builtin:logmonitoring.sensitive-data-masking-settings)
Create rules to mask any information you consider to be sensitive. Masking is done on OneAgent, and no personal data is sent or stored on Dynatrace server.
builtin:logmonitoring.sensitive-data-masking-settings
group:log-monitoring
group:log-monitoring.ingest-and-processing
HOST
- HostKUBERNETES_CLUSTER
- Kubernetes clusterHOST_GROUP
- Host Groupenvironment
GET | Managed | https://{your-domain}/e/{your-environment-id}/api/v2/settings/schemas/builtin:logmonitoring.sensitive-data-masking-settings |
SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/settings/schemas/builtin:logmonitoring.sensitive-data-masking-settings | |
Environment ActiveGate | https://{your-activegate-domain}/e/{your-environment-id}/api/v2/settings/schemas/builtin:logmonitoring.sensitive-data-masking-settings |
To execute this request, you need an access token with Read settings (settings.read
) scope. To learn how to obtain and use it, see Tokens and authentication.
Masking
objectexpression
Maximum one capture group is allowed. If none was given, the whole expression will be treated as a capture group.
type
STRING
SHA1
SHA256
replacement
Matcher
objectattribute
dt.entity.process_group
log.source
log.source.origin
host.tag
k8s.container.name
k8s.namespace.name
k8s.deployment.name
k8s.pod.annotation
k8s.pod.label
k8s.workload.name
k8s.workload.kind
container.name
dt.entity.container_group
process.technology
operator
MATCHES
values