Getting Data In

Masking sensitive information from event

payal4296
Explorer

 Hi,I am trying to remove some of the sensitive information to be indexed by Splunk.

But these configurations are not working ,even after getting the configuration reflected over btool and validating the regex over SPL.

Anyone can assist?

props.conf
[o365:management:activity]
TRANSFORMS-anonymize = info-anonymizer
KV_MODE = json
TRUNCATE = 10485760

transforms.conf
[info-anonymizer]
DEST_KEY = _raw
FORMAT = $1$2
REGEX = (.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(\"ResultsTruncated\"\:.*)


Have already Validated regex over SPL, It is working fine.

|regex _raw="(.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(\"ResultsTruncated\"\:.*)"

and

|rex field=_raw "(?<before>.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(?<after>\"ResultsTruncated\"\:.*)"
|eval _raw=before+""+after

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Something must be different.  If not the configuration then something else.  Could the format of the data have changed since Friday?  Perhaps a change was made on the source over the weekend.

---
If this reply helps you, Karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

So the key is to find out what changed since Friday.  Use btool to verify the configuration is still in place on your indexers/heavy forwarders.

---
If this reply helps you, Karma would be appreciated.
0 Karma

payal4296
Explorer

But nothing have changed, the configurations are same in btool.

0 Karma

payal4296
Explorer

Yes have restarted the splunk service after applying changes to the conf files. 

Actually it did worked on Friday ,the day changes were applied but it is not working after that .

0 Karma

richgalloway
SplunkTrust
SplunkTrust
Recall that btool shows the configuration on disk. Did you restart Splunk after changing the config files?
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...