|
552 | 552 | # If none of those parameters are set, the global audit log is used
|
553 | 553 | # (`/var/log/httpd/modsec\_audit.log`; Debian and derivatives: `/var/log/apache2/modsec\_audit.log`; others: ).
|
554 | 554 | #
|
| 555 | +# @param modsec_inbound_anomaly_threshold |
| 556 | +# Override the global scoring threshold level of the inbound blocking rules |
| 557 | +# for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule |
| 558 | +# Set. |
| 559 | +# |
| 560 | +# @param modsec_outbound_anomaly_threshold |
| 561 | +# Override the global scoring threshold level of the outbound blocking rules |
| 562 | +# for the Collaborative Detection Mode in the OWASP ModSecurity Core Rule |
| 563 | +# Set. |
| 564 | +# |
555 | 565 | # @param no_proxy_uris
|
556 | 566 | # Specifies URLs you do not want to proxy. This parameter is meant to be used in combination
|
557 | 567 | # with [`proxy_dest`](#proxy_dest).
|
|
1901 | 1911 | Optional[Variant[Hash, Array]] $modsec_disable_msgs = undef,
|
1902 | 1912 | Optional[Variant[Hash, Array]] $modsec_disable_tags = undef,
|
1903 | 1913 | Optional[String] $modsec_body_limit = undef,
|
| 1914 | + Optional[Integer[1, default]] $modsec_inbound_anomaly_threshold = undef, |
| 1915 | + Optional[Integer[1, default]] $modsec_outbound_anomaly_threshold = undef, |
1904 | 1916 | Array[Hash] $jk_mounts = [],
|
1905 | 1917 | Boolean $auth_kerb = false,
|
1906 | 1918 | Enum['on', 'off'] $krb_method_negotiate = 'on',
|
|
2786 | 2798 | # - $modsec_disable_tags
|
2787 | 2799 | # - $modsec_body_limit
|
2788 | 2800 | # - $modsec_audit_log_destination
|
2789 |
| - if $modsec_disable_vhost or $modsec_disable_ids or !empty($modsec_disable_ips) or $modsec_disable_msgs or $modsec_disable_tags or $modsec_audit_log_destination { |
| 2801 | + # - $modsec_inbound_anomaly_threshold |
| 2802 | + # - $modsec_outbound_anomaly_threshold |
| 2803 | + if $modsec_disable_vhost or $modsec_disable_ids or !empty($modsec_disable_ips) or $modsec_disable_msgs or $modsec_disable_tags or $modsec_audit_log_destination or ($modsec_inbound_anomaly_threshold and $modsec_outbound_anomaly_threshold) { |
2790 | 2804 | concat::fragment { "${name}-security":
|
2791 | 2805 | target => "${priority_real}${filename}.conf",
|
2792 | 2806 | order => 320,
|
|
0 commit comments