Splunk Search

how to mask data in data model?

viswanathsd
Path Finder

Sample:
1234/rani/abc1234/dfh
Need to get output as */rani/*/dfh

Tags (1)

sgundeti
Path Finder

you can refer here, using SEDCMD , REGEX in props.conf and transforms.conf file in $SPLUNK_HOME/etc/system/local/ directory

http://docs.splunk.com/Documentation/Splunk/6.2.1/Data/Anonymizedatausingconfigurationfiles

0 Karma

viswanathsd
Path Finder

Thanks for your response.But i need to know,how can I implement this in Data MOdel?

0 Karma

MuS
Legend

Like @Ayn wrote, use an eval expresion in your data model. Look at the docs for more details http://docs.splunk.com/Documentation/Splunk/6.2.1/Knowledge/Definedatamodelattributes

0 Karma

Ayn
Legend

Use an eval expression. Something like this should do it.

replace(yourfield,"([^/]+)/([^/]+)/([^/]+)/([^/]+)","*/\2/*/\4")

mrobichaud_splu
Splunk Employee
Splunk Employee

To make this work via "add eval", you'd need to create a new field with a different name in the data model and hide the old field. The display name can be whatever you'd like.

Another option is to do that eval in a root search -> Add object -> Root search.

0 Karma

viswanathsd
Path Finder

1234 should be replace by wild character

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...