<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need to exclude or discard specific field values which contains sensitive info from indexed events in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751972#M119403</link>
    <description>&lt;P&gt;If your events are always formed this way - the fields are in this order, there are no other fields squeezed in the middle, there is just one password per event and so on, you can use a simple SEDCMD to replace the data. Something like this:&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class=""&gt;SEDCMD-strip-pass-from-match = s/("match_element&lt;/SPAN&gt;&lt;SPAN&gt;"\s*&lt;/SPAN&gt;&lt;SPAN class=""&gt;:\s*&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ARGS:password&lt;/SPAN&gt;&lt;SPAN&gt;"\s*,\s*"&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_value&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;")&lt;/SPAN&gt;&lt;SPAN class=""&gt;[^"]+&lt;/SPAN&gt;&lt;SPAN&gt;"/\1REDACTED"/&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;But be aware of all the caveats I mentioned before - as soon as your source - for example - swaps order of reported fields, which is perfectly fine from the json point of view, it will stop working.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Aug 2025 10:14:06 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2025-08-21T10:14:06Z</dc:date>
    <item>
      <title>Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751910#M119387</link>
      <description>&lt;P&gt;I Need to exclude or discard specific field values which contains sensitive info from indexed events. Users should not see this data because this is password and needs to be masked or remove completely. But this password field will only come when there is field called&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_element&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ARGS:password&lt;/SPAN&gt;&lt;SPAN&gt;" follows with password in field name called&amp;nbsp;"&lt;SPAN class=""&gt;match_value&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;RG9jYXgtODc5MzIvKxs%253D&lt;/SPAN&gt;" in this way.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Below is the raw event -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;matches&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;[{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_element&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ARGS:password&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_value&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;RG9jYXgtODc5NzIvKys%253D&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;is_internal&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:false&lt;/SPAN&gt;&lt;SPAN&gt;}],&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;These are json values and given kv_mode=json in order to auto extract field values while indexing.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here I need to mask or remove or override match values field values (&lt;SPAN class=""&gt;RG9jYXgtODc5MzIvKxs%253D and soonnnn&lt;/SPAN&gt;). Those are the passwords given by the user and very sensitive data which can be misued.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am afraid that if I do anything wrong.. Json format will disturb which in return all logs will be disturbed. Can someone help me with the workaround of this?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 13:32:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751910#M119387</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-20T13:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751913#M119388</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273888"&gt;@Karthikeya&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use an ingest_eval to do this on the instance that parses the logs (e.g. HF or Indexer) using the following config:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# props.conf
[yourSourcetype]
# You could choose to remove or redact
#TRANSFORMS-removePasswordJson = removePasswordJson
TRANSFORMS-redactPasswordJson = redactPasswordJson

# transforms
[redactPasswordJson]
INGEST_EVAL = _raw=replace(_raw,"\"match_element\":\"ARGS:password\"[^\"]*\"match_value\":\"[^\"]*\"","\"match_element\":\"ARGS:password\",\"match_value\":\"REDACTED\"")

[removePasswordJson]
INGEST_EVAL = _raw=replace(_raw,"\"match_element\":\"ARGS:password\"[^}]*\"match_value\":\"[^\"]*\",?","")&lt;/LI-CODE&gt;&lt;P&gt;This is the equiv when ran in the search to visualise the output you should get:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="livehybrid_0-1755698617269.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/40009i1E5164B86892BE5E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="livehybrid_0-1755698617269.png" alt="livehybrid_0-1755698617269.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|windbag | head 1 | eval _raw="{\"someField\":\"someVal\",\"matches\":[{\"match_element\":\"ARGS:password\",\"match_value\":\"RG9jYXgtODc5NzIvKys%253D\",\"is_internal\":false}]}" 
```| eval _raw=replace(_raw,"\"match_element\":\"ARGS:password\"[^\"]*\"match_value\":\"[^\"]*\",?","")```
| eval _raw=replace(_raw,"\"match_element\":\"ARGS:password\"[^\"]*\"match_value\":\"[^\"]*\"","\"match_element\":\"ARGS:password\",\"match_value\":\"REDACTED\"")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 14:06:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751913#M119388</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-08-20T14:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751918#M119389</link>
      <description>&lt;P&gt;Already using one ingest eval to this sourcetype to route logs to specific indexes. Can we use one more ingest eval here? Will it override that or independent?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 14:57:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751918#M119389</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-20T14:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751920#M119390</link>
      <description>&lt;P&gt;Unfortunately, you're trying to fiddle with structured data which means that strictly text-based tools might work if the data will be formatted in a constant way, which it doesn't have to, but might fail if - for example - fields order varies.&lt;/P&gt;&lt;P&gt;The best solution here would be to use an external tool before ingesting the data into Splunk which can handle your jsons understanding their structure.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 15:04:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751920#M119390</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-20T15:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751921#M119391</link>
      <description>&lt;P&gt;You can have multiple transforms containing INGEST_EVAL for the same sourcetype.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 15:07:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751921#M119391</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-20T15:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751939#M119392</link>
      <description>&lt;P&gt;Yes&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/273888"&gt;@Karthikeya&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;you can use multiple INGEST_EVAL.&lt;/P&gt;&lt;P&gt;As this is JSON ive written an alternative INGEST_EVAL for this which relies less on replacing parts of the raw json string and uses the JSON functions instead, let me know if this helps!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="livehybrid_0-1755725268483.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/40015i5E93D8535FA819B7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="livehybrid_0-1755725268483.png" alt="livehybrid_0-1755725268483.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In the screenshot you can see the raw data added (bottom right) the props/transforms (top right) and output (left).&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# props.conf
[yourSourceType]
TRANSFORMS-redactJSONPassword = redactJSONPassword

# transforms.conf
[redactJSONPassword]
INGEST_EVAL = _raw=json_set(_raw,"matches.{".mvfind(json_array_to_mv(json_extract(_raw, "matches")),"ARGS:password")."}.match_value","REDACTED")&lt;/LI-CODE&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 21:29:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751939#M119392</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-08-20T21:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751956#M119394</link>
      <description>&lt;P&gt;1. It pains me when I think of performance. But that's not the most important issue.&lt;/P&gt;&lt;P&gt;2. Obviously, the original post contained only partial event. Are you sure you eval modifies _all_ occurrences? And only those? Not challenging your solution, just pointing out that structured data is difficult to handle.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 07:11:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751956#M119394</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-21T07:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751957#M119395</link>
      <description>&lt;P&gt;What performance issues can I get? Please let me know&lt;BR /&gt;The logs which contain match element field value as&amp;nbsp;&lt;SPAN&gt;"ARGS:password", then match value will be password everytime and that should be masked or removed. For rest match element field values, no need to mask anything.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 07:25:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751957#M119395</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-21T07:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751958#M119396</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/170906"&gt;@livehybrid&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp; what will be the best way to do it? Remove or Mask? User is fine with both. but what will be the best approach? and please help me with final props and transforms? I can see two above and confused.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 07:26:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751958#M119396</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-21T07:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751959#M119397</link>
      <description>&lt;P&gt;This data is just key value pairs coming from source end. I have given kv_mode=Json which is converting them to Json readable format.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 07:30:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751959#M119397</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-21T07:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751961#M119398</link>
      <description>&lt;P&gt;and what if one event has multiple match element values (&lt;SPAN&gt;"ARGS:password"&lt;/SPAN&gt;) then it should mask all the corresponding passwords as well. Need to write logic in such a way.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 07:31:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751961#M119398</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-21T07:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751963#M119399</link>
      <description>&lt;P&gt;"Remove" what? Just the value?&amp;nbsp; It's no different than masking it. Remove the whole event? It's the easiest way. This you actually can do relatively simply with regex-based matching.&lt;/P&gt;&lt;P&gt;About the performance remark earlier - well, parsing structured data and subsequently manipulating it are relatively heavy operations. So if you have just a few events every now and then, it should be no problem but if you're gonna have a lot of those, I'd still advise for an external tool.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 08:00:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751963#M119399</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-21T08:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751964#M119400</link>
      <description>&lt;P&gt;remove the match value field (which contains passwrod values) completely not complete events -&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is raw data of it&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;matches&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;[{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_element&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ARGS:password&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_value&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;SmFUYWlfZUJhZTc%253D&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;is_internal&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:false&lt;/SPAN&gt;&lt;SPAN&gt;}]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So is it better to do this -&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;matches&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;[{"&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_element&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ARGS:password&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_value&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;"MASKED&lt;/SPAN&gt;&lt;SPAN&gt;","&lt;/SPAN&gt;&lt;SPAN class=""&gt;is_internal&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:false&lt;/SPAN&gt;&lt;SPAN&gt;}]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;or this -&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;SPAN class=""&gt;matches&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;[{"&lt;SPAN class=""&gt;match_element&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:&lt;/SPAN&gt;"&lt;SPAN class=""&gt;ARGS:password&lt;/SPAN&gt;","&lt;SPAN class=""&gt;is_internal&lt;/SPAN&gt;"&lt;SPAN class=""&gt;:false&lt;/SPAN&gt;}]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;At the end this operation shouldn't impact JSON format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 08:10:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751964#M119400</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-21T08:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751966#M119401</link>
      <description>&lt;P&gt;OK. So your event as a whole is actually _not_ a well-formed json.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 09:26:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751966#M119401</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-21T09:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751967#M119402</link>
      <description>&lt;P&gt;yes initially they are key value pairs and we are changing it in Splunk to JSON format. Please help me with the logic accordingly to mask password values.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 09:33:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751967#M119402</guid>
      <dc:creator>Karthikeya</dc:creator>
      <dc:date>2025-08-21T09:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751972#M119403</link>
      <description>&lt;P&gt;If your events are always formed this way - the fields are in this order, there are no other fields squeezed in the middle, there is just one password per event and so on, you can use a simple SEDCMD to replace the data. Something like this:&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class=""&gt;SEDCMD-strip-pass-from-match = s/("match_element&lt;/SPAN&gt;&lt;SPAN&gt;"\s*&lt;/SPAN&gt;&lt;SPAN class=""&gt;:\s*&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;ARGS:password&lt;/SPAN&gt;&lt;SPAN&gt;"\s*,\s*"&lt;/SPAN&gt;&lt;SPAN class=""&gt;match_value&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt;&lt;SPAN&gt;")&lt;/SPAN&gt;&lt;SPAN class=""&gt;[^"]+&lt;/SPAN&gt;&lt;SPAN&gt;"/\1REDACTED"/&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;But be aware of all the caveats I mentioned before - as soon as your source - for example - swaps order of reported fields, which is perfectly fine from the json point of view, it will stop working.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 10:14:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/751972#M119403</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-08-21T10:14:06Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/752058#M119429</link>
      <description>Why you are transforming KV event into JSON?&lt;BR /&gt;The KV events are much easier and faster handle in Splunk.</description>
      <pubDate>Fri, 22 Aug 2025 13:00:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/752058#M119429</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2025-08-22T13:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: Need to exclude or discard specific field values which contains sensitive info from indexed events</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/752114#M119439</link>
      <description>&lt;P&gt;I would like to say that its always better to fix the problem at the source and try to mask those details which ever is not needed. If you are not able to then you should have a regex in place and try to check that these raw events match those regex and then try to mask it.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;One more way is to have a program running, where you can have the raw events having matching the regex and convert them into a different one this way it will definitely help you. I am sure by now you would have got the answers from the team of experts but however it all depends on your organizations and how well you can perform it.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Below is a link which will help you for the masking of events.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://help.splunk.com/en/splunk-enterprise/get-started/get-data-in/9.4/configure-event-processing/anonymize-data" target="_blank"&gt;https://help.splunk.com/en/splunk-enterprise/get-started/get-data-in/9.4/configure-event-processing/anonymize-data&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 12:03:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Need-to-exclude-or-discard-specific-field-values-which-contains/m-p/752114#M119439</guid>
      <dc:creator>sramamurthy2</dc:creator>
      <dc:date>2025-08-25T12:03:57Z</dc:date>
    </item>
  </channel>
</rss>

