<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk HEC Obfuscate data in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464047#M99544</link>
    <description>&lt;P&gt;did you restart the server ? also this configuration will apply to the newer events only and not on the historical events.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Aug 2019 21:13:43 GMT</pubDate>
    <dc:creator>mayurr98</dc:creator>
    <dc:date>2019-08-26T21:13:43Z</dc:date>
    <item>
      <title>Splunk HEC Obfuscate data</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464042#M99539</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;

&lt;P&gt;I need your help to resolve a question. Is it possible to obfuscate / mask data that is sent via HEC?&lt;/P&gt;

&lt;P&gt;Please can you give me an example.&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 19:37:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464042#M99539</guid>
      <dc:creator>lufermalgo</dc:creator>
      <dc:date>2019-08-26T19:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk HEC Obfuscate data</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464043#M99540</link>
      <description>&lt;P&gt;did you try this :&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/Anonymizedata#Define_the_sed_script_in_props.conf"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/Anonymizedata#Define_the_sed_script_in_props.conf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 19:45:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464043#M99540</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2019-08-26T19:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk HEC Obfuscate data</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464044#M99541</link>
      <description>&lt;P&gt;The HEC operates in any other way that other indexes do. There are 2 possible solutions&lt;BR /&gt;
1) And I like this more - obfuscate your data in the source application, you might be using java/python/.net ALL of them have data masking functions&lt;BR /&gt;
2) The HEC index and source/sourcetypes are just like any other data source, you can go to the .conf files , use the HEC .When you send the data and if you configure something like this&lt;BR /&gt;
{&lt;BR /&gt;
    "time": 1426279439, // epoch time&lt;BR /&gt;
    "host": "localhost",&lt;BR /&gt;
    "source": "datasource",&lt;BR /&gt;
    "sourcetype": "txt",&lt;BR /&gt;
    "index": "main",&lt;BR /&gt;
    "event": { "Hello world!" }&lt;BR /&gt;
}&lt;BR /&gt;
You can then just anonymize  data in the normal way, i assume you have  custom host for your HEC source?&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/Anonymizedata"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.1/Data/Anonymizedata&lt;/A&gt; &lt;BR /&gt;
you can anonymize data based onhost,source or sourcetype&lt;BR /&gt;
BUT&lt;BR /&gt;
I would recommend option#1 , just apply a SEDCMD or sha256 function in whatever source code  language your HEC event source is written in. You ask why?&lt;BR /&gt;
Well,then the data remains safe in transit over the internet, assuming some one hacks into the message transfer protocol over internet all he/she would get is an encrypted string...&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 19:58:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464044#M99541</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2019-08-26T19:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk HEC Obfuscate data</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464045#M99542</link>
      <description>&lt;P&gt;Hi @mayurr98 &lt;/P&gt;

&lt;P&gt;Thank you very much for your answer.&lt;BR /&gt;
Follow the instructions but it didn't work, this is my configuration:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[httpevent]
LINE_BREAKER = ([\r\n]+)
NO_BINARY_CHECK = true
SEDCMD-Anon = s/(\d+)\.(\d+)\.(\d+)\.(\d+)/\1.\2.xxx.xxx/g
category = Custom
disabled = false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This is HEC test:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;curl -k "http://172.23.254.84:8088/services/collector/raw?sourcetype=httpevent&amp;amp;index=main" \
    -H "Authorization: Splunk cb985d67-c858-4951-a9d0-aed4bf614eda" \
        -d '127.0.0.1 - admin [26/Aug/2019:09:05:26.875 -0700] "GET /servicesNS/admin/launcher/data/ui/views?count=-1 HTTP/1.0" 200 126721 - - - 6ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.917 -0700] "GET /servicesNS/admin/launcher/data/ui/nav/default HTTP/1.0" 200 4367 - - - 6ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.941 -0700] "GET /services/apps/local?search=disabled%3Dfalse&amp;amp;count=-1 HTTP/1.0" 200 31930 - - - 4ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.954 -0700] "GET /services/apps/local?search=disabled%3Dfalse&amp;amp;count=-1 HTTP/1.0" 200 31930 - - - 3ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.968 -0700] "GET /servicesNS/admin/launcher/data/ui/views?digest=1&amp;amp;count=-1 HTTP/1.0" 200 58672 - - - 5ms'
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What I am trying to do is hide the ip of the event, something like this: 127.0.xxx.xxx&lt;/P&gt;

&lt;P&gt;My test environment is as follows:&lt;/P&gt;

&lt;P&gt;&lt;IMG src="https://www.draw.io/?title=Diagrama%20de%20clase#R7VZNc5swEP01HJPBwjj2scZO3U7i6dTtJD3KaA1qBGKECDi%2FvhIsxoQZ52P64UN98Ggfy2r13u4ixwuS6qOiWXwrGQiHuKxyvIVDyHQyNf8W2DfAeDpugEhx1kBuB2z4EzTgqEULziBHrIG0lELzrA%2BGMk0h1D2MKiXLvttOCtYDMhpBLw0LbEIqYOB2x5mO8VjkqsNXwKO43Xk0mTVPEto6Y%2BA8pkyWR5C3dLxASambVVIFICx3LS%2FhOlunyed0tr29I3QdVZtv3kUT7PotrxyOoCDVvzf0pAn9SEWBfM1mM6Qm1%2FuWRGCGUzSl0rGMZErFskPnShYpA7uVa6zO50bKzIAjA%2F4ErfdYILTQ0kCxTgQ%2BhYrr%2B6P1Dxvq0kdrUWHk2tij0eRpk3um9QtEoV8uCxXCCT%2BC9UpVBKfieYdqMF0EMgGt9uY9BYJq%2FthPjmI9Rwe%2FTjOzQNneICEZSLgC%2Bmj3v5aqpIqBcshEmPznW7uK7KrkprgH6GoZDKTvC1vGXMMmozVtpRkYfRExFVAaqndIMqQQo5Ap9iAOIeKiXXYtPWr7ND5q54n7h1j3BqxvMlGkDwb7ZPiqLOnnyKRPzo1J%2F%2F%2B0afzGr5w25F9Om6tB3cdaZwMJTdXqPuMKcv5Et7WDZTOTPNV1dv7c8RcGoYJHqQFCQ6dpH29uq5%2BbL%2FkHfJBwxmr5Bd2CmNPwIaoLIZBCqnpfb1f%2FTvUP3jMwk%2BNrwwsy%2Bif76sK9HE09nAqvlgLDfbFcHLnI3S43JfBcq8Ou75dvPJAvENyee%2FAtCL9%2FvTnPETb%2BexPMmN39rtGguyR7y18%3D" alt="alt text" /&gt;&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 20:52:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464045#M99542</guid>
      <dc:creator>lufermalgo</dc:creator>
      <dc:date>2019-08-26T20:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk HEC Obfuscate data</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464046#M99543</link>
      <description>&lt;P&gt;Hi @Sukisen1981 &lt;/P&gt;

&lt;P&gt;Thank you very much for your answer.&lt;BR /&gt;
Follow the instructions but it didn't work, this is my configuration:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[httpevent]
LINE_BREAKER = ([\r\n]+)
NO_BINARY_CHECK = true
SEDCMD-Anon = s/(\d+)\.(\d+)\.(\d+)\.(\d+)/\1.\2.xxx.xxx/g
category = Custom
disabled = false
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This is HEC test:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;curl -k "http://172.23.254.84:8088/services/collector/raw?sourcetype=httpevent&amp;amp;index=main" \
    -H "Authorization: Splunk cb985d67-c858-4951-a9d0-aed4bf614eda" \
        -d '127.0.0.1 - admin [26/Aug/2019:09:05:26.875 -0700] "GET /servicesNS/admin/launcher/data/ui/views?count=-1 HTTP/1.0" 200 126721 - - - 6ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.917 -0700] "GET /servicesNS/admin/launcher/data/ui/nav/default HTTP/1.0" 200 4367 - - - 6ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.941 -0700] "GET /services/apps/local?search=disabled%3Dfalse&amp;amp;count=-1 HTTP/1.0" 200 31930 - - - 4ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.954 -0700] "GET /services/apps/local?search=disabled%3Dfalse&amp;amp;count=-1 HTTP/1.0" 200 31930 - - - 3ms
        127.0.0.1 - admin [26/Aug/2019:09:05:26.968 -0700] "GET /servicesNS/admin/launcher/data/ui/views?digest=1&amp;amp;count=-1 HTTP/1.0" 200 58672 - - - 5ms'
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What I am trying to do is hide the ip of the event, something like this: 127.0.xxx.xxx&lt;/P&gt;

&lt;P&gt;My test environment is as follows:&lt;/P&gt;

&lt;P&gt;![alt text][1]&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 20:53:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464046#M99543</guid>
      <dc:creator>lufermalgo</dc:creator>
      <dc:date>2019-08-26T20:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk HEC Obfuscate data</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464047#M99544</link>
      <description>&lt;P&gt;did you restart the server ? also this configuration will apply to the newer events only and not on the historical events.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 21:13:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-HEC-Obfuscate-data/m-p/464047#M99544</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2019-08-26T21:13:43Z</dc:date>
    </item>
  </channel>
</rss>

