Skip to content

Instantly share code, notes, and snippets.

@burnsie7
burnsie7 / log_redaction_examples.md
Created March 11, 2020 15:58
PII Log Redaction

Log Processing Rules

log_processing_rules:

Generic String: "sensitive-info"

  - type: exclude_at_match
    name: exclude_sensitive_info
    pattern: (?:sensitive\-info)
@jaycdave88
jaycdave88 / Datadog PowerShell + win32_event_log setup
Last active October 12, 2023 15:15
PowerShell script to install latest Datadog Windows agent. Enable logs, live process, and configure win32_event_logs
# Download agent
(Invoke-WebRequest https://s3.amazonaws.com/ddagent-windows-stable/datadog-agent-7-latest.amd64.msi -OutFile c:\datadog-agent-7-latest.amd64.msi)
# Download .NET Tracer v1.13x64 .msi
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
(Invoke-WebRequest https://github.com/DataDog/dd-trace-dotnet/releases/download/v1.13.0/datadog-dotnet-apm-1.13.0-x64.msi -OutFile c:\datadog-dotnet-apm-1.13.0-x64.msi)
# Start the Datadog agent
(Start-Process -Wait msiexec -ArgumentList '/qn /i c:\datadog-agent-7-latest.amd64.msi APIKEY=xxx HOSTNAME="my_hostname" TAGS="mytag1,mytag2"')
#!/usr/bin/env python
import socket
import json
import time
import ssl
host = "intake.logs.datadoghq.com"
ssl_port = 10516
ddApiKey = "API_KEY"
dd_source = "MY_SOURCE"
$pwd = convertto-securestring "Admin!" -asplaintext -force
$cred=new-object -typename System.Management.Automation.PSCredential -argumentlist ".\reutadmin",$pwd
$windows_vms = @("192.168.86.66")
$install_datadog = {
& msiexec /qn /i datadog-agent-6-latest.amd64.msi APIKEY="DATADOG_API_KEY" HOSTNAME="my_hostname" TAGS="mytag1,mytag2"
}