The rule header contains the information that defines the who, where, and what of a packet, as well as what to do in the event that a packet with all the attributes indicated in the rule should show up. The first item in a rule is the rule action. The rule action tells Snort what to do when it finds a packet that matches the rule criteria. There are 5 available default actions in Snort, alert, log, pass, activate, and dynamic. In addition, if you are running Snort in inline mode, you have additional options which include drop, reject, and sdrop.
You can also define your own rule types and associate one or more output plugins with them. You can then use the rule types as actions in Snort rules.
This example will create a type that will log to just tcpdump:
ruletype suspicious { type log output log_tcpdump: suspicious.log }
This example will create a rule type that will log to syslog and tcpdump: database:
ruletype redalert { type alert output alert_syslog: LOG_AUTH LOG_ALERT output log_tcpdump: suspicious.log }