Set Up App Protect Instances for Security Monitoring

Overview

F5 NGINX Security Monitoring supports the following use cases:

  • Security Monitoring only: Use only the Security Monitoring module to monitor data from NGINX App Protect WAF instances. You will be able to review the security dashboards to assess potential threats and identify opportunities to fine-tune your policies. Your NGINX App Protect WAF configurations are managed outside of the NGINX Instance Manager context.
  • Security Monitoring and Instance Manager: Use the Security Monitoring module with the NGINX Instance Manager. In addition to monitoring your application security, you will be able to manage your NGINX App Protect WAF configurations and security policies in a single location and push pre-compiled updates to an instance or instance group.

Before You Begin

Complete the following prerequisites before proceeding with the steps in this guide.

  1. If you are new to NGINX App Protect WAF, follow the instructions in the installation and configuration guides to get up and running:

  2. Review the dependencies with NGINX App Protect WAF and NGINX Plus.

    The Security Monitoring module requires the following versions of NGINX App Protect WAF and NGINX Plus for the data plane:

    Security Monitoring NGINX App Protect WAF
    1.7.1 Release 4.7.0–4.12.0, 5.1.0–5.4.0
    1.7.0 Release 4.4.0–4.7.0
    1.6.0 Release 4.3.0–4.4.0
    1.5.0 Release 4.3.0
    1.4.0 Release 4.2.0
    1.3.0 Release 3.12.2–4.2.0
    1.2.0 Release 3.12.2–4.1.0
    1.1.0 Release 3.12.2–4.0.0
    1.0.0 Release 3.12.2
  3. Determine your use case: Security Monitoring only or Security Monitoring and Configuration Management.

  4. Install the NGINX Security Monitoring module and upload your license.

Install NGINX Agent

NGINX Agent is a companion daemon for NGINX Open Source or NGINX Plus instance that provides:

  • Remote management of NGINX configurations
  • Collection and reporting of real-time NGINX performance and operating system metrics
  • Notifications of NGINX events

Repeat the steps in this section on each NGINX App Protect WAF data plane host to install and configure NGINX Agent for use with Security Monitoring. These settings apply to both of the Security Monitoring use cases.

  1. Use SSH to connect to the data plane host.

  2. Install the NGINX Agent package from the NGINX Instance Manager host.

    Note: To complete this step, make sure that gpg is installed on your system. You can install NGINX Agent using various command-line tools like curl or wget. If your NGINX Instance Manager host is not set up with valid TLS certificates, you can use the insecure flags provided by those tools. See the following examples:

    • Secure:

      curl https://<NMS_FQDN>/install/nginx-agent | sudo sh
         
    • Insecure:

      curl --insecure https://<NMS_FQDN>/install/nginx-agent | sudo sh
         

      You can add your NGINX instance to an existing instance group or create one using --instance-group or -g flag when installing NGINX Agent.

      The following example shows how to download and run the script with the optional --instance-group flag adding the NGINX instance to the instance group my-instance-group:

      curl https://<NMS_FQDN>/install/nginx-agent > install.sh; chmod u+x install.sh
         sudo ./install.sh --instance-group my-instance-group
         

      By default, the install script attempts to use a secure connection when downloading packages. If, however, the script cannot create a secure connection, it uses an insecure connection instead and logs the following warning message:

      Warning: An insecure connection will be used during this nginx-agent installation
         

      To require a secure connection, you can set the optional flag skip-verify to false.

      The following example shows how to download and run the script with an enforced secure connection:

      curl https://<NMS_FQDN>/install/nginx-agent > install.sh chmod u+x install.sh; chmod u+x install.sh
         sudo sh ./install.sh --skip-verify false
         

    • Secure:

      wget https://<NMS_FQDN>/install/nginx-agent -O - | sudo sh -s --skip-verify false
         
    • Insecure:

      wget --no-check-certificate https://<NMS_FQDN>/install/nginx-agent -O - | sudo sh
         

      When you install the NGINX Agent, you can use the --instance-group or -g flag to add your NGINX instance to an existing instance group or to a new group that you specify.

      The following example downloads and runs the NGINX Agent install script with the optional --instance-group flag, adding the NGINX instance to the instance group my-instance-group:

      wget https://gnms1.npi.f5net.com/install/nginx-agent -O install.sh ; chmod u+x install.sh
         sudo ./install.sh --instance-group my-instance-group
         
  3. Edit the /etc/nginx-agent/nginx-agent.conf file to add the nap_monitoring configuration.

    Add the lines below to the end of the file. This enables NGINX Agent to send NGINX App Protect messages to the NGINX Instance Manager management plane.

    dataplane:
       status:
          # poll interval for data plane status - the frequency the NGINX Agent will query the data plane for changes
          poll_interval: 30s
          # report interval for data plane status - the maximum duration to wait before syncing data plane information if no updates have been observed
          report_interval: 24h
    events:
       # report data plane events back to the management plane
       enable: true
    metrics:
       # specify the size of a buffer to build before sending metrics
       bulk_size: 20
       # specify metrics poll interval
       report_interval: 1m
       collection_interval: 15s
       mode: aggregated
    
    # OSS NGINX default config path
    # path to aux file dirs can also be added
    config_dirs: "/etc/nginx:/usr/local/etc/nginx:/usr/share/nginx/modules:/etc/nms:/etc/app_protect"
    
    # Enable reporting NGINX App Protect details to the management plane.
    extensions:
      - nginx-app-protect
      - nap-monitoring
    
    # Enable reporting NGINX App Protect details to the control plane.
    nginx_app_protect:
       # Report interval for NGINX App Protect details - the frequency the NGINX Agent checks NGINX App Protect for changes.
       report_interval: 15s
       # Enable precompiled publication from the NGINX Instance Manager (true) or perform compilation on the data plane host (false).
       precompiled_publication: true
    
    # NGINX App Protect Monitoring config
    nap_monitoring:
       # Buffer size for collector. Will contain log lines and parsed log lines
       collector_buffer_size: 50000
       # Buffer size for processor. Will contain log lines and parsed log lines
       processor_buffer_size: 50000
       # Syslog server IP address the collector will be listening to
       syslog_ip: "127.0.0.1"
       # Syslog server port the collector will be listening to
       syslog_port: 514
    
  4. If the location /api directive has not been set up in the nginx.conf file, follow the example below to add it:

    server{
               location /api {
                   api write=on;
                   allow 127.0.0.1;
                   deny all;
               }
    }
    

    After adding the directive, restart NGINX to apply the changes:

    sudo systemctl restart nginx
    
    Important:
    You can change the values of syslog_ip and syslog_port to meet your needs. You must use the same values when configuring logging for the Security Monitoring module. If the syslog:<server><port> configuration does not match these settings, the monitoring dashboards will not display any data. Also, the networking changes for NGINX App Protect Version 5 preclude the use of 127.0.0.1 as a syslog server address. For Version 5, the address of the docker0 interface (typically 192.0.10.1) or the IP address of the data plane host can be used for the syslog server address.
    Note:

    You can use the NGINX Agent installation script to add the fields for nginx_app_protect and nap_monitoring:

    # Download install script via API
    curl https://<NMS_FQDN>/install/nginx-agent > install.sh
    
    # Use the flag --nap-monitoring to set the child fields for the field 'nap_monitoring', the
    # child field values will be set to the values in the example configuration from above. Specify
    # the -m | --nginx-app-protect-mode flag to set up management of NGINX App Protect on the instance.
    # In the example below we specify 'precompiled-publication' for the flag value which will make the
    # config field 'precompiled_publication' set to 'true', if you would like to set the config field
    # 'precompiled_publication' to 'false' you can specify 'none' as the flag value.
    sudo sh ./install.sh --nap-monitoring true --nginx-app-protect-mode precompiled-publication
    
  5. Restart NGINX Agent:

    sudo systemctl restart nginx-agent
    

Set Up Instances for Security Monitoring Only

Complete the steps in this section if you are only using the Security Monitoring module to monitor your application security. In this use case, you are not using Instance Manager to manage your WAF security policies.

Repeat the steps below on each NGINX App Protect WAF data plane instance.

  1. Use SSH to connect to the data plane host.

  2. Create a new log format definition file with the name /etc/app_protect/conf/log_sm.json and the contents shown below. This defines the log format for the Security Monitoring module.

    This configuration sets the maximum accepted request payload to 2048 bytes and the maximum message size to 5k. The latter setting truncates messages larger than 5k.

  3. Add character escaping for the used separator , to be escaped with its standard URL encoding %2C.

    {
        "filter": {
            "request_type": "illegal"
        },
        "content": {
            "format": "user-defined",
            "format_string": "%blocking_exception_reason%,%dest_port%,%ip_client%,%is_truncated_bool%,%method%,%policy_name%,%protocol%,%request_status%,%response_code%,%severity%,%sig_cves%,%sig_set_names%,%src_port%,%sub_violations%,%support_id%,%threat_campaign_names%,%violation_rating%,%vs_name%,%x_forwarded_for_header_value%,%outcome%,%outcome_reason%,%violations%,%violation_details%,%bot_signature_name%,%bot_category%,%bot_anomalies%,%enforced_bot_anomalies%,%client_class%,%client_application%,%client_application_version%,%transport_protocol%,%uri%,%request%",
            "escaping_characters": [
                {
                    "from": ",",
                    "to": "%2C"
                }
            ],
            "max_request_size": "2048",
            "max_message_size": "5k",
            "list_delimiter": "::"
        }
    }
    
  4. Find the context in your NGINX configuration where NGINX App Protect WAF logging is enabled. In the same context, add the app_protect_security_log directive shown in the example below to configure attack data logging for use with the Security Monitoring dashboards.

       app_protect_security_log_enable on;
       app_protect_security_log "/etc/app_protect/conf/log_sm.json" syslog:server=127.0.0.1:514;
    
    Important:
    The syslog:server=<syslog_ip>:<syslog_port> must match the syslog_ip and syslog_port values specified in the NGINX Agent configuration file. The dashboards won’t display any data if these settings don’t match. Also, the networking changes for NGINX App Protect Version 5 preclude the use of 127.0.0.1 as a syslog server address. For Version 5, the address of the docker0 interface (typically 192.0.10.1) or the IP address of the data plane host can be used for the syslog server address.
  5. Restart NGINX Agent and the NGINX web server.

    sudo systemctl restart nginx-agent
    sudo systemctl restart nginx
    

You should now be able to view data from your NGINX App Protect instances in the NGINX Security Monitoring dashboards.

Set up Instances for Security Monitoring with Instance Manager

Complete the steps in this section if you want to use the Security Monitoring module and Instance Manager. In this use case, you will use NGINX Instance Manager to monitor threats and to manage your NGINX App Protect WAF configurations and security policies.

Take the steps below to update your NGINX App Protect WAF configurations by using Instance Manager.

  1. Log in to the NGINX Instance Manager user interface and go to Modules > Instance Manager.

  2. Select Instances or Instance Groups, as appropriate.

  3. Select Edit Config from the Actions menu for the desired instance or instance group.

  4. Next, edit the desired configuration file. You will add directives that reference the security policies bundle and enable the NGINX App Protect WAF logs required by the Security Monitoring dashboards. An example configuration is provided below.

       app_protect_enable on;
       app_protect_enable on;
       app_protect_policy_file "/etc/nms/NginxDefaultPolicy.tgz";
       app_protect_security_log_enable on;
       app_protect_security_log "/etc/nms/secops_dashboard.tgz" syslog:server=127.0.0.1:514;
    
    • Add the app_protect_policy_file directive with a reference to a security policy.

      The policy reference must use the .tgz file extension when using Instance Manager to perform precompiled publication of NGINX App Protect WAF policies and log profiles. The file path referenced must exist on the NGINX Instance Manager host, but it’s ok if the policy file doesn’t exist yet. If your Instance is not configured for precompiled publication, then use the .json file extension for polcies and log profiles. In this case, the file path referenced in the NGINX configuration must reside on the Instance.

      If you are using custom security policies, at this stage, it’s fine to use the default security policy shown in the example above. After completing the steps in this guide, refer to the instructions in Set Up App Protect WAF Configuration Management to add your custom security policy files to NGINX Instance Manager and update your NGINX configuration.

    • Add the app_protect_security_log_enable on and the app_protect_security_log directive to any NGINX context where NGINX App Protect WAF is enabled and you want to be able to review attack data.

      The logging configuration must reference "/etc/nms/secops_dashboard.tgz", as shown in the example.

      If the app_protect_security_log_enable setting is already present, just add the app_protect_security_log beneath it in the same context.

      Important:
      The syslog:server=<syslog_ip>:<syslog_port> must match the syslog_ip and syslog_port values specified in the NGINX Agent configuration file. The Security Monitoring dashboards won’t display any data if these settings don’t match. Also, the networking changes for NGINX App Protect Version 5 preclude the use of 127.0.0.1 as a syslog server address. For Version 5, the address of the docker0 interface (typically 192.0.10.1) or the IP address of the data plane host can be used for the syslog server address.
  5. Select Publish to immediately push the configuration file updates out to your NGINX instance or instance group.

You should now be able to view data from your NGINX App Protect WAF instances in the Security Monitoring dashboard.

What’s Next


Last modified November 19, 2024