Logs • PII • GDPR
Log anonymization and redaction that keeps context intact
Mask sensitive tokens (emails, IPs, IDs, secrets, JWTs) while preserving structure — so support, security, and platform teams can share artifacts safely.
Common problems
What teams need from log redaction
Real logs contain long tokens and identifiers that must be transformed without destroying readability.
Secrets & tokens
API keys, bearer tokens, JWTs, session IDs.
Identifiers
Emails, UUIDs, customer IDs, account IDs.
Infrastructure signals
IP addresses, hostnames, trace IDs, correlation IDs.
Next: see Rules v2 actions
The live demo includes examples for masking, redaction, deterministic hashing, and other built-in actions.
FAQ
Log anonymization FAQ
Short answers to common evaluation questions.