intrusion detection: optional fast log to syslog

Change syslog to be always on but use the syslog checkbox
to decide whether alert logging is forwarded or not.

Discussed with: @adschellevis
This commit is contained in:
Franco Fichtner 2018-05-21 10:18:06 +00:00
parent 9f9e54e815
commit 062ad3f82c
3 changed files with 12 additions and 1 deletions

View File

@ -17,6 +17,12 @@
<type>checkbox</type>
<help><![CDATA[Enable promiscuous mode, for certain setups (like IPS with vlans), this is required to actually capture data on the physical interface.]]></help>
</field>
<field>
<id>ids.general.syslog</id>
<label>Enable syslog alerts</label>
<type>checkbox</type>
<help><![CDATA[Send alerts to system log in fast log format. This will not change the alert logging used by the product itself.]]></help>
</field>
<field>
<id>ids.general.MPMAlgo</id>
<label>Pattern matcher</label>

View File

@ -172,6 +172,10 @@
</OptionValues>
<ValidationMessage>Please select a valid pattern matcher algorithm</ValidationMessage>
</MPMAlgo>
<syslog type="BooleanField">
<default>0</default>
<Required>Y</Required>
</syslog>
<LogPayload type="BooleanField">
<default>0</default>
<Required>Y</Required>

View File

@ -239,7 +239,8 @@ outputs:
# a line based alerts log similar to fast.log into syslog
- syslog:
enabled: yes
enabled: {% if helpers.exists('OPNsense.IDS.general.syslog') and OPNsense.IDS.general.syslog|default('0') == '0' %}no{% else %}yes{% endif %}
# reported identity to syslog. If ommited the program name (usually
# suricata) will be used.
#identity: "suricata"