►
From YouTube: Web Application Firewall 12 3 Demo
Description
Demo of the Web Application Firewall introduced in GitLab 12.3
A
A
A
A
Now
the
tillers
been
installed
into
our
cluster,
will
install
ingress
into
our
cluster
as
well
and
when
we're
installing
ingress.
This
is
also
installing
the
Web
Application
Firewall
into
our
cluster
as
well.
There's
no
additional
steps
needed
by
you
or
your
users
to
add
the
waffe
capability
to
newly
created
clusters
with
github.
A
So
now
that
our
applications
then
deploy
to
the
cluster,
we
can
interact
with
it
and
the
application
is
a
simple
greeting
machine
that
when
you
enter
your
name,
it
greets
you,
but
rather
than
entering
just
our
name.
Let's
enter
something
that
looks
a
little
bit
more
suspicious
to
the
application.
Specifically,
let's
try
and
inject
a
piece
of
JavaScript
into
this
input
so
that
it's
served
to
other
users.
So.
A
You
see
when
Lukas
that
he
has
injected
javascript
into
the
page.
That's
why
we
see
that
pop
up,
but
also
on
the
bottom
half
of
the
window.
This
is
the
log
from
the
Web
Application
Firewall,
immediately
being
able
to
detect
and
identify
this
traffic
as
malicious.
The
Web
Application
Firewall
has
been
pre-configured
with
a
powerful
set
of
rules
from
wasp,
and
you
can
look
at
the
logs
in
your
cluster
anytime
to
see
any
of
the
traffic
that's
been
identified
as
potentially
malicious.