Suricata: rule mismatch + so-elastalert missing + #13206
-
Version2.4.70 Installation MethodSecurity Onion ISO image Descriptionother (please provide detail below) Installation TypeDistributed Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPU10 RAM32 Storage for /500G Storage for /nsm500G Network Traffic Collectionspan port Network Traffic Speeds1Gbps to 10Gbps StatusNo, one or more services are failed (please provide detail below) Salt StatusYes, there are salt failures (please provide detail below) LogsNo, there are no additional clues DetailHi, Rebooting the manager node didn't help - neither did
Tried "salt-call state.highstate" several times over half an hour or so - same error message as above. On the Detections tab I also got a "!" likely to be caused by this: Clicking on "Suricata Rule Mismatch" brings me to the Hunt interface giving and scrolling to the right reveals Interestingly enough the problems mentioned above didn't occur after upgrading from 2.4.60 > 2.4.70 - they started after rebooting all nodes as of today. Thanks much in advance for any clue... Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 11 replies
-
If you click on the "Rule Mismatch", and filter for the "Integrity Check Report" log, what does it show? Also, if so-elastalert is still showing missing, check your Elasticsearch cluster health - |
Beta Was this translation helpful? Give feedback.
-
First of all the good news: the "so-elastalert"-problem seems to have disappeared over time - after several hours (basically overnight) so-elastalert was up&running again without any intervention from my side. The "Rule Mismatch"-problem is still there though. Filtering for "Integrity Check Report" gives So these errors occur every couple of minutes I exported one of the detail pages to json and found something very interesting: There's a section with the following content: These numbers seem to correspond to the SID-numbers of my local suricata rules. These rules have been there for quite a while and I never had any problems with them. I configured then in 2.4.60 via Administration > Configuration > Advanced settings > idstools > rules > Local Rules and they've been working perfectly since then. To me it seems like SecurityOnion is complaining about local rules, despite they seem to work OK (if the weren't working I had got tons of false positives). Any clue as to what's going on here? |
Beta Was this translation helpful? Give feedback.
Yes, this is a known bug that will be fixed in the upcoming release.