Analyse Snort Output via PRTG
Modified on 2025-06-10 12:46:55 +0200
Attention: This article is a record of a conversation with the Paessler support team. The information in this conversation is not updated to preserve the historical record. As a result, some of the information or recommendations in this conversation might be out of date.
Important: We no longer maintain this article. The information might be out of date.
We are currently running snort as IDS/IPS on some of our firewalls. Is there a "comfortable" way of analysing snort's output-messages (Unified2-format) to have a nice looking integration withinin PRTG?
I tried using the syslog-messages, but by using them we only get a table of those messages and not an analysis of what is really going on.
Any suggestions?
Article Comments
Dear marcolips
We have no instructions for integration with third-party applications. You might want to check out the PRTG API to see what options you have to operate PRTG through a script.
May, 2017 - Permalink
Hi Marcolips,
Did you manage to get anywhere with Snort and PRTG - I too really like the idea of a single point of reference for network health...
Jun, 2018 - Permalink
Disclaimer:
The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.
Dear marcolips
We have no instructions for integration with third-party applications. You might want to check out the PRTG API to see what options you have to operate PRTG through a script.
May, 2017 - Permalink