Fast.log not being written to

Version: Suricata 7.0.6
OS: AlmaLinux 8.9
Installation: rpm install

No alerts are being written to fast.log despite it being enabled. I followed the quickstart alerting but nothing gets logged. Appreciate any help/suggestions.

What about the /var/log/suricata/eve.json file? Could be that no alert triggering traffic is occurring, but you could still be getting metadata (other event type).

eve.json logs the event. I can attach the relevant entries in eve.json if that helps; have to sanitize it first.

If you’re getting alert event types in eve.json, there should also be entries in fast.log

Can you post the output from suricata -c /path/to/your/suricata.yaml --dump-config|grep fast

This is what displays on my system when doing that:

outputs.0 = fast
outputs.0.fast = (null)
outputs.0.fast.enabled = yes
outputs.0.fast.filename = fast.log
outputs.0.fast.append = yes
engine-analysis.rules-fast-pattern = yes

Output as follows:

outputs.0 = fast
outputs.0.fast = (null)
outputs.0.fast.enabled = yes
outputs.0.fast.filename = fast.log
outputs.0.fast.append = yes
outputs.0.fast.filetype = regular
engine-analysis.rules-fast-pattern = yes

The fast.log and eve.json should be in the same logging directory.

The default logging directory is in the suricata configuration file – look for default-log-dir
This value can be overridden from the command line if -l /path/to/log-dir is added

I suspect a permissions issue … are you launching suricata as root ? Are you using the run-as configuration setting?
Can you post the output of ls -ld /path/to/log-dir?

Running as root.

default-log-dir: /var/log/suricata/

ls -ld /var/log/suricata
drwxr-x—. 2 root root 4096 Sep 3 06:00 /var/log/suricata
[root@pat-test-01 suricata]$

Does curling http://testmynids.org/uid/index.html versus https://testmynids.org/uid/index.html
make a difference in this test?

Are you using this rule (mentioned in the quickstart quite)? If so, yes, the content should be available for inspection (and hence, not encrypted):

alert ip any any -> any any (msg:"GPL ATTACK_RESPONSE id check returned root"; content:"uid=0|28|root|29|"; classtype:bad-unknown; sid:2100498; rev:7; metadata:created_at 2010_09_23, updated_at 2010_09_23;)

Could you post your suricata.yaml config file (or, dm the file)?

verified the rule is the same.

I dm the file to you.

Upon further inspection of the eve.json log, on a system that takes a lot more traffic, it looks like alerts are not generated.

I may have this resolved, in a holding pattern for now, will update when I know more.