Fedora Installation from GIT

This document is a walk-through for installing and using the most recent code of Suricata on Fedora. Have a look at the other guides for installation on Ubuntu, FreeBSD or binary installations. In case you are using another operating system, you should replace those commands by your operating-specific commands.

Pre-installation requirements

Before you can build Suricata for your system, run the following command to ensure that you have everything you need for the installation.

sudo dnf install pcre pcre-devel autoconf cargo \
automake make libtool libpcap-devel libnet-devel lz4-devel \
libyaml libyaml-devel pkgconfig file-devel zlib zlib-devel \
libcap-ng-devel libcap-ng file-devel jansson jansson-devel \
sudo dnf install git-core

Depending on the current status of your system, it may take a while to complete this process.

HTP is bundled with Suricata and installed automatically. If you need to install HTP manually for other reasons, instructions can be found at HTP library installation.

By default, Suricata works as an IDS. If you want to use it as a IDS and IPS program, enter:

sudo dnf install libnetfilter_queue-devel libnetfilter_queue libnfnetlink-devel libnfnetlink


First, it is convenient to create a directory for Suricata. Name it 'suricata' for example. Open the terminal and enter:

mkdir suricata

Followed by:

cd suricata

Next, enter the following line in the terminal:

git clone git://
cd oisf
git clone -b 0.5.x

Followed by:


To configure, please enter the following. Alternatively, skip the rest of this section
and continue from the Auto Setup section.


To compile, please enter:


To install Suricata, enter:

sudo make install
sudo ldconfig

Auto Setup

You can also use the available auto setup features of Suricata:


./configure && make && make install-conf

make install-conf
would do the regular "make install" and then it would automatically create/setup all the necessary directories and suricata.yaml for you.

./configure && make && make install-rules

make install-rules
would do the regular "make install" and then it would automatically download and set up the latest ruleset from Emerging Threats available for Suricata
./configure && make && make install-full

make install-full
would combine everything mentioned above (install-conf and install-rules) - and will present you with a ready to run (configured and set up) Suricata

Please continue with Basic Setup.

In case you have already made a map for the most recent code, downloaded the code into that map, and want to download recent code again, please enter:

cd suricata/oisf

next, enter:

git pull

After that, you start again at running autogen.