Runtime log governance · SDK + Control Plane

Prevent secrets, PII, and bad data from ever leaving your application. Enforce logging rules before anything reaches your pipeline.

Everything else fixes logs after the mistake. Cerbi prevents the mistake.

With Cerbi

Application
emits log
Cerbi
Enforces policy before emission
Clean Logs
Only safe, governed data
Datadog / Splunk
downstream sink

Without Cerbi

Application
emits log
Pipeline
raw data passes through
Ingest / Storage
sensitive data already stored
Sensitive data stored
Security risk · Compliance exposure
68.9K+NuGet downloads
29Packages
Microsoft Partner
Azure Marketplace
Harvard i-Lab

Ifyou'rerelyingoningestmasking,you'realreadytoolate.

Cerbi: governance at the source

Log Example

The difference is visible in the log.

Same event. Same application. One exposes credentials to your observability platform. The other does not.

Without Cerbi
User login failed email=jane@company.comPII password=SuperSecret123SECRET token=abc123xyzTOKEN

Sensitive fields reach Datadog, Splunk, and every downstream system.

With Cerbi
User login failed email=[REDACTED] password=[BLOCKED] token=[REDACTED]
GovernanceViolations=["SensitiveField:password","SensitiveField:token"]

Sensitive fields never leave the application. Violations are recorded asynchronously.

SAMPLESensitive field (exposed)
SAMPLERedacted / Blocked by Cerbi
SAMPLEGovernance violation record

Comparison

What Cerbi does that others cannot.

Capability
Cerbi
Datadog / Splunk / OTel
Control pointIn-app vs pipeline
Stops bad logs before emission
Schema enforcement before emission
Requires downstream configuration
Dependency on external systems
Works with existing log sinksNo replacement required
Async violation reporting
Supported
Not supported
Partial / limited

Architecture

Where Cerbi lives in your stack.

Cerbi sits between your logger and your sinks — entirely inside the application boundary. Nothing is added to your infrastructure.

Application Boundary
Application
Your service or API
Logger
MEL / Serilog / NLog
Cerbi Governance Layer
Rules · Schema · Sensitivity
Control point
Clean Logs
DatadogSplunkAzure MonitorOTel
Async governance path
Violations
field + rule + severity
Async Queue
non-blocking buffer
CerbiShield
Dashboard + audit

Positioning

Every tool has a different moment of action.

Datadog
fixesafter ingestion
Splunk
masksat ingest
OpenTelemetry
transformsin pipelines
Cerbi
preventsbefore they exist
Cerbi

The earlier the control point, the smaller the window of exposure. Cerbi closes that window entirely by acting inside the process, before any data moves.

Interactive Demo

See Cerbi in the Log Path

Pick a scenario, configure governance rules, and watch what gets sanitized, blocked, and routed asynchronously, before a single byte reaches your observability platform.

Mode
Rule Set
Input Log Event
Sensitive Data Leak
{
  "timestamp": "2025-04-12T14:32:11.042Z",
  "level": "Information",
  "message": "Payment processed",
  "correlationId": "ord-8821-xk",
  "userId": "u_4492",
  "ssn": "382-91-0047",
  "cardNumber": "4111-1111-1111-1111",
  "cvv": "392",
  "amount": 149.99,
  "service": "payment-api",
}
Runtime Flow
Application Boundary
Logger
Your App
Cerbi
Governance

hot path

Sanitized Log
Downstream
Splunk / Datadog
Azure Monitor
Downstream Sanitized Log

// Run example to see output

Governance Result

// Governance score, violations, and async routing appear here

This demo runs entirely in-browser. No log data is transmitted. Behavior reflects Cerbi's in-process governance engine.

[ Incident record ]Real-world breaches attributed to log exposure

Real incident patterns

Logs are one of the least governed data surfaces in modern systems.

Recurring patterns

Sensitive data logged as a debugging shortcut
No field-level schema or restrictions
No enforcement of allowed vs forbidden fields
Over-retention of sensitive operational data
Downstream masking relied on instead of prevention
Searchable analytics stores filled with high-risk fields
Internal support and telemetry systems treated as low-risk

Where Cerbi fits

Define what is allowed to be logged
Block sensitive fields before logs leave the app
Enforce governance at the source
Reduce risk in downstream systems
End of incident record

06. WILLAdoption

Adopt in minutes.

CerbiStream drops into your existing logging setup. No migration. No new infrastructure on the hot path.

Full setup guide

Free trial

14 days · 5M governed events

No credit card required. Full platform access.

View trial details
01
Install from NuGetInstall-Package CerbiStream
02
Add one line to your logger.UseCerbi(cfg => cfg.LoadProfile("governance.json"))
03
Store governance profiles as codegovernance.json → committed, versioned, reviewed
04
Ship: nothing else changesNo agents · No pipeline rewrite · No sink replacement

Who this is for

Built for the teams who own what gets logged.

Cerbi is a fit when logging behavior needs to be a controlled, auditable property of the platform, not a per-team decision made at the call site.

Platform engineering

You own the internal developer platform or shared logging infrastructure. You need consistent policy enforcement across many services without mandating call-site rewrites or deploying new pipeline components.

Security and compliance

You are responsible for preventing PHI, PII, credentials, and sensitive fields from reaching observability platforms. You need evidence that governance is applied at emission, not retroactively cleaned downstream.

Architecture leadership

You are designing or auditing logging strategy across a distributed services estate. You want governance that is version-controlled, policy-driven, and compatible with your existing logging framework without lock-in.

07.Origin

Built by engineers who lived the problem.

Cerbi was built after seeing the same problem across multiple production systems: PHI already in Splunk, tokens already in CloudWatch, audit trails that collapsed under review. Every team had already shipped the problem before anyone looked. The check was always too late, too manual, or missing entirely.

Logging governance should not be a post-ingest scrubbing task or a quarterly audit finding. It belongs at the moment the log is written, enforced in the same process, on the same thread, before any sink ever sees the data. That is what Cerbi does.

Get started

Stop fixing logs after the fact.

Start controlling what gets logged in the first place.

14-day free trial. No credit card required. One-line setup.