Skip to content

Commit

Permalink
chore: add syntax highlighting/formatting
Browse files Browse the repository at this point in the history
  • Loading branch information
brnhensley authored Oct 18, 2024
1 parent 324e8e8 commit 85b7068
Showing 1 changed file with 9 additions and 8 deletions.
17 changes: 9 additions & 8 deletions src/content/docs/iast/troubleshooting.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -163,7 +163,8 @@ If you don't find your problem listed here, you can always reach out to [New Rel
You can update the `appId` in the below query and run it in the query builder to find all the vulnerabilities reported for your application.

```sql
SELECT * FROM Vulnerability WHERE issueType = 'Application Vulnerability' AND appId = '{your application's appId}'
SELECT * FROM Vulnerability
WHERE issueType = 'Application Vulnerability' AND appId = YOU_APPLICATION_ID
```
</Collapser>

Expand Down Expand Up @@ -193,7 +194,7 @@ If you don't find your problem listed here, you can always reach out to [New Rel

For instance, let's suppose that your application is using libraries for [Mongo DB](http://go.mongodb.org/mongo-driver/mongo). For this specific library, you need to import this [instrumentation package](https://github.com/newrelic/csec-go-agent/tree/main/instrumentation/csec_mongodb_mongo) from newrelic:
```
```go
import (
"github.com/newrelic/go-agent/v3/integrations/nrsecurityagent"
"github.com/newrelic/go-agent/v3/newrelic"
Expand All @@ -208,8 +209,8 @@ If you don't find your problem listed here, you can always reach out to [New Rel

* If you're opening an HTTP protocol endpoint, place the `newrelic.WrapListen` function around the endpoint name to enable vulnerability scanning against that endpoint:
```
http.ListenAndServe(newrelic.WrapListen(":<YOUR PORT NUMBER>"), nil)
```go
http.ListenAndServe(newrelic.WrapListen(":YOUR_PORT_NUMBER"), nil)
```
<Callout variant="important">
Expand All @@ -227,16 +228,16 @@ If you don't find your problem listed here, you can always reach out to [New Rel

* Disable low-priority-instrumentation from security config:

```
```yml
low-priority-instrumentation:
enabled: false
enabled: false
```

* Exclude low-priority-instrumentation class from the class transformer. To do this, add the given lines in the `class_transformer` section of the config file:

```
```yml
com.newrelic.instrumentation.security.low-priority-instrumentation:
enabled: false
enabled: false
```
</Collapser>

Expand Down

0 comments on commit 85b7068

Please sign in to comment.