Skip to content

Commit

Permalink
doc/userguide: notes about Lua rules being disabled by default
Browse files Browse the repository at this point in the history
  • Loading branch information
jasonish authored and victorjulien committed Jun 14, 2023
1 parent f119b29 commit 4a97461
Show file tree
Hide file tree
Showing 2 changed files with 18 additions and 0 deletions.
14 changes: 14 additions & 0 deletions doc/userguide/configuration/suricata-yaml.rst
Original file line number Diff line number Diff line change
Expand Up @@ -2735,3 +2735,17 @@ you probably want to set `run-as` configuration parameter so as to drop root pri
Beyond suricata.yaml, other ways to harden Suricata are
- compilation : enabling ASLR and other exploit mitigation techniques.
- environment : running Suricata on a device that has no direct access to Internet.

Lua
~~~

Suricata 7.0 disables Lua rules by default. Lua rules can be enabled
in the ``security.lua`` section of the configuration file:

::

security:
lua:
# Allow Lua rules. Disabled by default.
#allow-rules: false

4 changes: 4 additions & 0 deletions doc/userguide/rules/lua-detection.rst
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,10 @@
Lua Scripting for Detection
===========================

.. note:: Lua is disabled by default for use in rules, it must be
enabled in the configuration file. See the ``security.lua``
section of ``suricata.yaml`` and enable ``allow-rules``.

Syntax:

::
Expand Down

0 comments on commit 4a97461

Please sign in to comment.