<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to mask the indexed data in Splunk cloud? in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-mask-the-indexed-data-in-Splunk-cloud/m-p/644834#M109744</link>
    <description>&lt;P&gt;From the security point of view - probably the only acceptable solution would be to drop the index altogether and re-ingest the data from scratch - this time properly with sensitive data masked/removed. That of course costs your license usage.&lt;/P&gt;&lt;P&gt;You could try to fiddle with masking and collecting to another index but again - collect with a sourcetype other than stash incurs license usage.&lt;/P&gt;&lt;P&gt;As &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt; already pointed out, the delete command marks the events as unsearchable but they are still contained within the buckets so they might be readable by examining raw buckets content which is probably not OK by your compliance dept.&lt;/P&gt;&lt;P&gt;Any form of search-time manipulation within splunk itself is indeed bypassable relatively easy and it can be seen only as a way to hide some event parts for making work with some parts of data more convenient but not as a security control (at least not an effective one).&lt;/P&gt;</description>
    <pubDate>Sun, 28 May 2023 09:56:35 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2023-05-28T09:56:35Z</dc:date>
    <item>
      <title>How to mask the indexed data in Splunk cloud?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-mask-the-indexed-data-in-Splunk-cloud/m-p/644175#M109684</link>
      <description>&lt;P&gt;There are few events already indexed the sensitive info in Splunk SaaS cloud. how to mask those sensitive data in the events. or events delete option to restrict user not to view those events. Please advise.&lt;/P&gt;
&lt;P&gt;Splunk SaaS cloud.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Example event:&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;@timestamp&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;2023-05-14T15:32:07.449Z&lt;/SPAN&gt;&lt;SPAN&gt;", "&lt;/SPAN&gt;&lt;SPAN class=""&gt;log.level&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; "Msg&lt;/SPAN&gt;&lt;SPAN&gt;", "&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.message&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;system&lt;/SPAN&gt; &lt;SPAN class=""&gt;Authenticate&lt;/SPAN&gt; &lt;SPAN class=""&gt;customer&lt;/SPAN&gt; &lt;SPAN class=""&gt;:dda9c1ad-2df1-ehetiokhnergiwre453644836-sgnreg346893&lt;/SPAN&gt;&amp;nbsp;&lt;STRONG&gt;&lt;SPAN class=""&gt;PAN1&lt;/SPAN&gt;&amp;nbsp;123456789&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN class=""&gt;request&lt;/SPAN&gt; &lt;SPAN class=""&gt;AuthVerificationRequest&lt;/SPAN&gt;&lt;SPAN&gt;(&lt;/SPAN&gt;&lt;SPAN class=""&gt;authRequest=null&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;accountNumber=null&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;STRONG&gt;pan&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;=123456789&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;pin=0987654321pcw/5&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;txnsubtypcde=Full_pan_Lookup&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;)" , "&lt;/SPAN&gt;&lt;SPAN class=""&gt;ecs.version&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt; "&lt;/SPAN&gt;&lt;SPAN class=""&gt;1.2.0&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;process.thread.name&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;http-nio-8080-exec-150&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;log.logger&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;com&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.appId&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;IVR-BEE&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.appVersion&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;1&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.channelId&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;ACIVR&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.correlationId&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ujb6678879-2df1-4a32-83e5-4198dbcfe913&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.flow-id&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;AUTH-PIN&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.interactionId&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;5646540-8a2c-4893kr-58434&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.tenantId&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"lll&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;labels.url&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;/digital-auth/engineering/authenticateuser/v1/auth&lt;/SPAN&gt;&lt;SPAN&gt;"}&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 May 2023 04:37:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-mask-the-indexed-data-in-Splunk-cloud/m-p/644175#M109684</guid>
      <dc:creator>sathiyasun</dc:creator>
      <dc:date>2023-05-23T04:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask the indexed data in Splunk cloud?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-mask-the-indexed-data-in-Splunk-cloud/m-p/644816#M109739</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;if the event is written on bucket then users could always see it somehow if they have access to this index. At least I didn't know any way how to avoid this. There are some ways to do this little bit harder but now way to make it impossible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So your only ways to disable users see it is restrict access to this index or "delete" those from index.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For deleting it you need can_delete capability added to your account. I propose that you add it just temporary and remove it as soon as you have deleted those from index. BUT remember that even delete command cannot remove events from bucket/disk, it just mark those so that searches didn't shows those.&lt;/P&gt;&lt;P&gt;How to delete? Just create search which found only those event which has sensitive content and when you are happy with it then pipe it to delete command like&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your indexes&amp;gt; &amp;lt;your search which founds only those events which you want to remove&amp;gt;
| delete&lt;/LI-CODE&gt;&lt;P&gt;r. Ismo&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 13:58:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-mask-the-indexed-data-in-Splunk-cloud/m-p/644816#M109739</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2023-05-27T13:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask the indexed data in Splunk cloud?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-mask-the-indexed-data-in-Splunk-cloud/m-p/644834#M109744</link>
      <description>&lt;P&gt;From the security point of view - probably the only acceptable solution would be to drop the index altogether and re-ingest the data from scratch - this time properly with sensitive data masked/removed. That of course costs your license usage.&lt;/P&gt;&lt;P&gt;You could try to fiddle with masking and collecting to another index but again - collect with a sourcetype other than stash incurs license usage.&lt;/P&gt;&lt;P&gt;As &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/214410"&gt;@isoutamo&lt;/a&gt; already pointed out, the delete command marks the events as unsearchable but they are still contained within the buckets so they might be readable by examining raw buckets content which is probably not OK by your compliance dept.&lt;/P&gt;&lt;P&gt;Any form of search-time manipulation within splunk itself is indeed bypassable relatively easy and it can be seen only as a way to hide some event parts for making work with some parts of data more convenient but not as a security control (at least not an effective one).&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 09:56:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-mask-the-indexed-data-in-Splunk-cloud/m-p/644834#M109744</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-05-28T09:56:35Z</dc:date>
    </item>
  </channel>
</rss>

