<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why is Splunk line breaking a single IDS Alert event into two events? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287648#M54954</link>
    <description>&lt;P&gt;These props.conf settings need to be where the parsing phase happens, that'll be a heavy forwarder or the indexers in this case. The universal forwarder will ignore these.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Apr 2016 19:34:20 GMT</pubDate>
    <dc:creator>martin_mueller</dc:creator>
    <dc:date>2016-04-13T19:34:20Z</dc:date>
    <item>
      <title>Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287641#M54947</link>
      <description>&lt;P&gt;Splunk is breaking ids single event into two events, such as:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;4/11/16
2:42:46.152 PM 
04/11-14:42:46.152985 00:05:00:00:00:00 -&amp;gt; 00:00:00:05:00:01 type:0x800 len:0x222
10.20.30.40:59406 -&amp;gt; 106.120.151.145:80 TCP TTL:52 TOS:0x0 ID:53190 IpLen:20 DgmLen:532 DF
***A**** Seq: 0xBA0195C4  Ack: 0xBB15F92D  Win: 0x3E00  TcpLen: 20
[Xref =&amp;gt; http://doc.emergingthreats.net/2008500]
host = ISMeta2 source = /var/log/snort/snort.log

4/11/16
2:42:46.000 PM 
[**] [1:2008500:6] ET MALWARE Sogoul.com Spyware User-Agent (SogouIMEMiniSetup) [**]
[Classification: A Network Trojan was Detected] [Priority: 1]
host = ISMeta2 source = /var/log/snort/snort.log
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Which appears in snort.log as this one event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[**] [1:2008500:6] ET MALWARE Sogoul.com Spyware User-Agent (SogouIMEMiniSetup) [**]
[Classification: A Network Trojan was Detected] [Priority: 1]
04/11-14:42:46.152985 00:05:00:00:00:00 -&amp;gt; 00:00:00:05:00:01 type:0x800 len:0x222
10.20.30.40:59406 -&amp;gt; 106.120.151.145:80 TCP TTL:52 TOS:0x0 ID:53190 IpLen:20 DgmLen:532 DF
***A**** Seq: 0xBA0195C4  Ack: 0xBB15F92D  Win: 0x3E00  TcpLen: 20
[Xref =&amp;gt; http://doc.emergingthreats.net/2008500]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;All events start with &lt;CODE&gt;[**]&lt;/CODE&gt; I have props.conf configured as follows where snort_alert_full is sourcetype, but that doesn't fix my issue&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[snort_alert_full]      
BREAK_ONLY_BEFORE = [**]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:23:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287641#M54947</guid>
      <dc:creator>dmenon</dc:creator>
      <dc:date>2020-09-29T09:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287642#M54948</link>
      <description>&lt;P&gt;BREAK_ONLY_BEFORE expects a regular expression, &lt;CODE&gt;[**]&lt;/CODE&gt; would be extremely malformed for your data. Have you tried &lt;CODE&gt;\[\*\*\]&lt;/CODE&gt;?&lt;/P&gt;

&lt;P&gt;That being said, you'd be better off utilizing LINE_BREAKER like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;SHOULD_LINEMERGE = false
LINE_BREAKER = ([\r\n]+)\[\*\*\]
TIME_PREFIX = ^([^\r\n]+[\r\n]+){2}
MAX_TIMESTAMP_LOOKAHEAD = 25
TIME_FORMAT = %m/%d-%H:%M:%S.%6N
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;That'll be MUCH faster and should achieve exactly what you need.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:20:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287642#M54948</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2020-09-29T09:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287643#M54949</link>
      <description>&lt;P&gt;Thanks for the help, this did not work, I think there is more to the way the logs are setup as well. For instance - I want splunk to look at event starting with &lt;CODE&gt;[**]&lt;/CODE&gt; and then grab the timestamp from the third line of the log. How do I achieve that ? &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[**] [1:2008500:6] ET MALWARE Sogoul.com Spyware User-Agent (SogouIMEMiniSetup) [**]
 [Classification: A Network Trojan was Detected] [Priority: 1]
 04/11-14:42:46.152985 00:05:00:00:00:00 -&amp;gt; 00:00:00:05:00:01 type:0x800 len:0x222
 10.20.30.40:59406 -&amp;gt; 106.120.151.145:80 TCP TTL:52 TOS:0x0 ID:53190 IpLen:20 DgmLen:532 DF
 ***A**** Seq: 0xBA0195C4  Ack: 0xBB15F92D  Win: 0x3E00  TcpLen: 20
 [Xref =&amp;gt; http://doc.emergingthreats.net/2008500]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks in advance. &lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 14:43:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287643#M54949</guid>
      <dc:creator>dmenon84</dc:creator>
      <dc:date>2016-04-12T14:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287644#M54950</link>
      <description>&lt;P&gt;Some more sample events:&lt;/P&gt;

&lt;P&gt;Event 1 &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[**] [1:2520169:2541] ET TOR Known Tor Exit Node UDP Traffic group 85 [**]
[Classification: Misc Attack] [Priority: 2]
04/12-11:22:01.201114 00:00:00:05:00:01 -&amp;gt; 00:05:00:00:00:00 type:0x800 len:0x53
93.158.215.174:23320 -&amp;gt; 90.80.70.60:53 UDP TTL:52 TOS:0x28 ID:43018 IpLen:20 DgmLen:69
Len: 41
[Xref =&amp;gt; http://doc.emergingthreats.net/bin/view/Main/TorRules]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Event 2&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[**] [1:2016104:3] ET TROJAN DNS Reply for unallocated address space - Potentially Malicious 1.1.1.0/24 [**]
[Classification: A Network Trojan was Detected] [Priority: 1]
04/12-11:30:31.770737 00:00:00:05:00:01 -&amp;gt; 00:05:00:00:00:00 type:0x800 len:0x69
125.39.136.74:53 -&amp;gt; 30.40.50.60:56038 UDP TTL:51 TOS:0x0 ID:35728 IpLen:20 DgmLen:91
Len: 63
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and my current props.conf because I see &lt;CODE&gt;[**}&lt;/CODE&gt; at 2 places so I expanded on your suggestion.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[snort_alert_full]
SHOULD_LINEMERGE = false
LINE_BREAKER =[**]\s+[\d+:\d+:\d+]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Apr 2016 16:46:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287644#M54950</guid>
      <dc:creator>dmenon84</dc:creator>
      <dc:date>2016-04-12T16:46:23Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287645#M54951</link>
      <description>&lt;P&gt;The LINE_BREAKER from my answer works fine using your sample event from the question. I've added timestamp parsing to the answer.&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1225i69ED7DEA48AE965B/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 17:26:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287645#M54951</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-04-12T17:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287646#M54952</link>
      <description>&lt;P&gt;That LINE_BREAKER cannot work. First, it doesn't have a capturing group for the linebreaker processor to consume and second, you're not escaping the regex special chars asterisk and square bracket.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 17:28:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287646#M54952</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-04-12T17:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287647#M54953</link>
      <description>&lt;P&gt;Hi, I think your answer will definitely work but I don't think I have the props.conf in the right place basically the logs are being forwarded to splunk through universal forwarder. Under etc/deployment-apps I see a folder SplunkUFSnortconfig folder which is where the inputs.conf is configured as to which location to monitor name of index,sourcetype etc. I created props.conf in SplunkUFSnortconfig  -&amp;gt; local but that doesn't seem to do anything at all. &lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 16:46:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287647#M54953</guid>
      <dc:creator>dmenon84</dc:creator>
      <dc:date>2016-04-13T16:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Splunk line breaking a single IDS Alert event into two events?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287648#M54954</link>
      <description>&lt;P&gt;These props.conf settings need to be where the parsing phase happens, that'll be a heavy forwarder or the indexers in this case. The universal forwarder will ignore these.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 19:34:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Why-is-Splunk-line-breaking-a-single-IDS-Alert-event-into-two/m-p/287648#M54954</guid>
      <dc:creator>martin_mueller</dc:creator>
      <dc:date>2016-04-13T19:34:20Z</dc:date>
    </item>
  </channel>
</rss>

