You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Apr 16, 2021. It is now read-only.
# Default to no PulledPork options
PP_OPTIONS=""
# OPTION: -n if we have no Internet connection
if [ "$LOCAL_NIDS_RULE_TUNING" == "true" ] || [ "$LOCAL_NIDS_RULE_TUNING" == "yes" ]; then
cp /opt/emergingthreats/emerging* /tmp
PP_OPTIONS="-n"
echo "LOCAL_NIDS_RULE_TUNING is enabled."
echo "This will cause PulledPork to use the existing rules in /opt/emergingthreats/"
echo "instead of downloading new rules from the Internet."
echo "If you want PulledPork to download new rules from the Internet,"
echo "set the following in /etc/nsm/securityonion.conf:"
echo "LOCAL_NIDS_RULE_TUNING=no"
fi
# OPTION: -T if the user is running Suricata
if [ "$ENGINE" = "suricata" ]; then
PP_OPTIONS="$PP_OPTIONS -T"
echo "ENGINE=suricata, so we'll execute PulledPork with the -T option to avoid adding soid rules to downloaded.rules."
fi
# Go get rules from Internet.
echo "Running PulledPork."
/usr/bin/pulledpork.pl -P $PP_OPTIONS -c /etc/nsm/pulledpork/pulledpork.conf |
grep -v "normalizations disabled because not inline" |grep -v "^$"
Original comment by doug.bu...@gmail.com on 17 Jul 2014 at 11:17
Original issue reported on code.google.com by
doug.bu...@gmail.com
on 17 Jul 2014 at 10:47The text was updated successfully, but these errors were encountered: