Encrypt and Filter
4 minute read
Overview
There is a lot we may want to do with the data as you may have saw while looking at live data.
For this workshop we are going to encrypt PII, drop useless information from events and then route the financial transaction data to a specific S3 bucket while sending that and everything else to the teams general S3 bucket.
While we are going with S3 for this workshop, we have many other Destinations available today and others, like Mezmo Log Analysis, that are experimental. If interested in access to experimental features, reach out to your account representative or support@mezmo.com.
But, let’s take this one step at a time.
Note on Editing a Deployed Pipeline
Deployed your pipeline in Tapping: Understand Your Data, then you need to go into Edit mode on your Pipeline. You can do this by selecting Edit pipeline in the top right corner of the Pipeline view.Step 1: Drop the Unnecessary Buffer
We don’t need the buffer, so let’s drop it. First select Add Processor which will pull up a dialog like so
Then connect this to the Source processor by hovering over the Source till you see a gray half circle. Click and drag to the right edge of the You may have noticed we are referencing the We want to send only the transaction events to S3, to do this we can use a We could group successful and failed transactions ( For the first route: Similarly, for the second output: Click Connect the Note that we will leave the Now, let’s encrypt each of the credit card fields individually to ensure security and compliance. The fields we want to encrypt are Since each are unique, order doesn’t matter so much here. For each: Once you do this for each of the above fields (or don’t, it’s just a demo pipeline afterall), you should have 5 floating processors like so Now, connect each one sequentially and then link the fail and success routes to the first processor in this group in parallel. The Pipeline should now look similar to Now that the transformations have been defined, it’s time to sink this all up to the S3 and start gathering data. Was this page helpful? Glad to hear it! Please tell us how we can improve. Sorry to hear that. Please tell us how we can improve.

Remove Fields from the list (docs)Drop buffer.buffer to drop itSave.

Drop buffer node. Release the mouse and things are linked up. Data will now flow left to right, from the Source to the Processor. Also note that things will rearrange themselves as you go.

buffer key via .buffer. This is syntax is slightly different than you may be used to but its very straight forward. To learn more, check out our docs here.Step 3: Route Transaction Data
Route processor (docs). Go ahead and add one with the Title Transactions..transaction.result) but let’s seperate the routes. To do this, we will create two Outputs.Transaction Success.transaction.result equals true.transaction.total_price is greater_or_equal to 0 via Add Expresion.

Transaction Fail.transaction.result equals false.transaction.total_price expression from above.Save.

Drop Buffer processor from Step 1 to the Route processor you just created.

Unmatched route untouched for this workshop. But there are many things that could be done with this data: send to Log Analytics, send to a SIEM, etc.Step 4: Encrypt the Credit Card Information
.transaction.cc.cc_number.transaction.cc.cc_exp.transaction.cc.cc_cvv.transaction.cc.cc_zip.transaction.cc.cc_nameEncrypt Field processor (docs)AES-256-CFB algorithm with a 32 character Encryption Key (checkout AllKeysGenerator.comto generate each key)Initialization Vector and name it whatever you like. Note that every encryption processor needs to add a key like this to the event itself for decryption down the road.Save.





Feedback