Skip to main content
Version: v4.25

Suricata

Suricata is network monitor with a rule matching engine to detect threats. Use Tenzir to acquire, process, and store Suricata logs.

Examples

Ingest EVE JSON logs into a node

EVE JSON is the log format in which Suricata generates events.

A typical Suricata configuration looks like this:

outputs:
  # Extensible Event Format (nicknamed EVE) event log in JSON format
  - eve-log:
      enabled: yes
      filetype: regular #regular|syslog|unix_dgram|unix_stream|redis
      filename: eve.json

The filetype setting determines how you'd process the log file and defaults to regular.

Onboard Suricata EVE JSON logs as follows:

load_file "/path/to/eve.json"
read_suricata
publish "suricata"

If your set filetype to unix_stream, you need to create a Unix domain socket first, e.g., like this:

nc -U -l /tmp/eve.socket

Then use the same pipeline as above; Tenzir automatically detects the file type.