All Apps and Add-ons

Snort App -- 'Snort event search' doesn't search all data

tammi8
New Member

When I click on 'Search', for example the last 15 mins, I see all alerts but 'Snort event search' only allows me to search for a subset of the data. For example I have test rule triggering on ICMP traffic. I have the traffic I am generating by ping command as well as network traffic being generated by running applications. I see all the alerts being created in my Barnyard logs and in Splunk when I use 'Search' but when I click on 'Snort event search', I am only able to see the traffic being generated by the running applications. None of the ping traffic I am generated is searchable in that window.

Am I missing something or is this broken?

Any help appreciated.

Tags (2)
0 Karma
1 Solution

Ayn
Legend

This is an issue in the app that I've been meaning to address. The search form takes user input, among other things source port and destination port. Default value for these is "*". So if a user simply just uses default values, the search that is created contains among other things src_port=* and dest_port=*, respectively. Splunk interprets this (correctly) as that the src_port and dest_port fields can have any value, as long as they exist in the event. This has the implication that events that do not have source ports and destination ports (such as events related to ICMP data) will not match.

So no, you're not missing something and yes, it is broken. There are ways of addressing this issue, I just frankly forgot to do it. Thanks for the reminder. I'll post an updated version of the app shortly.

View solution in original post

0 Karma

Ayn
Legend

This is an issue in the app that I've been meaning to address. The search form takes user input, among other things source port and destination port. Default value for these is "*". So if a user simply just uses default values, the search that is created contains among other things src_port=* and dest_port=*, respectively. Splunk interprets this (correctly) as that the src_port and dest_port fields can have any value, as long as they exist in the event. This has the implication that events that do not have source ports and destination ports (such as events related to ICMP data) will not match.

So no, you're not missing something and yes, it is broken. There are ways of addressing this issue, I just frankly forgot to do it. Thanks for the reminder. I'll post an updated version of the app shortly.

0 Karma

tammi8
New Member

Awesome. Thanks for the quick and detailed response.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...