Please check my YAML rules to suppress Suricata alerts #12872
-
Version2.4.60 Installation MethodSecurity Onion ISO image Descriptionconfiguration Installation TypeStandalone Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPU12 RAM64GB Storage for /200GB Storage for /nsm2TB Network Traffic Collectionspan port Network Traffic SpeedsLess than 1Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsYes, there are additional clues in /opt/so/log/ (please provide detail below) DetailAdditional information:
/opt/so/log/suricata/ My installation is intended as a self-paced learning exercise. Installed on my home network with 43 client devices (desktops, phones, tv, IoT, security cameras, etc). Primary upstream network security is provided by Ubiquiti. As it is a home network, some of the alerts can be suppressed. For example, rule.uuid, 2027397, “ET POLICY Spotify P2P Client”. In idstools.sids.modify, I have added the following YAML rule;
However, Suricata is still generating alerts for this rule. Note the extract from the log (above) "Threshold config parsed: 0 rules(s) found" I have also tried completely disabling the rule in idstools.sids.disable and this does not suppress alert generation for me either.
I suspect that the problem is the formatting of my YAML rules. Could someone please have a look at my modified rules for me? In the dumb questions list; Here is a slightly expanded extract of my YAML rules.
Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
Try removing those comments. Right now, comments are only supported for BPFs. You can also check your logs for any errors. |
Beta Was this translation helpful? Give feedback.
-
I see the issue now. You're placing those suppress rules in the wrong location. They need to be under Suricata > thresholding > SIDs. |
Beta Was this translation helpful? Give feedback.
I see the issue now. You're placing those suppress rules in the wrong location. They need to be under Suricata > thresholding > SIDs.