-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Investigate a mechanism for centralized/shared persistent storage #378
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Original reporter: rbarnett |
[email protected]: I have seen that in the beta release of http 2.3 there is now also a memcache implementation for the SSL Sessioncache (modules/cache/mod_socache_memcache.c). Maybe some part of the Code can be reused? |
[email protected]: I tested kyoto tycoon which can be used as an alternative for memcached and has also a replication feature built in, memcached protocol is supported. |
rbarnett: there is an Apache module that implements this - We could re-use some data. |
This functionality is under test under the branch: https://github.com/SpiderLabs/ModSecurity/tree/memcache_collections This test implementation is using memcache to store the collections values. The memcache server can be informed by the utilization of the following configuration option:
If SecPersistentStorage was not informed or if is set to "local" the collection will be stored on the sdbm files. |
Anyone know the current status of this feature? This type of feature would be awesome for people who want to use multiple embedded solutions. Apache 2.4 (as people have mentioned) supports this type of functionality for SSL cache and 2.4 is now in Debian stable (8.0). |
This feature is being implemented as part of version 3 (aka libmodsecurity). In version 3, the collections were implemented over a interface that allow us to extend ModSecurity with different collections backends. The interface is available here: Tickets were opened to track the implementation of the initial backends, they are: #1139, #1140, #1141 |
MODSEC-224: For distributed environments, we need to extend the persistent storage mechanism to allow for centralized logging. This would allow individual ModSec installs to access a central storage location for initcol, setsid, setuid actions. One option may be to look at memcached.
Possible directives would be:
SecPersistentStorage Local|Centralized
SecCentralizedStorageHost hostname|ip
The text was updated successfully, but these errors were encountered: