<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk for Snort Event Question in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/90998#M6038</link>
    <description>&lt;P&gt;I'm running a bunch of sample test PCAP files through and getting output in Splunk for Snort but the events seem to be kind of random with different dates, destination IP's, etc within a single event. This is probably a dumb question but I'm wondering what categorizes an event in Splunk for Snort could someone give some insight?&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;

&lt;P&gt;EDIT: I see in the opt/splunk/var/lib/splunk/defaultdb/db/ that there are the same number of folders as events. Gives me a little better view of what's happening but not the full picture.&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2013 13:17:47 GMT</pubDate>
    <dc:creator>phillijc</dc:creator>
    <dc:date>2013-07-10T13:17:47Z</dc:date>
    <item>
      <title>Splunk for Snort Event Question</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/90998#M6038</link>
      <description>&lt;P&gt;I'm running a bunch of sample test PCAP files through and getting output in Splunk for Snort but the events seem to be kind of random with different dates, destination IP's, etc within a single event. This is probably a dumb question but I'm wondering what categorizes an event in Splunk for Snort could someone give some insight?&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;

&lt;P&gt;EDIT: I see in the opt/splunk/var/lib/splunk/defaultdb/db/ that there are the same number of folders as events. Gives me a little better view of what's happening but not the full picture.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2013 13:17:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/90998#M6038</guid>
      <dc:creator>phillijc</dc:creator>
      <dc:date>2013-07-10T13:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Snort Event Question</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/90999#M6039</link>
      <description>&lt;P&gt;Could you please provide much more details about what you're seeing and what you're expecting? It's &lt;EM&gt;very&lt;/EM&gt; hard to say something useful without any actual details.&lt;/P&gt;

&lt;P&gt;An event in Splunk for Snort is pretty much what you would consider to be an event yourself when reading the log files.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jul 2013 15:51:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/90999#M6039</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-07-13T15:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Snort Event Question</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/91000#M6040</link>
      <description>&lt;P&gt;Thank you for your reply. I just thought that with a whole folder of different PCAPs who are proven attacks would trigger more events. Here's a little more info:&lt;BR /&gt;
Data inputs monitors a file /var/log/snort/alert&lt;BR /&gt;
Source Type: Manual, snort&lt;BR /&gt;
Event types, these basically search the classification of the alerts. I'm currently only getting network trojans and the snort-alert (of coarse). I'm thinking my data may just simply be limited: &lt;BR /&gt;
 - snort-alert &lt;BR /&gt;
 - snort_dos&lt;BR /&gt;
 - snort_exploit&lt;BR /&gt;
 - snort_information_leak&lt;BR /&gt;
 - snort_login&lt;BR /&gt;
 - snort_potentially_bad&lt;BR /&gt;
 - snort_privilege_gain&lt;BR /&gt;
 - snort_scan&lt;BR /&gt;
 - snort_trojan&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:20:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/91000#M6040</guid>
      <dc:creator>phillijc</dc:creator>
      <dc:date>2020-09-28T14:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Snort Event Question</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/91001#M6041</link>
      <description>&lt;P&gt;OK, the main problem I see with your setup is that you have set the sourcetype "snort". As the installation docs for Splunk for Snort state, you need to set either snort_alert_fast for alert_fast format or snort_alert_full for alert_full format. This is because these two need to be parsed differently in order to achieve correct event breaking, and I suspect this is what is causing you problems - events are not breaking properly so event boundaries in Splunk will not correspond to event boundaries in the original log file.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:20:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Snort-Event-Question/m-p/91001#M6041</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2020-09-28T14:20:40Z</dc:date>
    </item>
  </channel>
</rss>

