Encrypt and Filter
4 minute read
Overview
There is a lot we may want to do with the data as you may have saw while looking at live data.
For this workshop we are going to encrypt PII, drop useless information from events and then route the financial transaction data to a specific S3 bucket while sending that and everything else to the teams general S3 bucket.
While we are going with S3 for this workshop, we have many other Destinations
available today and others, like Mezmo Log Analysis, that are experimental
. If interested in access to experimental
features, reach out to your account representative or support@mezmo.com.
But, let’s take this one step at a time.
Note on Editing a Deployed Pipeline
Deployed
your pipeline in Tapping: Understand Your Data, then you need to go into Edit mode on your Pipeline. You can do this by selecting Edit pipeline
in the top right corner of the Pipeline view.Step 1: Drop the Unnecessary Buffer
We don’t need the buffer, so let’s drop it. First select Add Processor which will pull up a dialog like so
Then connect this to the Source processor by hovering over the Source till you see a gray half circle. Click and drag to the right edge of the You may have noticed we are referencing the We want to send only the transaction events to S3, to do this we can use a We could group successful and failed transactions ( For the first route: Similarly, for the second output: Click Connect the Note that we will leave the Now, let’s encrypt each of the credit card fields individually to ensure security and compliance. The fields we want to encrypt are Since each are unique, order doesn’t matter so much here. For each: Once you do this for each of the above fields (or don’t, it’s just a demo pipeline afterall), you should have 5 floating processors like so Now, connect each one sequentially and then link the fail and success routes to the first processor in this group in parallel. The Pipeline should now look similar to Now that the transformations have been defined, it’s time to sink this all up to the S3 and start gathering data. Was this page helpful? Glad to hear it! Please tell us how we can improve. Sorry to hear that. Please tell us how we can improve.Remove Fields
from the list (docs)Drop buffer
.buffer
to drop itSave
.Drop buffer
node. Release the mouse and things are linked up. Data will now flow left to right, from the Source to the Processor. Also note that things will rearrange themselves as you go.buffer
key via .buffer
. This is syntax is slightly different than you may be used to but its very straight forward. To learn more, check out our docs here.Step 3: Route Transaction Data
Route
processor (docs). Go ahead and add one with the Title Transactions
..transaction.result
) but let’s seperate the routes. To do this, we will create two Outputs
.Transaction Success
.transaction.result
equals true
.transaction.total_price
is greater_or_equal to 0
via Add Expresion.Transaction Fail
.transaction.result
equals false
.transaction.total_price
expression from above.Save
.Drop Buffer
processor from Step 1 to the Route processor you just created.Unmatched
route untouched for this workshop. But there are many things that could be done with this data: send to Log Analytics, send to a SIEM, etc.Step 4: Encrypt the Credit Card Information
.transaction.cc.cc_number
.transaction.cc.cc_exp
.transaction.cc.cc_cvv
.transaction.cc.cc_zip
.transaction.cc.cc_name
Encrypt Field
processor (docs)AES-256-CFB
algorithm with a 32 character Encryption Key
(checkout AllKeysGenerator.comto generate each key)Initialization Vector
and name it whatever you like. Note that every encryption processor needs to add a key like this to the event itself for decryption
down the road.Save
.Feedback