This documentation and the Cisco Observability Platform functionalities it describes are subject to change. Data saved on the platform may disappear and APIs may change without notice.
logs:dataMaskingExpression
Description
Defines a pattern corresponding to sensitive data that may appear in a log message.
Syntax
{
"uniqueName": "<string>",
"displayName": "<string>",
"regexPattern": "<string>",
"dataSensitivity": "<string>",
}
Attributes
| Attribute | Description |
|---|---|
uniqueName |
Required. Name of the masking rule. Alphanumeric characters, underscores, dashes, dots only. Maximum of 128 characters. Must be unique within a solution or tenant. |
displayName |
Required. Name of the masking rule as it appears in the user interface. Maximum of 64 characters. |
regexPattern |
Regular expression to match. |
dataSensitivity |
Severity of the data you're masking (in other words, how critical it is to mask the data). Valid values: LOW, MEDIUM, HIGH, CRITICAL. |
Example
{
"uniqueName": "Voyager_email_address",
"description": "Regex for identifying email address from Voyager solution",
"displayName": "email_address_expression",
"regexPattern": "([a-zA-Z0-9!#$‘*+?^_`{|}~.-]+(?:@|%40)(?:[a-zA-Z0-9-]+\\\\.)+[a-zA-Z0-9-]+)",
"dataSensitivity": "LOW"
}