Troubleshooting
This section offers some common problem-solution pairs, dedicated to both new and existing users. For more information, see the Siren Alert FAQ.
Debug Siren Alert
Ensure you have the following options in investigate.yml
:
# Enables you specify a file where Siren Investigate stores log output. logging.dest: stdout # Set the value of this setting to true to suppress all logging output. logging.silent: false # Set the value of this setting to true to suppress all logging output other than error messages. logging.quiet: false # Set the value of this setting to true to log all events, including system usage information # and all requests. logging.verbose: true
All messages which have Siren Alert
in its status are messages
related to Siren Alert.
No alert emails
Basic config, investigate.yml
:
logging.verbose: true sentinl: settings: email: active: true host: beast-cave ssl: false report: active: true tmp_path: /tmp/
Check your server using some email client, for example mailx
:
mailx -S smtp=<smtp-server-address> -r <from-address> -s <subject> -v <to-address> < body.txt
Security exception while using Search Guard Classic
For example, this message:
p-f45016r31z8-yok6hzhmmii: [security_exception] no permissions for indices:data/read/search :: {\"path\":\"/logstash-2017.09.22/_search\" ,\"query\":{},\"body\":\"{}\",\"statusCode\":403,\"response\":\"{\\\"error\\\":{\\\"root_cause\\\":[{\\\"type\\\":\\\"security_exception\ \\",\\\"reason\\\":\\\"no permissions for indices:data/read/search\\\"}],\\\"type\\\":\\\"security_exception\\\",\\\"reason\\\":\\\"no permissions for indices:data/read/search\\\"},\\\"status\\\":403}\"}"}
It says Siren Alert cannot read indices:data/read/search
the
logstash-2017.09.22
index. Ensure you have the following role for
logstash-*
indices in sg_roles.yml
:
# For the kibana server sg_kibana_server: indices: 'logstash-*': '*': - indices:data/read/search
Linux file permissions
The Siren Alert plugin requires two internal binaries (phantomjs
and
chrome
) to be executable. If Siren Investigate is running as root,
it can take care of this automatically. However, if Siren Investigate is
running as an unprivileged user, for example in a hardened environment,
you may see errors in the logs similar to this:
Jul 24 09:16:04 xxxxxxxx investigate[30856]: FATAL { Error: EPERM: operation not permitted, chmod '/xxxxxxx/siren-investigate-10.1.0-linux-x86_64/siren_plugins/sentinl/node_modules/phantomjs-prebuilt/bin/phantomjs' Jul 24 09:17:42 xxxxxxxx investigate[32296]: [sentinl] fail to make report engine executable: EPERM: operation not permitted, chmod '/xxxxxxxx/siren-investigate-10.1.0-linux-x86_64/siren_plugins/sentinl/node_modules/puppeteer/.local-chromium/linux-564778/chrome-linux/chrome'!
Siren Investigate includes a post-installation utility that can be run by an administrator as root (or using sudo), that can fix these file permissions manually:
cd $INVESTIGATE_INSTALL_DIRECTORY/siren_plugins/sentinl/ ../../node/bin/node ./postinst.js