You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: newrelic-agent/src/main/resources/newrelic.yml
+64-59Lines changed: 64 additions & 59 deletions
Original file line number
Diff line number
Diff line change
@@ -464,66 +464,71 @@ common: &default_settings
464
464
agent:
465
465
enabled: false
466
466
467
+
# This configuration allows users to specify a unique test identifier when running IAST Scan with CI/CD
468
+
iast_test_identifier: 'run-id'
469
+
467
470
# Security controllers
468
-
scan_controllers:
469
-
# The scan_request_rate_limit configuration allows to specify maximum number of replay request played per minute.
470
-
# The maximum is 3600 and the minimum is 12 replay request per minute.
471
-
iast_scan_request_rate_limit: 3600# Number of IAST replay request played per minute, Default is 3600
472
-
473
-
# The scan_schedule configuration allows to specify when IAST scans should be executed
474
-
scan_schedule:
475
-
# The delay field specifies the delay in minutes before the IAST scan starts. This allows to schedule the scan to start at a later time.
476
-
delay: 0#In minutes, default is 0 min
477
-
# The duration field specifies the duration of the IAST scan in minutes. This determines how long the scan will run.
478
-
duration: 0#In minutes, default is forever
479
-
480
-
# The schedule field specifies a cron expression that defines when the IAST scan should start.
481
-
#schedule: "" #By default, schedule is inactive
482
-
483
-
# Allow continuously sample collection of IAST events
484
-
always_sample_traces: false # Default is false
485
-
486
-
# The exclude_from_iast_scan configuration allows to specify APIs, parameters, and categories that should not be scanned by Security Agents.
487
-
exclude_from_iast_scan:
488
-
# The api field specifies list of APIs using regular expression (regex) patterns that follow the syntax of Perl 5. The regex pattern should provide a complete match for the URL without the endpoint.
489
-
# Example:
490
-
# api:
491
-
# - .*account.*
492
-
# - .*/\api\/v1\/.*?\/login
493
-
api: [ ]
494
-
495
-
# The parameters configuration allows users to specify headers, query parameters, and body keys that should be excluded from IAST scans.
496
-
# Example:
497
-
# http_request_parameters:
498
-
# header:
499
-
# - X-Forwarded-For
500
-
# query:
501
-
# - username
502
-
# - password
503
-
# body:
504
-
# - account.email
505
-
# - account.contact
506
-
http_request_parameters:
507
-
# A list of HTTP header keys. If a request includes any headers with these keys, the corresponding IAST scan will be skipped.
508
-
header: [ ]
509
-
# A list of query parameter keys. The presence of these parameters in the request's query string will lead to skipping the IAST scan.
510
-
query: [ ]
511
-
# A list of keys within the request body. If these keys are found in the body content, the IAST scan will be omitted.
512
-
body: [ ]
513
-
514
-
# The iast_detection_category configuration allows to specify which categories of vulnerabilities should not be detected by Security Agents.
515
-
# If any of these categories are set to true, Security Agents will not generate events or flag vulnerabilities for that category.
516
-
iast_detection_category:
517
-
insecure_settings: false
518
-
invalid_file_access: false
519
-
sql_injection: false
520
-
nosql_injection: false
521
-
ldap_injection: false
522
-
javascript_injection: false
523
-
command_injection: false
524
-
xpath_injection: false
525
-
ssrf: false
526
-
rxss: false
471
+
scan_controllers:
472
+
# The scan_request_rate_limit configuration allows to specify maximum number of replay request played per minute.
473
+
# The maximum is 3600 and the minimum is 12 replay request per minute.
474
+
iast_scan_request_rate_limit: 3600# Number of IAST replay request played per minute, Default is 3600
475
+
# This configuration allows users to the number of application instances for a specific entity where IAST analysis is performed.
476
+
scan_instance_count: 0# Values are 1 or 0, 0 signifies run on all application instances
477
+
478
+
# The scan_schedule configuration allows to specify when IAST scans should be executed
479
+
scan_schedule:
480
+
# The delay field specifies the delay in minutes before the IAST scan starts. This allows to schedule the scan to start at a later time.
481
+
delay: 0#In minutes, default is 0 min
482
+
# The duration field specifies the duration of the IAST scan in minutes. This determines how long the scan will run.
483
+
duration: 0#In minutes, default is forever
484
+
485
+
# The schedule field specifies a cron expression that defines when the IAST scan should start.
486
+
#schedule: "" #By default, schedule is inactive
487
+
488
+
# Allow continuously sample collection of IAST events
489
+
always_sample_traces: false # Default is false
490
+
491
+
# The exclude_from_iast_scan configuration allows to specify APIs, parameters, and categories that should not be scanned by Security Agents.
492
+
exclude_from_iast_scan:
493
+
# The api field specifies list of APIs using regular expression (regex) patterns that follow the syntax of Perl 5. The regex pattern should provide a complete match for the URL without the endpoint.
494
+
# Example:
495
+
# api:
496
+
# - .*account.*
497
+
# - .*/\api\/v1\/.*?\/login
498
+
api: [ ]
499
+
500
+
# The parameters configuration allows users to specify headers, query parameters, and body keys that should be excluded from IAST scans.
501
+
# Example:
502
+
# http_request_parameters:
503
+
# header:
504
+
# - X-Forwarded-For
505
+
# query:
506
+
# - username
507
+
# - password
508
+
# body:
509
+
# - account.email
510
+
# - account.contact
511
+
http_request_parameters:
512
+
# A list of HTTP header keys. If a request includes any headers with these keys, the corresponding IAST scan will be skipped.
513
+
header: [ ]
514
+
# A list of query parameter keys. The presence of these parameters in the request's query string will lead to skipping the IAST scan.
515
+
query: [ ]
516
+
# A list of keys within the request body. If these keys are found in the body content, the IAST scan will be omitted.
517
+
body: [ ]
518
+
519
+
# The iast_detection_category configuration allows to specify which categories of vulnerabilities should not be detected by Security Agents.
520
+
# If any of these categories are set to true, Security Agents will not generate events or flag vulnerabilities for that category.
521
+
iast_detection_category:
522
+
insecure_settings: false
523
+
invalid_file_access: false
524
+
sql_injection: false
525
+
nosql_injection: false
526
+
ldap_injection: false
527
+
javascript_injection: false
528
+
command_injection: false
529
+
xpath_injection: false
530
+
ssrf: false
531
+
rxss: false
527
532
528
533
# Deprecated!!! Instead, please use iast_detection_category to disable vulnerabilities category by IAST,
529
534
# These are the category of security events that can be detected. Set to false to disable detection of
0 commit comments