<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Encrypt the Source data in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/668047#M229202</link>
    <description>&lt;P&gt;2023-10-25 10:56:46,709 WARN pool-1-thread-1 com.veeva.bpr.batchrecordprint.scheduledTasks - Header Field Name: MOM_Caution_e_1, value is out of Bounds using beginIndex:608, endIndex:684 from line:&lt;BR /&gt;2023-10-25 10:56:46,709 WARN pool-1-thread-1 com.veeva.Kpr.batchrecordprint.scheduledTasks - 02000011831199QD06620&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my requirement is encrypt the WARN pool-1-........................ record the source file&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please help me the process&lt;/P&gt;</description>
    <pubDate>Thu, 09 Nov 2023 10:41:27 GMT</pubDate>
    <dc:creator>vijreddy30</dc:creator>
    <dc:date>2023-11-09T10:41:27Z</dc:date>
    <item>
      <title>Encrypt the Source data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/667927#M229165</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My requirement is source data records data need to be encrypted. What does process need to follow? Is there any possibly&amp;nbsp; props.conf ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please help me the process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vij&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 16:17:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/667927#M229165</guid>
      <dc:creator>vijreddy30</dc:creator>
      <dc:date>2023-11-08T16:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt the Source data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/668016#M229196</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240303"&gt;@vijreddy30&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;what do you meam with encrypt source data?&lt;/P&gt;&lt;P&gt;are you speaking of encrypt the original files? it isn't a Splunk Matter,&lt;/P&gt;&lt;P&gt;are you speaking of data transmission,&amp;nbsp;which kind of ingestions are you speaking about: forwarders, syslog, HEC?&lt;/P&gt;&lt;P&gt;if Forwarders, you can excrypt data between Forwarders and Indexers and there are checking technics inside Splunk.&lt;/P&gt;&lt;P&gt;If you're speaking of syslog: I hint to use an rsyslog server and read files using a Universal Forwarders; I'm not sure that's possible to encrypt syslogs; in addition, you could use two UFs and a Load Balancer to avoid Single Point of Failures,&lt;/P&gt;&lt;P&gt;If you're speaking of HEC, you can use https and the token is a securization of your ingestion; as syslogs, you should use two Forwarders and a Load Balancer.&lt;/P&gt;&lt;P&gt;if you're speaking of encryption on Splunk see at&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/blog/learn/end-to-end-encryption.html?locale=en_us" target="_blank"&gt;https://www.splunk.com/en_us/blog/learn/end-to-end-encryption.html?locale=en_us&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 07:20:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/668016#M229196</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-11-09T07:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt the Source data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/668047#M229202</link>
      <description>&lt;P&gt;2023-10-25 10:56:46,709 WARN pool-1-thread-1 com.veeva.bpr.batchrecordprint.scheduledTasks - Header Field Name: MOM_Caution_e_1, value is out of Bounds using beginIndex:608, endIndex:684 from line:&lt;BR /&gt;2023-10-25 10:56:46,709 WARN pool-1-thread-1 com.veeva.Kpr.batchrecordprint.scheduledTasks - 02000011831199QD06620&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my requirement is encrypt the WARN pool-1-........................ record the source file&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please help me the process&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 10:41:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/668047#M229202</guid>
      <dc:creator>vijreddy30</dc:creator>
      <dc:date>2023-11-09T10:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Encrypt the Source data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/668054#M229203</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/240303"&gt;@vijreddy30&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;let me understand: do you want to mask some events or part of event in permanent way or in reversible way?&lt;/P&gt;&lt;P&gt;if in reversible way, you have to preprocess your data using a script and a certificate and then index your data using Splunk.&lt;/P&gt;&lt;P&gt;If you only want to anonymize a part of your data, follow the instructions at&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/blog/learn/data-anonymization.html" target="_blank"&gt;https://www.splunk.com/en_us/blog/learn/data-anonymization.html&lt;/A&gt;&amp;nbsp;or&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Data/Anonymizedata?_gl=1*b5bay4*_ga*MTY1NjIzMDM3OC4xNjk3MjA1MzU0*_ga_GS7YF8S63Y*MTY5OTUyODU5My41MjcuMS4xNjk5NTI4ODA3LjI3LjAuMA..*_ga_5EPM2P39FV*MTY5OTUyODU2NC42NDAuMS4xNjk5NTI4OTg0LjAuMC4w&amp;amp;_ga=2.165103034.468842275.1697205354-1656230378.1697205354&amp;amp;_gac=1.117944699.1697439287.Cj0KCQjwm66pBhDQARIsALIR2zDDpMo42f4nQY5ylRFnUfEyW_h0bbBBKVDgM2rBU1cuYdYxGqfUTWkaAjkxEALw_wcB#Anonymize_data_through_a_sed_script" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Data/Anonymizedata?_gl=1*b5bay4*_ga*MTY1NjIzMDM3OC4xNjk3MjA1MzU0*_ga_GS7YF8S63Y*MTY5OTUyODU5My41MjcuMS4xNjk5NTI4ODA3LjI3LjAuMA..*_ga_5EPM2P39FV*MTY5OTUyODU2NC42NDAuMS4xNjk5NTI4OTg0LjAuMC4w&amp;amp;_ga=2.165103034.468842275.1697205354-1656230378.1697205354&amp;amp;_gac=1.117944699.1697439287.Cj0KCQjwm66pBhDQARIsALIR2zDDpMo42f4nQY5ylRFnUfEyW_h0bbBBKVDgM2rBU1cuYdYxGqfUTWkaAjkxEALw_wcB#Anonymize_data_through_a_sed_script&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 11:23:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Encrypt-the-Source-data/m-p/668054#M229203</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-11-09T11:23:47Z</dc:date>
    </item>
  </channel>
</rss>

