This tutorial explains how sensitive data in logs and traces—such as personally identifiable information (PII), passwords, tokens, emails, and credit card numbers—can create serious security and compliance risks if left unprotected. It introduces Open Observe Enterprise’s Sensitive Data Reduction feature, which enables automatic detection and handling of such data.
The video walks through key concepts like ingestion-time versus query-time redaction, helping you understand when and how to apply each method. A practical demo shows how to define sensitive data patterns, test them, and apply them to data streams. It also covers different approaches to handling sensitive data, including redaction, hashing, and dropping fields entirely.
By the end, viewers will see how to implement a streamlined, built-in solution for securing logs without relying on external tools or complex workflows.