<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to mask sensitive data in search from any app in Splunk in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259823#M77884</link>
    <description>&lt;P&gt;Data that has already been indexed in Splunk is immutable.  If this were not so, Splunk would be fairly useless for compliance purposes.  The best that you can do is to use the &lt;CODE&gt;delete&lt;/CODE&gt; command to hide the data (as I said, it is immutable so it doesn't really get deleted but it does become unsearchable).  You could use &lt;CODE&gt;roles&lt;/CODE&gt; to limit who has access to the data.&lt;/P&gt;

&lt;P&gt;One other crazy idea is to manually modify the data and then reindex it by sending into a Summary Index using the &lt;CODE&gt;collect&lt;/CODE&gt; command and then use both indices in your searches until the data ages out like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=normal_index OR index=my_SI_hack ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This has the benefit of not costing you any license so you could slam 11 months of backlog in and not go over (and then &lt;CODE&gt;delete&lt;/CODE&gt; the original events).&lt;/P&gt;</description>
    <pubDate>Wed, 07 Oct 2015 13:01:28 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2015-10-07T13:01:28Z</dc:date>
    <item>
      <title>How to mask sensitive data in search from any app in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259820#M77881</link>
      <description>&lt;P&gt;I have looked at answers for this already, but when I try any of them, my search still shows the unmasked data.&lt;/P&gt;

&lt;P&gt;Sample data:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;10.98.112.52 - myid [06/Oct/2015:09:42:39 -0400] "GET /mySeal/VUEIT/myPortal/ApplicationSelection/CheckDeatilsSSN?SSN=123-45-6789&amp;amp;TAXID=&amp;amp;RecipientType=Agent&amp;amp;_= HTTP/1.1" 200 22
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Tried the following:&lt;/P&gt;

&lt;P&gt;props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WebProxy]
TRANSFORMS-anonymize = ssn-web-anonymizer
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;transfoms.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[ssn-web-anonymizer]
REGEX = (?m)^(.*)SSN=\d\d\d\-\d\d\-\d\d\d\d(\&amp;amp;.*)$
FORMAT = $1SSN=###-##-####$2
DEST_KEY = _raw
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Also tried:&lt;/P&gt;

&lt;P&gt;props.conf:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[source::WebProxy]
SEDCMD-hidessn=s/(SSN=\d{3})\-(\d{2})\-(\d{4})/SSN=xxx\-xx\-xxxx/g
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;What am I doing wrong?&lt;/P&gt;

&lt;P&gt;Again I need the data masked no matter where the search is being done.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2015 16:07:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259820#M77881</guid>
      <dc:creator>cbright</dc:creator>
      <dc:date>2015-10-06T16:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask sensitive data in search from any app in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259821#M77882</link>
      <description>&lt;P&gt;Both your solution works fine for me. Did you make this changes to Indexer/Heavy forwarder and restarted the SPlunk instance in them??&lt;BR /&gt;
Also, this will mask any future data only, historical data will remain as it is.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2015 16:18:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259821#M77882</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2015-10-06T16:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask sensitive data in search from any app in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259822#M77883</link>
      <description>&lt;P&gt;Again I need the data masked for already indexed data no matter where or how the search is being done.&lt;/P&gt;

&lt;P&gt;It seems if this is not possible I would have to delete all data for the past 11 months and that really is not an acceptable option.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2015 16:18:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259822#M77883</guid>
      <dc:creator>cbright</dc:creator>
      <dc:date>2015-10-06T16:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask sensitive data in search from any app in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259823#M77884</link>
      <description>&lt;P&gt;Data that has already been indexed in Splunk is immutable.  If this were not so, Splunk would be fairly useless for compliance purposes.  The best that you can do is to use the &lt;CODE&gt;delete&lt;/CODE&gt; command to hide the data (as I said, it is immutable so it doesn't really get deleted but it does become unsearchable).  You could use &lt;CODE&gt;roles&lt;/CODE&gt; to limit who has access to the data.&lt;/P&gt;

&lt;P&gt;One other crazy idea is to manually modify the data and then reindex it by sending into a Summary Index using the &lt;CODE&gt;collect&lt;/CODE&gt; command and then use both indices in your searches until the data ages out like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=normal_index OR index=my_SI_hack ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This has the benefit of not costing you any license so you could slam 11 months of backlog in and not go over (and then &lt;CODE&gt;delete&lt;/CODE&gt; the original events).&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2015 13:01:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259823#M77884</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-10-07T13:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to mask sensitive data in search from any app in Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259824#M77885</link>
      <description>&lt;P&gt;Did this explain what you were seeing?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 16:03:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-mask-sensitive-data-in-search-from-any-app-in-Splunk/m-p/259824#M77885</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-12-08T16:03:42Z</dc:date>
    </item>
  </channel>
</rss>

