Suricata Alert/Drop by top rule names #18
Replies: 3 comments 1 reply
-
I think I could implement this. Something like a top dropped category/top dropped signature, top alerted category/top alerted signature? Or do you mean ruleset names, e.g 'emerging-dos.rules'? |
Beta Was this translation helpful? Give feedback.
-
You laid out what I was thinking exactly. That would be pretty sweet. I really need to get to work learning Grafana more as it could be useful for so many things, and almost decided to do this myself to learn more about Grafan. BUT, if I want to load updates for your dashboard, I’d have to re-add them every time. Here is what I have configured in Graylog currently to extract the suricata JSON data, if any of it is useful. Had to enable EVE logging for suricata, as there wasn't much information in just the syslog that's easy to parse any way. Extractor Config: First Extractor - strip off everything but the JSON data Second Extractor - load the JSON data Now, in the extracted data, the following fields contain the information you'd need alert_action -> (allowed or blocked) Following may also be useful, but these could be dropped or alerted in either direction, so not as simple as showing blocks inbound on the WAN interface. src_ip I then did some things with GROK patterns against the JSON to pull out DNS and TLS information but that may not be useful for the dashboard. That was where the complexity was, the initial extractors are pretty simple with regex stripping off everything but JSON, and then parsing the JSON. |
Beta Was this translation helpful? Give feedback.
-
I see you already had an update before I posted the information and had a totally different way of doing it than I was thinking. In the process of setting that up now!! |
Beta Was this translation helpful? Give feedback.
-
Have you ever thought about adding Suricata Alert/Drop information to the dashboard based on rule names??
Beta Was this translation helpful? Give feedback.
All reactions