Skip to content

Commit 079eb02

Browse files
committed
feat(edge): more waf
1 parent df42a71 commit 079eb02

File tree

8 files changed

+28
-16
lines changed

8 files changed

+28
-16
lines changed
3.3 KB
Loading

faq/edge-services.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,10 @@ productIcon: EdgeServicesProductIcon
1414

1515
Edge Services is a feature for Scaleway Load Balancers and Object Storage buckets. Creating Edge Services [pipelines](/edge-services/concepts/#pipeline) towards your Load Balancers or Object Storage buckets provides:
1616
-A [caching service](/edge-services/how-to/configure-cache/) to improve performance by reducing load on your [origin](/edge-services/concepts/#origin), and
17+
- A [Web Application Firewall](/edge-services/how-to/configure-waf/) to protect your origin from threats and malicious activity, and
1718
- A customizable and secure endpoint for accessing content via Edge Services, which can be set to a subdomain of your choice and secured with an SSL/TLS certificate.
1819

19-
<Lightbox src="scaleway-edge-services-pipeline.webp" alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer" />
20+
<Lightbox src="scaleway-edge-services-pipeline.webp" alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer. A Web Application Firewall sits between the cache and origin, protecting the origin from threats." />
2021

2122
## Which products are compatible with Edge Services?
2223

menu/navigation.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3645,6 +3645,10 @@
36453645
"label": "Configure a cache",
36463646
"slug": "configure-cache"
36473647
},
3648+
{
3649+
"label": "Configure WAF",
3650+
"slug": "configure-waf"
3651+
},
36483652
{
36493653
"label": "Monitor with Cockpit",
36503654
"slug": "monitor-cockpit"
@@ -3671,6 +3675,10 @@
36713675
"label": "CNAME records for Edge Services",
36723676
"slug": "cname-record"
36733677
},
3678+
{
3679+
"label": "Understanding WAF",
3680+
"slug": "understanding-waf"
3681+
},
36743682
{
36753683
"label": "Understanding pricing",
36763684
"slug": "understanding-pricing"

pages/edge-services/concepts.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The endpoint can be customized with a user-defined subdomain, allowing you to re
4242

4343
## Exclusions
4444

45-
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), exclusions let you define filters for requests that should not be evaluated by the WAF, but rather pass straight to the Load Balancer origin. Learn more about [creating exclusions](TODO)
45+
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), exclusions let you define filters for requests that should not be evaluated by WAF, but rather pass straight to the Load Balancer origin. Learn more about [creating exclusions](/edge-services/how-to/configure-waf/#how-to-set-exclusions)
4646

4747
## Origin
4848

@@ -63,7 +63,7 @@ The Load Balancer defined by the user as origin for a given Edge Services pipeli
6363

6464
## Paranoia level
6565

66-
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), the paranoia level determines how sensitive the request-evaluation mechanism is to potential threats. Four paranoia levels are available, with level 1 being the least sensitive, and level 4 being the most sensitive. The higher the paranoia level, the more likely it is that a given request will be judged to be malicious. For full details on paranoia levels, see [TODO](todo).
66+
In the context of an Edge Services [Web Application Firewall](#web-application-firewall), the paranoia level determines how sensitive the request-evaluation mechanism is to potential threats. Four paranoia levels are available, with level 1 being the least sensitive, and level 4 being the most sensitive. The higher the paranoia level, the more likely it is that a given request will be judged to be malicious. For full details on paranoia levels, see our [detailed documentation](/edge-services/reference-content/understanding-waf/#waf-ruleset-and-paranoia-levels).
6767

6868
## Pipeline
6969

@@ -79,4 +79,4 @@ The protocol (HTTP or HTTPS) that the Edge Services pipeline should use when sen
7979

8080
## WAF
8181

82-
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can set the [paranoia level](#paranoia-level) to be used when evaluating requests. Requests that are judged to be malicious are then blocked or logged, depending on the settings you choose. Find out more about [configuring a WAF](/edge-services/how-to/configure-waf/).
82+
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can set the [paranoia level](#paranoia-level) to be used when evaluating requests. Requests that are judged to be malicious are then blocked or logged, depending on the settings you choose. Find out more about [configuring WAF](/edge-services/how-to/configure-waf/).

pages/edge-services/how-to/configure-waf.mdx

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,12 @@ categories:
1313
- network
1414
---
1515

16-
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that shouldn't be filtered by the WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose.
16+
An Edge Services **W**eb **A**pplication **F**irewall (WAF) evaluates requests to your Load Balancer origin to determine whether they are potentially malicious. You can choose the [paranoia level](/edge-services/concepts/#paranoia-level) to be used when evaluating requests, and set [exclusions](/edge-services/concepts/#exclusions) to define traffic that shouldn't be filtered by WAF. Requests that are judged to be malicious are blocked or logged, depending on the settings you choose.
1717

1818
This page walks you through the processing of enabling and configuring WAF to protect your Load Balancer origin.
1919

20+
To read more about how WAF works, try our [Understanding WAF](/edge-services/reference-content/understanding-waf/) page.
21+
2022
<Message type="note">
2123
WAF is not available for Object Storage bucket origins.
2224
</Message>
@@ -39,10 +41,10 @@ WAF is not available for Object Storage bucket origins.
3941

4042
TODO SCREENSHOT
4143

42-
3. Choose the **paranoia level**, from 1 - 4, that is best adapted to your use case. The higher the paranoia level, the more sensitive WAF is to potential threats, and the more likely it is to class a request as malicious. For help with choosing a paranoia level, see our [dedicated documentation](TODO).
44+
3. Choose the **paranoia level**, from 1 - 4, that is best adapted to your use case. The higher the paranoia level, the more sensitive WAF is to potential threats, and the more likely it is to class a request as malicious. For help with choosing a paranoia level, see our [dedicated documentation](/edge-services/reference-content/understanding-waf/#waf-ruleset-and-paranoia-levels).
4345

4446
<Message type="tip">
45-
After enabling WAF, you will be able to [set exclusions](TODO) that filter out requests matching certain criteria from being evaluated by WAF.
47+
After enabling WAF, you will be able to [set exclusions](#how-to-set-exclusions) that filter out requests matching certain criteria from being evaluated by WAF.
4648
</Message>
4749

4850
4. Select a WAF **mode**. Requests judged to be malicious can either be **blocked** and prevented from passing to the Load Balancer origin, or **logged** but allowed to pass.
@@ -68,13 +70,13 @@ Once you have enabled WAF, you can choose to set **exclusions**. Exclusions are
6870
<Lightbox src="scaleway-add-exclusions.webp" alt="A screenshot of the Add exclusions popup in the Scaleway console, with an 'if' box to set a path regex value, and a 'then' box pre-filled to 'Bypass WAF'" /> TODO CHANGE NEW BUTTON?
6971

7072
3. Set up to two filters for this exclusion. You can add either:
71-
- One ***Path regex** filter, to match paths of requests to exclude. For example, TODO
72-
- One **HTTP method** filter, to match te HTTP methods of requests to exclude. For example, enter one or more of `GET`, `PATCH`, `PUT`, `DELETE` etc. Requests that match any of these methods will be considered to match the HTTP method filter.
73-
- One of each of the above (use the **Add filter** button to add the second filter)
73+
- One ***Path regex** filter, to match paths of requests to exclude. For example, `/api/v1/.*`
74+
- One **HTTP method** filter, to match te HTTP methods of requests to exclude. For example, enter one or more of `GET`, `PATCH`, `PUT`, `DELETE` etc. Requests that match any of these methods will be considered to match the HTTP method filter.
75+
- One of each of the above (use the **Add filter** button to add the second filter)
7476

75-
If you include both a path regex and an HTTP method filter in the same exclusion, requests must match both of the filters in order to be excluded.
77+
If you include both a path regex and an HTTP method filter in the same exclusion, requests must match both of the filters in order to be excluded.
7678

77-
Currently, the only action possible to set for matching requests is **Bypass WAF** (matching requests will not be evaluated by WAF and will proceed directly to the Load Balancer origin.) In the future, more actions will be added.
79+
Currently, the only action possible to set for matching requests is **Bypass WAF** (matching requests will not be evaluated by WAF and will proceed directly to the Load Balancer origin.) In the future, more actions will be added.
7880

7981
4. Click **Add** to add the exclusion.
8082

@@ -94,7 +96,7 @@ Once you have enabled WAF, you can choose to set **exclusions**. Exclusions are
9496

9597
4. Click **Confirm** when you have finished editing.
9698

97-
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
99+
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
98100

99101
5. Continue to edit or delete other exclusions as necessary.
100102

@@ -110,7 +112,7 @@ Once you have enabled WAF, you can choose to set **exclusions**. Exclusions are
110112

111113
3. Click **Delete**.
112114

113-
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
115+
You are returned to your Edge Services pipeline overview, but you are still in Edit mode.
114116

115117
4. Continue to edit or delete other exclusions as necessary.
116118

pages/edge-services/how-to/subscribe-edge-services.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ content:
66
h1: How to subscribe to Edge Services
77
paragraph: Find out how to take your first steps with Scaleway Edge Services by subscribing to a pricing plan. Learn how to choose the best plan for your needs and change your plan at the click of a button.
88
dates:
9-
validation: 2024-10-15
9+
validation: 2025-03-03
1010
posted: 2024-10-15
1111
tags: object-storage edge-services subscription-plan subscribe billing pricing
1212
categories:
@@ -19,6 +19,7 @@ To use Edge Services, you must subscribe to a [pricing plan](https://www.scalewa
1919

2020
- A fixed number of Edge Services [pipelines](/edge-services/concepts/#pipeline). You can create pipelines for either Load Balancers, Object Storage buckets, or a mixture of both, with your subscription plan.
2121
- A certain amount of egress [cache](/edge-services/concepts/#cache) data (the quantity of data transferred from Edge Services' caches, not including the transfer from the origin bucket or Load Balancer).
22+
- TODO
2223
- A custom domain and SSL certificate (managed or custom) for each pipeline.
2324

2425
If you create more pipelines than are included in your plan, or your pipelines' caches egress more data than is included, you will be charged additionally for this. The rates per pipeline/GB of data are indicated on the [pricing](https://www.scaleway.com/en/pricing/network/#edge-services) page.

pages/edge-services/reference-content/understanding-waf.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You can set **exclusions**, so that certain requests are not evaluated by WAF an
3131

3232
In an Edge Services pipeline, WAF sits before the origin stage. This means that WAF only protects your origin, it does not protect or filter requests towards the cache.
3333

34-
<Lightbox src="scaleway-edge-services-pipeline.webp" alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer. A Web Application Firewall sits between the cache and origin, protecting the origin from threats." />
34+
<Lightbox src="scaleway-edge-services-pipeline-diag.webp" alt="A diagram shows the elements and workflow of an Edge Services pipeline. The user connects to the customizable Edge Services endpoint (with its SSL/TLS certificate), which fetches content from the Edge Services cache, which itself fetches content to cache from an origin which is either an Object Storage bucket or Load Balancer. A Web Application Firewall sits between the cache and origin, protecting the origin from threats." />
3535

3636
If you have both WAF and cache enabled, requests that can be served by the cache will not go through WAF. Only requests that cannot be served by the cache will be filtered by WAF, and allowed to pass to the origin or not depending on your WAF configuration.
3737

0 commit comments

Comments
 (0)