--- /dev/null
+;
+; Example configuration file for the Suricata Reporter
+;
+; This application receives events from Suricata to generate reports,
+; alert emails and store a history of alerts.
+;
+[DEFAULT]
+; The number of worker processes to spawn.
+; Default is to launch one worker per CPU core.
+;workers = 4
+
+; The socket where to receive events from
+;socket = /var/run/suricata/reporter.socket
+
+; The ownership of the socket
+;user = suricata
+;group = suricata
+
+; The path to the database
+;database = /var/log/suricata/reporter.db
+
+[syslog]
+; Enable sending any alerts to syslog in the human-reable fast.log format
+;enabled = true
+
+[email]
+; Enable sending an alert email for each alert
+;enabled = true
+
+; The sender email address
+;sender = no-reply@ipfire.org
+
+; The recipient email addresses. Use comma separation for more reciepients.
+;recipients = john.doe@example.com, jane.doe@example.com
# Install the reporter
install -v -m 755 $(DIR_SRC)/config/suricata/suricata-reporter /usr/bin/suricata-reporter
+ install -v -m 644 $(DIR_SRC)/config/suricata/reporter.conf \
+ /var/ipfire/suricata/reporter.conf
+ chown -v nobody:nobody /var/ipfire/suricata/reporter.conf
# Install the watcher
install -v -m 755 $(DIR_SRC)/config/suricata/suricata-watcher /usr/bin/suricata-watcher
if [ "$ENABLE_IDS" == "on" ]; then
# Start the reporter
boot_mesg "Starting Intrusion Prevention Reporter..."
- loadproc -f -p /var/run/suricata/reporter.pid -b /usr/bin/suricata-reporter
+ loadproc -f -p /var/run/suricata/reporter.pid -b /usr/bin/suricata-reporter \
+ --config="/var/ipfire/suricata/reporter.conf"
# Start suricata
boot_mesg "Starting Intrusion Prevention System..."