-
Notifications
You must be signed in to change notification settings - Fork 490
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[appsec] Log all matched rules #3442
Comments
@LaurenceJJones: Thanks for opening an issue, it is currently awaiting triage. In the meantime, you can:
DetailsI am a bot created to help the crowdsecurity developers manage community feedback and contributions. You can check out my manifest file to understand my behavior and what I can do. If you want to use this for your project, you can check out the BirthdayResearch/oss-governance-bot repository. |
@LaurenceJJones: There are no 'kind' label on this issue. You need a 'kind' label to start the triage process.
DetailsI am a bot created to help the crowdsecurity developers manage community feedback and contributions. You can check out my manifest file to understand my behavior and what I can do. If you want to use this for your project, you can check out the BirthdayResearch/oss-governance-bot repository. |
A workaround for now could be to use seclang audit engine
|
Currently when using CRS with AppSec you cannot follow the chain of analysis from CRS.
You will see ruleid
901340
as this is the init rule but is not all the rules that matched, if you change thelog_level
to debug you can see the debug logs from coraza, however, if you had one false trigger and didnt have the debug logs at the time then it can be a mystery of how to replicate or even debug the rule chain.There 2 ways we can do this either:
Option 1 would be best for "native" compatibility, however, this can cause a lot of log lines in our crowdsec.log file, so maybe allowing them to have another option might not be so bad.
The text was updated successfully, but these errors were encountered: