Skip to content
Wallarm Documentation
What's New
Initializing search
Ask AI
Product tour
Use for free
English
Japanese
Turkish
Portuguese (BR)
Arabic
Introduction
API Discovery
API Protection
API Security Testing
AI Security
Deployment
Integrations
Platform Management
Reference
Introduction
Introduction
Getting Started
Getting Started
Platform Overview
Quick Start
Video Guides
Video Guides
Platform Overview
API Discovery Overview
API Leaks Overview
Shadow and Orphan API
Analyzing CVEs and Attacks
API Abuse Prevention
Platform Settings
API Discovery
API Discovery
Overview
Exploring Your APIs
Exploring Your APIs
API Inventory
Dashboard
Track API Changes
Risk Analysis
Risk Analysis
Risk Score
Rogue APIs (Shadow/Orphan/Zombie)
Sensitive Business Flows
Data Protection
Data Protection
Sensitive Data Detection
BOLA Auto-Protection
Setup & Configuration
API Protection
API Protection
Overview
Best Practices
API Session Security
API Session Security
Overview
Setup
Exploring Sessions
Session Blocking
Business Logic Abuse
API-Specific Protection
API-Specific Protection
BOLA Protection (Manual)
BOLA Protection (Auto)
Enumeration Attack Protection
GraphQL Protection
File Upload Restriction
Custom Request Anomaly
Bot Management
Bot Management
Overview
Setup
Exploring Detected Bots
Exceptions
API Spec Enforcement
API Spec Enforcement
Overview
Setup
Viewing Events
Credential Protection
Credential Protection
Credential Stuffing Detection
Threat Protection (WAAP)
Threat Protection (WAAP)
WAAP Overview
Threat Protection Overview
Brute Force Protection
Forced Browsing Protection
Multi-Attack Thresholds
DoS Protection
DDoS Protection
IP Filtering
Filtration Mode
Mitigation Controls
Mitigation Controls
Overview
Rules & Policies
Rules & Policies
Overview
Rate Limiting
Virtual Patching
Custom Regex Rules
Sensitive Data Masking
Request Processing
Response Headers
Overlimit Detection
API Security Testing
API Security Testing
Security Testing Overview
Threat Replay Testing
Threat Replay Testing
Overview
Setup
Exploring Results
Schema-Based Testing
Schema-Based Testing
Overview
Setup
Exploring Results
API Attack Surface (AASM)
API Attack Surface (AASM)
Overview
Setup
API Surface Discovery
Security Issues
Detecting Vulnerabilities
AI Security
AI Security
Overview
AI Discovery
AI Discovery
AI Agent Discovery
AI Protection
AI Protection
AI Agent Protection
AI Payload Inspection
Deployment
Deployment
Deployment Overview
Security Edge (Managed)
Security Edge (Managed)
Overview
Free Tier
Inline Deployment
Inline Deployment
Overview
Deployment Guide
Access Control Lists
Cache Rules
Custom Block Page
Host Redirection
mTLS Configuration
Multi-Region
NGINX Overrides
Upgrade & Management
Telemetry Portal
Telemetry Portal
Overview
Main Dashboard
Logs Dashboard
Security Edge Connector
Kubernetes
Kubernetes
NGINX Ingress Controller
NGINX Ingress Controller
Deployment
Configuration Options
High Availability
Monitoring
Real Client IP
Sidecar Proxy
Sidecar Proxy
Deployment
Helm Chart
Customization
Pod Annotations
Scaling
eBPF (Out-of-Band)
eBPF (Out-of-Band)
Deployment
Helm Chart
Selecting Packets
Chaining Ingress Controllers
Cloud Platforms
Cloud Platforms
AWS
AWS
AMI
Autoscaling
Autoscaling
Overview
Create AMI Image
Autoscaling Group Setup
Load Balancing
Docker on ECS
Terraform Module
Terraform Module
Overview
Terraform for VPC
Terraform for API Gateway
AWS WAF Integration
Cost Estimation
GCP
GCP
Machine Image
Autoscaling
Autoscaling
Overview
Create GCP Image
Instance Template
Autoscaling Group
Load Balancing
Docker on GCE
Azure
Azure
Container Instances
Alibaba Cloud
Alibaba Cloud
Docker on ECS
Heroku
Private Cloud
Cloud-Init Script
Connectors
Connectors
Overview
Akamai EdgeWorkers
Apigee
AWS API Gateway
AWS Lambda
Azure API Management
Azion Edge
Cloudflare
Fastly
IBM API Connect
Istio
Kong Ingress Controller
Kong API Gateway
Layer7 API Gateway
MuleSoft
MuleSoft Flex
Code Bundle Changelog
Self-Hosted Node
Self-Hosted Node
Overview
Inline Deployment
Inline Deployment
Overview
Linux All-in-One
Docker NGINX-Based
Native Node
Native Node
All-in-One Installer
Docker Image
Helm Chart
Helm Chart Configuration
AWS AMI
Configuration Reference
NGINX Node
NGINX Node
All-in-One Installer
Docker Image
AWS AMI Package
GCP Machine Image
Postanalytics Module
Custom NGINX Version
Out-of-Band (Traffic Mirror)
Out-of-Band (Traffic Mirror)
Overview
TCP Mirror Analysis
On-Premise
On-Premise
Overview
Deployment
Maintenance
Multi-Tenant
Multi-Tenant
Overview
Configure Accounts
Deploy Multi-Tenant Node
Custom Deployment
Custom Deployment
Request Custom Deployment
Upgrades & Migration
Upgrades & Migration
Versioning Policy
What's New
General Recommendations
Node Artifact Versions
NGINX Node Upgrades
NGINX Node Upgrades
DEB/RPM Packages
Postanalytics Module
All-in-One Installer
Docker Image
Ingress Controller
Ingress Controller Retirement
Sidecar Proxy
Cloud Image
Multi-Tenant Node
Native Node Upgrades
Native Node Upgrades
All-in-One
Helm Chart
Docker Image
Artifact Versions
EOL Node Upgrades (3.6 and lower)
EOL Node Upgrades (3.6 and lower)
What's New
NGINX Modules
Postanalytics
Docker Image
Ingress Controller
Cloud Image
Multi-Tenant
Migrate IP Lists
Integrations
Integrations
Integrations Overview
Messaging & Alerts
Messaging & Alerts
Email
Slack
Microsoft Teams
Telegram
Incident Management
Incident Management
PagerDuty
Opsgenie
Jira
ServiceNow
InsightConnect
SIEM & Analytics
SIEM & Analytics
Splunk
Sumo Logic
Microsoft Sentinel
Datadog
Log Collectors
Log Collectors
Fluentd
Logstash
Integration Examples
Integration Examples
IBM QRadar via Fluentd
IBM QRadar via Logstash
Splunk via Fluentd
Splunk via Logstash
ArcSight via Fluentd
ArcSight via Logstash
Datadog via Fluentd/Logstash
Cloud Storage
Cloud Storage
Amazon S3
MinIO
Webhooks
Webhooks
Webhook Configuration
DevSecOps
DevSecOps
Docker Image Security
Generate SBOM
Platform Management
Platform Management
Overview
Dashboards
Dashboards
Threat Prevention Dashboard
API Discovery Dashboard
OWASP API Top 10 Dashboard
Business Intelligence
Monitoring & Events
Monitoring & Events
Event Overview
Analyzing Attacks
Analyzing Incidents
Grouping & Sampling
Vulnerabilities
Triggers & Alerts
Triggers & Alerts
Trigger Configuration
Search & Reports
Search & Reports
Search & Filters
Custom Reports
Account Settings
Account Settings
Account
Applications
Audit Log
Users & Access
Users & Access
User Management
API Tokens
SSO Configuration
SSO Configuration
SSO Overview
SSO Setup
Google Workspace
Okta
Troubleshooting
LDAP Integration
Nodes & Infrastructure
Nodes & Infrastructure
Node Overview
Resource Allocation
Cloud Synchronization
Proxy Configuration
Block Page Configuration
NGINX Node Configuration
Handling Invalid Headers
JA3 Fingerprinting
Monitoring & Metrics
Monitoring & Metrics
NGINX Node Metrics
NGINX Node Metrics
Overview
Postanalytics Metrics
wcli Controller Metrics
API Firewall Metrics
Native Node Metrics
Native Node Metrics
Overview
Postanalytics Metrics
Runtime Metrics
Statistics Service
Node Logging
Failover Configuration
Troubleshooting
Troubleshooting
Overview
Detection and Blocking
Detection Tools
Performance
Real Client IP
End User Problems
Wallarm Ingress Controller
Wallarm Cloud is Down
OWASP Dashboard Alerts
NGINX Error Log
Dynamic DNS in NGINX
Plans & Pricing
Plans & Pricing
Subscription Plans
Reference
Reference
Overview
What's New
API Reference
API Reference
Overview
Request Examples
Attack Types
Glossary
Operations Reference
Operations Reference
Terraform Provider
Learning Request Volume
Health Check
Scanner IP Addresses
Data Retention Policy
Shared Responsibility Model
SLA
Version 6.x and 0.14.x+
Versions 6.x and 0.14.x+
Versions 5.x and 0.13.x-
Version 4.10 ⚠
Changelog & news
¶
Back to top