{"id":13114,"date":"2019-08-30T11:11:32","date_gmt":"2019-08-30T15:11:32","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=13114"},"modified":"2023-02-27T05:10:49","modified_gmt":"2023-02-27T10:10:49","slug":"iri-masking-app-splunk","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/","title":{"rendered":"Voracity Data Munging and Masking App for Splunk"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In Q3\u201919, IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seam<\/span><span style=\"font-weight: 400;\">lessly indexes data from any <\/span><a href=\"https:\/\/www.iri.com\/products\/voracity-platform\"><span style=\"font-weight: 400;\">Voracity platform<\/span><\/a><span style=\"font-weight: 400;\"> data wrangling or protection job. The app \u2014 available on <\/span><a href=\"https:\/\/splunkbase.splunk.com\/app\/4639\/\"><span style=\"font-weight: 400;\">Splunkbase<\/span><\/a> <span style=\"font-weight: 400;\">\u2014 is the modern successor to the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-transformation2\/iri-voracity-add-on-for-splunk\/\"><span style=\"font-weight: 400;\">2016 Voracity add-on<\/span><\/a><span style=\"font-weight: 400;\"> to Splunk, and an alternative to <\/span><a href=\"https:\/\/www.iri.com\/blog\/business-intelligence\/forward-voracity-data-into-splunk\/\"><span style=\"font-weight: 400;\">using Splunk Universal Forwarder<\/span><\/a><span style=\"font-weight: 400;\"> to index the data.\u00a0\u00a0<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/08\/vorcity-flyer-front-2019-no-top-e1567188793648.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16385  alignright\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2021\/08\/voracity-flyer-front-no-banner-1024x695.png\" alt=\"IRI Voracity data management platform\" width=\"525\" height=\"356\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2021\/08\/voracity-flyer-front-no-banner-1024x695.png 1024w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2021\/08\/voracity-flyer-front-no-banner-300x204.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2021\/08\/voracity-flyer-front-no-banner-768x521.png 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2021\/08\/voracity-flyer-front-no-banner-1536x1042.png 1536w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2021\/08\/voracity-flyer-front-no-banner-2048x1390.png 2048w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2021\/08\/voracity-flyer-front-no-banner.png 1110w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">The app functions as an invocation and integration point for the execution and use of different <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">SortCL<\/span><\/a><span style=\"font-weight: 400;\">-compatible jobs and their results; i.e.,\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.iri.com\/products\/cosort\"><span style=\"font-weight: 400;\">IRI CoSort<\/span><\/a><span style=\"font-weight: 400;\"> data cleansing and transformation<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.iri.com\/products\/nextform\"><span style=\"font-weight: 400;\">IRI NextForm<\/span><\/a><span style=\"font-weight: 400;\"> data migration and replication<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> PII discovery and de-identification<\/span><\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/www.iri.com\/products\/rowgen\"><span style=\"font-weight: 400;\">IRI RowGen<\/span><\/a><span style=\"font-weight: 400;\"> test data synthesis and population<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The app launches these existing jobs \u2014 usually created graphically in <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\">, an IDE built on Eclipse \u2014 and automatically ingests and indexes the output data from those jobs into Splunk. From there, the data is ready to perform advanced analytics, apply visualizations or execute automated actions in Splunk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The app works by running any specified IRI job script as a modular input given its specified location. It also accepts and executes additional SortCL command line arguments to the script, such as \/WARNINGSON, \/STATISTICS, or another named \/OUTFILE target. The data flowing to Splunk through the app should be specified in a structured format like CSV, XML or JSON.<\/span><\/p>\n<h4><b>Installing the IRI App for Splunk<\/b><b><br \/>\n<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">There are two options to install the IRI app:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Download the app from Splunkbase and install it via the \u201cinstall from file\u201d button within your Splunk instance<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Search for \u201cIRI Voracity Data Munging and Masking App for Splunk\u201d and have it installed directly.<\/span><\/li>\n<\/ol>\n<p><a href=\"\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-13119 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png\" alt=\"\" width=\"915\" height=\"466\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png 915w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app-300x153.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app-768x391.png 768w\" sizes=\"(max-width: 915px) 100vw, 915px\" \/><\/a><\/p>\n<h4><b>Creating Data \/ Modular Input<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The input to Splunk is the output of a Voracity job. The first \/OUTFILE target in that job must be set to stdout for the data to be indexed into Splunk. Additional SortCL command line arguments can be specified in a modular input<span id='easy-footnote-1-13114' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#easy-footnote-bottom-1-13114' title='&lt;\/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;Modular input is a way to get data into Splunk. The IRI Voracity Data Munging and Masking App for Splunk uses modular inputs to get data produced by SortCL jobs into Splunk. In this modular input, an App user can specify things like the location of the SortCL job, additional SortCL commands, and the time interval to run the modular input.&lt;\/span&gt;&lt;span style=&quot;font-weight: 400;&quot;&gt;'><sup>1<\/sup><\/a><\/span><\/span><span style=\"font-weight: 400;\">, including more \/OUTFILE= sections that define other targets beyond the data piping into Splunk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To create a modular input, select the Voracity app from the dropdown menu in the upper-left corner of Splunk. \u201cInputs\u201d should be the default page of the app. To create an input, select the \u201cCreate New Input\u201d button and select the IRI Voracity (SortCL) Job to run, which will produce the input data for Splunk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enter a unique name for the data input (without spaces). Set the interval and index location for the data input.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The interval indicates how often the modular input will be run. The modular input involves invoking SortCL from the command line with a specified IRI Job location and any other specified additional command line arguments. The index selector specifies what index the data will be stored in. The IRI Job Location field must be filled with the full path to the IRI job (.*cl file).<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/08\/script_setup.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13120 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/08\/script_setup-1024x362.png\" alt=\"\" width=\"648\" height=\"229\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/script_setup-1024x362.png 1024w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/script_setup-300x106.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/script_setup-768x271.png 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/script_setup.png 1130w\" sizes=\"(max-width: 648px) 100vw, 648px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, seven different command line arguments can be added to the Modular Input to be run. These commands include \/STATISTICS=, \/WARNINGSON, \/WARNINGSOFF, \/DEBUG, \/RC, \/MONITOR=, and \/OUTFILE=. Background on the SortCL program and its syntax can be found in the <\/span><a href=\"https:\/\/www.iri.com\/ftp9\/pdf\/CoSort\/IRI_CoSort_Overview.pdf\"><span style=\"font-weight: 400;\">CoSort overview booklet<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An extra file path must be specified if a command ends in &#8216;=&#8217;. This field should be left blank if no command is selected or a command that does not end in &#8216;=&#8217; is selected.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, click the \u201cadd\u201d button at the bottom of the dialog. The name of your new input (*.scl job script file) should now be listed in the data inputs table.<\/span><\/p>\n<h4><b>Searching the Results<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">To search the results now available in Splunk, select \u201cSearch\u201d from the navbar of the IRI App. Type <\/span><i><span style=\"font-weight: 400;\">\u201cSource= \u201cname_of_modular_input_type:\/\/modular_input_name\u201d\u201d<\/span><\/i><span style=\"font-weight: 400;\"> to search the data indexed by the modular input.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This can also be accessed by clicking \u201cData Summary\u201d and selecting the source from the \u201cSources\u201d menu. Use Splunk commands such as<\/span><i><span style=\"font-weight: 400;\"> |stats, |chart, <\/span><\/i><span style=\"font-weight: 400;\">and <\/span><i><span style=\"font-weight: 400;\">|timechart<\/span><\/i><span style=\"font-weight: 400;\"> to help visualize your data. See <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/secure-then-splunk-a-format-preserving-encryption-and-pseduonymization-example\/\"><span style=\"font-weight: 400;\">this article<\/span><\/a><span style=\"font-weight: 400;\"> for a prior example.<\/span><\/p>\n<h4><b>Visualizing the Results<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Here is an example of U.S. president data from 1900 onward sorted in a simple CoSort SortCL job, and then indexed and visualized by Splunk:<\/span><\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app_graphic.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13121 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2019\/08\/iri_app_graphic-1024x555.png\" alt=\"\" width=\"718\" height=\"389\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app_graphic-1024x555.png 1024w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app_graphic-300x163.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app_graphic-768x416.png 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app_graphic.png 1600w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/a><\/p>\n<h4><b>Actioning the Results<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In addition to visual analytics, you can also utilize the Adaptive Response Framework in Splunk Enterprise Security, or a playbook in Splunk Phantom, to take action on production or log data prepared in Voracity across a wide range of industries and applications.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Examples would be wrangling customer transactions for Splunk to flag for promotion and pricing decisions, and MQTT or Kafka fed sensor data aggregated (and anonymized) by Voracity for Splunk to use in diagnostic or preventive alerts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact <\/span><a href=\"mailto:voracity@iri.com\"><span style=\"font-weight: 400;\">voracity@iri.com<\/span><\/a><span style=\"font-weight: 400;\"> if you would like help building out data preparation, presentation, and prescriptive scenarios using Voracity and Splunk.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Q3\u201919, IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seamlessly indexes data from any Voracity platform data wrangling or protection job. The app \u2014 available on Splunkbase \u2014 is the modern successor to the 2016 Voracity add-on to Splunk, and an alternative to using Splunk Universal Forwarder to<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\" title=\"Voracity Data Munging and Masking App for Splunk\">Read More<\/a><\/div>\n","protected":false},"author":119,"featured_media":13119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[32,34],"tags":[52,789,574,1418,1435],"class_list":["post-13114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-intelligence","category-business","tag-business-intelligence-2","tag-iri-voracity","tag-splunk","tag-splunk-add-on","tag-splunk-app"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Voracity Data Munging and Masking App for Splunk - IRI<\/title>\n<meta name=\"description\" content=\"IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seamlessly indexes data from any Voracity platform data wrangling\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Voracity Data Munging and Masking App for Splunk - IRI\" \/>\n<meta property=\"og:description\" content=\"IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seamlessly indexes data from any Voracity platform data wrangling\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-30T15:11:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-27T10:10:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png\" \/>\n\t<meta property=\"og:image:width\" content=\"915\" \/>\n\t<meta property=\"og:image:height\" content=\"466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devon Kozenieski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devon Kozenieski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\"},\"author\":{\"name\":\"Devon Kozenieski\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1\"},\"headline\":\"Voracity Data Munging and Masking App for Splunk\",\"datePublished\":\"2019-08-30T15:11:32+00:00\",\"dateModified\":\"2023-02-27T10:10:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\"},\"wordCount\":847,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png\",\"keywords\":[\"business intelligence\",\"IRI Voracity\",\"Splunk\",\"Splunk Add-on\",\"Splunk App\"],\"articleSection\":[\"Business Intelligence (BI&#041;\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\",\"name\":\"Voracity Data Munging and Masking App for Splunk - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png\",\"datePublished\":\"2019-08-30T15:11:32+00:00\",\"dateModified\":\"2023-02-27T10:10:49+00:00\",\"description\":\"IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seamlessly indexes data from any Voracity platform data wrangling\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png\",\"width\":915,\"height\":466},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Voracity Data Munging and Masking App for Splunk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1\",\"name\":\"Devon Kozenieski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/19bf36cedac5d586ea168f58f96eb2f1?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/19bf36cedac5d586ea168f58f96eb2f1?s=96&d=blank&r=g\",\"caption\":\"Devon Kozenieski\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/devonk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Voracity Data Munging and Masking App for Splunk - IRI","description":"IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seamlessly indexes data from any Voracity platform data wrangling","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/","og_locale":"en_US","og_type":"article","og_title":"Voracity Data Munging and Masking App for Splunk - IRI","og_description":"IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seamlessly indexes data from any Voracity platform data wrangling","og_url":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/","og_site_name":"IRI","article_published_time":"2019-08-30T15:11:32+00:00","article_modified_time":"2023-02-27T10:10:49+00:00","og_image":[{"width":915,"height":466,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png","type":"image\/png"}],"author":"Devon Kozenieski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Devon Kozenieski","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/"},"author":{"name":"Devon Kozenieski","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1"},"headline":"Voracity Data Munging and Masking App for Splunk","datePublished":"2019-08-30T15:11:32+00:00","dateModified":"2023-02-27T10:10:49+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/"},"wordCount":847,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png","keywords":["business intelligence","IRI Voracity","Splunk","Splunk Add-on","Splunk App"],"articleSection":["Business Intelligence (BI&#041;","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/","url":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/","name":"Voracity Data Munging and Masking App for Splunk - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png","datePublished":"2019-08-30T15:11:32+00:00","dateModified":"2023-02-27T10:10:49+00:00","description":"IRI created a new, free app for Splunk Enterprise and Enterprise Security users that seamlessly indexes data from any Voracity platform data wrangling","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png","width":915,"height":466},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/business-intelligence\/iri-masking-app-splunk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Voracity Data Munging and Masking App for Splunk"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/de972c035aaeecfc40a3ae2ea5ff7ba1","name":"Devon Kozenieski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/19bf36cedac5d586ea168f58f96eb2f1?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/19bf36cedac5d586ea168f58f96eb2f1?s=96&d=blank&r=g","caption":"Devon Kozenieski"},"url":"https:\/\/beta.iri.com\/blog\/author\/devonk\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/08\/iri_app.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13114"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=13114"}],"version-history":[{"count":10,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13114\/revisions"}],"predecessor-version":[{"id":16435,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13114\/revisions\/16435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/13119"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=13114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=13114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=13114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}