Skip to content

Commit 2d63463

Browse files
maycmleedomalessi
andauthored
[DOCS-12427] Add sampling info (#32511)
* add info * Apply suggestions from code review * Apply suggestions from code review Co-authored-by: domalessi <111786334+domalessi@users.noreply.github.com> --------- Co-authored-by: domalessi <111786334+domalessi@users.noreply.github.com>
1 parent 68ddbef commit 2d63463

File tree

2 files changed

+8
-0
lines changed

2 files changed

+8
-0
lines changed

content/en/security/sensitive_data_scanner/_index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,13 +66,17 @@ The data that can be scanned and redacted are:
6666
- **RUM**: Event attribute values only
6767
- **Events**: Event attribute values only
6868

69+
Optionally, sampling rates can be set between 10% and 99% for each product. This helps manage costs when you first get started by reducing the amount of data that gets scanned for sensitive information.
70+
6971
For each [scanning rule][17], one of the following actions can be applied to matched sensitive data:
7072

7173
- **Redact**: Replace the entire matched data with a single token that you choose, such as `[sensitive_data]`.
7274
- **Partially redact**: Replace a specific portion of all matching values.
7375
- **Hash**: Replace the entire matched data with a non-reversible unique identifier.
7476
- **Mask** (available for logs only): Obfuscate all matching values. Users with the `Data Scanner Unmask` permission can de-obfuscate (unmask) and view this data in Datadog. See [Mask action][16] for more information.
7577

78+
**Note**: When scanning sampled data, you will not be able to select actions that obfuscate the data it scans.
79+
7680
To use Sensitive Data Scanner, set up a scanning group to define what data to scan and then set up scanning rules to determine what sensitive information to match within the data. For scanning rules you can:
7781
- Add predefined scanning rules from Datadog's [Scanning Rule Library][2]. These rules detect common patterns such as email addresses, credit card numbers, API keys, authorization tokens, network and device information, and more.
7882
- [Create your own rules using regex patterns][3].

content/en/security/sensitive_data_scanner/setup/telemetry_data.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,17 @@ Sensitive Data Scanner in the Cloud scans telemetry data, such as your applicati
2424
- **RUM**: Event attribute values only
2525
- **Events**: Event attribute values only
2626

27+
Optionally, sampling rates can be set between 10% and 99% for each product. This helps manage costs when you first get started by reducing the amount of data that gets scanned for sensitive information.
28+
2729
For each scanning rule, one of the following actions can be applied to matched sensitive data:
2830

2931
- **Redact**: Replace the entire matched data with a single token that you choose, such as `[sensitive_data]`.
3032
- **Partially redact**: Replace a specific portion of all matching values.
3133
- **Hash**: Replace the entire matched data with a non-reversible unique identifier.
3234
- **Mask** (available for logs only): Obfuscate all matching values. Users with the `Data Scanner Unmask` permission can de-obfuscate (unmask) and view this data in Datadog. See [Mask action](#mask-action) for more information.
3335

36+
**Note**: When scanning sampled data, you will not be able to select actions that obfuscate the data it scans.
37+
3438
You submit logs and events to the Datadog backend, so the data leaves your environment before it gets redacted. The logs and events are scanned and redacted in the Datadog backend during processing, so sensitive data is redacted before events are indexed and shown in the Datadog UI.
3539

3640
If you don't want data to leave your environment before it gets redacted, use [Observability Pipelines][12] and the [Sensitive Data Scanner processor][13] to scan and redact sensitive data. See [Set Up Pipelines][14] for information on how to set up a pipeline and its components.

0 commit comments

Comments
 (0)