Fedora Installation from GIT¶
This document is a walk-through for installing and using the most recent code of Suricata on Fedora. Have a look at the other guides for installation on Ubuntu, FreeBSD or binary installations. In case you are using another operating system, you should replace those commands by your operating-specific commands.
Before you can build Suricata for your system, run the following command to ensure that you have everything you need for the installation.
sudo dnf install pcre pcre-devel autoconf cargo \ automake make libtool libpcap-devel libnet-devel lz4-devel \ libyaml libyaml-devel pkgconfig file-devel zlib zlib-devel \ libcap-ng-devel libcap-ng file-devel jansson jansson-devel \
sudo dnf install git-core
Depending on the current status of your system, it may take a while to complete this process.
HTP is bundled with Suricata and installed automatically. If you need to install HTP manually for other reasons, instructions can be found at HTP library installation.
By default, Suricata works as an IDS. If you want to use it as a IDS and IPS program, enter:
sudo dnf install libnetfilter_queue-devel libnetfilter_queue libnfnetlink-devel libnfnetlink
First, it is convenient to create a directory for Suricata. Name it 'suricata' for example. Open the terminal and enter:
Next, enter the following line in the terminal:
git clone git://phalanx.openinfosecfoundation.org/oisf.git
git clone https://github.com/OISF/libhtp.git -b 0.5.x
To configure, please enter the following. Alternatively, skip the rest of this section
and continue from the Auto Setup section.
To compile, please enter:
To install Suricata, enter:
sudo make install sudo ldconfig
You can also use the available auto setup features of Suricata:
./configure && make && make install-conf
would do the regular "make install" and then it would automatically create/setup all the necessary directories and suricata.yaml for you.
./configure && make && make install-rules
would do the regular "make install" and then it would automatically download and set up the latest ruleset from Emerging Threats available for Suricata
./configure && make && make install-full
would combine everything mentioned above (install-conf and install-rules) - and will present you with a ready to run (configured and set up) Suricata
Please continue with Basic Setup.
In case you have already made a map for the most recent code, downloaded the code into that map, and want to download recent code again, please enter:
After that, you start again at running autogen.