Skip to main content

Interactive Encryption Patterns Explorer

See field-level encryption in action! Use the interactive explorer below to step through 6 stages of progressive encryption patterns. Watch as sensitive fields are encrypted while preserving analytics-safe metadata.

How to Use This Explorer

  1. Navigate using arrow keys (← →) or click the numbered stage buttons
  2. Compare the Input (left) and Output (right) JSON at each stage
  3. Observe how sensitive fields are encrypted (red strikethrough) while analytics data is preserved (green highlight)
  4. Inspect the YAML code showing exactly what processors were added
  5. Learn from the stage description explaining the encryption technique and compliance benefit

Interactive Encryption Patterns Explorer

Original Sensitive Data

Raw payment and customer data with multiple compliance violations requiring immediate field-level encryption.

Use ← → arrow keys to navigate
📥Input
{
"transaction_id": "txn-12345",
"payment": {
"card_number": "4532-1234-5678-9010",
"cvv": "123",
"cardholder_name": "Sarah Johnson"
},
"customer": {
"email": "[email protected]",
"ssn": "123-45-6789"
}
}
📤Output
{
"transaction_id": "txn-12345",
"payment": {
"card_number": "4532-1234-5678-9010",
"cvv": "123",
"cardholder_name": "Sarah Johnson"
},
"customer": {
"email": "[email protected]",
"ssn": "123-45-6789"
}
}
Added/Changed
Removed
Completed Step
Current Step
Not Done Yet
📄New Pipeline Stepinput.json
# Stage 1: Original Data Input
# No encryption applied yet - all sensitive data visible

input:
  http_server:
    address: "0.0.0.0:8080"
    path: "/encrypt"

pipeline:
  processors:
    # Passthrough - no encryption yet
    - mapping: |
        root = this

output:
  stdout: {}

Try It Yourself

Ready to build this encryption pipeline? Follow the step-by-step tutorial:

Deep Dive into Each Pattern

Want to understand each encryption strategy in depth?


Next: Set up your environment to build this encryption pipeline yourself