Dashboards & Visualizations

How to hide dynamic filter token or parameters in URL

Iswarya
Engager

How to hide the dynamic filter tokens that we are passing in URL without using js.We need this because we don't want the user to view the tokens in URL.

Labels (1)
Tags (3)
0 Karma
1 Solution

PickleRick
SplunkTrust
SplunkTrust

Question is _why_ do you want to do so? For "security" reasons? That won't fly. The user can press F12 and check what's being sent to and from the server so regardless of whether the data is sent as URL parameters or additional data in request headers - it's still there and can still be observed.

View solution in original post

PickleRick
SplunkTrust
SplunkTrust

Question is _why_ do you want to do so? For "security" reasons? That won't fly. The user can press F12 and check what's being sent to and from the server so regardless of whether the data is sent as URL parameters or additional data in request headers - it's still there and can still be observed.

ITWhisperer
SplunkTrust
SplunkTrust

Assuming you are talking about passing tokens to dashboards through the URL, this is the way it is done. Alternatives might include, having a separate dashboard for each possible combination of tokens and calling the relevant dashboard; passing an encoded version of the token which the dashboard then decodes; using a reference to the token which the dashboard then does a lookup to dereference it, etc. All of these options are complex and I have to wonder whether it is worth the effort.

Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...