Splunk AppDynamics

Mask Sensitive Data in URLs

Kay_Koedel
Path Finder

We want to mask sensitive data that comes with URLs or Params to our services.

The Sensitive Data can be Found with regex.

This can come at any part of a url

for example:

http://server.com/endpoint/sensitiv/get

http://server.com/endpoint/get/sensitiv/

We want to add a rule that masks all the URLs with *

http://server.com/endpoint/sensitiv123/get --> BT /endpoint/***/get

http://server.com/endpoint/get/sensitiv456/ --> BT /endpoint/get/***

I found the documentation:

https://docs.appdynamics.com/display/PRO45/Filter+Sensitive+Data

But it is not working. Can you give an example of how it will work for the given examples?

Labels (3)
0 Karma
1 Solution

Kay_Koedel
Path Finder

It was told by Appd Support that this is not possible:

"If that is the case, then the sensitive data filter will not solve your purpose. Rather, you'll need to define custom Servlet BT detection rules based on the URI matching with a regular expression. Please refer to https://docs.appdynamics.com/display/PRO45/URI+Based+Entry+Points for more information on this."

View solution in original post

Kay_Koedel
Path Finder

It was told by Appd Support that this is not possible:

"If that is the case, then the sensitive data filter will not solve your purpose. Rather, you'll need to define custom Servlet BT detection rules based on the URI matching with a regular expression. Please refer to https://docs.appdynamics.com/display/PRO45/URI+Based+Entry+Points for more information on this."

Get Updates on the Splunk Community!

Developer Spotlight with Brett Adams

In our third Spotlight feature, we're excited to shine a light on Brett—a Splunk consultant, innovative ...

Index This | What can you do to make 55,555 equal 500?

April 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Say goodbye to manually analyzing phishing and malware threats with Splunk Attack ...

In today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware ...