Request and response body capture
Capture request body
Enable this option to capture and store the full request body content in event data for debugging and analysis.Capture response body
Enable this option to capture and store the full response body content in event data for complete request-response tracking.IP address filtering
Exclude localhost
Enable this option to prevent event collection from requests originating from localhost IP addresses (localhost, 127.0.0.1, ::1).
This is useful for excluding development and testing traffic from your
production analytics.
Excluded IP addresses
Specify IP addresses that will be completely excluded from event collection. This is useful for blocking noisy sources or internal testing IPs. You can add multiple IP addresses, one per line. For example:Field masking
Masked field names
Specify field names that will be automatically masked (replaced with asterisks) in request and response bodies to protect sensitive information like passwords, tokens, and API keys. You can add multiple field names. Common examples include:passwordtokenauthorizationset-cookieapiKeysecret
Masked JSON paths
Use JSONPath expressions to mask specific nested fields in request/response bodies. Use dot notation to target deeply nested values. Examples:user.email- Masks the email field within a user objectorder.card.number- Masks the card number in a nested order structurecredentials.apiKey- Masks API keys in nested credential objectsdata.user.password- Masks passwords at any nesting level
Header masking
Control which HTTP headers are automatically masked to protect sensitive authentication and session data.Mask cookies
Enable this option to automatically mask all cookie-related headers (Set-Cookie, Cookie) to protect session information.
Cookie masking is recommended for all production environments to protect user
session data.
Mask authorization
Enable this option to automatically mask theAuthorization header to protect API keys, tokens, and credentials.
Custom masked headers
Specify additional custom headers that should be automatically masked in all events. Common examples include:X-API-KeyX-Auth-TokenX-Session-TokenX-API-Secret
Custom headers are masked regardless of whether cookie or authorization
masking is enabled, giving you full control over which headers contain
sensitive information.