<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: obfuscate data from Splunk _internal index in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709778#M21432</link>
    <description>I totally agree what &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt; said. This is technically doable, but there isn’t any sense to do it. I know that there are some sites who want that internal logs are seen also e.g. power user, but I don’t say that this is the perfect solution as it also generates some other concerns!</description>
    <pubDate>Sun, 26 Jan 2025 00:07:43 GMT</pubDate>
    <dc:creator>isoutamo</dc:creator>
    <dc:date>2025-01-26T00:07:43Z</dc:date>
    <item>
      <title>obfuscate data from Splunk _internal index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709772#M21429</link>
      <description>&lt;P&gt;I'm wondering, is it possible to mask / anonymize data at index time for the _internal index.&amp;nbsp; I have an Alert Action configured with a webhook, and I'm looking to mask the URI of the request in internal logs.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm able to mask the value at search time with this SPL.&lt;/P&gt;&lt;P class=""&gt;index=_internal action=webhook | rex field=url mode=sed "s/https?:\/\/&lt;A href="http://www.domin.com\" target="_blank" rel="noopener"&gt;www.domin.com\&lt;/A&gt;/(.*)/https:\/\/&lt;A href="http://www.domain.com\" target="_blank" rel="noopener"&gt;www.domain.com\&lt;/A&gt;/XXXX-XXXX-XXXX/g" | table url&lt;/P&gt;&lt;P class=""&gt;I tried to port this configuration to /opt/splunk/etc/system/local/ by creating a props.conf with the following.&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;[sourcetype::_internal]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SEDCMD-url = s/https?:\/\/&lt;A href="http://www.domain.com\" target="_blank" rel="noopener"&gt;www.domain.com\&lt;/A&gt;/(.*)/https:\/\/&lt;A href="http://www.domain.com\" target="_blank" rel="noopener"&gt;www.domain.com\&lt;/A&gt;/XXXX-XXXX-XXXX/g&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;AND&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;[splunkd]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SEDCMD-url = s/https?:\/\/&lt;A href="http://www.domain.com\" target="_blank" rel="noopener"&gt;www.domain.com\&lt;/A&gt;/(.*)/https:\/\/&lt;A href="http://www.domain.com\" target="_blank" rel="noopener"&gt;www.domain.com\&lt;/A&gt;/XXXX-XXXX-XXXX/g&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Doesn't work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;This is a standalone instance of Splunk running on a ec2 instance.&amp;nbsp; So my question is, is it even possible to filter splunk generated logs?&amp;nbsp; Should I funnel these to transforms.conf and do it there?&amp;nbsp; Is that possible?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;Any help or insight would be greatly appreciated&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 18:05:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709772#M21429</guid>
      <dc:creator>ctripod1</dc:creator>
      <dc:date>2025-01-25T18:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: obfuscate data from Splunk _internal index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709773#M21430</link>
      <description>&lt;P&gt;I have never try this, but basically it should work all other internal logs except _audit.&amp;nbsp;&lt;BR /&gt;Try to use [splunkd] as a sourcetype or [source::…/var/log/splunk/splunkd*] based on which event you try to mask. You should remember that source definitions override sourcetype definitions.&lt;/P&gt;&lt;P&gt;BUT if you do this and you have any issues with splunk this probably gives a reason for splunk to denying full support to you before you remove that configuration.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 18:36:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709773#M21430</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2025-01-25T18:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: obfuscate data from Splunk _internal index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709776#M21431</link>
      <description>&lt;P&gt;While I do understand that compliance people (I suppose that's where the idea ultimately comes from) sometimes have their reasons, sometimes they are a bit overzealous.&lt;/P&gt;&lt;P&gt;Remember that _internal is - as the name says - Splunk's internal index. There should be only things relevant to Splunk's inner workings there. This index is not meant for non-admins access. So there should not be data there which is not obtainable by the admins anyway.&lt;/P&gt;&lt;P&gt;So while technically, you should be able to mask some data out of your events, it might make troubleshooting more difficult (also supportability point raised by &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt; is a very good one). You must also remember that parsing (and all associated activities like SEDCMD) are done on first heavy component in event's path so you'd need to place the props/transforms on the search-head(s) which is(are) generating those alerts. And this is a very unintuitive place to look for such settings in case someone inherits your environment in the future.&lt;/P&gt;&lt;P&gt;So while it is technically possible, I'd be hard pressed to call this a good idea.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 21:34:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709776#M21431</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-01-25T21:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: obfuscate data from Splunk _internal index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709778#M21432</link>
      <description>I totally agree what &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt; said. This is technically doable, but there isn’t any sense to do it. I know that there are some sites who want that internal logs are seen also e.g. power user, but I don’t say that this is the perfect solution as it also generates some other concerns!</description>
      <pubDate>Sun, 26 Jan 2025 00:07:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709778#M21432</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2025-01-26T00:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: obfuscate data from Splunk _internal index</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709847#M21446</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt;&amp;nbsp;This worked perfectly!&amp;nbsp; Thank you for your input.&amp;nbsp; Seems the `source` monitor stanza was the way to go.&amp;nbsp; Here is my final configuration for future Splunkers that want to accomplish the same.&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;[source::.../var/log/splunk/splunkd*]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;SEDCMD-url = s/https?:\/\/&lt;A href="http://www.domain.com\" target="_blank" rel="noopener"&gt;www.domain.com\&lt;/A&gt;/(.*)/https:\/\/&lt;A href="http://www.domain.com\" target="_blank" rel="noopener"&gt;www.domain.com\&lt;/A&gt;/XXXX-XXXX-XXXX/g&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 16:24:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/obfuscate-data-from-Splunk-internal-index/m-p/709847#M21446</guid>
      <dc:creator>ctripod1</dc:creator>
      <dc:date>2025-01-27T16:24:46Z</dc:date>
    </item>
  </channel>
</rss>

