{"id":17987,"date":"2024-09-25T22:10:08","date_gmt":"2024-09-26T02:10:08","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=17987"},"modified":"2024-11-06T15:47:06","modified_gmt":"2024-11-06T20:47:06","slug":"running-darkshield-from-the-command-line","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/","title":{"rendered":"Running DarkShield from the Command Line"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">IRI DarkShield<\/span><\/a><span style=\"font-weight: 400;\"> Command-Line Interface (CLI) offers a powerful way to harness the data discovery and masking capabilities of DarkShield <\/span><a href=\"https:\/\/www.iri.com\/news\/press-releases\/new-darkshield-version-finds-and-masks-more-pii-data-at-risk\"><span style=\"font-weight: 400;\">Version 5<\/span><\/a><span style=\"font-weight: 400;\"> outside the graphical <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\"><span style=\"font-weight: 400;\">IRI Workbench<\/span><\/a><span style=\"font-weight: 400;\"> environment. This article introduces you to the DarkShield CLI, its requirements, and how to use it effectively.<\/span><\/p>\n<h5><b>What is the DarkShield CLI?<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The DarkShield CLI is a Command-Line Interface utility for the IRI DarkShield v5 search and remediation engine. It enables you to execute and automate DarkShield operations without relying on the IRI Workbench GUI at runtime.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18009\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/CLI-1-300x171.png\" alt=\"\" width=\"326\" height=\"186\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/CLI-1-300x171.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/CLI-1-1024x585.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/CLI-1-768x439.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/CLI-1-1536x878.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/CLI-1.png 1110w\" sizes=\"(max-width: 326px) 100vw, 326px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The CLI operates on .dsc configuration files generated in IRI Workbench, which are produced through wizards in the DarkShield menu. The CLI option is particularly useful for integrating DarkShield jobs into automated workflows, CI\/CD pipelines, or batch job automation tools.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The DarkShield CLI utilizes the same on-premise DarkShield API engine as the IRI Workbench does; i.e., it makes HTTP\/S requests to your hosted DarkShield API for job execution. This ensures consistency in data masking results across different:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DarkShield environments (GUI\/CLI\/API)\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">data source types (structured\/semi-structured\/unstructured)\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IRI data masking products (FieldShield\/DarkShield\/CellShield).<\/span><\/li>\n<\/ul>\n<h5><b>Why Use the DarkShield CLI?<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The DarkShield CLI is designed for users who need to systemize or embed DarkShield jobs. It has provides several advantages; including:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Automation<\/b><span style=\"font-weight: 400;\">: Easily integrate DarkShield operations into automated workflows, CI\/CD pipelines, and batch applications using scripting or job schedulers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Flexibility<\/b><span style=\"font-weight: 400;\">: Run masking jobs in environments where a graphical interface is not available or practical.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Consistency<\/b><span style=\"font-weight: 400;\">: Ensure that the same masking routines used in IRI Workbench can be executed in different environments, maintaining consistency in data protection strategies.<\/span><\/li>\n<\/ol>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18004\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Why-Darkshield-CLI-300x252.png\" alt=\"\" width=\"430\" height=\"361\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Why-Darkshield-CLI-300x252.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Why-Darkshield-CLI-1024x859.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Why-Darkshield-CLI-768x645.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Why-Darkshield-CLI-1536x1289.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Why-Darkshield-CLI-2048x1719.png 2048w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Why-Darkshield-CLI.png 1110w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/p>\n<h5><b>Getting Started<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Before you start using the DarkShield CLI, ensure you have the following:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The right O\/S<\/b><span style=\"font-weight: 400;\">: Windows or Linux (ask about macOS)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Java 17 (<\/b><a href=\"https:\/\/adoptium.net\/\"><b>JRE<\/b><\/a><b>)<\/b><span style=\"font-weight: 400;\">: Java Runtime Environment (JRE) version 17 installed\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Valid DarkShield License<\/b><span style=\"font-weight: 400;\">: Obtain the back-end license required to run DarkShield from IRI. See &#8220;Setting up the Executable&#8221; below for more details.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>DarkShield Job Config Files:<\/b><span style=\"font-weight: 400;\"> Created your .dsc (DarkShield Configuration) files using the applicable DarkShield <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\"><span style=\"font-weight: 400;\">wizard(s)<\/span><\/a><span style=\"font-weight: 400;\"> in IRI Workbench. For more information, see the <\/span><a href=\"https:\/\/www.iri.com\/ftp9\/pdf\/DarkShield\/IRI_DarkShield_Overview.pdfwww.iri.com\/ftp9\/?dir=pdf\/DarkShield\"><span style=\"font-weight: 400;\">DarkShield Product Overview<\/span><\/a><span style=\"font-weight: 400;\"> booklet.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>A running DarkShield API instance<\/b><span style=\"font-weight: 400;\">: This instance must be set up and running for the CLI to function; this is done\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The DarkShield <\/span><b>CLI feature<\/b><span style=\"font-weight: 400;\">, if not already installed with your copy of Voracity\/DarkShield \u2013 contact IRI if you are not sure.<\/span><\/li>\n<\/ol>\n<h5><b>Setting up the Executable<\/b><\/h5>\n<p><i><span style=\"font-weight: 400;\">DarkShield<\/span><\/i><span style=\"font-weight: 400;\"> relies on the masking routines found in the <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><i><span style=\"font-weight: 400;\">CoSort SortCL<\/span><\/i><\/a><span style=\"font-weight: 400;\"> executable, so a license to use that executable in the DarkShield context is required to perform any masking operations. By default, DarkShield uses the COSORT_HOME environment variable to find the bin directory containing SortCL.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><i><span style=\"font-weight: 400;\">DarkShield<\/span><\/i><span style=\"font-weight: 400;\"> CLI uses the same engine as direct execution in IRI Workbench, which involves making web requests to the <\/span><a href=\"https:\/\/docs.google.com\/document\/d\/1nBQd3cCYpuxghvrfoVCSu_C4UGlLmRhfbt30VoaKM-8\/edit#heading=h.fhk4klyw1vc6\"><span style=\"font-weight: 400;\">DarkShield API<\/span><\/a><span style=\"font-weight: 400;\">. A DarkShield API instance must be set up and running for a job to complete successfully. By default, the CLI will make requests to a URL at port 8959 of the localhost, but the URL of the DarkShield API instance for the job to contact is a configurable option.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The DarkShield API itself requires the SortCL executable to perform masking. This is the same program used by <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> for masking, and thus when the same masking functions are used, the same ciphertext results can be produced from the same original plaintext values processed by either tool.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Contact your IRI representative, and refer to the DarkShield instructions in the <\/span><a href=\"https:\/\/www.iri.com\/download\/2ff98014a89ab3f1bda9325273f4feb282aeefc0\"><span style=\"font-weight: 400;\">IRI software installation<\/span><\/a><span style=\"font-weight: 400;\"> guide, to set up SortCL on your system(s) where data masking jobs will run. Note that everything will be included if you install IRI Voracity on Windows.<\/span><\/p>\n<h5><b><\/b><b>Command Line Operations<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The DarkShield CLI client operates on the same <\/span><i><span style=\"font-weight: 400;\">.dsc <\/span><\/i><span style=\"font-weight: 400;\">(i.e. search and\/or masking configuration)<\/span> <span style=\"font-weight: 400;\">files which are created and used in the IRI Workbench version of DarkShield.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just as you can automate the execution of .dsc files built in IRI Workbench using the IRI Workbench task scheduler, you can use the CLI to execute the same jobs outside Workbench as a command task (see examples below) from: the O\/S shell, an external batch program, CI\/CD DevOps pipeline, an application system call, or any job scheduler you prefer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, the DarkShield job (.dsc) configuration files can only be created in IRI Workbench. For more details, see <a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\/cli-api\">this page<\/a> and the <\/span><a href=\"https:\/\/www.iri.com\/download\/faca0bd49c6e350590bb463e92162bf4a9ad7e36\"><span style=\"font-weight: 400;\">DarkShield Primer<\/span><\/a><span style=\"font-weight: 400;\">, as well as the internal documentation on DarkShield found within IRI Workbench.<\/span><\/p>\n<h5><b>DarkShield CLI Syntax<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">When you are on the command line, the syntax you would use to run your job is:<\/span><\/p>\n<pre><b>darkshield [[Path Mode [-u=URL] [-r] [-ae] [-ao=Audit Output Folder] [-hV]<\/b><\/pre>\n<p><span style=\"font-weight: 400;\">The options, or flags that are parameters, to that command are as follows:<\/span><b>\u00a0<\/b><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<pre><b>Path <\/b> <span style=\"font-weight: 400;\">Path to the search\/mask configuration (.dsc) file<\/span>\r\n<b>Mode<\/b> <span style=\"font-weight: 400;\">Type of job (search, mask, or search_mask for both)<\/span>\r\n<b>-r, --results<\/b><span style=\"font-weight: 400;\"> \u00a0 \u00a0 <\/span> <span style=\"font-weight: 400;\">If each masking job will produce a JSON audit report<\/span>\r\n<b>-u, --url=URL <\/b><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0<\/span> <span style=\"font-weight: 400;\">URL of the DarkShield API (Plankton) web service<\/span>\r\n<b>-ae \u2013audit-enabled <\/b><span style=\"font-weight: 400;\">\u00a0<\/span> <span style=\"font-weight: 400;\">Turns on DarkShield job audit logging<\/span>\r\n<b>-ao -audit-output<\/b> <span style=\"font-weight: 400;\">Your target folder for the audit logs<\/span>\r\n<b>-h, --help <\/b><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span> <span style=\"font-weight: 400;\">Displays program description and these options<\/span>\r\n<b>-V, --version <\/b><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span> <span style=\"font-weight: 400;\">Prints version information and exits.<\/span><\/pre>\n<h5><b>Examples<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Here are some examples of DarkShield CLI invocations and their explanations:<\/span><\/p>\n<pre><span style=\"font-weight: 400;\">darkshield C:\\runtime-eclipse17\\new_search_json-xml-delim_out\\new_search_json-xml-delim_out.dsc SEARCH_MASK<\/span>\r\n<\/pre>\n<p><span style=\"font-weight: 400;\">Runs a DarkShield job in search_mask (SEARCH_MASK) mode, which searches and masks data in one-pass, using the Workbench-configured DarkShield .dsc job located at the path <\/span><\/p>\n<pre><span style=\"font-weight: 400;\">\u2018<\/span><i><span style=\"font-weight: 400;\">C:\\runtime-eclipse17\\\\new_search_json-xml-delim_out\\new_search_json-xml-delim_out.dsc<\/span><\/i><\/pre>\n<p><span style=\"font-weight: 400;\">darkshield <\/span><\/p>\n<pre><span style=\"font-weight: 400;\">C:\\runtime-eclipse17\\new_search_json-xml-delim_out\\new_search_json-xml-delim_out.dsc SEARCH<\/span> \r\n<\/pre>\n<p><span style=\"font-weight: 400;\">Runs a DarkShield job in search mode using the Workbench-configured DarkShield .dsc job located at the path <\/span><\/p>\n<pre><span style=\"font-weight: 400;\">\u2018<\/span><i><span style=\"font-weight: 400;\">C:\\runtime-eclipse17\\new_search_json-xml-delim_out\\new_search_json-xml-delim_out.dsc<\/span><\/i><i><\/i><\/pre>\n<pre><span style=\"font-weight: 400;\">darkshield -u <\/span><span style=\"font-weight: 400;\">http<\/span><span style=\"font-weight: 400;\">:<\/span><span style=\"font-weight: 400;\">\/\/192.168.1.34:8959<\/span><span style=\"font-weight: 400;\"> -ae -ao \/home\/darkshield\/logs -r new_search.dsc MASK<\/span>\r\n<\/pre>\n<p><span style=\"font-weight: 400;\">Runs a DarkShield job in mask mode (NOTE: a DarkShield job must have previously been run in search mode before running in mask mode) using the Workbench-configured DarkShield job named <\/span><i><span style=\"font-weight: 400;\">new_search.dsc<\/span><\/i><span style=\"font-weight: 400;\">, located in the current working directory. The URL of the DarkShield API is specified as <\/span><span style=\"font-weight: 400;\">http:\/\/192.168.1.34:8959<\/span><span style=\"font-weight: 400;\"> and the creation of a DarkShield job audit log is enabled. The output folder for an audit log of the DarkShield job is specified as <\/span><i><span style=\"font-weight: 400;\">\/home\/darkshield\/logs<\/span><\/i><span style=\"font-weight: 400;\">. Production of detailed JSON-formatted results files, which audit masking results of each masking request to the DarkShield API, is also enabled. Note that a DarkShield job may consist of numerous requests to the DarkShield API for searching and\/or masking.<\/span><\/p>\n<pre><span style=\"font-weight: 400;\">darkshield --version<\/span>\r\n<\/pre>\n<p><span style=\"font-weight: 400;\">Prints the DarkShield product version in use: (e.g.) 5.0<\/span><\/p>\n<pre><span style=\"font-weight: 400;\">darkshield --help<\/span>\r\n<\/pre>\n<p><span style=\"font-weight: 400;\">Displays the help messages above.<\/span><\/p>\n<h5><b>Conclusion<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The DarkShield CLI provides a versatile and powerful way to manage data discovery and masking tasks <\/span><i><span style=\"font-weight: 400;\">outside <\/span><\/i><span style=\"font-weight: 400;\">the IRI Workbench GUI. Whether you&#8217;re looking to automate these workflows, integrate them into CI\/CD pipelines, or simply prefer the command-line interface, the DarkShield CLI has you covered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For help configuring or running DarkShield jobs, please email <\/span><a href=\"mailto:darkshield@iri.com\"><span style=\"font-weight: 400;\">darkshield@iri.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The IRI DarkShield Command-Line Interface (CLI) offers a powerful way to harness the data discovery and masking capabilities of DarkShield Version 5 outside the graphical IRI Workbench environment. This article introduces you to the DarkShield CLI, its requirements, and how to use it effectively. What is the DarkShield CLI? The DarkShield CLI is a Command-Line<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\" title=\"Running DarkShield from the Command Line\">Read More<\/a><\/div>\n","protected":false},"author":101,"featured_media":18011,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[1929,1932,1930,1928,1494,1931,280,14,18,13,1927,850,68],"class_list":["post-17987","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-automation-workflows","tag-batch-job-automation","tag-ci-cd-integration","tag-command-line-interface","tag-darkshield-api","tag-darkshield-configuration","tag-data-discovery","tag-data-masking","tag-data-privacy","tag-data-protection-2","tag-iri-darkshield-cli","tag-iri-workbench","tag-sortcl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Running DarkShield from the Command Line - IRI<\/title>\n<meta name=\"description\" content=\"Learn how to use the command-line interface (CLI) mode in the DarkShield data masking tool to automate your PII search and masking jobs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Running DarkShield from the Command Line\" \/>\n<meta property=\"og:description\" content=\"Learn how to use the command-line interface (CLI) mode in the DarkShield data masking tool to automate your PII search and masking jobs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-26T02:10:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-06T20:47:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Donna Davis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Donna Davis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\"},\"author\":{\"name\":\"Donna Davis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\"},\"headline\":\"Running DarkShield from the Command Line\",\"datePublished\":\"2024-09-26T02:10:08+00:00\",\"dateModified\":\"2024-11-06T20:47:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\"},\"wordCount\":1016,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png\",\"keywords\":[\"Automation workflows\",\"Batch job automation\",\"CI\/CD integration\",\"Command-Line Interface\",\"Darkshield API\",\"DarkShield configuration\",\"data discovery\",\"data masking\",\"data privacy\",\"data protection\",\"IRI DarkShield CLI\",\"IRI Workbench\",\"SortCL\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\",\"name\":\"Running DarkShield from the Command Line - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png\",\"datePublished\":\"2024-09-26T02:10:08+00:00\",\"dateModified\":\"2024-11-06T20:47:06+00:00\",\"description\":\"Learn how to use the command-line interface (CLI) mode in the DarkShield data masking tool to automate your PII search and masking jobs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Running DarkShield from the Command Line\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b\",\"name\":\"Donna Davis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g\",\"caption\":\"Donna Davis\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/donnad\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Running DarkShield from the Command Line - IRI","description":"Learn how to use the command-line interface (CLI) mode in the DarkShield data masking tool to automate your PII search and masking jobs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/","og_locale":"en_US","og_type":"article","og_title":"Running DarkShield from the Command Line","og_description":"Learn how to use the command-line interface (CLI) mode in the DarkShield data masking tool to automate your PII search and masking jobs.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/","og_site_name":"IRI","article_published_time":"2024-09-26T02:10:08+00:00","article_modified_time":"2024-11-06T20:47:06+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png","type":"image\/png"}],"author":"Donna Davis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Donna Davis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/"},"author":{"name":"Donna Davis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b"},"headline":"Running DarkShield from the Command Line","datePublished":"2024-09-26T02:10:08+00:00","dateModified":"2024-11-06T20:47:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/"},"wordCount":1016,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png","keywords":["Automation workflows","Batch job automation","CI\/CD integration","Command-Line Interface","Darkshield API","DarkShield configuration","data discovery","data masking","data privacy","data protection","IRI DarkShield CLI","IRI Workbench","SortCL"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/","name":"Running DarkShield from the Command Line - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png","datePublished":"2024-09-26T02:10:08+00:00","dateModified":"2024-11-06T20:47:06+00:00","description":"Learn how to use the command-line interface (CLI) mode in the DarkShield data masking tool to automate your PII search and masking jobs.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/running-darkshield-from-the-command-line\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Running DarkShield from the Command Line"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/52271b71b77d927ce9421530e2b1260b","name":"Donna Davis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f109ab98ab74af3d4419d9d477bb85db?s=96&d=blank&r=g","caption":"Donna Davis"},"url":"https:\/\/www.iri.com\/blog\/author\/donnad\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/09\/Featured-Image-CLI.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17987"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/101"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=17987"}],"version-history":[{"count":9,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17987\/revisions"}],"predecessor-version":[{"id":18089,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17987\/revisions\/18089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/18011"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=17987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=17987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=17987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}