suricata
suricata copied to clipboard
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Update of #9651 fixing the formatting. EVE logging has a direction parameter that can cause the logging of an application layer to be done in a direction that is not...
#11073, plus a libpcap live job based on the af-packet script.
Expand live tests with various unix socket commands. Fix bugs found while doing this: https://redmine.openinfosecfoundation.org/issues/7020 https://redmine.openinfosecfoundation.org/issues/7022 Clean version of #11061
Reimplement threshold storage and add a thread local cache, both to reduce lock contention. https://redmine.openinfosecfoundation.org/issues/426 https://redmine.openinfosecfoundation.org/issues/6967 Replaces https://github.com/OISF/suricata/pull/11024 Review in isolation, no relation other thresholding PRs.
#11071, slightly cleaned up. Adds a script for unix socket runmode. Adds a ASAN and a Codecov build.
As #11066, but also adding an ASAN build.
Staging: - #10731 - #11032 - #11064 - #11065 SV_BRANCH=https://github.com/OISF/suricata-verify/pull/1831
If a rule script crashed, the return value was treated as a no match. This would make a negation of the rule match and alert. Instead cleanup and exit early...
SV_BRANCH=https://github.com/OISF/suricata-verify/pull/1822 https://redmine.openinfosecfoundation.org/issues/6822 replacing #10910, rebasing and addressing a comment
Previous PR: #11053 Changes to previous PR: * Add new `suricata.yaml` options to EVE Output documentation page. * Update example `outputs` section in documentation. ## Ticket Redmine ticket: https://redmine.openinfosecfoundation.org/issues/6984 SV_BRANCH=https://github.com/OISF/suricata-verify/pull/1826