This function submits ModSecurity™ rule error reports to a remote receiver. The third party rule vendors use these error reports to identify problems with their rule sets.
Important:
When you disable the Web Server role, the system disables this function.
HTTP Request was successful.
object | |
object |
whmapi1 --output=jsonpretty \ modsec_report_rule \ row_ids='794828' \ message=$'Hi. We\'re having some trouble with this rule. It seems to be blocking all requests.' \ email='john.doe@example.com' \ type='false positive' \ send='1'
{- "data": {
- "report": [
- {
- "email": "john.doe@example.com",
- "hits": [
- {
- "action_desc": "Access denied with code 406 (phase 2).",
- "handler": null,
- "host": "example.com",
- "http_method": "GET",
- "http_status": 406,
- "http_version": "HTTP/1.1",
- "id": 794828,
- "ip": "10.215.215.236",
- "justification": "Unconditional match in SecAction.",
- "meta_file": "/usr/local/apache/conf/modsec_vendor_configs/MyVendor/one.conf",
- "meta_id": 12345694,
- "meta_line": 1,
- "meta_logdata": null,
- "meta_msg": "Method is not allowed by policy",
- "meta_offset": 0,
- "meta_rev": 1,
- "meta_severity": "CRITICAL",
- "meta_uri": null,
- "path": "/something",
- "timestamp": "2019-10-13T07:58:04.000Z",
- "timezone": "-300"
}
], - "message": "Hi. We're having some trouble with this rule. It seems to be blocking all requests.",
- "rule_text": "SecAction \"deny,auditlog,id:'12345694'\"\n",
- "type": "false positive"
}
]
}, - "metadata": {
- "command": "modsec_report_rule",
- "reason": "OK",
- "result": 1,
- "version": 1
}
}