Hi : )
I’m setting up Suricata in a Docker environment using docker-compose
, and my setup includes an attacker container running Kali Linux and an IDS system using Suricata. This is how my docker-compose.yml
file look like:
version: '3.8'
services:
attacker:
image: kalilinux/kali-rolling
container_name: attacker
networks:
vlan_net:
ipv4_address: 10.0.0.10
tty: true
privileged: true
volumes:
- ./shared:/shared
command: >
bash -c "
apt-get update &&
apt-get install -y nmap metasploit-framework &&
tail -f /dev/null"
ids_system:
image: jasonish/suricata
container_name: ids_system
networks:
- vlan_net
volumes:
- ./rules:/var/lib/suricata/rules
- suricata:/var/log/suricata
cap_add:
- NET_ADMIN
- NET_RAW
- SYS_NICE
command: suricata -c /etc/suricata/suricata.yaml -i eth0
networks:
vlan_net:
driver: bridge
ipam:
config:
- subnet: 10.0.0.0/24
gateway: 10.0.0.1
volumes:
suricata:
rules:
shared:
I have configured the HOME_NET
and Interface correctly, but I can’t detect an intrusion from my attacker
container, however I can detect intrusion from the ids_system
container.
I have been using this to test for intrusion:
curl https://testmynids.org/uid/index.html
Could there be anything that i’m missing in terms of configuration?
Thanks!