This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

You can detect code-level vulnerabilities and monitor application security in .NET applications running in Docker, Kubernetes, Amazon ECS, and AWS Fargate.

Follow these steps to enable Code Security in your service:

  1. Update your Datadog Agent to at least version 7.41.1.

  2. Update your Datadog Tracing Library to at least the minimum version needed to turn on Code Security. For details, see Library Compatibility page.

  3. Add the DD_IAST_ENABLED=true environment variable to your application configuration. For example, on Windows self-hosted, run the following PowerShell snippet as part of your application start-up script:

    $target=[System.EnvironmentVariableTarget]::Process
    [System.Environment]::SetEnvironmentVariable("DD_IAST_ENABLED","true",$target)
    

Or one of the following methods, depending on where your application runs:

In a Windows console:

rem Set environment variables
SET DD_IAST_ENABLED=true

rem Start application
dotnet.exe example.dll

Run the following PowerShell command as administrator to configure the necessary environment variables in the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Environment and restart IIS.

$target=[System.EnvironmentVariableTarget]::Machine
[System.Environment]::SetEnvironmentVariable("DD_IAST_ENABLED","true",$target)
net stop was /y
net start w3svc

Add the following to your application configuration:

DD_IAST_ENABLED=true

Update your configuration container for APM by adding the following argument in your docker run command:

docker run -d --name app -e DD_IAST_ENABLED=true company/app:latest

Add the following environment variable value to your container Dockerfile:

ENV DD_IAST_ENABLED=true

Update your deployment configuration file for APM and add the ASM environment variable:

spec:
  template:
    spec:
      containers:
        - name: <CONTAINER_NAME>
          image: <CONTAINER_IMAGE>/<TAG>
          env:
            - name: DD_IAST_ENABLED
              value: "true"

Update your ECS task definition JSON file, by adding this in the environment section:

"environment": [
  ...,
  {
    "name": "DD_IAST_ENABLED",
    "value": "true"
  }
]

Add the following line to your container Dockerfile:

ENV DD_IAST_ENABLED=true

To see Code Security in action, browse your service and find code-level vulnerabilities in the Vulnerability Explorer.

If you need additional assistance, contact [Datadog support][5].

Further Reading

PREVIEWING: esther/docs-9478-fix-split-after-example