|
552 | 552 | # If none of those parameters are set, the global audit log is used |
553 | 553 | # (`/var/log/httpd/modsec\_audit.log`; Debian and derivatives: `/var/log/apache2/modsec\_audit.log`; others: ). |
554 | 554 | # |
| 555 | +# @param modsec_inbound_anomaly_threshold |
| 556 | +# Override the global scoring threshold level of the inbound blocking rules |
| 557 | +# for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule |
| 558 | +# Set. |
| 559 | +# |
| 560 | +# @param modsec_outbound_anomaly_threshold |
| 561 | +# Override the global scoring threshold level of the outbound blocking rules |
| 562 | +# for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule |
| 563 | +# Set. |
| 564 | +# |
555 | 565 | # @param no_proxy_uris |
556 | 566 | # Specifies URLs you do not want to proxy. This parameter is meant to be used in combination |
557 | 567 | # with [`proxy_dest`](#proxy_dest). |
|
1901 | 1911 | Optional[Variant[Hash, Array]] $modsec_disable_msgs = undef, |
1902 | 1912 | Optional[Variant[Hash, Array]] $modsec_disable_tags = undef, |
1903 | 1913 | Optional[String] $modsec_body_limit = undef, |
| 1914 | + Optional[Integer[1, default]] $modsec_inbound_anomaly_threshold = undef, |
| 1915 | + Optional[Integer[1, default]] $modsec_outbound_anomaly_threshold = undef, |
1904 | 1916 | Array[Hash] $jk_mounts = [], |
1905 | 1917 | Boolean $auth_kerb = false, |
1906 | 1918 | Enum['on', 'off'] $krb_method_negotiate = 'on', |
|
2786 | 2798 | # - $modsec_disable_tags |
2787 | 2799 | # - $modsec_body_limit |
2788 | 2800 | # - $modsec_audit_log_destination |
2789 | | - if $modsec_disable_vhost or $modsec_disable_ids or !empty($modsec_disable_ips) or $modsec_disable_msgs or $modsec_disable_tags or $modsec_audit_log_destination { |
| 2801 | + # - $modsec_inbound_anomaly_threshold |
| 2802 | + # - $modsec_outbound_anomaly_threshold |
| 2803 | + if $modsec_disable_vhost or $modsec_disable_ids or !empty($modsec_disable_ips) or $modsec_disable_msgs or $modsec_disable_tags or $modsec_audit_log_destination or ($modsec_inbound_anomaly_threshold and $modsec_outbound_anomaly_threshold) { |
2790 | 2804 | concat::fragment { "${name}-security": |
2791 | 2805 | target => "${priority_real}${filename}.conf", |
2792 | 2806 | order => 320, |
|
0 commit comments