What is the correct example to redact a plain-text password from raw events?
The correct answer is B. in props.conf:
[identity]
SEDCMD-redact_pw = s/password=([^,|/s]+)/ ####REACTED####/g
s/password=([^,|/s]+)/ ####REACTED####/g
The g flag at the end means that the replacement is applied globally, not just to the first match.
Option A is incorrect because it uses the REGEX attribute instead of the SEDCMD attribute. The REGEX attribute is used to extract fields from events, not to modify them.
Option C is incorrect because it uses the transforms.conf file instead of the props.conf file. The transforms.conf file is used to define transformations that can be applied to fields or events, such as lookups, evaluations, or replacements. However, these transformations are applied after indexing, not before.
Option D is incorrect because it uses both the wrong attribute and the wrong file. There is no REGEX-redact_pw attribute in the transforms.conf file.
References: 1: Redact data from events - Splunk Documentation
Lynda
2 months agoGail
2 months agoHortencia
3 months agoTimothy
3 months agoJames
3 months agoFloyd
3 months agoVenita
4 months agoEffie
4 months agoEdison
4 months agoVannessa
4 months agoLaurel
4 months agoDarrin
5 months agoMalissa
5 months agoAnnamaria
11 months agoKaycee
9 months agoMaryrose
9 months agoMyra
9 months agoInocencia
9 months agoAlecia
9 months agoTalia
9 months agoNoe
9 months agoAnnett
10 months agoRomana
11 months agoMartin
11 months agoBeckie
10 months agoEllsworth
10 months agoJame
11 months agoStephane
11 months agoCarey
11 months agoStephane
11 months agoVashti
11 months agoEvangelina
10 months agoReed
10 months agoStefania
11 months agoCarey
11 months ago