Security Settings
Configure PII scrubbing, redaction policies, MFA, RBAC, audit logs, and data retention.
Security Settings
Obtrace provides layered security controls for data privacy, access management, and compliance. Security is enforced at ingestion time and throughout the data lifecycle.
Obtrace is an AI-powered observability platform that detects production errors, finds root causes automatically, and suggests or opens code fixes as pull requests. Security settings ensure that this automation operates within your data governance requirements.
PII scrubbing
Gate1: Ingest-time scrubbing
Gate1 runs at the ingest edge before data reaches storage or workers. It applies built-in patterns for common PII:
- Email addresses
- Credit card numbers (PCI patterns)
- Social Security Numbers
- Bearer tokens and API keys
- IP addresses (configurable)
Gate1 scrubbing is always active and cannot be disabled. Matched patterns are replaced with [REDACTED:<type>].
Gate2: Policy-based scrubbing
Gate2 runs in workers and applies tenant-specific redaction policies using JSONPath and regex patterns:
Actions: redact (replace with placeholder), hash (SHA-256, preserves cardinality), drop (remove field entirely).
Authentication
MFA / OTP
Enforce multi-factor authentication for all users in your organization:
Supported methods: TOTP (authenticator apps), WebAuthn (hardware keys, passkeys).
API key management
API keys are scoped to project and environment. Rotate keys without downtime by creating a new key before revoking the old one:
RBAC
Role-based access control with predefined and custom roles:
| Role | Capabilities |
|---|---|
viewer | Read dashboards, incidents, replays |
responder | Acknowledge/resolve incidents, view AI analysis |
editor | Modify dashboards, notification rules, integrations |
admin | Manage users, security settings, billing |
owner | Full access including destructive operations |
Create custom roles by combining granular permissions:
Audit log
All security-relevant actions are recorded in an immutable audit log:
Logged events include: user login/logout, role changes, API key creation/revocation, redaction policy changes, data export requests, and security setting modifications.
Audit logs are retained for 1 year regardless of your data retention settings.
Data retention
Configure how long telemetry data is stored:
Data is hard-deleted after the retention period. There is no soft-delete or recovery after expiration.
Security settings audit trail
Changes to security settings themselves are tracked separately with before/after diffs:
Limitations
- Gate1 patterns are not configurable per tenant. Custom patterns require Gate2 policies.
- RBAC custom roles are limited to 20 per organization.
- Audit log queries support a maximum time range of 90 days per request. Use pagination for longer periods.