Getting Data In

Masking sensitive information from event

payal4296
Explorer

 Hi,I am trying to remove some of the sensitive information to be indexed by Splunk.

But these configurations are not working ,even after getting the configuration reflected over btool and validating the regex over SPL.

Anyone can assist?

props.conf
[o365:management:activity]
TRANSFORMS-anonymize = info-anonymizer
KV_MODE = json
TRUNCATE = 10485760

transforms.conf
[info-anonymizer]
DEST_KEY = _raw
FORMAT = $1$2
REGEX = (.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(\"ResultsTruncated\"\:.*)


Have already Validated regex over SPL, It is working fine.

|regex _raw="(.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(\"ResultsTruncated\"\:.*)"

and

|rex field=_raw "(?<before>.*\"SensitiveInformationDetections\"\:\s\{)\"DetectedValues\"\:\s\[.*\]\,\s(?<after>\"ResultsTruncated\"\:.*)"
|eval _raw=before+""+after

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Something must be different.  If not the configuration then something else.  Could the format of the data have changed since Friday?  Perhaps a change was made on the source over the weekend.

---
If this reply helps you, Karma would be appreciated.
0 Karma

richgalloway
SplunkTrust
SplunkTrust

So the key is to find out what changed since Friday.  Use btool to verify the configuration is still in place on your indexers/heavy forwarders.

---
If this reply helps you, Karma would be appreciated.
0 Karma

payal4296
Explorer

But nothing have changed, the configurations are same in btool.

0 Karma

payal4296
Explorer

Yes have restarted the splunk service after applying changes to the conf files. 

Actually it did worked on Friday ,the day changes were applied but it is not working after that .

0 Karma

richgalloway
SplunkTrust
SplunkTrust
Recall that btool shows the configuration on disk. Did you restart Splunk after changing the config files?
---
If this reply helps you, Karma would be appreciated.
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...