Skip to content

Commit 64d9620

Browse files
committed
acrolinx tweaks
1 parent 2af8baa commit 64d9620

File tree

1 file changed

+11
-9
lines changed

1 file changed

+11
-9
lines changed

articles/web-application-firewall/ag/waf-application-gateway-for-containers-overview.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,11 @@ Application Gateway for Containers is an application layer (layer 7) [load balan
1818

1919
## Configuration
2020

21-
To leverage WAF on your Application Gateway for Containers deployment, you will need to attach your WAF policy via a Security Policy. Security Policy in this context is a new child resource in Azure Resource Manager (ARM) that was introduced as part of the Application Gateway for Containers integration. The Security Policy is referenced by your Application Load Balancer (ALB) controller and helps define the scope of how your WAF policy is applied to your application’s traffic.
22-
Application Gateway for Containers also introduces a new resource called ‘WebApplicationFirewallPolicy’. This custom resource defines at which points the WAF policy is applied and can be configured at the listener or route path level. This configuration is done via your Kubernetes resource’s YAML file.
23-
Here is an example YAML configuration that shows targeting a specific path called ‘pathA’ on an HTTP Route resource:
21+
To use WAF on your Application Gateway for Containers deployment, you need to attach your [WAF policy](create-waf-policy-ag.md) via a Security Policy, which is a new Azure Resource Manager child resource that is part of the Application Gateway for Containers integration. The Security Policy is referenced by your Application Load Balancer (ALB) controller and helps define the scope of how your WAF policy is applied to the application’s traffic.
2422

23+
Application Gateway for Containers also introduces a new resource called `WebApplicationFirewallPolicy`. This custom resource defines at which point the WAF policy is applied and can be configured at the listener or route path level. This configuration is done via your Kubernetes resource’s YAML file.
24+
25+
Here's an example YAML configuration that shows targeting a specific path called `pathA` on an HTTP Route resource:
2526

2627
```yaml
2728
apiVersion: alb.networking.azure.io/v1
@@ -42,12 +43,13 @@ spec:
4243
4344
## Limitations
4445
45-
The following functionality is not supported on a WAF Policy associated with an Application Gateway for Containers instance:
46-
- Cross Region & Cross Subscription Not Supported – Your WAF policy needs to be in the same subscription and region as your Application Gateway for Containers resource.
47-
- Core Rule Set (CRS) Managed Rules – Application Gateway for Containers WAF only supports Default Rule Set (DRS) managed rulesets.
48-
- Legacy Bot Manager Ruleset – Bot Manager Ruleset 0.1 is not supported, but all newer Bot Manager ruleset versions are supported.
49-
- Java Script Challenge Actions on Bot Manager Rules – During preview you cannot set the Action on a Bot Manager rule to Java Script Challenge.
50-
- CoPilot for Security – During preview CoPilot for Security is not supported.
46+
The following functionality isn't supported on a WAF Policy associated with an Application Gateway for Containers instance:
47+
48+
- Cross region cross subscription: your WAF policy must be in the same subscription and region as your Application Gateway for Containers resource.
49+
- Core Rule Set (CRS) Managed Rules: Application Gateway for Containers WAF only supports Default Rule Set (DRS) managed rulesets.
50+
- Legacy Bot Manager Ruleset: Bot Manager Ruleset 0.1 isn't supported, but all newer Bot Manager ruleset versions are supported.
51+
- JavaScript Challenge actions on Bot Manager rules: you can't set the Action on a Bot Manager rule to JavaScript Challenge during the preview.
52+
- Microsoft Security Copilot: isn't supported during the preview.
5153
5254
## Pricing
5355

0 commit comments

Comments
 (0)