-
Notifications
You must be signed in to change notification settings - Fork 111
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
parser for log source Sucuri #2460
Comments
hi @narsree1 the log format provided in the attached documentation doesn't seem to be right and they provided only one example. Can you fetch more examples to a pcap file? |
It seems that we haven't any activity during last 2 weeks. |
@narsree1 I haven't got your pcap on email, are you sent it? |
**What is the sc4s version? 3.23.0
**Is there a pcap available? If so, would you prefer to attach it to this issue or send it to Splunk support? No
**What the vendor name? Sucuri
**What's the product name? WAF
**If you're requesting support for a new vendor, do you have any preferences regarding the default index and sourcetype for their events? index:Sucuri , Sourcetype: sucuri:alert
**Do you have syslog documentation or a manual for that device??https://docs.sucuri.net/website-firewall/configuration/integrating-with-splunk/
**Feature Request description: create a parser to parse events for Sucuri
**Do you want to have it for local usage or prepare a github PR? local usage
The text was updated successfully, but these errors were encountered: