doc/userguide/rule-management/adding-your-own-rules.rst
If you would like to create a rule yourself and use it with Suricata, this guide might be helpful.
Start creating a file for your rule. Use one of the following examples in your console/terminal window:
::
sudo nano local.rules sudo vim local.rules
Write your rule, see :doc:../rules/intro and save it.
.. tip:: To ensure that there are no duplicated SIDs, check rule SID ranges read
more about sid at :ref:suricata-rules-sids.
Update the Suricata configuration file so your rule is included. Use one of the following examples:
::
sudo nano /etc/suricata/suricata.yaml sudo vim /etc/suricata/suricata.yaml
and make sure your local.rules file is added to the list of rules: ::
default-rule-path: /usr/local/etc/suricata/rules
rule-files:
- suricata.rules
- /path/to/local.rules
Now, run Suricata and see if your rule is being loaded.
::
suricata -c /etc/suricata/suricata.yaml -i wlan0
If the rule failed to load, Suricata will display as much information as it has when it deemed the rule un-loadable. Pay special attention to the details: look for mistakes in special characters, spaces, capital characters, etc.
Next, check if your log-files are enabled in the Suricata configuration file
suricata.yaml.
If you had to correct your rule and/or modify Suricata's YAML configuration file, you'll have to restart Suricata.
If you see your rule is successfully loaded, you can double check your rule by doing something that should trigger it.
By default, Suricata will log alerts to two places
eve.jsonfast.logThese files will be located in the log output directory which is set by one of two methods:
default-log-dir for the name of the directory-l /path/to/log-dir creates log files in the named
directory.The following example assumes that the log directory is named /var/log/suricata ::
tail -f /var/log/suricata/fast.log
If you would make a rule like this: ::
alert http any any -> any any (msg:"Do not read gossip during work"; content:"Scarlett"; nocase; classtype:policy-violation; sid:1; rev:1;)
Your alert should look like this: ::
09/15/2011-16:50:27.725288 [] [1:1:1] Do not read gossip during work [] [Classification: Potential Corporate Privacy Violation] [Priority: 1] {TCP} 192.168.0.32:55604 -> 68.67.185.210:80