<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do you redact data that's already indexed? in Splunk Dev</title>
    <link>https://community.splunk.com/t5/Splunk-Dev/How-do-you-redact-data-that-s-already-indexed/m-p/420893#M7380</link>
    <description>&lt;P&gt;We currently index logs into index=indexY at a rate of 2G – 5G a day with the retention set to 12 months.&lt;/P&gt;

&lt;P&gt;One day last week, a code update started logging the user and password into the log in the form of ‘password=changeme’.  Our Splunk environment is certified non-pci/non-private data and needs to remain so.  We need to retain the event data due to security best practices, it is the event for access to a critical services, however the field needs to be redacted.  &lt;/P&gt;

&lt;P&gt;What are the best options for retaining the data while scrubbing the field? For instance 'password=change' should be redacted to 'password=SCRUBBED' or removed entirely.  Please consider that that data at rest cannot contain confidential data, so masking it at the Search Head is not a viable solution.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Jan 2019 14:07:42 GMT</pubDate>
    <dc:creator>lostbeatnik01</dc:creator>
    <dc:date>2019-01-22T14:07:42Z</dc:date>
    <item>
      <title>How do you redact data that's already indexed?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-do-you-redact-data-that-s-already-indexed/m-p/420893#M7380</link>
      <description>&lt;P&gt;We currently index logs into index=indexY at a rate of 2G – 5G a day with the retention set to 12 months.&lt;/P&gt;

&lt;P&gt;One day last week, a code update started logging the user and password into the log in the form of ‘password=changeme’.  Our Splunk environment is certified non-pci/non-private data and needs to remain so.  We need to retain the event data due to security best practices, it is the event for access to a critical services, however the field needs to be redacted.  &lt;/P&gt;

&lt;P&gt;What are the best options for retaining the data while scrubbing the field? For instance 'password=change' should be redacted to 'password=SCRUBBED' or removed entirely.  Please consider that that data at rest cannot contain confidential data, so masking it at the Search Head is not a viable solution.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 14:07:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-do-you-redact-data-that-s-already-indexed/m-p/420893#M7380</guid>
      <dc:creator>lostbeatnik01</dc:creator>
      <dc:date>2019-01-22T14:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: How do you redact data that's already indexed?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-do-you-redact-data-that-s-already-indexed/m-p/420894#M7381</link>
      <description>&lt;P&gt;HI&lt;/P&gt;

&lt;P&gt;there is a new function called ingest_eval. This lets you mask data at index time. I think its included since 7.2&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.3/Data/IngestEval"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.3/Data/IngestEval&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 17:30:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-do-you-redact-data-that-s-already-indexed/m-p/420894#M7381</guid>
      <dc:creator>dkeck</dc:creator>
      <dc:date>2019-01-22T17:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: How do you redact data that's already indexed?</title>
      <link>https://community.splunk.com/t5/Splunk-Dev/How-do-you-redact-data-that-s-already-indexed/m-p/420895#M7382</link>
      <description>&lt;P&gt;Hi @lostbeatnik01,&lt;/P&gt;

&lt;P&gt;You can't alter indexed data so only option is to remove those data, you can use &lt;CODE&gt;| delete&lt;/CODE&gt; command which hides data from searching but it will not remove data from server and to use this command you need &lt;CODE&gt;can_delete&lt;/CODE&gt; capability in role, even admin role does not have this capability by default.&lt;/P&gt;

&lt;P&gt;To anonymize any new data you can use &lt;CODE&gt;SEDCMD-&lt;/CODE&gt; or combination of props and transforms, have a look at document &lt;A href="https://docs.splunk.com/Documentation/Splunk/7.2.3/Data/Anonymizedata"&gt;https://docs.splunk.com/Documentation/Splunk/7.2.3/Data/Anonymizedata&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 10:18:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Dev/How-do-you-redact-data-that-s-already-indexed/m-p/420895#M7382</guid>
      <dc:creator>harsmarvania57</dc:creator>
      <dc:date>2019-01-23T10:18:13Z</dc:date>
    </item>
  </channel>
</rss>

