Commit e69eae16 authored by Evan Read's avatar Evan Read

Merge branch 'docs-aqualls-modsecurity-caps' into 'master'

Docs: add 'ModSecurity' to capitalization rule

See merge request gitlab-org/gitlab!29538
parents 82e5e41c a0fc2350
...@@ -85,6 +85,7 @@ ...@@ -85,6 +85,7 @@
"Microsoft", "Microsoft",
"Minikube", "Minikube",
"MinIO", "MinIO",
"ModSecurity",
"NGINX Ingress", "NGINX Ingress",
"NGINX", "NGINX",
"OAuth", "OAuth",
......
...@@ -474,7 +474,7 @@ To enable ModSecurity with Auto Deploy, you need to create a `.gitlab/auto-deplo ...@@ -474,7 +474,7 @@ To enable ModSecurity with Auto Deploy, you need to create a `.gitlab/auto-deplo
|Attribute | Description | Default | |Attribute | Description | Default |
-----------|-------------|---------| -----------|-------------|---------|
|`enabled` | Enables custom configuration for modsecurity, defaulting to the [Core Rule Set](https://coreruleset.org/) | `false` | |`enabled` | Enables custom configuration for ModSecurity, defaulting to the [Core Rule Set](https://coreruleset.org/) | `false` |
|`secRuleEngine` | Configures the [rules engine](https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-(v2.x)#secruleengine) | `DetectionOnly` | |`secRuleEngine` | Configures the [rules engine](https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-(v2.x)#secruleengine) | `DetectionOnly` |
|`secRules` | Creates one or more additional [rule](https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-(v2.x)#SecRule) | `nil` | |`secRules` | Creates one or more additional [rule](https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-(v2.x)#SecRule) | `nil` |
......
...@@ -213,7 +213,7 @@ the WAF with OWASP CRS! ...@@ -213,7 +213,7 @@ the WAF with OWASP CRS!
## Testing out the OWASP Core Rule Set ## Testing out the OWASP Core Rule Set
Now let's send a potentially malicious request, as if we were a scanner, Now let's send a potentially malicious request, as if we were a scanner,
checking for vulnerabilities within our application and examine the modsecurity logs: checking for vulnerabilities within our application and examine the ModSecurity logs:
```shell ```shell
$ curl --location --insecure fjdiaz-auto-devv-2.34.68.60.207.nip.io --header "User-Agent: absinthe" | grep 'Rails!' --after 2 --before 2 $ curl --location --insecure fjdiaz-auto-devv-2.34.68.60.207.nip.io --header "User-Agent: absinthe" | grep 'Rails!' --after 2 --before 2
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment