Encrypt Field Processor

Description

You can use the Encrypt processor to apply an encryption algorithm and key to a specified field.

Use

The Encrypt processor is useful when you need to send sensitive log data to storage, for example when you want to retain log data that may contain account names and passwords.

Configuration

There are four options you need to set for this processor.

OptionDescriptionExample
FieldThe field you want to apply encryption to..foo
Encryption algorithmThe encryption algorithm to apply. These options also determine how many characters to use for the encryption key and initialization vector.AES-256-CFB (key=32 characters, iv=16characters)
Encryption keyThe key used by the algorithm to encrypt the field.6B58703273357638792F423F4528482B
Initialization vector (IV) fieldThis field is added by the pipeline to the JSON and is used by the algorithm as the initialization key..encrypt_iv

Interactive Demo

Check out an interactive demo of the Encrypt Processor as a component in a Compliance group, as well as instructions for building a version of the Pipette with your own sample data.

Example

Before

JSON
Copy
OptionValue
Field.foo
Encryption algorithmAES-256-CFB (key=32 characters, iv=16characters)
Encryption key6B58703273357638792F423F4528482B
Initialization vector (IV) field.encrypt_iv

After

JSON
Copy
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
  Last updated