Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: Christopher Tauchen <[email protected]>
  • Loading branch information
electricjesus and ctauchen authored Mar 8, 2024
1 parent 933e614 commit 9f30a2d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion calico-enterprise/threat/web-application-firewall.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -222,7 +222,7 @@ By default WAF will not block a request even if it has matching rule violations.

For basic customizations, it's best to add it after all the includes in `tigera.conf`. In fact, this is the reason why the `SecRuleEngine` directive and the rest of [our customizations](https://github.com/tigera/operator/blob/master/pkg/render/applicationlayer/embed/coreruleset/tigera.conf#L8-L17) are situated there.

An example is adding a sampling mode. For that, the tigera.conf will look like this:
An example is adding a sampling mode. For that, the `tigera.conf` will look like this:

```bash
# coreruleset activation
Expand Down

0 comments on commit 9f30a2d

Please sign in to comment.