These are the possibilities,
1. You may overlook,
* The need to create a dedicated application in ComplianceCow similar to the one used in PolicyCow.
* The inclusion of user inputs provided in PolicyCow.
* The need to return an evidence file from the rule.
2. If you're making an external call, please be aware that your firewall may have restrictions in place.
In ComplianceCow, having an application is essential for running a rule.
You have the option to publish the application you've already created in PolicyCow. This action will generate the application type in ComplianceCow.
The input.yaml
file within rules is utilized during rule execution. Conversely, within the task, it serves solely for testing purposes.
To track errors encountered during rule execution:
You can locate a file named cowexecutions/cowexecutions.ndjson
, which contains information about the rule execution. If you return a proper error message, you can check it there. If not, you can find the rule execution setup under cowexecutions/rules/{{rulename}}
. Additionally, you'll find the logs.txt
inside the rule/task folders for further insights.
If you're developing the application, you'll need to install it for local testing. You can utilize the install_cow_packages.sh
script for the installation process.