>>>
>>>
>>> Hi all,
>>>
>>>
>>>
>>> I have a question about suricata eve log. I tried enabling eve logging (eve.json) by editing the suricata.yaml file-
>>>
>>>
>>>
>>> # Extensible Event Format (nicknamed EVE) event log in JSON format
>>>
>>> - eve-log:
>>>
>>> enabled: yes
>>>
>>> filetype: regular #regular|syslog|unix_dgram|unix_stream|redis
>>>
>>> filename: eve.json
>>>
>>>
>>>
>>> I'm not sure if I'm missing any steps but this does not generate the eve log file under /var/log/suricata/. I tried playing around with syslog/fast/http log and they all seem to work but not eve.
>>>
>>> Is enabling the setting in suricata.yaml the only change that needs to be made?
>>>
>>>
>>>
>>> Thanks,
>>>
>>> Nafisa
>>>
>> _______________________________________________
>> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
>> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
>> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>>
>> Conference: https://suricon.net
>> Trainings: https://suricata-ids.org/training/
> _______________________________________________
> Suricata IDS Users mailing list: oisf-users at openinfosecfoundation.org
> Site: http://suricata-ids.org | Support: http://suricata-ids.org/support/
> List: https://lists.openinfosecfoundation.org/mailman/listinfo/oisf-users
>
> Conference: https://suricon.net
> Trainings: https://suricata-ids.org/training/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openinfosecfoundation.org/pipermail/oisf-users/attachments/20190509/f4ca1b29/attachment.html>
More information about the Oisf-users
mailing list