Skip to content

Commit 54340af

Browse files
committed
Documentation to run iast when apm is disabled
1 parent 3de28a5 commit 54340af

File tree

1 file changed

+63
-2
lines changed
  • content/en/security/code_security/iast/setup

1 file changed

+63
-2
lines changed

content/en/security/code_security/iast/setup/_index.md

Lines changed: 63 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,7 @@ aliases:
1111
Before setting up Runtime Code Analysis (IAST), ensure the following prerequisites are met:
1212

1313
1. **Datadog Agent Installation:** The Datadog Agent is installed and configured for your application's operating system or container, cloud, or virtual environment.
14-
2. **Datadog APM Configuration:** Datadog APM is configured for your application or service, and web traces (`type:web`) are being received by Datadog.
15-
3. **Supported Tracing Library:** The Datadog Tracing Library used by your application or service supports Runtime Code Analysis (IAST) capabilities for the language of your application or service. For more details, see the **Compatibility Requirements** section below.
14+
2. **Supported Tracing Library:** The Datadog Tracing Library used by your application or service supports Runtime Code Analysis (IAST) capabilities for the language of your application or service. For more details, see the **Compatibility Requirements** section below.
1615

1716
## Using Datadog Tracing Libraries
1817

@@ -87,6 +86,34 @@ Update your ECS task definition JSON file, by adding this in the environment sec
8786
]
8887
```
8988

89+
#### APM Tracing disabled
90+
91+
To disable APM tracing while keeping App and API Protection enabled, you must set the APM tracing variable to false.
92+
93+
{{< tabs >}}
94+
{{% tab "Using system properties" %}}
95+
96+
Start your Java application with the Datadog agent and App and API Protection enabled using system properties:
97+
98+
```bash
99+
java -javaagent:/path/to/dd-java-agent.jar -Ddd.iast.enabled=true -Ddd.apm.tracing.enabled=false -Ddd.service=<MY_SERVICE> -Ddd.env=<MY_ENV> -jar path/to/app.jar
100+
```
101+
{{% /tab %}}
102+
103+
{{% tab "Using environment variables" %}}
104+
105+
Set the required environment variables:
106+
107+
```Dockerfile
108+
DD_IAST_ENABLED=true
109+
DD_APM_TRACING_ENABLED=false
110+
DD_SERVICE=<YOUR_SERVICE_NAME>
111+
DD_ENV=<YOUR_ENVIRONMENT>
112+
```
113+
{{% /tab %}}
114+
{{< /tabs >}}
115+
116+
90117
[1]: https://github.com/DataDog/dd-trace-java/releases
91118
[2]: /security/code_security/iast/setup/
92119
[3]: /security/code_security/iast/setup/
@@ -199,6 +226,18 @@ Add the following line to your container Dockerfile:
199226
ENV DD_IAST_ENABLED=true
200227
```
201228

229+
#### APM Tracing disabled
230+
231+
To disable APM tracing while keeping App and API Protection enabled, you must set the APM tracing variable to false.
232+
233+
```Dockerfile
234+
DD_IAST_ENABLED=true
235+
DD_APM_TRACING_ENABLED=false
236+
DD_SERVICE=<YOUR_SERVICE_NAME>
237+
DD_ENV=<YOUR_ENVIRONMENT>
238+
```
239+
240+
202241
To see Runtime Code Analysis (IAST) in action, browse your service and find code-level vulnerabilities in the [Vulnerability Explorer][4].
203242

204243
{{< img src="/security/application_security/Code-Level-Vulnerability-Details-New.mp4" alt="Video showing Code Vulnerabilities" video="true" >}}
@@ -280,6 +319,17 @@ Update your ECS task definition JSON file, by adding this in the environment sec
280319
]
281320
```
282321

322+
#### APM Tracing disabled
323+
324+
To disable APM tracing while keeping App and API Protection enabled, you must set the APM tracing variable to false.
325+
326+
```Dockerfile
327+
DD_IAST_ENABLED=true
328+
DD_APM_TRACING_ENABLED=false
329+
DD_SERVICE=<YOUR_SERVICE_NAME>
330+
DD_ENV=<YOUR_ENVIRONMENT>
331+
```
332+
283333
[1]: https://github.com/DataDog/dd-trace-js/blob/master/MIGRATING.md
284334
[2]: /security/code_security/iast/setup/nodejs/
285335
[3]: /security/code_security/iast/setup/
@@ -357,6 +407,17 @@ Update your ECS task definition JSON file, by adding this in the environment sec
357407
]
358408
```
359409

410+
#### APM Tracing disabled
411+
412+
To disable APM tracing while keeping App and API Protection enabled, you must set the APM tracing variable to false.
413+
414+
```Dockerfile
415+
DD_IAST_ENABLED=true
416+
DD_APM_TRACING_ENABLED=false
417+
DD_SERVICE=<YOUR_SERVICE_NAME>
418+
DD_ENV=<YOUR_ENVIRONMENT>
419+
```
420+
360421
#### Third-Party Library Compatibility Note
361422

362423
Runtime Code Analysis (IAST) modifies Python code at runtime. This could cause conflicts with other third-party Python libraries that perform similar code transformations, particularly with the following, though not limited to them:

0 commit comments

Comments
 (0)