Skip to main content
Version: 2.1.0

Sensor Configuration Reference

This page documents all available environment variables for the Mata Elang Sensor.

Snort Configuration

VariableDescriptionPossible ValuesDefault
NETWORK_INTERFACENetwork interface to listen on for packet captureInterface name (e.g., eth0)eth0
SNORT_OINKCODEOINKCODE required to download rules from snort.orgAlphanumeric string(none — required for registered/lightspd rulesets)
SNORT_COMPRESSED_RULES_FILE_PATHPath to compressed rules file (.tar.gz) inside the containerAbsolute path (e.g., /tmp/rules/filename.tar.gz)(none)
RULESETRuleset source to usecommunity, registered, lightspdcommunity
SNORT_BLOCKLISTEnable blocklisttrue, falsefalse
ET_BLOCKLISTEnable Emerging Threats blocklisttrue, falsefalse
BLOCKLIST_URLSURLs to download blocklists from (comma-separated)URL string(none)
IPS_POLICYIPS policy/rule set to useconnectivity, balanced, security, max-detect, nonebalanced
Note

SNORT_OINKCODE is only required if using registered or lightspd rulesets. Register at https://www.snort.org/users/sign_up to get a free OINKCODE.

Parser Configuration

VariableDescriptionPossible ValuesDefault
MES_CLIENT_SERVERIP address of the Mata Elang Defense Center (sensor-api)IP address172.17.0.1
MES_CLIENT_PORTgRPC port of the Defense CenterPort number50051
MES_CLIENT_SENSOR_IDUnique identifier for this sensorStringsensor1
MES_CLIENT_FILEPath to the Snort alert JSON fileAbsolute path/var/log/snort/alert_json.txt
MES_CLIENT_INTERVALInterval between batch sends to gRPC serverDuration string1s
MES_CLIENT_MAX_CLIENTSMaximum concurrent gRPC stream clientsInteger10
MES_CLIENT_MAX_MESSAGE_SIZEMaximum gRPC message size in MBInteger (MB)100
Note

Set MES_CLIENT_SENSOR_ID to a unique name for each sensor (e.g., sensor-office-1, sensor-dc-1). This ID appears in OpenSearch Dashboards to identify which sensor generated each alert.

gRPC / TLS Configuration

VariableDescriptionPossible ValuesDefault
MES_CLIENT_SECUREEnable TLS for gRPC client connectiontrue, falsetrue
MES_CLIENT_CERTIFICATEPath to CA certificate for server verificationAbsolute path/secrets/ca.crt
MES_CLIENT_SERVER_NAMEServer name for TLS hostname verification (must match CN/SAN in server cert)Stringsensor-api
MES_CLIENT_VERBOSELog verbosity level0 (off), 1 (debug), 2+ (trace)0

Complete Example

###############################
# Mata Elang: Sensor Snort
###############################

NETWORK_INTERFACE=eth0

# Uncomment to download rules from snort.org
#SNORT_OINKCODE=your-oinkcode-here
#RULESET=registered

# Uncomment to use blocklist
#SNORT_BLOCKLIST=true
#BLOCKLIST_URLS=https://some-blocklist-url.com/blocklist.txt

IPS_POLICY=balanced

###############################
# Mata Elang: Sensor Parser
###############################

MES_CLIENT_SERVER=172.17.0.1
MES_CLIENT_PORT=50051
MES_CLIENT_SENSOR_ID=sensor-office-1
MES_CLIENT_FILE=/var/log/snort/alert_json.txt
MES_CLIENT_INTERVAL=1s
MES_CLIENT_MAX_CLIENTS=10
MES_CLIENT_MAX_MESSAGE_SIZE=100

# -- gRPC TLS --
MES_CLIENT_SECURE=true
MES_CLIENT_CERTIFICATE=/secrets/ca.crt
MES_CLIENT_SERVER_NAME=sensor-api