This might be due to the fact that the HTTP request that gets sent when you try to store a query has a content type of application/ld+json
. Many firewalls do not allow this content type by default, so you'll need to ask your admin to whitelist it.
The way to do this varies by cloud provider, but here's how to do it on Azure:
- Log in to https://portal.azure.com.
- Locate your Application Gateway or WAF policy in the Azure portal.
- Custom Rules Creation:
- For Application Gateway WAF:
- Go to the
Web Application Firewall
underSettings
. - Select the policy to which you want to add the rule.
- Click on
Custom rules
.
- For Front Door WAF:
- Select the WAF policy.
- Go to
Custom Rules
.
- Add a New Custom Rule:
- Click on
Add custom rule
. - Set a name for the rule.
- In the
Rule type
, selectMatch Rule
. - Configure the rule to match requests where the
Content-Type
header containsapplication/ld+json
.- Match Condition: Select
Request Header
. - Header Name: Enter
Content-Type
. - Operator: Choose
Contains
. - Value: Enter
application/ld+json
.
- Action: Choose
Allow
to whitelist the requests.
- Priority and Rule Status:
- Set an appropriate
Priority
for the rule. Lower numbers have higher priority. - Ensure the rule status is set to
Enabled
.
- Save and Apply Changes:
- Click on
Add
orSave
to create the rule. - It might take a few minutes for changes to propagate across the network.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article