The important part is to make a new file to get Crowdsec to parse the log file you want it to parse. You can make a new one but will have to manage the ‘custom.yaml’ file in a way that might not make sense, but since it gets copied over, is necessary.
Thanks for the reply. I did a similar approach but with fast.logs enabled. The things is that I populated the costom.yaml only with the fast.logs config and the eve.json
I am not shure if I need to be 1 on 1 copy like the suricata.yaml file.
I tried first to copy and have the exact same content in both but after doing this, the machine started to run out of memory super fast and eventually when swap was also full it restarted. I don’t know why or which approach is better.
Currently the setup is working and the fast.log get populated with events and the flow is working ok but since I only have this part of the config in custom.yaml I don’t know if everything is working ok or not.
Some of the duplicated/parse error comes from Suricata not being Snort, as some rules are written for Snort and cannot be parsed by Suricata. There are other issues possibly, but those are much more in the space of what is actually performing your rule update cycle.
Are you using ‘suricata-update’ or are you using Suricata as installed in an OPNSense and their Policy method of rule updates and modifications, or another rule management environment all together?
Thank you for the config, much appreciated. I pasted your config and seems to be working. Regarding the duplicate and parsing errors, I solved that. There are still the flow bit errors that I see in the logs.
I am using Suricata directly as it comes with the OPNSense install.