How to connect locally managed Docker SWAG with open-appsec to WebUI
Connecting your integrated open-appsec deployment to the open-appsec central WebUI provides many benefits. Using the WebUI (SaaS) is optional and included in all editions, including open-appsec free community edition.
Central WebUI for viewing/managing all open-appsec configuration and functionality
Store and view your open-appsec security logs
Monitor your open-appsec deployments
Monitor learning status of each of your protected assets
See learning progress and status
Receive and manage tuning suggestions
Get cloud-based shared learning between multiple agents (e.g. in HA scenario)
On this page it will be explained how you can connect your existing locally-managed Docker SWAG deployment with open-appsec to the open-appsec WebUI
Prerequisites
Existing SWAG with open-appsec WAF deployment which
locally managed
not connected to the central WebUI yet
Steps to connect your SWAG with open-appsec WAF deployment to WebUI
Create a new Docker Deployment Profile and copy the “Token” from that Profile (you will need it later!).
As subtype select: SWAG + open-appsec
Run following commands to redeploy your docker-compose file:
Note: The following step is only relevant when you picked “This management” as management mode earlier! Skip this step for the “Declarative management” management mode as in that case the configuration for open-appsec is done locally in the local_policy.yaml file!
Create one or more assets in the WebUI which represent web applications and/or Web APIs which you want to be protected by open-appsec WAF and allows you to adjust the open-appsec configuration specifically for each of them. Make sure the configured web application in your asset(s) matches your public DNS name for the SWAG container (as configure in the compose file here: URL=yourdomain.url)
You can check open-appsec agent status by running:
Check what's shown for "Management mode:" to verify that your agent is connected to the central open-appsec WebUI in the mode which you selected within the profile settings.
Run following curl request to simulate an attack (replace with your SWAG container DNS name and Port)
Note: “-k” was added above so this would work even when still using a Let’s Encrypt “staging” certificate. You can alternatively use your web browser, just open the following URL:
Last updated
Was this helpful?