Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Suricata ~ Updates Killing Network Connections

    Scheduled Pinned Locked Moved 2.4 Development Snapshots
    28 Posts 8 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      Teken
      last edited by

      Since updating to the last official 2.4.2 P1 release every single day at 12:30 AM and 6:30 PM my entire network shuts down. Upon further audit and review I  found when ever the Suricata program is updating its signatures the system will be locked up doing something which literally kills all network connections in my home.  >:(

      Since I update based on six hour intervals starting at 12:30 AM each day it was easy to track. As seen in this image capture when Suricata is updating its data base the load increases several watts from its base 8 watts RMS at 12:30 AM & 6:30 PM.

      I have since changed the setting to 28 days until the next scheduled update until such time root cause has been identified and resolved by the development team.

      Moving the update period has completely solved this network down issue for me . . .

      Thank You!

      ![Suricata Energy Draw.PNG](/public/imported_attachments/1/Suricata Energy Draw.PNG)
      ![Suricata Energy Draw.PNG_thumb](/public/imported_attachments/1/Suricata Energy Draw.PNG_thumb)
      ![Suricata Update Interval.PNG](/public/imported_attachments/1/Suricata Update Interval.PNG)
      ![Suricata Update Interval.PNG_thumb](/public/imported_attachments/1/Suricata Update Interval.PNG_thumb)

      1 Reply Last reply Reply Quote 0
      • Raul RamosR
        Raul Ramos
        last edited by

        Hi.

        Is 0:30 the best update hour? mine is on 4 or 5 AM.

        Have you enable or disabled "Live Rule Swap on Update"? on Global settings? what are your interface "IPS Mode" (Goto and edit interface, section "Alert and Block Settings")?

        pfSense:
        ASRock -> Wolfdale1333-D667 (2GB TeamElite Ram)
        Marvell 88SA8040 Sata to CF(Sandisk 4GB) Controller
        NIC's: RTL8100E (Internal ) and Intel® PRO/1000 PT Dual (Intel 82571GB)

        1 Reply Last reply Reply Quote 0
        • T
          Teken
          last edited by

          @mais_um:

          Hi.

          Is 0:30 the best update hour? mine is on 4 or 5 AM.

          Have you enable or disabled "Live Rule Swap on Update"? on Global settings? what are your interface "IPS Mode" (Goto and edit interface, section "Alert and Block Settings")?

          The time could really be what ever I simply left it at the default value. The problem is not just because the network goes out but when it happens I have several Alpha / Beta pieces of hardware that have a really hard time coming back on line once this update happens. I literally have to hard reboot these two devices by removing power remotely via my web hosted switch.

          This was NEVER an issue prior to this release  . . .

          I did note the option of Live Rule Swap on Update but again I never used it in the past. I see no reason to use this as a solution given the previous release operated just fine. If no one is going to take this issue seriously and address it obviously I will have to use that option moving forward.

          what are your interface "IPS Mode" (Goto and edit interface, section "Alert and Block Settings")?

          Can you provide a image capture as to where this is I can't find it.

          Thank You!

          1 Reply Last reply Reply Quote 0
          • GertjanG
            Gertjan
            last edited by

            Hi,

            Suricata, when updating uses some Watts … never saw stats that showed  increased system usage expressed by Watts before.
            What about process usage ? RAM usage ? Do they follow the Watt usage ?

            Although firewalls like this https://store.netgate.com/SG-1000.aspx shouldn't maybe not using heavy packages as Suricate (I might be wrong here), I wonder what you use for hardware.

            No "help me" PM's please. Use the forum, the community will thank you.
            Edit : and where are the logs ??

            1 Reply Last reply Reply Quote 0
            • bmeeksB
              bmeeks
              last edited by

              @Gertran is on the right track.  Suricata needs a good bit of CPU horsepower, and the more rules you enable the more horsepower it needs.  That needed horsepower includes a pretty fast and capable CPU along with plenty of RAM.  I would say 2GB is cutting it close on RAM.  I would rather have at least 4GB of RAM for Suricata with a lot of rules enabled.

              Are any other packages running on this firewall?  That can further add to load, and if you have another package that needs to download daily updates (such as IP lists or something), then perhaps there is a conflict with the update jobs ???

              Bill

              1 Reply Last reply Reply Quote 0
              • Raul RamosR
                Raul Ramos
                last edited by

                @bmeeks:

                @Gertran is on the right track.  Suricata needs a good bit of CPU horsepower, and the more rules you enable the more horsepower it needs.  That needed horsepower includes a pretty fast and capable CPU along with plenty of RAM.  I would say 2GB is cutting it close on RAM.  I would rather have at least 4GB of RAM for Suricata with a lot of rules enabled.

                Bill

                This is way i point a bad hour to make updates. To me 0:30 is to soon, is this the default?. This updates should be made when less people is connected.

                @Teken:

                …
                Can you provide a image capture as to where this is I can't find it.
                ...

                Image annexed.

                @bmeeks is here you should have a good feedback, is the maintainer and the expert.

                ![Suricata - inline mode.jpg](/public/imported_attachments/1/Suricata - inline mode.jpg)
                ![Suricata - inline mode.jpg_thumb](/public/imported_attachments/1/Suricata - inline mode.jpg_thumb)

                pfSense:
                ASRock -> Wolfdale1333-D667 (2GB TeamElite Ram)
                Marvell 88SA8040 Sata to CF(Sandisk 4GB) Controller
                NIC's: RTL8100E (Internal ) and Intel® PRO/1000 PT Dual (Intel 82571GB)

                1 Reply Last reply Reply Quote 0
                • bmeeksB
                  bmeeks
                  last edited by

                  @mais_um:

                  This is way i point a bad hour to make updates. To me 0:30 is to soon, is this the default?. This updates should be made when less people is connected.

                  I can't remember the package default off the top of my head, but since the package is used all over the world and in different time zones, there is no "perfect" default value.  The creators of the rule packages each have their own update posting schedules based on their local time.  But their local time is not the same as someone in a different part of the world.  So you just need to experiment.  For me, I set my times to 1:30 AM US Eastern and 1:30 PM Eastern and have not had any issues.  I did have issues in the past with the old default of midnight US Eastern and noon US Eastern.

                  Bill

                  1 Reply Last reply Reply Quote 0
                  • T
                    Teken
                    last edited by

                    @Gertjan:

                    Hi,

                    Suricata, when updating uses some Watts … never saw stats that showed  increased system usage expressed by Watts before.
                    What about process usage ? RAM usage ? Do they follow the Watt usage ?

                    Although firewalls like this https://store.netgate.com/SG-1000.aspx shouldn't maybe not using heavy packages as Suricate (I might be wrong here), I wonder what you use for hardware.

                    I haven't been around when the system shuts down the network due to work flow. In the near future I'll schedule it for a time I'm around and confirm what the process / RAM usage is. I'm sure lots of folks haven't ever seen a energy chart placed on this forum to describe a problem. I only did so because it helped illustrate the factual data of when the time event happen and the correlation was a increase in power due to more processing power being called upon.

                    I know what every single device and circuit consumes, for how long, frequency of, and if there are any out of band readings in the home. If there is my systems shut them down and send alerts to me indicating when and where.

                    1 Reply Last reply Reply Quote 0
                    • T
                      Teken
                      last edited by

                      @bmeeks:

                      @Gertran is on the right track.  Suricata needs a good bit of CPU horsepower, and the more rules you enable the more horsepower it needs.  That needed horsepower includes a pretty fast and capable CPU along with plenty of RAM.  I would say 2GB is cutting it close on RAM.  I would rather have at least 4GB of RAM for Suricata with a lot of rules enabled.

                      Are any other packages running on this firewall?  That can further add to load, and if you have another package that needs to download daily updates (such as IP lists or something), then perhaps there is a conflict with the update jobs ???

                      Bill

                      Hello Bill,

                      This is a brand new Micro PC I propped up in late 2017 and the hardware specification are these:

                      Intel(R) Atom(TM) CPU E3845 @ 1.91GHz
                      4 CPUs: 1 package(s) x 4 core(s)
                      AES-NI CPU Crypto: Yes (active)

                      1 Reply Last reply Reply Quote 0
                      • T
                        Teken
                        last edited by

                        @mais_um:

                        @bmeeks:

                        @Gertran is on the right track.  Suricata needs a good bit of CPU horsepower, and the more rules you enable the more horsepower it needs.  That needed horsepower includes a pretty fast and capable CPU along with plenty of RAM.  I would say 2GB is cutting it close on RAM.  I would rather have at least 4GB of RAM for Suricata with a lot of rules enabled.

                        Bill

                        This is way i point a bad hour to make updates. To me 0:30 is to soon, is this the default?. This updates should be made when less people is connected.

                        @Teken:

                        …
                        Can you provide a image capture as to where this is I can't find it.
                        ...

                        Image annexed.

                        @bmeeks is here you should have a good feedback, is the maintainer and the expert.

                        I do no see IPS Mode in the 2.4.2 P1 firmware release.

                        1 Reply Last reply Reply Quote 0
                        • bmeeksB
                          bmeeks
                          last edited by

                          @Teken:

                          @bmeeks:

                          @Gertran is on the right track.  Suricata needs a good bit of CPU horsepower, and the more rules you enable the more horsepower it needs.  That needed horsepower includes a pretty fast and capable CPU along with plenty of RAM.  I would say 2GB is cutting it close on RAM.  I would rather have at least 4GB of RAM for Suricata with a lot of rules enabled.

                          Are any other packages running on this firewall?  That can further add to load, and if you have another package that needs to download daily updates (such as IP lists or something), then perhaps there is a conflict with the update jobs ???

                          Bill

                          Hello Bill,

                          This is a brand new Micro PC I propped up in late 2017 and the hardware specification are these:

                          Intel(R) Atom(TM) CPU E3845 @ 1.91GHz
                          4 CPUs: 1 package(s) x 4 core(s)
                          AES-NI CPU Crypto: Yes (active)

                          The amount of RAM might be an issue.  It really depends on the number of enabled rules.  When the scheduled updates run, Suricata basically has to load both sets of rules into memory at the same time, then when everything is loaded up it switches over to using the new rules in RAM and discards the old ones.  So for a brief period of time you need almost twice as much RAM as compared to the rest of the running time.  With a limited amount of RAM to start with, this could result in memory paging (the swapping in and out to disk of some RAM content).  Your power spike is simply the physical evidence of the much higher CPU workload during the task.  A higher CPU workload is normal for rule updates.

                          Bill

                          1 Reply Last reply Reply Quote 0
                          • T
                            Teken
                            last edited by

                            @bmeeks:

                            @Teken:

                            @bmeeks:

                            @Gertran is on the right track.  Suricata needs a good bit of CPU horsepower, and the more rules you enable the more horsepower it needs.  That needed horsepower includes a pretty fast and capable CPU along with plenty of RAM.  I would say 2GB is cutting it close on RAM.  I would rather have at least 4GB of RAM for Suricata with a lot of rules enabled.

                            Are any other packages running on this firewall?  That can further add to load, and if you have another package that needs to download daily updates (such as IP lists or something), then perhaps there is a conflict with the update jobs ???

                            Bill

                            Hello Bill,

                            This is a brand new Micro PC I propped up in late 2017 and the hardware specification are these:

                            Intel(R) Atom(TM) CPU E3845 @ 1.91GHz
                            4 CPUs: 1 package(s) x 4 core(s)
                            AES-NI CPU Crypto: Yes (active)

                            The amount of RAM might be an issue.  It really depends on the number of enabled rules.  When the scheduled updates run, Suricata basically has to load both sets of rules into memory at the same time, then when everything is loaded up it switches over to using the new rules in RAM and discards the old ones.  So for a brief period of time you need almost twice as much RAM as compared to the rest of the running time.  With a limited amount of RAM to start with, this could result in memory paging (the swapping in and out to disk of some RAM content).  Your power spike is simply the physical evidence of the much higher CPU workload during the task.  A higher CPU workload is normal for rule updates.

                            Bill

                            Hello Bill,

                            My apologies I didn't state how much RAM I have on board. This Micro PC has 8 GB of RAM which should be more than plenty to run pfSense.

                            1 Reply Last reply Reply Quote 0
                            • bmeeksB
                              bmeeks
                              last edited by

                              @Teken:

                              @bmeeks:

                              @Teken:

                              @bmeeks:

                              @Gertran is on the right track.  Suricata needs a good bit of CPU horsepower, and the more rules you enable the more horsepower it needs.  That needed horsepower includes a pretty fast and capable CPU along with plenty of RAM.  I would say 2GB is cutting it close on RAM.  I would rather have at least 4GB of RAM for Suricata with a lot of rules enabled.

                              Are any other packages running on this firewall?  That can further add to load, and if you have another package that needs to download daily updates (such as IP lists or something), then perhaps there is a conflict with the update jobs ???

                              Bill

                              Hello Bill,

                              This is a brand new Micro PC I propped up in late 2017 and the hardware specification are these:

                              Intel(R) Atom(TM) CPU E3845 @ 1.91GHz
                              4 CPUs: 1 package(s) x 4 core(s)
                              AES-NI CPU Crypto: Yes (active)

                              The amount of RAM might be an issue.  It really depends on the number of enabled rules.  When the scheduled updates run, Suricata basically has to load both sets of rules into memory at the same time, then when everything is loaded up it switches over to using the new rules in RAM and discards the old ones.  So for a brief period of time you need almost twice as much RAM as compared to the rest of the running time.  With a limited amount of RAM to start with, this could result in memory paging (the swapping in and out to disk of some RAM content).  Your power spike is simply the physical evidence of the much higher CPU workload during the task.  A higher CPU workload is normal for rule updates.

                              Bill

                              Hello Bill,

                              My apologies I didn't state how much RAM I have on board. This Micro PC has 8 GB of RAM which should be more than plenty to run pfSense.

                              OK, 8 GB should be plenty of RAM.  A spike in CPU usage and power consumption would be normal, but losing network connectivity is not normal.  That has not been reported by others so far as I can tell, so it appears to be isolated to your case.  Is there anything unusual about your network card?  Is it a USB device or a standard port on the motherboard?  Are you using blocking mode for Suricata or just the default IDS mode?  This is set on the INTERFACE SETTINGS tab for each configured Suricata interface.  You have a choice of two blocking modes when you enable "Block Offenders".  Those two modes are Legacy Mode and Inline IPS Mode.  If you have blocking configured, which of those two modes do you have enabled?

                              Bill

                              1 Reply Last reply Reply Quote 0
                              • T
                                Teken
                                last edited by

                                Block Offenders is not checked on either LAN / WAN interface. The Micro PC has four on board Intel WG82583 NIC's.

                                Thank You!

                                1 Reply Last reply Reply Quote 0
                                • bmeeksB
                                  bmeeks
                                  last edited by

                                  @Teken:

                                  Block Offenders is not checked on either LAN / WAN interface. The Micro PC has four on board Intel WG82583 NIC's.

                                  Thank You!

                                  With that basic setup (no blocking), I really can't imagine a scenario where Suricata could break your network connectivity.  In that default setup you have, it only launches libpcap to get copies of packets coming through the interface so it can analyze them.  That's it.  Are you 100% positive Suricata is the issue?  I know of nothing within the binary that can break your network connectivity, especially with blocking not enabled.  In the GUI, even if that code got really intense, the worst that should happen is the GUI responsivness would suck for a few seconds.

                                  When you say the network "breaks", does it self recover?  In other words, will connectivity come back if you do nothing?  If not, what do you do to restore connectivity?  Those can be troubleshooting hints.

                                  Bill

                                  1 Reply Last reply Reply Quote 0
                                  • T
                                    Teken
                                    last edited by

                                    Hello Bill,

                                    When the system is updating all networking is halted specifically anything to do with WiFi. If I'm watching Netflix on my LG smart TV the only way to restore the connection is to cycle power to the TV. This same behavior is seen on two smart weather stations I am beta testing.

                                    On those specific devices I can see the hubs showing a red LED.

                                    A red LED indicates on those specific pieces of hardware that the hub is not able to connect to the WiFi network / communicate to the weather servers.

                                    The only remedy is to cycle power to those two hubs to establish a WiFi connection. Since I started this thread this problem has not reappeared due to the fact I have pushed the Suricata update to 29 days etc.

                                    Any further insight is greatly appreciated!

                                    1 Reply Last reply Reply Quote 0
                                    • bmeeksB
                                      bmeeks
                                      last edited by

                                      More insight is going to take some additional info from logs and recreating the event more often than every 29 days.

                                      If you are game, change the interval back to every 6 or 12 hours and change the time for the update to coincide with a period when you are available to login to the firewall and see what's happening and grab some log info during the issue.  Specifically I need to see the system log entries during the time the loss of connectivity is happening along with your suricata.log file for the interface.

                                      The system log for pfSense is under STATUS >> SYSTEM LOGS.  You can find the Suricata log I need under the LOGS VIEW tab and then select the suricata.log file in the drop-down selector.  The system log will likely contain the most relevant info.  Just remember to capture the info during the time the connectivity problem is happening.  Feel free to obfuscate IP addresses if you want to.

                                      Bill

                                      1 Reply Last reply Reply Quote 0
                                      • T
                                        Teken
                                        last edited by

                                        @bmeeks:

                                        More insight is going to take some additional info from logs and recreating the event more often than every 29 days.

                                        If you are game, change the interval back to every 6 or 12 hours and change the time for the update to coincide with a period when you are available to login to the firewall and see what's happening and grab some log info during the issue.  Specifically I need to see the system log entries during the time the loss of connectivity is happening along with your suricata.log file for the interface.

                                        The system log for pfSense is under STATUS >> SYSTEM LOGS.  You can find the Suricata log I need under the LOGS VIEW tab and then select the suricata.log file in the drop-down selector.  The system log will likely contain the most relevant info.  Just remember to capture the info during the time the connectivity problem is happening.  Feel free to obfuscate IP addresses if you want to.

                                        Bill

                                        Hi Bill,

                                        Apologies for the tardy reply I've been on the road for work for several weeks. Upon my return I shall follow your suggestions and it should be noted since moving the update interval to 29 days. Nothing bad has happen to any network appliance in the home. Since my last reply that very much affirms this issue is directly related to the update.

                                        Thank You!

                                        1 Reply Last reply Reply Quote 0
                                        • S
                                          SuperTechie
                                          last edited by

                                          I am having issues with apparently random killing all network connections with 2.4.2p1 also, but I'm not sure it is Suricata doing it.  For my system it happens at a seemingly random time from 1-10 days.  I have been unable to correlate it to any cron job, and the logs do not show anything except the gateway is down when it happens.  For mine the network interface outage usually lasts 1-2 minutes, though at least once I had to reboot.  The system at the console thinks all is fine, and there are no crashes.  I've tried different hardware including swapping servers and network cards, but the issue persists.  Kinda hard to troubleshoot with the frequency so far apart, and no known way of inducing the error.

                                          Hardware:  HP DL380 G6, 48 Gig memory, Xeon 5650x2, Intel i340 4 port network cards x 2.
                                          Packages:  pfBlockerNG 2.1.2_2, mailreport 3.1, Suricata 4.0.3_1

                                          1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate
                                            last edited by

                                            So why is the gateway down? Do you have State killing on gateway failure enabled?

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.