Skip to content

Commit

Permalink
Merge branch 'coraza-workflow-tuning' of github.com:electricjesus/doc…
Browse files Browse the repository at this point in the history
…s into coraza-workflow-tuning
  • Loading branch information
electricjesus committed Mar 8, 2024
2 parents a0102e7 + b9a9383 commit 8ec20e3
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions calico-enterprise/threat/web-application-firewall.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ SecRuleEngine DetectionOnly

The configuration file starts with importing the appropriate rule set config. We use Coraza WAF's recommended [Core Rule Set setup](https://coraza.io/docs/tutorials/corerule set/) files:

Check failure on line 179 in calico-enterprise/threat/web-application-firewall.mdx

View workflow job for this annotation

GitHub Actions / runner / vale

[vale] reported by reviewdog 🐶 [Vale.Spelling] Did you really mean 'config'? Raw Output: {"message": "[Vale.Spelling] Did you really mean 'config'?", "location": {"path": "calico-enterprise/threat/web-application-firewall.mdx", "range": {"start": {"line": 179, "column": 71}}}, "severity": "ERROR"}

Check failure on line 179 in calico-enterprise/threat/web-application-firewall.mdx

View workflow job for this annotation

GitHub Actions / runner / vale

[vale] reported by reviewdog 🐶 [Vale.Spelling] Did you really mean 'Coraza'? Raw Output: {"message": "[Vale.Spelling] Did you really mean 'Coraza'?", "location": {"path": "calico-enterprise/threat/web-application-firewall.mdx", "range": {"start": {"line": 179, "column": 86}}}, "severity": "ERROR"}

Check failure on line 179 in calico-enterprise/threat/web-application-firewall.mdx

View workflow job for this annotation

GitHub Actions / runner / vale

[vale] reported by reviewdog 🐶 [Vale.Spelling] Did you really mean 'WAF's'? Raw Output: {"message": "[Vale.Spelling] Did you really mean 'WAF's'?", "location": {"path": "calico-enterprise/threat/web-application-firewall.mdx", "range": {"start": {"line": 179, "column": 93}}}, "severity": "ERROR"}

1. Coraza recommended [config](https://github.com/corazawaf/coraza/blob/main/coraza.conf-recommended)
1. Coraza recommended [configuration](https://github.com/corazawaf/coraza/blob/main/coraza.conf-recommended)

Check failure on line 181 in calico-enterprise/threat/web-application-firewall.mdx

View workflow job for this annotation

GitHub Actions / runner / vale

[vale] reported by reviewdog 🐶 [Vale.Spelling] Did you really mean 'Coraza'? Raw Output: {"message": "[Vale.Spelling] Did you really mean 'Coraza'?", "location": {"path": "calico-enterprise/threat/web-application-firewall.mdx", "range": {"start": {"line": 181, "column": 4}}}, "severity": "ERROR"}
1. The rest of the [corerule set](https://github.com/corerule set/corerule set) files, currently [v4.0.0-rc2](https://github.com/corerule set/corerule set/tree/v4.0.0-rc2)

These files can be customized if desired. Add all your customizations directly under `tigera.conf`:
Expand Down Expand Up @@ -232,7 +232,7 @@ Include @owasp_crs/*.conf

SecRuleEngine DetectionOnly

# --- all customisations appear below this line, unless they need a specific loading order like plugins ---
# --- all customizations appear below this line, unless they need a specific loading order like plugins ---

# --- Add sampling mode
# Read about sampling mode here https://corerule set.org/docs/concepts/sampling_mode/
Expand Down Expand Up @@ -263,7 +263,7 @@ Change anomaly scoring threshold:
setvar:tx.outbound_anomaly_score_threshold=20"
```

Or even change rule action parameters, behaviour e.g.:
Or even change rule action parameters or behavior. For example:

```bash
# --- append to more allowed content types to request bodies
Expand Down Expand Up @@ -296,7 +296,7 @@ wordpress-rule-exclusions-before.conf
wordpress-rule-exclusions-config.conf
```

and then tigera.conf contents should be:
and then `tigera.conf` contents should be:

```bash
Include @coraza.conf-recommended
Expand Down

0 comments on commit 8ec20e3

Please sign in to comment.