Getting Data In

Masking sensitive information from event

payal4296
Explorer

 Hi,I am trying to remove some of the sensitive information to be indexed by Splunk.

But these configurations are not working ,even after getting the configuration reflected over btool and validating the regex over SPL.

Anyone can assist?

props.conf
[o365:management:activity]
TRANSFORMS-anonymize = info-anonymizer
KV_MODE = json
TRUNCATE = 10485760

transforms.conf
[info-anonymizer]
DEST_KEY = _raw
FORMAT = $1$2
REGEX = (.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(\"ResultsTruncated\"\:.*)


Have already Validated regex over SPL, It is working fine.

|regex _raw="(.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(\"ResultsTruncated\"\:.*)"

and

|rex field=_raw "(?<before>.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(?<after>\"ResultsTruncated\"\:.*)"
|eval _raw=before+""+after

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Something must be different.  If not the configuration then something else.  Could the format of the data have changed since Friday?  Perhaps a change was made on the source over the weekend.

---
If this reply helps you, Karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

So the key is to find out what changed since Friday.  Use btool to verify the configuration is still in place on your indexers/heavy forwarders.

---
If this reply helps you, Karma would be appreciated.
0 Karma

payal4296
Explorer

But nothing have changed, the configurations are same in btool.

0 Karma

payal4296
Explorer

Yes have restarted the splunk service after applying changes to the conf files. 

Actually it did worked on Friday ,the day changes were applied but it is not working after that .

0 Karma

richgalloway
SplunkTrust
SplunkTrust
Recall that btool shows the configuration on disk. Did you restart Splunk after changing the config files?
---
If this reply helps you, Karma would be appreciated.
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...