Skip to content

Commit be126d9

Browse files
jsimphercswattbarieom
authored
DAC for LLM Observability (#30771)
* mark * doc updates * link out from guide * rename * add to sidebar * Update content/en/llm_observability/monitoring/data_access_controls.md Co-authored-by: Barry Eom <[email protected]> * move data access controls to its own section * tweak * qf * changes --------- Co-authored-by: cecilia saixue watt <[email protected]> Co-authored-by: Barry Eom <[email protected]>
1 parent 67af7ae commit be126d9

File tree

4 files changed

+43
-13
lines changed

4 files changed

+43
-13
lines changed

config/_default/menus/main.en.yaml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4718,16 +4718,21 @@ menu:
47184718
parent: llm_obs
47194719
identifier: llm_obs_experiments
47204720
weight: 5
4721+
- name: Data Security and RBAC
4722+
url: llm_observability/data_security_and_rbac
4723+
parent: llm_obs
4724+
identifier: llm_obs_data_security_and_rbac
4725+
weight: 6
47214726
- name: Terms and Concepts
47224727
url: llm_observability/terms/
47234728
parent: llm_obs
47244729
identifier: llm_obs_terms
4725-
weight: 6
4730+
weight: 7
47264731
- name: Guides
47274732
url: llm_observability/guide/
47284733
parent: llm_obs
47294734
identifier: llm_obs_guide
4730-
weight: 7
4735+
weight: 8
47314736
- name: CI Visibility
47324737
url: continuous_integration/
47334738
pre: ci

content/en/account_management/rbac/data_access.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,10 @@ Log in as a user assigned the Datadog Admin role, or any user with a role in you
4343

4444
In order to create a Restricted Dataset, identify the data to be restricted with a query.
4545

46-
{{< img src="/account_management/rbac/restricted_dataset.png" alt="Create a Restricted Dataset dialog. Selects data in RUM, APM, Logs, and Metrics matching the tag service:hr. Grants access to a Privileged access team.">}}
46+
{{< img src="/account_management/rbac/restricted_dataset-2.png" alt="Create a Restricted Dataset dialog. Selects data in RUM, APM, Logs, and Metrics matching the tag service:hr. Grants access to a Privileged access team.">}}
4747

4848
Name Dataset
49-
: A descriptive name to help users understand what data is contained in the dataset.
49+
: A descriptive name to help users understand what data is contained in the dataset.
5050

5151
Select data to be included in this Dataset
5252
: The boundary definition that describes which data to restrict to a specific set of users. Boundaries are query statements with limitations that allow an access manager to define the scope of sensitive data to be protected. The [supported telemetry types][10] are custom metrics, RUM sessions, APM traces, logs, cloud costs, error tracking issues, and CI Visibility pipelines.
@@ -61,7 +61,7 @@ After completing all the fields to define the dataset, click **Create Restricted
6161
You may create a maximum of 100 Restricted Datasets. If you need a higher limit, reach out to Support.
6262

6363
### API
64-
The Data Access Control API is under development and should be considered unstable. Future versions may be backward incompatible.
64+
The Data Access Control API is under development and should be considered unstable. Future versions may be backward incompatible.
6565

6666
Terraform support will be announced after Data Access Control is generally available.
6767

@@ -75,6 +75,7 @@ Terraform support will be announced after Data Access Control is generally avail
7575
- Error Tracking issues
7676
- Logs
7777
- RUM sessions
78+
- LLM Observability
7879

7980
## Usage constraints
8081

@@ -92,6 +93,7 @@ Playlists are collections of Session Replays you can aggregate in a folder-like
9293
### Logs
9394
Data Access Control is separate from the existing [Logs RBAC permissions][11] feature, also known as log restriction queries. To use Data Access Control with Log Management, first request access to Data Access Control. Next, manually migrate your configuration from Log Management permissions to Data Access Control.
9495

96+
9597
## Select tags for access
9698

9799
Each Restricted Dataset can control access to multiple types of data, such as metrics. You are free to use the same or different tags across multiple types of telemetry. Within each telemetry type, you must use a _single_ tag or attribute to define your access strategy.
@@ -101,7 +103,7 @@ If you have too many combinations of tags or attributes to fit within these cons
101103
### Supported example
102104

103105
#### Restricted Dataset 1
104-
- Telemetry Type: RUM
106+
- Telemetry Type: RUM
105107
- Filters: `@application.id:ABCD`
106108

107109
#### Restricted Dataset 2
@@ -112,23 +114,23 @@ If you have too many combinations of tags or attributes to fit within these cons
112114

113115
### Not supported example
114116

115-
#### Restricted Dataset 1:
116-
* Telemetry type: RUM
117+
#### Restricted Dataset 1:
118+
* Telemetry type: RUM
117119
* Filters: `@application.id:ABCD`
118120

119121
#### Restricted Dataset 2:
120-
* Telemetry type: RUM
122+
* Telemetry type: RUM
121123
* Filters: `env:prod`
122124

123125
Restricted Dataset 1 uses `@application.id` as the tag for RUM data, so a new Restricted Dataset can't change to a different tag. Instead, consider reconfiguring Restricted Dataset 2 to use `@application.id`, or changing all of your Restricted Datasets with RUM data to use another tag.
124126

125127
### Not supported example
126128

127-
#### Restricted Dataset 1:
128-
* Telemetry type: RUM
129+
#### Restricted Dataset 1:
130+
* Telemetry type: RUM
129131
* Filters: `@application.id:ABCD`
130132

131-
#### Restricted Dataset 2:
133+
#### Restricted Dataset 2:
132134
* Telemetry type: RUM
133135
* Filters: `@application.id:IJKL` `env:prod`
134136

@@ -150,7 +152,7 @@ For example, if you have a single application that is instrumented with Real Use
150152
* Telemetry type: RUM
151153
* Filters: `@application.id:<rum-app-id>`
152154
* **Grant access:**
153-
* Teams or roles of users who can see this RUM data
155+
* Teams or roles of users who can see this RUM data
154156

155157
This configuration example would protect the RUM data from this application, and keep other data from this application available to existing users in your organization.
156158

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Data Security and RBAC
3+
further_reading:
4+
- link: "/account_management/rbac/data_access"
5+
tag: "Documentation"
6+
text: "Learn more about data access controls"
7+
---
8+
{{< whatsnext desc=" ">}}
9+
{{< nextlink href="https://datadoghq.com/legal/hipaa-eligible-services">}}<u>HIPAA-Eligible Services</u>: Datadog Legal's list of HIPAA-eligible services{{< /nextlink >}}
10+
{{< nextlink href="/llm_observability/evaluations/#sensitive-data-scanner-integration">}}<u>Sensitive Data Scanning for LLM Observability</u>: Redact sensitive information in your LLM application{{< /nextlink >}}
11+
{{< /whatsnext >}}
12+
13+
## Data Access Control
14+
15+
LLM Observability allows you to restrict access to potentially sensitive data associated with your ML applications to only certain teams and roles in your organization. This is particularly important when your LLM applications process sensitive information such as personal data, proprietary business information, or confidential user interactions.
16+
17+
Access controls in LLM Observability are built on Datadog's [Data Access Control][1] feature, which enables enables you to regulate access to data deemed sensitive. You can use the `ml_app` tag to identify and restrict access to specific LLM applications within your organization.
18+
19+
## Further reading
20+
21+
{{< partial name="whats-next/whats-next.html" >}}
22+
23+
[1]: /account_management/rbac/data_access
235 KB
Loading

0 commit comments

Comments
 (0)