Module configuration

IMPORTANT

This guide only applies to Next-Gen WAF customers with access to the Next-Gen WAF control panel. If you have access to the Next-Gen WAF product in the Fastly control panel, you can only deploy the Next-Gen WAF with the Edge WAF deployment method.

We provide the ability to configure the Next-Gen WAF module. The following attributes are set by default, but may need to be modified to provide support for different environments. In the majority of cases modifying module configuration is not necessary. Contact support if you need assistance or have questions regarding modifying module configuration.

Apache

To modify the Next-Gen WAF module configuration in Apache you will need to add directives to your Apache configuration file (e.g., for CentOS it is httpd.conf, for Debian or Ubuntu it is apache.conf or apache2.conf). Note, these directives must be set after the Next-Gen WAF module is loaded.

Starting with release 1.6.0, the following directives replace any earlier ones. These directives are a renaming of the earlier ones but with the addition of the prefix SigSci.

NameDescriptionDefault value
SigSciAgentTimeoutAgent socket timeout in milliseconds.100
SigSciAgentPostLenMaximum POST body size in bytes.100000
SigSciAgentInspectionEnable or disable the module.On
SigSciAgentPortThe local port (when using TCP) that the agent listens on. If SigSciAgentPort is set, then SigSciAgentHost must be an IP or hostname.Unix: None, Windows: 9999
SigSciAgentHostHost or IP Address, otherwise use SigSciAgentHost to specify the domain socket file (e.g., /foo/bar.sock).Unix: /var/run/sigsci.sock, Windows: 127.0.0.1
SigSciEnableFixupsToggles Signal Sciences fixups priority over post-read request handling to allow the request to be seen before it’s modified.Off
SigSciRunBeforeModulesListNext-Gen WAF module runs before the list of specified modules (e.g., mod_example.c mod_something.c).None
SigSciRunAfterModulesListNext-Gen WAF module runs after the list of specified modules (e.g., mod_example.c mod_something.c).None
SigSciExpectedContentTypesA space-delimited list of custom content-types to support.None
SigSciExtendContentTypesEnables extended content inspection.false
NOTE

The SigSciRunBeforeModulesList and SigSciRunAfterModulesList directives are currently not supported on ARM64-based Linux distributions.

The following directives will be deprecated in favor of the new ones above with the SigSci prefix but are backwards compatible and will continue to work.

NameDescription
AgentTimeoutAgent socket timeout (in milliseconds), default: 100.
AgentPostLenMaximum POST body size in bytes, default: 100000
AgentInspectionEnable or disable the module, default: On
AgentPortThe local port (when using TCP) that the agent listens on, default: none. Note, if AgentPort is set then AgentHost must be a IP or hostname.
AgentHostHost or IP Address, otherwise use AgentHost to specify the domain socket file. /foo/bar.sock

The following directives are deprecated and will be ignored.

NameDescription
SigSciAltResponseCodesSpecifying alternative codes on which to block is deprecated. Instead we now block on any response code within the range 300-599.

Conditional Inspection Example

The Next-Gen WAF Apache Module can perform conditional inspection per VirtualHost by either disabling or enabling the module globally. This is useful for configurations that only require inspection to be performed, or not performed, on specific request conditions (e.g., path).

To enable or disable the module globally add both the SigSciAgentInspection and SigSciEnableFixups directives to the global Apache configuration (httpd.conf, apache2.conf). For example to disable the Next-Gen WAF Apache Module globally, but enable inspection for a specific `VirtualHost``:

NOTE

SigSciEnableFixups must be turned on for SigSciAgentInspection to conditionally work within Location directives.

SigSciAgentInspection Off
SigSciEnableFixups On

Inside each corresponding VirtualHost, add the appropriate SigSciAgentInspection directive value. For example, to enable inspection with only the VirtualHost handling requests for example.com:

1
2
3
4
5
6
<VirtualHost *:80>
DocumentRoot "/www/example1"
ServerName example.com
ServerAlias www.example.com
SigSciAgentInspection On
</VirtualHost>

After restarting the appropriate Apache service, the module will log the following output to the Apache error log with the appropriate values (1 for enabled, 0 for disabled) for each directive enabling or disabling the module applied in configuration:

[Fri Dec 12 11:56:31.329363 2025] [signalsciences:notice] [pid 3439:tid 123749635139456] SigSci: config: agent inspection flag: 0
[Fri Dec 12 11:56:31.329363 2025] [signalsciences:notice] [pid 3439:tid 123749635139456] SigSci: config: agent inspection flag: 1

NGINX dynamic module

Refer to Installing the NGINX dynamic module for instructions on installing and configuring the NGINX dynamic module.

NGINX Lua Module

IMPORTANT

We strongly recommend that you use the more performant NGINX dynamic module if possible. The NGINX Lua module takes advantage of OpenResty and has more installation dependencies as a result.

To modify the Next-Gen WAF Lua module for NGINX, changes can be made in the Next-Gen WAF Lua script, which by default is at /opt/sigsci/nginx/sigsci.conf.

NameDescription
agenthostThe IP address or path to Unix domain socket the SignalSciences Agent is listening on, default: unix:/var/run/sigsci.sock.
agentportThe local port (when using TCP) that the agent listens on, default: 12345
timeoutAgent socket timeout (in milliseconds), default: 100.
maxpostMaximum POST body size in bytes, default: 100000

Example configuration

1
2
3
4
sigsci.agenthost = "unix:/var/run/sigsci.sock"
sigsci.agentport = 12345
sigsci.timeout = 100
sigsci.maxpost = 1000000

HAProxy

Configuration changes are typically not required for the HAProxy module to work. However, it is possible to override the default settings if needed. To do so, you must create an override.lua file in which to add these configuration directives. Then, update the global section of your HAProxy config file (/usr/local/etc/haproxy/haproxy.cfg) to load this over-ride config file.

Example of configuration

1
2
3
4
global
...
lua-load /path/to/override.lua
...

Over-ride Directives

These directives may be used in your over-ride config file.

NameDescription
sigsci.agenthostThe IP address or path to unix domain socket the SignalSciences Agent is listening on, default: /var/run/sigsci.sock (unix domain socket).
sigsci.agentportThe local port (when using TCP) that the agent listens on, default: nil
sigsci.log_debugEnable verbose logging, default: false
sigsci.log_network_errorsEnable logging of socket connection errors, default: false
sigsci.timeoutAgent socket timeout (in seconds), default: 1 (0 means off).
sigsci.maxpostMaximum POST body size in bytes, default: 100000
sigsci.extra_blocking_resp_hdrUser may supply a response header to be added upon 406 responses, default: ""
sigsci.expected_content_typesA list of custom content-types to support
sigsci.extend_content_typesEnables extended content inspection. Default value is false.

Example of over-ride configuration

1
2
3
sigsci.agenthost = "192.0.2.243"
sigsci.agentport = 9090
sigsci.extra_blocking_resp_hdr = "Access-Control-Allow-Origin: https://example.com"

IIS

You can set the configuration for the IIS module using the MSI installer, the SigsciCtl.exe utility in v2.0.0+, IIS Manager UI, PowerShell, or the appcmd.exe utility. See Configuration Usage for more information on configuring the IIS module.

NameDefault ValueDescription
agentHost127.0.0.1
agentPort737
DebugFalseEnable Module debugging; sends to event-viewer.
ReuseConnectionsFalseUse a socket pool with the maximum number of sockets based on hardware concurrency.
MaxPostSize100000
AnomalySize524288
AnomalyDurationMillis1000
TimeoutMillis200Agent socket timeout in milliseconds.
ExpectedContentTypesA space delimited list of custom content-types to support.
ExtendContentTypesfalseThis can be set to true to enable extended content inspection.

Language Modules

See language specific module pages for configuration details.

Was this guide helpful?

Do not use this form to send sensitive information. If you need assistance, contact support. This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.