I have enabled a Cloud Armor security policy with a throttle rule based on Custom Authorization HTTP header. This rule is functioning as expected, and requests are being throttled as required. Now, I want to inspect this token in the header within the logs. Therefore, I have enabled logs with
I believe the logs shown is intentional to prevent sensitive information from being exposed on the logs. As stated on the documentation, when you use verbose logging, Cloud Armor logs snippets of the elements from the incoming requests that triggered a particular preconfigured WAF rule. These snippets might contain pieces of request headers, request parameters, or elements of the POST body.
If you need to inspect the details of the custom headers in the logs, use Logging query language. Create a filter to extract the contents of your Auth header. Below is an example:
Hi @Marvin_Lucero
Thanks for the reply, is it possible to fully see the contents of the Auth header using a filter, I couldn’t get it, can you please help with that.