The New Relic Go agent default security settings automatically provide security for your APM data to ensure data privacy and to limit the kind of information New Relic receives. You may have business reasons to change these settings.
If you want to restrict the information that New Relic receives, you can enable high security mode. If high security mode or the default settings do not work for your business needs, you can apply custom settings.
By default, here is how the New Relic Go agent handles the following potentially sensitive data:
- Request parameters: The agent does not capture HTTP request parameters.
- HTTPS: The agent communicates with New Relic using HTTPS.
- You cannot create custom events.
- The agent strips exception messages from errors.
- The agent strips
QueryParametersfrom database segments.
If you customize security settings, it may impact the security of your application.
If you need different security settings than default or high security mode, you can customize these settings:
Effects on data security
By default, you are sending some attributes to New Relic. If you do not want to send these default attributes to New Relic, set
If there are specific attribute keys that you do not want to send to New Relic in transaction traces, identify them using
For examples of how to disable the recording of each attribute, see their descriptions on the Go agent attributes page.
If you need more help, check out these support and learning resources:
- Browse the Explorers Hub to get help from the community and join in discussions.
- Find answers on our sites and learn how to use our support portal.
- Run New Relic Diagnostics, our troubleshooting tool for Linux, Windows, and macOS.
- Review New Relic's data security and licenses documentation.