<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk-reskit-powershell Query Masking Data in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439835#M171522</link>
    <description>&lt;P&gt;I've found that the results returned from my query will hide the word being searched on regardless of if it says 'password' or not. When I use the -expandproperty option on the raw field it totally removes the word being searched for from the result set. If I don't use the -expandproperty option then it replaces my search string with a ',' comma.&lt;BR /&gt;
Since this problem seems to be bigger than my initial question that I posed,  I'm going to close this question and get the latest version of the kit from GitHub.  I hope that resolves this issue.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
M&lt;/P&gt;</description>
    <pubDate>Tue, 07 May 2019 11:22:08 GMT</pubDate>
    <dc:creator>MrMalice</dc:creator>
    <dc:date>2019-05-07T11:22:08Z</dc:date>
    <item>
      <title>Splunk-reskit-powershell Query Masking Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439833#M171520</link>
      <description>&lt;P&gt;I am trying to identify if events have password info in the returned events. I can run a query using the Search app and it returns the data that I am looking for. I visually examine the_raw output listing for the word 'password'.  When I execute the same query using splunk-reskit-powershell the data is returned, however, the word 'password' is replaced with a ',' comma in the _raw data listing.&lt;/P&gt;

&lt;P&gt;The syntax of my query is in the form of : index= sourcetype= 'password'&lt;BR /&gt;&lt;BR /&gt;
I use preset times when using the gui and startime and endtime when using powershell.&lt;/P&gt;

&lt;P&gt;Is there a way to prevent the data from being replaced in my output from the powershell query?&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 13:49:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439833#M171520</guid>
      <dc:creator>MrMalice</dc:creator>
      <dc:date>2019-05-06T13:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk-reskit-powershell Query Masking Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439834#M171521</link>
      <description>&lt;P&gt;The editor changed the context of my example.&lt;BR /&gt;
It should read:&lt;BR /&gt;
The syntax of my query is in the form of : index=  "index_name"  sourcetype="sourcetype_name"   'password' &lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 00:21:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439834#M171521</guid>
      <dc:creator>MrMalice</dc:creator>
      <dc:date>2020-09-30T00:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk-reskit-powershell Query Masking Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439835#M171522</link>
      <description>&lt;P&gt;I've found that the results returned from my query will hide the word being searched on regardless of if it says 'password' or not. When I use the -expandproperty option on the raw field it totally removes the word being searched for from the result set. If I don't use the -expandproperty option then it replaces my search string with a ',' comma.&lt;BR /&gt;
Since this problem seems to be bigger than my initial question that I posed,  I'm going to close this question and get the latest version of the kit from GitHub.  I hope that resolves this issue.&lt;/P&gt;

&lt;P&gt;Regards,&lt;BR /&gt;
M&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 11:22:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439835#M171522</guid>
      <dc:creator>MrMalice</dc:creator>
      <dc:date>2019-05-07T11:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk-reskit-powershell Query Masking Data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439836#M171523</link>
      <description>&lt;P&gt;I was unable to determine why the results from my search didn't include the search phrase from my search.&lt;BR /&gt;
Example:  index="main" sourcetype="splunkd"  "FooFoo"&lt;BR /&gt;
In my example the results in the_raw field would return all of the events without the word FooFoo in them.&lt;/P&gt;

&lt;P&gt;In order to get around this anomaly I piped the predicate out to regex.&lt;BR /&gt;
index="main" sourcetype="splunkd"  | regex _raw = "FooFoo"&lt;/P&gt;

&lt;P&gt;This returned all events along with the word "FooFoo" present in the result set.&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 14:41:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-reskit-powershell-Query-Masking-Data/m-p/439836#M171523</guid>
      <dc:creator>MrMalice</dc:creator>
      <dc:date>2019-05-09T14:41:44Z</dc:date>
    </item>
  </channel>
</rss>

