• Home
  • Dynatrace API
  • Environment
  • Settings
  • Schemas
  • Attribute allow list

Settings API - Attribute allow list schema table

Attribute allow list (builtin:unified-attribute-allow-list)

While Dynatrace automatically captures all OpenTracing and OpenTelemetry attributes, to prevent the accidental storage of personal data, only the values of attributes for which a related key is specified in the allow-list below are stored. This enables you to meet your privacy requirements while controlling the amount of monitoring data that's stored.

Schema IDSchema groupsScope
builtin:unified-attribute-allow-list
  • group:service-monitoring
  • group:service-monitoring.spans
environment
Retrieve schema via Settings API
GETManagedhttps://{your-domain}/e/{your-environment-id}/api/v2/settings/schemas/builtin:unified-attribute-allow-list
SaaShttps://{your-environment-id}.live.dynatrace.com/api/v2/settings/schemas/builtin:unified-attribute-allow-list
Environment ActiveGatehttps://{your-activegate-domain}/e/{your-environment-id}/api/v2/settings/schemas/builtin:unified-attribute-allow-list

Authentication

To execute this request, you need an access token with Read settings (settings.read) scope. To learn how to obtain and use it, see Tokens and authentication.

Parameters

PropertyLabelTypeDescriptionRequired
enabledEnabledboolean

If this is true, the value of the specified key is stored.

required
attributeKeyAttribute keytext

Key of the attribute to store

Attribute key service.name is automatically captured by default

required
maskingMaskingenum

If this attribute contains confidential data, turn on masking to conceal its value from users

Introduce more granular control over the visibility of attribute values.
Choose Do not mask to allow every user to see the actual value and use it in defining other configurations.
Choose Mask entire value to hide the whole value of this attribute from everyone who does not have 'View sensitive request data' permission. These attributes can't be used to define other configurations. Choose Mask only confidential data to apply automatic masking strategies to your data. These strategies include, for example, credit card numbers, IBAN, IPs, email-addresses, etc. It may not be possible to recognize all sensitive data so please always make sure to verify that sensitive data is actually masked. If sensitive data is not recognized, please use Mask entire value instead. Users with 'View sensitive request data' permission will be able to see the entire value, others only the non-sensitive parts. These attributes can't be used to define other configurations.

required