What is the correct example to redact a plain-text password from raw events?
The correct answer is B. in props.conf:
[identity]
SEDCMD-redact_pw = s/password=([^,|/s]+)/ ####REACTED####/g
s/password=([^,|/s]+)/ ####REACTED####/g
The g flag at the end means that the replacement is applied globally, not just to the first match.
Option A is incorrect because it uses the REGEX attribute instead of the SEDCMD attribute. The REGEX attribute is used to extract fields from events, not to modify them.
Option C is incorrect because it uses the transforms.conf file instead of the props.conf file. The transforms.conf file is used to define transformations that can be applied to fields or events, such as lookups, evaluations, or replacements. However, these transformations are applied after indexing, not before.
Option D is incorrect because it uses both the wrong attribute and the wrong file. There is no REGEX-redact_pw attribute in the transforms.conf file.
References: 1: Redact data from events - Splunk Documentation
Lynda
3 months agoGail
3 months agoHortencia
4 months agoTimothy
4 months agoJames
4 months agoFloyd
4 months agoVenita
4 months agoEffie
5 months agoEdison
5 months agoVannessa
5 months agoLaurel
5 months agoDarrin
5 months agoMalissa
6 months agoAnnamaria
12 months agoKaycee
10 months agoMaryrose
10 months agoMyra
10 months agoInocencia
10 months agoAlecia
10 months agoTalia
10 months agoNoe
10 months agoAnnett
10 months agoRomana
12 months agoMartin
12 months agoBeckie
11 months agoEllsworth
11 months agoJame
12 months agoStephane
12 months agoCarey
12 months agoStephane
12 months agoVashti
1 year agoEvangelina
11 months agoReed
11 months agoStefania
12 months agoCarey
1 year ago