{"version":"1.0","provider_name":"IRI","provider_url":"https:\/\/beta.iri.com\/blog","author_name":"Chaitali Mitra","author_url":"https:\/\/beta.iri.com\/blog\/author\/chaitalim\/","title":"How to Mask Data in Web Logs - IRI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"IroXEBB8OY\"><a href=\"https:\/\/beta.iri.com\/blog\/data-protection\/web-log-data-masking\/\">How to Mask Data in Web Logs<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/beta.iri.com\/blog\/data-protection\/web-log-data-masking\/embed\/#?secret=IroXEBB8OY\" width=\"600\" height=\"338\" title=\"&#8220;How to Mask Data in Web Logs&#8221; &#8212; IRI\" data-secret=\"IroXEBB8OY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/07\/privacy-please.jpg","thumbnail_width":1110,"thumbnail_height":745,"description":"This article is third in a 3-part series on CLF and ELF web log data. We first introduced\u00a0CLF and ELF web log formats, then introduced\u00a0IRI solutions for processing web log data, and here we conclude by\u00a0masking private data in\u00a0web log\u00a0files.\u00a0Note\u00a0that this article specifically addresses the masking of structured web log files via IRI FieldShield, whileRead More"}