RLA is a log processing tool designed to streamline the integration of Radware products with Security Information and Event Management (SIEM) systems. In its first major release, RLA is focuses on robust support of Radware Cloud WAAP logs, utilizing the Cloud WAAP's capability to export security and access logs to an AWS S3 Buckets.
Version 1.3.1 - Released on 7th November 2024
- Improved Enhanced Docker Deployment Options: Improved Docker deployment by avoiding internal logging to
agent.logwhen running inside a Docker container, instead logging to the console for better integration with container logging practices. Added the ability to importrla.yamlfrom an S3 bucket directly through the Docker entry point script. Also introduced a fully environment variable-driven configuration usingrla.yaml.template, providing a flexible way to configure RLA based entirely on environment variables.
- Added Docker Deployment Added: Introduced Docker deployment with a provided Dockerfile, allowing for easier and more consistent deployment of RLA in containerized environments.
- Fixed Certificate Validation fixed issue validating known CA signed certificates.
- Fixed Conversion Error fixed small issue in one of the unified access log field.
- Improved Graceful Shutdown improved handling of graceful shutdown to finish remaining tasks.
- Added ECS Compatibility Mode for enhanced log structure compatibility with both Elastic Common Schema and Radware custom schema.
- Improved Configuration Validation on startup, including checks for SQS queue and destination connectivity, for increased application reliability.
- Introduced Debug Options to selectively disable configuration validation, enhancing flexibility during troubleshooting.
- Improved Installer: Now offers an option to retain the existing
rla.yamlduring upgrades, ensuring seamless update experiences.
- Changed Homogenized fields are now all styled uniformly using camel casing.
- Added Batch configuration for TCP, TLS, HTTP, and HTTPS.
- Added Compatibility mode with Splunk HEC Support.
- Initial Release.
- Multi-Agent Architecture: Supports multiple agents, each with distinct configurations for targeted log processing.
- Cloud WAAP Integration: Efficiently ingests logs from Radware Cloud WAAP exported to AWS S3.
- Versatile Log Handling: Capable of processing various log types including Access, WAF, Bot, DDoS, and Web DDoS.
- Dynamic Format Conversion: Converts logs to multiple formats such as JSON, CEF, and LEEF, with customizable options.
- Selective Log Processing: Provides the ability to filter and process specific log types, enhancing control over log ingestion.
- Enhanced Information: Adds valuable enrichments to logs, improving their utility and integration with SIEM systems.
- Configurable Homogenization: Optional normalization of log fields across different log types for consistency.
- Customizable Timestamp and Severity Formats: Allows specific settings for timestamp and log severity formats in output logs.
- Adaptable Output Configurations: Supports various output methods and customization for delimiters and other format-specific settings.
- log_file: Specify the path for the RLA's log file. This is where RLA will write its operational logs.
- output_directory: Define the directory to store temporary files during log processing.
- log_directory: Set the directory for storing RLA's log files.
- logging_levels: Choose the logging level for RLA's internal logs. Options:
INFO,WARNING,DEBUG,ERROR.
Configure AWS credentials to allow RLA to interact with AWS services such as SQS and S3.
- access_key_id: Your AWS Access Key ID for authentication.
- secret_access_key: Your AWS Secret Access Key for authentication.
- region: The AWS region where the SQS queue and S3 bucket are located.
Define settings for each log collection agent.
- name: Assign a unique name for each agent.
- type: Define the type of log source. Currently, "sqs" is supported.
- num_worker_threads: Set the number of worker threads for processing messages.
- product: Specify the product type associated with this agent. Currently supports 'cloud_waap'.
- sqs_settings:
- queue_name: The name of the SQS queue to poll for messages.
- delete_on_failure: Determine whether to delete messages from the queue if processing fails (true/false).
- logs: Enable or disable specific log types for processing, such as
Access,WAF,Bot,DDoS,WebDDoS, andCSP.
Customize how logs are formatted and where they are sent after processing.
-
output_format: Choose the format for the output logs. Options:
json,cef,leef. This determines how logs are structured before being sent. -
type: Select the transport protocol for sending logs. Options:
http,https,tcp,udp,tls. This choice affects the delivery method of the log data. -
destination: Define the endpoint for log delivery, format dependent on the chosen
type. This is where the logs will be sent after processing. -
batch: Enable or disable batch processing of logs. When enabled, logs are grouped into batches before being sent, which can increase efficiency for certain output types. Note: This setting is particularly relevant for
httpandhttpstypes where batching can reduce the number of outbound requests. -
compatibility_mode: Configure the log forwarding format to ensure compatibility with various external systems. This setting adjusts how logs are formatted and sent.
-
"Splunk HEC" Option: Optimizes log format for Splunk's HTTP Event Collector, facilitating smoother integration and data analysis.
- Requirement:
typemust be configured as eitherhttporhttps, andoutput_formatasjson. This ensures logs meet the format expectations of Splunk HEC.
- Requirement:
-
"ECS" Option: Aligns log format with the Elastic Common Schema (ECS) for Elasticsearch, enhancing interoperability across different Elastic Stack applications.
- Requirement: Must be configured with
typeas eitherhttp,https,tls, ortcp, andoutput_formatasjson. Adheres logs to ECS specifications, streamlining their use within the Elastic ecosystem.
- Requirement: Must be configured with
-
"none" Option: Applies no special formatting, suitable when there's no requirement for logs to adhere to specific external system formats.
-
Customize output settings for each supported log format.
- time_format: Choose the format for timestamps. Options include 'ISO8601', 'epoch_ms_str', 'epoch_ms_int', 'MM dd yyyy HH:mm:ss'.
- unify_fields: Optionally normalize log fields across different log types for consistency (true/false).
- delimiter: Specify the delimiter used to separate events (commonly "\n").
- time_format and severity_format: Customize the representation of timestamps and severity levels in the logs.
- syslog_header: Configure the generation and content of syslog headers, specifying the source of the host field (
product,application,tenant).
Settings for secure TCP communication using TLS. These settings are crucial for ensuring encrypted and secure data transmission over the network.
- verify: Whether to verify the server's SSL certificate. Options:
true(verify the certificate) orfalse(do not verify). - ca_cert: Path to the CA (Certificate Authority) certificate file. This is used to authenticate the certificate of the server.
- client_cert: Path to the client's SSL certificate file. This certificate is presented to the server during the TLS handshake.
- client_key: Path to the client's SSL key file. This key is associated with the client's certificate.
Customize settings for log transmission over HTTP or HTTPS. When using HTTPS, the options available in the TLS Configuration can also be applied to ensure secure communication. This includes specifying certificates for SSL verification and encryption.
- authentication: Specify authentication method for secure endpoint access. Supported methods include
none(no authentication),basic(username and password), andbearer(bearer token). - custom_headers: Define additional HTTP headers to be included in each request. Useful for specifying content types, API keys, or other custom header values required by the receiving server. When deploying via the Docker image or AWS Fargate task definition, headers can be provided entirely through environment variables (for example:
HTTPS_AUTHORIZATION_HEADER,HTTPS_HEADER_X_CUSTOM_HEADER=MyValue, orHTTPS_CUSTOM_HEADERS="Header-One=Value;Header-Two=Other"). The container entrypoint automatically injects these values into the generatedrla.yaml.
For HTTPS connections, the following TLS-related settings can be utilized to enhance security:
- verify: Controls whether the server's SSL certificate should be verified. A critical setting for preventing man-in-the-middle attacks.
- ca_cert: Specify the path to the trusted CA certificate file. This ensures the server's certificate is issued by a trusted authority.
- client_cert and client_key: Provide paths to the client's SSL certificate and key files, respectively. These are used for client authentication by the server.
Enhance troubleshooting with optional debug settings, ensuring connectivity and configuration are verified at startup.
- verify_destination_connectivity: Checks connectivity to the specified destination. Default:
true. Disable for debugging or if the destination does not return a 200 OK response. - config_verification: Performs initial checks to verify configuration and connectivity. Default:
true. Disable to bypass these verifications.
These variables are used to control deployment behavior, and are not configured through rla.yaml. Instead, they are specified as environment variables for Docker-based deployments.
- CONFIGURATION_SOURCE: Defines the configuration source for RLA when running in Docker or ECS. Available options:
- S3: Use S3 as the source to fetch the
rla.yamlconfiguration. If any other value is provided (or not set), the default is to use environment variables based onrla.yaml.template.
- S3: Use S3 as the source to fetch the
- S3_BUCKET: The name of the S3 bucket where the
rla.yamlconfiguration file is stored. This is required ifCONFIGURATION_SOURCEis set to S3. - S3_KEY: The S3 key (path and file name) where the
rla.yamlconfiguration is stored. This is also required ifCONFIGURATION_SOURCEis set to S3.
For detailed explanations and additional configuration options, refer to the official RLA documentation or support resources.
aws_credentials:
access_key_id: 'your_access_key'
secret_access_key: 'your_secret_key'
region: 'your_region'
agents:
- name: "cloud_waap"
type: "sqs"
num_worker_threads: 5
product: "cloud_waap"
sqs_settings:
queue_name: 'your_sqs_queue_name'
delete_on_failure: false
logs:
Access: true
WAF: true
Bot: true
DDoS: true
WebDDoS: true
CSP: false
output:
output_format: 'json' # Supports 'json', 'cef', 'leef'
type: 'tcp'
destination: 'your_destination_address'To install the Radware Logging Agent on a Linux system, follow these steps:
-
Clone the Repository: Download the latest release package from the Releases section of the Radware Logging Agent GitHub repository. Look for the package named like
rla_{latest_release}.tar.gz, where{latest_release}indicates the version number. -
Run the Installation Script: Once you have downloaded the latest release package, extract it and run the included installation script. Remember to replace
{latest_release}with the actual version number you downloaded. This script automates the setup process, installing all necessary components.tar -zxvf rla_{latest_release}.tar.gz cd rla chmod +x install_rla.sh sudo ./install_rla.sh -
Configure rla.yaml: After installation, you'll need to configure the
rla.yamlfile to suit your specific environment and requirements. Use the following command to edit the configuration file:sudo vi /etc/rla/rla.yaml
Ensure that you correctly set all necessary configuration options according to your deployment needs.
-
Using Certificates: If your setup requires certificates, ensure they are correctly placed in the desired directory and have the appropriate ownership settings. Use the following command to change the ownership of the certificate files to the rla user and group, replacing <your_certificate_file> with the actual file name of your certificate:
sudo chown rla:rla <your_certificate_file>
Repeat this command for each certificate file you need to use with the Radware Logging Agent.
-
Start the Service: Once configured, you can start the Radware Logging Agent using the systemd service:
sudo systemctl start rla.service
The Radware Logging Agent (RLA) can be deployed using the included Dockerfile. Below are several deployment options that cater to different environments and configurations.
For local deployments or those within private cloud environments, you can use the provided rla.yaml.template to configure the RLA instance.
- Environment Variables: The environment variables specified within
rla.yaml.templateare used to set the necessary configuration parameters for RLA. Simply provide the appropriate values in your Docker environment. - Custom Sections: If the provided
rla.yaml.templatecontains commented sections, uncomment them as needed and ensure you supply the required environment variable values.
When running RLA on AWS ECS and you prefer to store your configuration in S3:
- Environment Variables:
- Set
CONFIGURATION_SOURCEto S3. - Add
S3_BUCKET(the bucket name) andS3_KEY(the path and file name).
- Set
- Permissions: Ensure that the ECS task role has the appropriate permissions to access the S3 bucket and key. This allows RLA to download the configuration file (
rla.yaml) whenever a new container starts. This method provides centralized configuration management, especially useful in scalable environments.
You can also use the environment variable-based configuration option in conjunction with AWS Systems Manager Parameter Store and AWS Secrets Manager. By mapping Parameters and Secrets to environment variables in the ECS task definition, you can manage the configuration without embedding sensitive information directly into your Docker environment. This provides an additional layer of security and flexibility for deploying RLA.
The Radware Logging Agent is continually evolving, with plans to expand its capabilities and support a wider range of functionalities. Here's what's on the horizon:
- Cloud WAAP Local File Integration: In addition to the current support for AWS S3, we plan to introduce local file ingestion to supplement the upcoming SFTP export feature from Cloud WAAP. This feature will enable an end-to-end pipeline from Cloud WAAP to SFTP and eventually to SIEM using various protocols and formats.
- Expanding Input Options: Future updates aim to incorporate additional input methods such as SCP, TCP, and HTTP. This expansion will facilitate the support of a broader range of Radware products.
- Support for Additional Radware Products: Our goal is to extend RLA's capabilities to include more Radware products, enriching and customizing their logs for optimal SIEM integration.
- Versatile Protocol Support: We're committed to enabling easy log transmission through various protocols, ensuring seamless integration with diverse SIEM systems.
This section provides examples of logs processed by the Radware Logging Agent, showcasing the original JSON format, enriched JSON, CEF (Common Event Format), and LEEF (Log Event Extended Format) versions for different log types.
{
"accept_language": "en-US,en;q=0.9",
"action": "Allowed",
"application_id": "cb696959b-2f53-41f2-87ad-9c5810313a74",
"application_name": "MyApp",
"cookie": "-",
"country_code": "US",
"destination_ip": "10.22.79.113",
"destination_port": 443,
"directory": "/user",
"host": "myapp.radware.net",
"http_bytes_in": 535,
"http_bytes_out": 7607,
"http_method": "POST",
"protocol": "https",
"referrer": "-",
"request": "POST /user/login HTTP/1.1",
"request_time": "0.114",
"response_code": 200,
"source_ip": "10.1.154.77",
"source_port": 43834,
"tenant_name": "MyAccount",
"time": "27/Jan/2024:00:49:40 +0000",
"user_agent": "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko",
"x-forwarded-for": "-"
}{
"acceptLanguage": "en-US,en;q=0.9",
"action": "Allowed",
"applicationId": "cb69699b-2f53-41f2-87ad-9c5810313a74",
"applicationName": "MyApp",
"countryCode": "US",
"destinationIp": "66.22.79.113",
"destinationPort": 443,
"directory": "/user",
"host": "myapp.radware.net",
"httpBytesIn": 535,
"httpBytesOut": 7607,
"httpMethod": "POST",
"httpVersion": "HTTP/1.1",
"logType": "Access",
"protocol": "https",
"product": "Cloud WAAP",
"request": "https://myapp.radware.net/user/login",
"requestTime": "0.114",
"responseCode": 200,
"sourceIp": "10.1.154.77",
"sourcePort": 43834,
"tenantName": "MyAccount",
"time": "2024-27-02T00:49:40.000Z",
"uri": "/user/login",
"user_agent": "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko"
}2024-12-02T08:50:40.100Z Cloud WAAP CEF:0|Radware|Cloud WAAP|1.0|Access|Access Log|Info| rt=2024-27-01T00:49:40.000Z act=Allowed dhost=myapp.radware.net src=10.1.154.77 dst=10.22.79.113 spt=43834 dpt=443 app=https request=https://myapp.radware.net/user/login uri=/user/login method=POST in=535 out=7607 requestClientApplication=Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko rdwrCldDirectory=/user rdwrCldAcceptLanguage=en-US,en;q\=0.9 rdwrCldRequestTime=0.114 rdwrCldResponseCode=200 rdwrCldCountryCode=US rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74 rdwrCldApplicationName=MyApp rdwrCldTenantName=MyAccount rdwrCldHttpVersion=HTTP/1.12024-12-02T08:50:40.100Z Cloud WAAP LEEF:2.0|Radware|Cloud WAAP|1.0|Access|eventTime=2024-27-01T00:49:40.000Z action=Allowed dhost=myapp.radware.net src=10.1.154.77 dst=10.22.79.113 srcPort=43834 dstPort=443 proto=https url=https://myapp.radware.net/user/login uri=/user/login method=POST bytesIn=535 bytesOut=7607 userAgent=Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko responseCode=200 rdwrCldDirectory=/user rdwrCldAcceptLanguage=en-US,en;q\=0.9 rdwrCldRequestTime=0.114 rdwrCldCountryCode=US rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74 rdwrCldApplicationName=MyApp rdwrCldTenantName=MyAccount rdwrCldHttpVersion=HTTP/1.1{
"action": "Blocked",
"applicationName": "MyApp",
"appPath": "/api/auth",
"destinationIp": "10.35.101.159",
"destinationPort": "54009",
"directory": "/api",
"enrichmentContainer": {
"applicationId": "cb69699b-2f53-41f2-87ad-9c5810313a74",
"contractId": "63qwe674-e83d-4fae-909d-84b309ba0cd9",
"geoLocation.countryCode": "US",
"tenant": "75292c55-9212-4714-babe-851b29de7cab"
},
"externalIp": "10.160.218.10",
"host": "myapp.radware.net",
"method": "POST",
"protocol": "HTTP",
"receivedTimeStamp": "1706313459865",
"request": "POST /api/auth HTTP/1.1\r\nAccept-Encoding: gzip\r\nHost: myapp.radware.net\r\nContent-Length: 0\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0\r\naccept: application/json\r\nx-remote-ip: 128.160.218.10\r\ncontent-type: application/json\r\nNotBot: True\r\nAuthorization: Basic dGVzdF91c2VyOjEyMzQ1Ng==\r\nCookie: uzmx=17063028541647068335-3f843db00cc4acfa31; AWSALB=5CC+YSlWg; AWSALBCORS=5CC\r\nShieldSquare-Response: 0\r\n\r\n",
"role": "public",
"security": true,
"severity": "High",
"sourceIp": "10.160.218.10",
"sourcePort": "59289",
"targetModule": "API Security Module",
"title": "API request method not allowed",
"transId": "2669954742",
"URI": "/api/auth",
"user": "public",
"vhost": "myapp.radware.net",
"violationCategory": "API Security Violation",
"violationDetails": "A user attempted to access an API endpoint using an HTTP Method that is not allowed.\n\r\nDescription:\r\nAPI Security Violation Detected.\nEndpoint: /api/auth\nMethod: POST\nViolation: Invalid Method.\nInvalid method\n\r\nSuggestion: Revise API Security settings if needed\r\nModule: API Security\r\nError Number: -216\r\n\nAuthenticated as Public\n",
"violationType": "API Security Violation",
"webApp": "App_MyAccount_MyApp"
}{
"action": "Blocked",
"applicationId": "cb69699b-2f53-41f2-87ad-9c5810313a74",
"applicationName": "MyApp",
"appPath": "/api/auth",
"category": "API Security Violation",
"contractId": "63qwe674-e83d-4fae-909d-84b309ba0cd9",
"cookie": "uzmx=17063028541647068335-3f843db00cc4acfa31; AWSALB=5CC+YSlWg; AWSALBCORS=5CC",
"countryCode": "US",
"destinationIp": "10.160.218.10",
"destinationPort": "54009",
"directory": "/api",
"headers": "Accept-Encoding: gzip; Host: myapp.radware.net; Content-Length: 0; User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0; accept: application/json; x-remote-ip: 10.160.218.10; content-type: application/json; ShieldSquare-Response: 0",
"host": "myapp.radware.net",
"httpMethod": "POST",
"httpVersion": "HTTP/1.1",
"logType": "WAF",
"name": "API request method not allowed",
"protocol": "HTTP",
"product": "Cloud WAAP",
"reason": "A user attempted to access an API endpoint using an HTTP Method that is not allowed.\n\r\nDescription:\r\nAPI Security Violation Detected.\nEndpoint: /api/auth\nMethod: POST\nViolation: Invalid Method.\nInvalid method\n\r\nSuggestion: Revise API Security settings if needed\r\nModule: API Security\r\nError Number: -216\r\n\nAuthenticated as Public\n",
"referrer": "",
"request": "http://myapp.radware.net/api/auth",
"role": "public",
"security": true,
"severity": "High",
"sourceIp": "10.160.218.10",
"source_port": "59289",
"targetModule": "API Security Module",
"tenantId": "75292c55-9212-4714-babe-851b29de7cab",
"tenantName": "MyAccount",
"time": "2024-26-01T00:49:40.000Z",
"trans_id": "2669954742",
"uri": "/api/auth",
"user": "public",
"userAgent": "Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0",
"vhost": "myapp75292c55-9212.radware.net",
"violationType": "API Security Violation",
"webApp": "App_MyAccount_MyApp"
}2024-12-02T08:48:40.000Z Cloud WAAP CEF:0|Radware|Cloud WAAP|1.0|WAF|API request method not allowed|High| rt=2024-26-01T00:49:40.000Z act=Blocked dhost=myapp.radware.net src=10.160.218.10 dst=10.160.218.10 spt=59289 dpt=54009 app=HTTP requestMethod=POST request=http://myapp.radware.net/api/auth uri=/api/auth reason=A user attempted to access an API endpoint using an HTTP Method that is not allowed.\\n\\r\\nDescription:\\r\\nAPI Security Violation Detected.\\nEndpoint: /api/auth\\nMethod: POST\\nViolation: Invalid Method.\\nInvalid method\\n\\r\\nSuggestion: Revise API Security settings if needed\\r\\nModule: API Security\\r\\nError Number: -216\\r\\n\\nAuthenticated as Public\\n cat=API Security Violation requestClientApplication=Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0 requestCookies=uzmx\=17063028541647068335-3f843db00cc4acfa31; AWSALB\=5CC+YSlWg; AWSALBCORS\=5CC rdwrCldAppPath=/api/auth rdwrCldDestinationIp=10.35.101.159 rdwrCldDirectory=/api rdwrCldRole=public rdwrCldSecurity=True rdwrCldSeverity=High rdwrCldTargetModule=API Security Module rdwrCldUser=public rdwrCldVhost=myapp.radware.net rdwrCldViolationType=API Security Violation rdwrCldWebApp=App_MyAccount_MyApp rdwrCldTenantName=MyAccount rdwrCldApplicationName=MyApp rdwrCldTransId=2669954742 rdwrCldCountryCode=US rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74 rdwrCldContractId=63qwe674-e83d-4fae-909d-84b309ba0cd9 rdwrCldTenantId=75292c55-9212-4714-babe-851b29de7cab rdwrCldHttpVersion=HTTP/1.1 rdwrCldHeaders=Accept-Encoding: gzip; Host: myapp.radware.net; Content-Length: 0; User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0; accept: application/json; x-remote-ip: 10.160.218.10; content-type: application/json; ShieldSquare-Response: 02024-12-02T08:48:40.000Z Cloud WAAP LEEF:2.0|Radware|Cloud WAAP|1.0|WAF|eventTime=2024-26-01T00:49:40.000Z action=Blocked dhost=myapp.radware.net src=10.160.218.10 dst=10.160.218.10 srcPort=59289 dstPort=54009 proto=HTTP method=POST request=http://myapp.radware.net/api/auth uri=/api/auth name=API request method not allowed reason=A user attempted to access an API endpoint using an HTTP Method that is not allowed.\\n\\r\\nDescription:\\r\\nAPI Security Violation Detected.\\nEndpoint: /api/auth\\nMethod: POST\\nViolation: Invalid Method.\\nInvalid method\\n\\r\\nSuggestion: Revise API Security settings if needed\\r\\nModule: API Security\\r\\nError Number: -216\\r\\n\\nAuthenticated as Public\\n cat=API Security Violation cookie=uzmx\=17063028541647068335-3f843db00cc4acfa31; AWSALB\=5CC+YSlWg; AWSALBCORS\=5CC userAgent=Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0 sev=High rdwrCldAppPath=/api/auth rdwrCldDirectory=/api rdwrCldRole=public rdwrCldSecurity=True rdwrCldTargetModule=API Security Module rdwrCldUser=public rdwrCldVhost=myapp.radware.net rdwrCldViolationType=API Security Violation rdwrCldWebApp=App_MyAccount_MyApp rdwrCldTenantName=MyAccount rdwrCldApplicationName=MyApp rdwrCldTransId=2669954742 rdwrCldCountryCode=US rdwrCldApplicationId=cb69699b-2f53-41f2-87ad-9c5810313a74 rdwrCldContractId=63qwe674-e83d-4fae-909d-84b309ba0cd9 rdwrCldTenantId=75292c55-9212-4714-babe-851b29de7cab rdwrCldHttpVersion=HTTP/1.1 rdwrCldHeaders=Accept-Encoding: gzip; Host: myapp.radware.net; Content-Length: 0; User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0; accept: application/json; x-remote-ip: 10.160.218.10; content-type: application/json; ShieldSquare-Response: 0