1.5. Cleaning an sos report


The sos utility offers a routine to obfuscate potentially sensitive data, such as user names, host names, IP or MAC addresses, or other user-specified keywords. The original sos report or sos collect stays unchanged, and a new *-obfuscated.tar.xz file is generated and intended to be shared with a third party.

注意

You can append the cleaner functionality to the sos report or sos collect commands with the --clean option:

[user@server1 ~]$ sudo sos report --clean

Prerequisites

  • You have generated an sos report or an sos collect tarball.
  • (Optional) You have a list of specific keywords beyond the user names, host names, and other data you want to obfuscate.

Procedure

  • Run the sos clean command on either an sos report or sos collect tarball and follow the on-screen instructions.

    1. You can add the --keywords option to additionally clean a given list of keywords.
    2. You can add the --usernames option to obfuscate further sensitive user names.

      The automatic user name cleaning will automatically run for users reported through the lastlog file for users with an UID of 1000 and above. This option is used for LDAP users that may not appear as an actual login, but may occur in certain log files.

      [user@server1 ~]$ sudo sos clean /var/tmp/sos-collector-2022-05-15-pafsr.tar.xz
      [sudo] password for user:
      
      sos clean (version 4.2)
      
      This command will attempt to obfuscate information that is generally considered to be potentially sensitive. Such information includes IP addresses, MAC addresses, domain names, and any user-provided keywords.
      
      Note that this utility provides a best-effort approach to data obfuscation, but it does not guarantee that such obfuscation provides complete coverage of all such data in the archive, or that any obfuscation is provided to data that does not fit the description above.
      
      Users should review any resulting data and/or archives generated or processed by this utility for remaining sensitive content before being passed to a third party.
      
      
      Press ENTER to continue, or CTRL-C to quit.
      
      Found 4 total reports to obfuscate, processing up to 4 concurrently
      
      sosreport-primary-rhel10-2022-05-15-nchbdmd :      Extracting...
      sosreport-sos-node1-2022-05-15-wmlomgu :      Extracting...
      sosreport-sos-node2-2022-05-15-obsudzc :      Extracting...
      sos-collector-2022-05-15-pafsr :                   Beginning obfuscation...
      sosreport-sos-node1-2022-05-15-wmlomgu :      Beginning obfuscation...
      sos-collector-2022-05-15-pafsr :                   Obfuscation completed
      sosreport-primary-rhel10-2022-05-15-nchbdmd :      Beginning obfuscation...
      sosreport-sos-node2-2022-05-15-obsudzc :      Beginning obfuscation...
      sosreport-primary-rhel10-2022-05-15-nchbdmd :      Re-compressing...
      sosreport-sos-node2-2022-05-15-obsudzc :      Re-compressing...
      sosreport-sos-node1-2022-05-15-wmlomgu :      Re-compressing...
      sosreport-primary-rhel10-2022-05-15-nchbdmd :      Obfuscation completed
      sosreport-sos-node2-2022-05-15-obsudzc :      Obfuscation completed
      sosreport-sos-node1-2022-05-15-wmlomgu :      Obfuscation completed
      
      Successfully obfuscated 4 report(s)
      
      A mapping of obfuscated elements is available at
          /var/tmp/sos-collector-2022-05-15-pafsr-private_map
      
      The obfuscated archive is available at
          /var/tmp/sos-collector-2022-05-15-pafsr-obfuscated.tar.xz
      
          Size    157.10KiB
          Owner    root
      
      Please send the obfuscated archive to your support representative and keep the mapping file private

Verification

  • Verify that the sos clean command created an obfuscated archive and an obfuscation mapping in the /var/tmp/ directory matching the description from the command output.

    [user@server1 ~]$ sudo ls -l /var/tmp/sos-collector-2022-05-15-pafsr-private_map /var/tmp/sos-collector-2022-05-15-pafsr-obfuscated.tar.xz
    [sudo] password for user:
    
    -rw-------. 1 root root 160868 May 15 16:10 /var/tmp/sos-collector-2022-05-15-pafsr-obfuscated.tar.xz
    -rw-------. 1 root root  96622 May 15 16:10 /var/tmp/sos-collector-2022-05-15-pafsr-private_map
  • Check the *-private_map file for the obfuscation mapping:

    [user@server1 ~]$ sudo cat /var/tmp/sos-collector-2022-05-15-pafsr-private_map
    [sudo] password for user:
    
    {
        "hostname_map": {
            "pmoravec-rhel10": "host0"
        },
        "ip_map": {
            "10.44.128.0/22": "100.0.0.0/22",
    ..
        "username_map": {
            "foobaruser": "obfuscateduser0",
            "jsmith": "obfuscateduser1",
            "johndoe": "obfuscateduser2"
        }
    }
重要

Keep both the original unobfuscated archive and the *private_map files locally as Red Hat support might refer to the obfuscated terms that you will need to translate to the original values.

Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2026 Red Hat
返回顶部