-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Connect the dots with observability #166
Comments
I think the key is what is |
This seems like an issue for Envoy, any filter may log so it makes sense to have a consistent story for correlation, presumably by having Envoy provide span/trace ID, maybe even within the wasm ABI handler without needing anything special inside filters. |
So I think we are narrowing down the scope of this discussion to the simplest approach which can be done in a timely manner. Not so long ago I started an issue (see envoyproxy/envoy#21959) to discuss a way to enrich observability data in envoy proxy but my feeling is that it will be a looong run until that can make to any master (either envoy or proxy-wasm, proxy-wasm being the main bottleneck). First of all, I avoided talking about spans for filters because of different reasons: first one being the lack of observability in envoy filters itself (no duration, no start, no end, no notice on who did the blocking, nor the reason) and scoped the conversation around how can Coraza enable this case in the near future, more so we should not only limit this to envoy but other proxies to so make sense provide a way to do so here aswell. Do you think that is reasonable? |
I agree increasing observability makes perfect sense. Are those filters running parallel in general case and envoy case? If so, we are better to bind those with spans. |
Coraza is a WAF - I think we already have that functionality available. Adding specific functionality for observability to coraza wasm seems like outside its scope, it just feels like anything would be too ad hoc. |
I tend to agree here. Why add something that the web server (or envoy) should already be doing? |
So the main point here is "will proxies do this?" I think the answer is,
yeah they should expose and API to do so but at the moment they won't and I
don't see a clear path to implement this (proxy wasm is not accepting new
features for now until someone takes ownership of it) so that is why I
think in the meantime we ca provide this to users as a UX improvement.
…On Thu, 9 Mar 2023, 15:48 Felipe Zipitría, ***@***.***> wrote:
I tend to agree here. Why add something that the web server (or envoy)
should already be doing?
—
Reply to this email directly, view it on GitHub
<#166 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAXOYAWN2WBHITMBYL3XEETW3HUSVANCNFSM6AAAAAAVU7ECIQ>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
It seems like option 3), allowing selecting keys from variables for audit logging, is probably the option that makes sense for a lightweight integration, really Coraza shouldn't be parsing any headers for it. Can move to Coraza repo maybe |
This same concern is valid for things like |
Related: proxy-wasm/spec#5 |
Related #209 (comment) cc @ericinfra |
I wanted to do correlation between the header x-request-id and the rules matched in the request. So I did a test and I updated a rule with id 941100. In the log show in this form: Are there other configuration to do this? |
X-Request-ID would work well in a istio deployment scenario! |
Right now there is no trivial way of connecting
audit logs
ordebug logs
(properly coraza logs) with the underlying requests or their consequent proxy logs (e.g. envoy logs).transaction ID
is one identifier associated with the WAF transaction (aka the request in the server) and is local to the server request processing.There are a couple of options here we could explore:
REQUEST_HEADERS
variable (e.g.REQUEST_HEADERS:X-Request-ID
: This is probably the easiest approach and does not need to happen in seclang necessarily but in the config of the WAF. A new auditlogpartX
would be needed to include all these extra fields. Whenever you want to correlated a request with a transaction, look for the request ID in the audit logs. Note: currently audit logs support printing the request headers but doing that for the sake of a single header is not only overkill but also a security concern as there is no redaction of potential sensitive information or PII.I would love to hear some input from @basvanbeek and @wu-sheng on this.
The text was updated successfully, but these errors were encountered: