Skip to content

Commit 20bcce7

Browse files
authored
Merge pull request #9314 from wazuh/enhancement/idr617-update-poc-guide
Update POC guide (IDR-617)
2 parents e56ab0b + 1a5a0c3 commit 20bcce7

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ All notable changes to this project will be documented in this file.
1515
- Updated steps in the *Building Docker images locally* section. ([#9174](https://github.com/wazuh/wazuh-documentation/pull/9174))
1616
- **Post-release**: Updated the *Deployment with Ansible* documentation. ([#9295](https://github.com/wazuh/wazuh-documentation/pull/9295))
1717
- **Post-release**: Updated the *Configure Python and YARA* section of the *Proof of concept guide* documentation. ([#9315](https://github.com/wazuh/wazuh-documentation/pull/9315))
18+
- **Post-release**: Updated the *Network IDS integration* section of the *Proof of concept guide* documentation. ([#9314](https://github.com/wazuh/wazuh-documentation/pull/9314))
1819

1920
## [v4.14.2]
2021

@@ -39,7 +40,6 @@ All notable changes to this project will be documented in this file.
3940
- **Post-release**: Updated the *Monitoring system calls* documentation. ([#9271](https://github.com/wazuh/wazuh-documentation/pull/9271))
4041
- **Post-release**: Updated the *Installing the Wazuh dashboard step by step* documentation. ([#9260](https://github.com/wazuh/wazuh-documentation/pull/9260))
4142

42-
4343
### Fixed
4444

4545
- Fixed code block highlighting and indentation for ``securityContext`` in *Upgrading Wazuh on Kubernetes*. ([#9161](https://github.com/wazuh/wazuh-documentation/pull/9161))

source/proof-of-concept-guide/integrate-network-ids-suricata.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Take the following steps to configure Suricata on the Ubuntu endpoint and send t
3838
3939
$ cd /tmp/ && curl -LO https://rules.emergingthreats.net/open/suricata-6.0.8/emerging.rules.tar.gz
4040
$ sudo tar -xvzf emerging.rules.tar.gz && sudo mkdir /etc/suricata/rules && sudo mv rules/*.rules /etc/suricata/rules/
41-
$ sudo chmod 777 /etc/suricata/rules/*.rules
41+
$ sudo find /etc/suricata/rules -name "*.rules" -exec chmod 777 {} \;
4242
4343
#. Modify Suricata settings in the ``/etc/suricata/suricata.yaml`` file and set the following variables:
4444

0 commit comments

Comments
 (0)