You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: tracer/src/Datadog.Trace/Configuration/supported-configurations-docs.yaml
+85-10Lines changed: 85 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,80 @@ DD_APPSEC_RULES: |
53
53
Override the default rules file provided. Must be a path to a valid JSON rules file.
54
54
Default is value is null (do not override).
55
55
56
+
DD_APPSEC_KEEP_TRACES: |
57
+
Specifies if the AppSec traces should be explicitly kept or dropped.
58
+
Default is true, to keep all traces, false means drop all traces (by setting AutoReject as sampling priority).
59
+
For internal testing only.
60
+
61
+
DD_APPSEC_TRACE_RATE_LIMIT: |
62
+
Limits the amount of AppSec traces sent per second with an integer value, strictly positive.
63
+
64
+
DD_APPSEC_WAF_TIMEOUT: |
65
+
WAF timeout in microseconds of each WAF execution (the timeout value passed to ddwaf_run).
66
+
67
+
DD_APPSEC_RASP_ENABLED: |
68
+
default value to true. Set to false to disable exploit prevention.
69
+
70
+
DD_APPSEC_STACK_TRACE_ENABLED: |
71
+
with a default value of true, it allows a customer to disable the generation of stack traces, for any ASM-specific purpose such as RASP.
72
+
73
+
DD_APPSEC_MAX_STACK_TRACES: |
74
+
with a default value of 2, defines the maximum number of stack traces to be reported due to RASP events. 0 for unlimited.
75
+
76
+
DD_APPSEC_MAX_STACK_TRACE_DEPTH: |
77
+
with a default value of 32, defines the maximum depth of a stack trace to be reported due to RASP events. O for unlimited.
78
+
79
+
DD_APPSEC_MAX_STACK_TRACE_DEPTH_TOP_PERCENT: |
80
+
with a default value of 75, defines the percentage of frames taken from the top of the stack when trimming. Min 0, Max 100
81
+
82
+
DD_APPSEC_OBFUSCATION_PARAMETER_KEY_REGEXP: |
83
+
The regex that will be used to obfuscate possible sensitive data in keys that are highlighted WAF as potentially malicious
84
+
85
+
DD_APPSEC_OBFUSCATION_PARAMETER_VALUE_REGEXP: |
86
+
The regex that will be used to obfuscate possible sensitive data in values that are highlighted WAF as potentially malicious
87
+
88
+
DD_APPSEC_HTTP_BLOCKED_TEMPLATE_HTML: |
89
+
Blocking response template for HTML content. This template is used in combination with the status code to craft and send a response upon blocking the request.
90
+
91
+
DD_APPSEC_HTTP_BLOCKED_TEMPLATE_JSON: |
92
+
Blocking response template for Json content. This template is used in combination with the status code to craft and send a response upon blocking the request.
93
+
94
+
DD_APPSEC_AUTOMATED_USER_EVENTS_TRACKING: |
95
+
Deprecate. Automatic tracking of user events mode. Values can be disabled, safe or extended.
96
+
This config is in the process of being deprecated. Please use DD_APPSEC_AUTO_USER_INSTRUMENTATION_MODE
97
+
instead.
98
+
Values will be automatically translated:
99
+
disabled = disabled
100
+
safe = anon
101
+
extended = ident
102
+
103
+
DD_APPSEC_AUTO_USER_INSTRUMENTATION_MODE: |
104
+
Automatic instrumentation of user event mode. Values can be ident, disabled, anon.
105
+
106
+
DD_API_SECURITY_ENABLED: |
107
+
When ASM is enabled, collects in spans endpoints apis schemas analyzed by the waf, default value is true.
108
+
109
+
DD_API_SECURITY_SAMPLE_DELAY: |
110
+
Api security sample delay in seconds , should be a float. Set to 0 for testing purposes. default value of 30.
111
+
112
+
DD_API_SECURITY_ENDPOINT_COLLECTION_ENABLED: |
113
+
with a default value of true, it allows a customer to disable the collection of endpoints for API Security.
0 commit comments