Google Native
getOrganizationSecurityPolicy
List all of the ordered rules present in a single specified policy.
Using getOrganizationSecurityPolicy
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getOrganizationSecurityPolicy(args: GetOrganizationSecurityPolicyArgs, opts?: InvokeOptions): Promise<GetOrganizationSecurityPolicyResult>
function getOrganizationSecurityPolicyOutput(args: GetOrganizationSecurityPolicyOutputArgs, opts?: InvokeOptions): Output<GetOrganizationSecurityPolicyResult>
def get_organization_security_policy(security_policy: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetOrganizationSecurityPolicyResult
def get_organization_security_policy_output(security_policy: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetOrganizationSecurityPolicyResult]
func LookupOrganizationSecurityPolicy(ctx *Context, args *LookupOrganizationSecurityPolicyArgs, opts ...InvokeOption) (*LookupOrganizationSecurityPolicyResult, error)
func LookupOrganizationSecurityPolicyOutput(ctx *Context, args *LookupOrganizationSecurityPolicyOutputArgs, opts ...InvokeOption) LookupOrganizationSecurityPolicyResultOutput
> Note: This function is named LookupOrganizationSecurityPolicy
in the Go SDK.
public static class GetOrganizationSecurityPolicy
{
public static Task<GetOrganizationSecurityPolicyResult> InvokeAsync(GetOrganizationSecurityPolicyArgs args, InvokeOptions? opts = null)
public static Output<GetOrganizationSecurityPolicyResult> Invoke(GetOrganizationSecurityPolicyInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetOrganizationSecurityPolicyResult> getOrganizationSecurityPolicy(GetOrganizationSecurityPolicyArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
Fn::Invoke:
Function: google-native:compute/beta:getOrganizationSecurityPolicy
Arguments:
# Arguments dictionary
The following arguments are supported:
- Security
Policy string
- Security
Policy string
- security
Policy String
- security
Policy string
- security_
policy str
- security
Policy String
getOrganizationSecurityPolicy Result
The following output properties are available:
- Adaptive
Protection Pulumi.Config Google Native. Compute. Beta. Outputs. Security Policy Adaptive Protection Config Response - Advanced
Options Pulumi.Config Google Native. Compute. Beta. Outputs. Security Policy Advanced Options Config Response - Associations
List<Pulumi.
Google Native. Compute. Beta. Outputs. Security Policy Association Response> A list of associations that belong to this policy.
- Creation
Timestamp string Creation timestamp in RFC3339 text format.
- Ddos
Protection Pulumi.Config Google Native. Compute. Beta. Outputs. Security Policy Ddos Protection Config Response - Description string
An optional description of this resource. Provide this property when you create the resource.
- Display
Name string User-provided name of the Organization security plicy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is FIREWALL. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- Fingerprint string
Specifies a fingerprint for this resource, which is essentially a hash of the metadata's contents and used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update metadata. You must always provide an up-to-date fingerprint hash in order to update or change metadata, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make get() request to the security policy.
- Kind string
[Output only] Type of the resource. Always compute#securityPolicyfor security policies
- Label
Fingerprint string A fingerprint for the labels being applied to this security policy, which is essentially a hash of the labels set used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update labels. You must always provide an up-to-date fingerprint hash in order to update or change labels. To see the latest fingerprint, make get() request to the security policy.
- Labels Dictionary<string, string>
Labels for this resource. These can only be added or modified by the setLabels method. Each label key/value pair must comply with RFC1035. Label values may be empty.
- Name string
Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- Parent string
The parent of the security policy.
- Recaptcha
Options Pulumi.Config Google Native. Compute. Beta. Outputs. Security Policy Recaptcha Options Config Response - Region string
URL of the region where the regional security policy resides. This field is not applicable to global security policies.
- Rule
Tuple intCount Total count of all security policy rule tuples. A security policy can not exceed a set number of tuples.
- Rules
List<Pulumi.
Google Native. Compute. Beta. Outputs. Security Policy Rule Response> A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a security policy, a default rule with action "allow" will be added.
- Self
Link string Server-defined URL for the resource.
- Self
Link stringWith Id Server-defined URL for this resource with the resource id.
- Type string
The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. This field can be set only at resource creation time.
- Adaptive
Protection SecurityConfig Policy Adaptive Protection Config Response - Advanced
Options SecurityConfig Policy Advanced Options Config Response - Associations
[]Security
Policy Association Response A list of associations that belong to this policy.
- Creation
Timestamp string Creation timestamp in RFC3339 text format.
- Ddos
Protection SecurityConfig Policy Ddos Protection Config Response - Description string
An optional description of this resource. Provide this property when you create the resource.
- Display
Name string User-provided name of the Organization security plicy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is FIREWALL. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- Fingerprint string
Specifies a fingerprint for this resource, which is essentially a hash of the metadata's contents and used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update metadata. You must always provide an up-to-date fingerprint hash in order to update or change metadata, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make get() request to the security policy.
- Kind string
[Output only] Type of the resource. Always compute#securityPolicyfor security policies
- Label
Fingerprint string A fingerprint for the labels being applied to this security policy, which is essentially a hash of the labels set used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update labels. You must always provide an up-to-date fingerprint hash in order to update or change labels. To see the latest fingerprint, make get() request to the security policy.
- Labels map[string]string
Labels for this resource. These can only be added or modified by the setLabels method. Each label key/value pair must comply with RFC1035. Label values may be empty.
- Name string
Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- Parent string
The parent of the security policy.
- Recaptcha
Options SecurityConfig Policy Recaptcha Options Config Response - Region string
URL of the region where the regional security policy resides. This field is not applicable to global security policies.
- Rule
Tuple intCount Total count of all security policy rule tuples. A security policy can not exceed a set number of tuples.
- Rules
[]Security
Policy Rule Response A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a security policy, a default rule with action "allow" will be added.
- Self
Link string Server-defined URL for the resource.
- Self
Link stringWith Id Server-defined URL for this resource with the resource id.
- Type string
The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. This field can be set only at resource creation time.
- adaptive
Protection SecurityConfig Policy Adaptive Protection Config Response - advanced
Options SecurityConfig Policy Advanced Options Config Response - associations
List<Security
Policy Association Response> A list of associations that belong to this policy.
- creation
Timestamp String Creation timestamp in RFC3339 text format.
- ddos
Protection SecurityConfig Policy Ddos Protection Config Response - description String
An optional description of this resource. Provide this property when you create the resource.
- display
Name String User-provided name of the Organization security plicy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is FIREWALL. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- fingerprint String
Specifies a fingerprint for this resource, which is essentially a hash of the metadata's contents and used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update metadata. You must always provide an up-to-date fingerprint hash in order to update or change metadata, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make get() request to the security policy.
- kind String
[Output only] Type of the resource. Always compute#securityPolicyfor security policies
- label
Fingerprint String A fingerprint for the labels being applied to this security policy, which is essentially a hash of the labels set used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update labels. You must always provide an up-to-date fingerprint hash in order to update or change labels. To see the latest fingerprint, make get() request to the security policy.
- labels Map<String,String>
Labels for this resource. These can only be added or modified by the setLabels method. Each label key/value pair must comply with RFC1035. Label values may be empty.
- name String
Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- parent String
The parent of the security policy.
- recaptcha
Options SecurityConfig Policy Recaptcha Options Config Response - region String
URL of the region where the regional security policy resides. This field is not applicable to global security policies.
- rule
Tuple IntegerCount Total count of all security policy rule tuples. A security policy can not exceed a set number of tuples.
- rules
List<Security
Policy Rule Response> A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a security policy, a default rule with action "allow" will be added.
- self
Link String Server-defined URL for the resource.
- self
Link StringWith Id Server-defined URL for this resource with the resource id.
- type String
The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. This field can be set only at resource creation time.
- adaptive
Protection SecurityConfig Policy Adaptive Protection Config Response - advanced
Options SecurityConfig Policy Advanced Options Config Response - associations
Security
Policy Association Response[] A list of associations that belong to this policy.
- creation
Timestamp string Creation timestamp in RFC3339 text format.
- ddos
Protection SecurityConfig Policy Ddos Protection Config Response - description string
An optional description of this resource. Provide this property when you create the resource.
- display
Name string User-provided name of the Organization security plicy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is FIREWALL. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- fingerprint string
Specifies a fingerprint for this resource, which is essentially a hash of the metadata's contents and used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update metadata. You must always provide an up-to-date fingerprint hash in order to update or change metadata, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make get() request to the security policy.
- kind string
[Output only] Type of the resource. Always compute#securityPolicyfor security policies
- label
Fingerprint string A fingerprint for the labels being applied to this security policy, which is essentially a hash of the labels set used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update labels. You must always provide an up-to-date fingerprint hash in order to update or change labels. To see the latest fingerprint, make get() request to the security policy.
- labels {[key: string]: string}
Labels for this resource. These can only be added or modified by the setLabels method. Each label key/value pair must comply with RFC1035. Label values may be empty.
- name string
Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- parent string
The parent of the security policy.
- recaptcha
Options SecurityConfig Policy Recaptcha Options Config Response - region string
URL of the region where the regional security policy resides. This field is not applicable to global security policies.
- rule
Tuple numberCount Total count of all security policy rule tuples. A security policy can not exceed a set number of tuples.
- rules
Security
Policy Rule Response[] A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a security policy, a default rule with action "allow" will be added.
- self
Link string Server-defined URL for the resource.
- self
Link stringWith Id Server-defined URL for this resource with the resource id.
- type string
The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. This field can be set only at resource creation time.
- adaptive_
protection_ Securityconfig Policy Adaptive Protection Config Response - advanced_
options_ Securityconfig Policy Advanced Options Config Response - associations
Sequence[Security
Policy Association Response] A list of associations that belong to this policy.
- creation_
timestamp str Creation timestamp in RFC3339 text format.
- ddos_
protection_ Securityconfig Policy Ddos Protection Config Response - description str
An optional description of this resource. Provide this property when you create the resource.
- display_
name str User-provided name of the Organization security plicy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is FIREWALL. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- fingerprint str
Specifies a fingerprint for this resource, which is essentially a hash of the metadata's contents and used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update metadata. You must always provide an up-to-date fingerprint hash in order to update or change metadata, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make get() request to the security policy.
- kind str
[Output only] Type of the resource. Always compute#securityPolicyfor security policies
- label_
fingerprint str A fingerprint for the labels being applied to this security policy, which is essentially a hash of the labels set used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update labels. You must always provide an up-to-date fingerprint hash in order to update or change labels. To see the latest fingerprint, make get() request to the security policy.
- labels Mapping[str, str]
Labels for this resource. These can only be added or modified by the setLabels method. Each label key/value pair must comply with RFC1035. Label values may be empty.
- name str
Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- parent str
The parent of the security policy.
- recaptcha_
options_ Securityconfig Policy Recaptcha Options Config Response - region str
URL of the region where the regional security policy resides. This field is not applicable to global security policies.
- rule_
tuple_ intcount Total count of all security policy rule tuples. A security policy can not exceed a set number of tuples.
- rules
Sequence[Security
Policy Rule Response] A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a security policy, a default rule with action "allow" will be added.
- self_
link str Server-defined URL for the resource.
- self_
link_ strwith_ id Server-defined URL for this resource with the resource id.
- type str
The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. This field can be set only at resource creation time.
- adaptive
Protection Property MapConfig - advanced
Options Property MapConfig - associations List<Property Map>
A list of associations that belong to this policy.
- creation
Timestamp String Creation timestamp in RFC3339 text format.
- ddos
Protection Property MapConfig - description String
An optional description of this resource. Provide this property when you create the resource.
- display
Name String User-provided name of the Organization security plicy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is FIREWALL. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- fingerprint String
Specifies a fingerprint for this resource, which is essentially a hash of the metadata's contents and used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update metadata. You must always provide an up-to-date fingerprint hash in order to update or change metadata, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make get() request to the security policy.
- kind String
[Output only] Type of the resource. Always compute#securityPolicyfor security policies
- label
Fingerprint String A fingerprint for the labels being applied to this security policy, which is essentially a hash of the labels set used for optimistic locking. The fingerprint is initially generated by Compute Engine and changes after every request to modify or update labels. You must always provide an up-to-date fingerprint hash in order to update or change labels. To see the latest fingerprint, make get() request to the security policy.
- labels Map<String>
Labels for this resource. These can only be added or modified by the setLabels method. Each label key/value pair must comply with RFC1035. Label values may be empty.
- name String
Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression
[a-z]([-a-z0-9]*[a-z0-9])?
which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.- parent String
The parent of the security policy.
- recaptcha
Options Property MapConfig - region String
URL of the region where the regional security policy resides. This field is not applicable to global security policies.
- rule
Tuple NumberCount Total count of all security policy rule tuples. A security policy can not exceed a set number of tuples.
- rules List<Property Map>
A list of rules that belong to this policy. There must always be a default rule (rule with priority 2147483647 and match "*"). If no rules are provided when creating a security policy, a default rule with action "allow" will be added.
- self
Link String Server-defined URL for the resource.
- self
Link StringWith Id Server-defined URL for this resource with the resource id.
- type String
The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google's cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. This field can be set only at resource creation time.
Supporting Types
ExprResponse
- Description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
Textual representation of an expression in Common Expression Language syntax.
- Location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- Description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
Textual representation of an expression in Common Expression Language syntax.
- Location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
Textual representation of an expression in Common Expression Language syntax.
- location String
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description string
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression string
Textual representation of an expression in Common Expression Language syntax.
- location string
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title string
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description str
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression str
Textual representation of an expression in Common Expression Language syntax.
- location str
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title str
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
Textual representation of an expression in Common Expression Language syntax.
- location String
Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
SecurityPolicyAdaptiveProtectionConfigAutoDeployConfigResponse
- Confidence
Threshold double - Expiration
Sec int - Impacted
Baseline doubleThreshold - Load
Threshold double
- Confidence
Threshold float64 - Expiration
Sec int - Impacted
Baseline float64Threshold - Load
Threshold float64
- confidence
Threshold Double - expiration
Sec Integer - impacted
Baseline DoubleThreshold - load
Threshold Double
- confidence
Threshold number - expiration
Sec number - impacted
Baseline numberThreshold - load
Threshold number
- confidence_
threshold float - expiration_
sec int - impacted_
baseline_ floatthreshold - load_
threshold float
- confidence
Threshold Number - expiration
Sec Number - impacted
Baseline NumberThreshold - load
Threshold Number
SecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfigResponse
- Enable bool
If set to true, enables CAAP for L7 DDoS detection.
- Rule
Visibility string Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
- Enable bool
If set to true, enables CAAP for L7 DDoS detection.
- Rule
Visibility string Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
- enable Boolean
If set to true, enables CAAP for L7 DDoS detection.
- rule
Visibility String Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
- enable boolean
If set to true, enables CAAP for L7 DDoS detection.
- rule
Visibility string Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
- enable bool
If set to true, enables CAAP for L7 DDoS detection.
- rule_
visibility str Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
- enable Boolean
If set to true, enables CAAP for L7 DDoS detection.
- rule
Visibility String Rule visibility can be one of the following: STANDARD - opaque rules. (default) PREMIUM - transparent rules.
SecurityPolicyAdaptiveProtectionConfigResponse
- Auto
Deploy Pulumi.Config Google Native. Compute. Beta. Inputs. Security Policy Adaptive Protection Config Auto Deploy Config Response - Layer7Ddos
Defense Pulumi.Config Google Native. Compute. Beta. Inputs. Security Policy Adaptive Protection Config Layer7Ddos Defense Config Response If set to true, enables Cloud Armor Machine Learning.
- Auto
Deploy SecurityConfig Policy Adaptive Protection Config Auto Deploy Config Response - Layer7Ddos
Defense SecurityConfig Policy Adaptive Protection Config Layer7Ddos Defense Config Response If set to true, enables Cloud Armor Machine Learning.
- auto
Deploy SecurityConfig Policy Adaptive Protection Config Auto Deploy Config Response - layer7Ddos
Defense SecurityConfig Policy Adaptive Protection Config Layer7Ddos Defense Config Response If set to true, enables Cloud Armor Machine Learning.
- auto
Deploy SecurityConfig Policy Adaptive Protection Config Auto Deploy Config Response - layer7Ddos
Defense SecurityConfig Policy Adaptive Protection Config Layer7Ddos Defense Config Response If set to true, enables Cloud Armor Machine Learning.
- auto_
deploy_ Securityconfig Policy Adaptive Protection Config Auto Deploy Config Response - layer7_
ddos_ Securitydefense_ config Policy Adaptive Protection Config Layer7Ddos Defense Config Response If set to true, enables Cloud Armor Machine Learning.
- auto
Deploy Property MapConfig - layer7Ddos
Defense Property MapConfig If set to true, enables Cloud Armor Machine Learning.
SecurityPolicyAdvancedOptionsConfigJsonCustomConfigResponse
- Content
Types List<string> A list of custom Content-Type header values to apply the JSON parsing. As per RFC 1341, a Content-Type header value has the following format: Content-Type := type "/" subtype *[";" parameter] When configuring a custom Content-Type header value, only the type/subtype needs to be specified, and the parameters should be excluded.
- Content
Types []string A list of custom Content-Type header values to apply the JSON parsing. As per RFC 1341, a Content-Type header value has the following format: Content-Type := type "/" subtype *[";" parameter] When configuring a custom Content-Type header value, only the type/subtype needs to be specified, and the parameters should be excluded.
- content
Types List<String> A list of custom Content-Type header values to apply the JSON parsing. As per RFC 1341, a Content-Type header value has the following format: Content-Type := type "/" subtype *[";" parameter] When configuring a custom Content-Type header value, only the type/subtype needs to be specified, and the parameters should be excluded.
- content
Types string[] A list of custom Content-Type header values to apply the JSON parsing. As per RFC 1341, a Content-Type header value has the following format: Content-Type := type "/" subtype *[";" parameter] When configuring a custom Content-Type header value, only the type/subtype needs to be specified, and the parameters should be excluded.
- content_
types Sequence[str] A list of custom Content-Type header values to apply the JSON parsing. As per RFC 1341, a Content-Type header value has the following format: Content-Type := type "/" subtype *[";" parameter] When configuring a custom Content-Type header value, only the type/subtype needs to be specified, and the parameters should be excluded.
- content
Types List<String> A list of custom Content-Type header values to apply the JSON parsing. As per RFC 1341, a Content-Type header value has the following format: Content-Type := type "/" subtype *[";" parameter] When configuring a custom Content-Type header value, only the type/subtype needs to be specified, and the parameters should be excluded.
SecurityPolicyAdvancedOptionsConfigResponse
- Json
Custom Pulumi.Config Google Native. Compute. Beta. Inputs. Security Policy Advanced Options Config Json Custom Config Response Custom configuration to apply the JSON parsing. Only applicable when json_parsing is set to STANDARD.
- Json
Parsing string - Log
Level string
- Json
Custom SecurityConfig Policy Advanced Options Config Json Custom Config Response Custom configuration to apply the JSON parsing. Only applicable when json_parsing is set to STANDARD.
- Json
Parsing string - Log
Level string
- json
Custom SecurityConfig Policy Advanced Options Config Json Custom Config Response Custom configuration to apply the JSON parsing. Only applicable when json_parsing is set to STANDARD.
- json
Parsing String - log
Level String
- json
Custom SecurityConfig Policy Advanced Options Config Json Custom Config Response Custom configuration to apply the JSON parsing. Only applicable when json_parsing is set to STANDARD.
- json
Parsing string - log
Level string
- json_
custom_ Securityconfig Policy Advanced Options Config Json Custom Config Response Custom configuration to apply the JSON parsing. Only applicable when json_parsing is set to STANDARD.
- json_
parsing str - log_
level str
- json
Custom Property MapConfig Custom configuration to apply the JSON parsing. Only applicable when json_parsing is set to STANDARD.
- json
Parsing String - log
Level String
SecurityPolicyAssociationResponse
- Attachment
Id string The resource that the security policy is attached to.
- Display
Name string The display name of the security policy of the association.
- Name string
The name for an association.
- Security
Policy stringId The security policy ID of the association.
- Attachment
Id string The resource that the security policy is attached to.
- Display
Name string The display name of the security policy of the association.
- Name string
The name for an association.
- Security
Policy stringId The security policy ID of the association.
- attachment
Id String The resource that the security policy is attached to.
- display
Name String The display name of the security policy of the association.
- name String
The name for an association.
- security
Policy StringId The security policy ID of the association.
- attachment
Id string The resource that the security policy is attached to.
- display
Name string The display name of the security policy of the association.
- name string
The name for an association.
- security
Policy stringId The security policy ID of the association.
- attachment_
id str The resource that the security policy is attached to.
- display_
name str The display name of the security policy of the association.
- name str
The name for an association.
- security_
policy_ strid The security policy ID of the association.
- attachment
Id String The resource that the security policy is attached to.
- display
Name String The display name of the security policy of the association.
- name String
The name for an association.
- security
Policy StringId The security policy ID of the association.
SecurityPolicyDdosProtectionConfigResponse
- Ddos
Protection string
- Ddos
Protection string
- ddos
Protection String
- ddos
Protection string
- ddos_
protection str
- ddos
Protection String
SecurityPolicyRecaptchaOptionsConfigResponse
- Redirect
Site stringKey An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- Redirect
Site stringKey An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect
Site StringKey An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect
Site stringKey An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect_
site_ strkey An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect
Site StringKey An optional field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
SecurityPolicyRuleHttpHeaderActionHttpHeaderOptionResponse
- Header
Name string The name of the header to set.
- Header
Value string The value to set the named header to.
- Header
Name string The name of the header to set.
- Header
Value string The value to set the named header to.
- header
Name String The name of the header to set.
- header
Value String The value to set the named header to.
- header
Name string The name of the header to set.
- header
Value string The value to set the named header to.
- header_
name str The name of the header to set.
- header_
value str The value to set the named header to.
- header
Name String The name of the header to set.
- header
Value String The value to set the named header to.
SecurityPolicyRuleHttpHeaderActionResponse
- Request
Headers List<Pulumi.To Adds Google Native. Compute. Beta. Inputs. Security Policy Rule Http Header Action Http Header Option Response> The list of request headers to add or overwrite if they're already present.
- Request
Headers []SecurityTo Adds Policy Rule Http Header Action Http Header Option Response The list of request headers to add or overwrite if they're already present.
- request
Headers List<SecurityTo Adds Policy Rule Http Header Action Http Header Option Response> The list of request headers to add or overwrite if they're already present.
- request
Headers SecurityTo Adds Policy Rule Http Header Action Http Header Option Response[] The list of request headers to add or overwrite if they're already present.
- request_
headers_ Sequence[Securityto_ adds Policy Rule Http Header Action Http Header Option Response] The list of request headers to add or overwrite if they're already present.
- request
Headers List<Property Map>To Adds The list of request headers to add or overwrite if they're already present.
SecurityPolicyRuleMatcherConfigLayer4ConfigResponse
- Ip
Protocol string The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
- Ports List<string>
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
- Ip
Protocol string The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
- Ports []string
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
- ip
Protocol String The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
- ports List<String>
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
- ip
Protocol string The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
- ports string[]
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
- ip_
protocol str The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
- ports Sequence[str]
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
- ip
Protocol String The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
- ports List<String>
An optional list of ports to which this rule applies. This field is only applicable for UDP or TCP protocol. Each entry must be either an integer or a range. If not specified, this rule applies to connections through any port. Example inputs include: ["22"], ["80","443"], and ["12345-12349"]. This field may only be specified when versioned_expr is set to FIREWALL.
SecurityPolicyRuleMatcherConfigResponse
- Dest
Ip List<string>Ranges CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
- Layer4Configs
List<Pulumi.
Google Native. Compute. Beta. Inputs. Security Policy Rule Matcher Config Layer4Config Response> Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
- Src
Ip List<string>Ranges CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
- Dest
Ip []stringRanges CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
- Layer4Configs
[]Security
Policy Rule Matcher Config Layer4Config Response Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
- Src
Ip []stringRanges CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
- dest
Ip List<String>Ranges CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
- layer4Configs
List<Security
Policy Rule Matcher Config Layer4Config Response> Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
- src
Ip List<String>Ranges CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
- dest
Ip string[]Ranges CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
- layer4Configs
Security
Policy Rule Matcher Config Layer4Config Response[] Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
- src
Ip string[]Ranges CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
- dest_
ip_ Sequence[str]ranges CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
- layer4_
configs Sequence[SecurityPolicy Rule Matcher Config Layer4Config Response] Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
- src_
ip_ Sequence[str]ranges CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
- dest
Ip List<String>Ranges CIDR IP address range. This field may only be specified when versioned_expr is set to FIREWALL.
- layer4Configs List<Property Map>
Pairs of IP protocols and ports that the rule should match. This field may only be specified when versioned_expr is set to FIREWALL.
- src
Ip List<String>Ranges CIDR IP address range. Maximum number of src_ip_ranges allowed is 10.
SecurityPolicyRuleMatcherResponse
- Config
Pulumi.
Google Native. Compute. Beta. Inputs. Security Policy Rule Matcher Config Response The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- Expr
Pulumi.
Google Native. Compute. Beta. Inputs. Expr Response User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- Versioned
Expr string Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
- Config
Security
Policy Rule Matcher Config Response The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- Expr
Expr
Response User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- Versioned
Expr string Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
- config
Security
Policy Rule Matcher Config Response The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr
Expr
Response User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned
Expr String Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
- config
Security
Policy Rule Matcher Config Response The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr
Expr
Response User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned
Expr string Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
- config
Security
Policy Rule Matcher Config Response The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr
Expr
Response User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned_
expr str Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
- config Property Map
The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr Property Map
User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned
Expr String Preconfigured versioned expression. If this field is specified, config must also be specified. Available preconfigured expressions along with their requirements are: SRC_IPS_V1 - must specify the corresponding src_ip_range field in config.
SecurityPolicyRuleRateLimitOptionsResponse
- Ban
Duration intSec Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- Ban
Threshold Pulumi.Google Native. Compute. Beta. Inputs. Security Policy Rule Rate Limit Options Threshold Response Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
- Conform
Action string Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- Enforce
On stringKey Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
- Enforce
On stringKey Name Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- Exceed
Action string Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny(status)", where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- Exceed
Redirect Pulumi.Options Google Native. Compute. Beta. Inputs. Security Policy Rule Redirect Options Response Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- Rate
Limit Pulumi.Threshold Google Native. Compute. Beta. Inputs. Security Policy Rule Rate Limit Options Threshold Response Threshold at which to begin ratelimiting.
- Ban
Duration intSec Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- Ban
Threshold SecurityPolicy Rule Rate Limit Options Threshold Response Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
- Conform
Action string Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- Enforce
On stringKey Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
- Enforce
On stringKey Name Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- Exceed
Action string Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny(status)", where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- Exceed
Redirect SecurityOptions Policy Rule Redirect Options Response Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- Rate
Limit SecurityThreshold Policy Rule Rate Limit Options Threshold Response Threshold at which to begin ratelimiting.
- ban
Duration IntegerSec Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban
Threshold SecurityPolicy Rule Rate Limit Options Threshold Response Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
- conform
Action String Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce
On StringKey Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
- enforce
On StringKey Name Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed
Action String Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny(status)", where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed
Redirect SecurityOptions Policy Rule Redirect Options Response Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate
Limit SecurityThreshold Policy Rule Rate Limit Options Threshold Response Threshold at which to begin ratelimiting.
- ban
Duration numberSec Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban
Threshold SecurityPolicy Rule Rate Limit Options Threshold Response Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
- conform
Action string Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce
On stringKey Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
- enforce
On stringKey Name Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed
Action string Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny(status)", where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed
Redirect SecurityOptions Policy Rule Redirect Options Response Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate
Limit SecurityThreshold Policy Rule Rate Limit Options Threshold Response Threshold at which to begin ratelimiting.
- ban_
duration_ intsec Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban_
threshold SecurityPolicy Rule Rate Limit Options Threshold Response Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
- conform_
action str Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce_
on_ strkey Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
- enforce_
on_ strkey_ name Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed_
action str Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny(status)", where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed_
redirect_ Securityoptions Policy Rule Redirect Options Response Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate_
limit_ Securitythreshold Policy Rule Rate Limit Options Threshold Response Threshold at which to begin ratelimiting.
- ban
Duration NumberSec Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban
Threshold Property Map Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'ban_duration_sec' when the number of requests that exceed the 'rate_limit_threshold' also exceed this 'ban_threshold'.
- conform
Action String Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce
On StringKey Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if this field 'enforce_on_key' is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforce_on_key_name". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
- enforce
On StringKey Name Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed
Action String Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny(status)", where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed
Redirect Property MapOptions Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate
Limit Property MapThreshold Threshold at which to begin ratelimiting.
SecurityPolicyRuleRateLimitOptionsThresholdResponse
- Count int
Number of HTTP(S) requests for calculating the threshold.
- Interval
Sec int Interval over which the threshold is computed.
- Count int
Number of HTTP(S) requests for calculating the threshold.
- Interval
Sec int Interval over which the threshold is computed.
- count Integer
Number of HTTP(S) requests for calculating the threshold.
- interval
Sec Integer Interval over which the threshold is computed.
- count number
Number of HTTP(S) requests for calculating the threshold.
- interval
Sec number Interval over which the threshold is computed.
- count int
Number of HTTP(S) requests for calculating the threshold.
- interval_
sec int Interval over which the threshold is computed.
- count Number
Number of HTTP(S) requests for calculating the threshold.
- interval
Sec Number Interval over which the threshold is computed.
SecurityPolicyRuleRedirectOptionsResponse
SecurityPolicyRuleResponse
- Action string
The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
- Description string
An optional description of this resource. Provide this property when you create the resource.
- Direction string
The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
- Enable
Logging bool Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
- Header
Action Pulumi.Google Native. Compute. Beta. Inputs. Security Policy Rule Http Header Action Response Optional, additional actions that are performed on headers.
- Kind string
[Output only] Type of the resource. Always compute#securityPolicyRule for security policy rules
- Match
Pulumi.
Google Native. Compute. Beta. Inputs. Security Policy Rule Matcher Response A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
- Preview bool
If set to true, the specified action is not enforced.
- Priority int
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
- Rate
Limit Pulumi.Options Google Native. Compute. Beta. Inputs. Security Policy Rule Rate Limit Options Response Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- Redirect
Options Pulumi.Google Native. Compute. Beta. Inputs. Security Policy Rule Redirect Options Response Parameters defining the redirect action. Cannot be specified for any other actions.
- Rule
Number string Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
- Rule
Tuple intCount Calculation of the complexity of a single firewall security policy rule.
- Target
Resources List<string> A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
- Target
Service List<string>Accounts A list of service accounts indicating the sets of instances that are applied with this rule.
- Action string
The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
- Description string
An optional description of this resource. Provide this property when you create the resource.
- Direction string
The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
- Enable
Logging bool Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
- Header
Action SecurityPolicy Rule Http Header Action Response Optional, additional actions that are performed on headers.
- Kind string
[Output only] Type of the resource. Always compute#securityPolicyRule for security policy rules
- Match
Security
Policy Rule Matcher Response A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
- Preview bool
If set to true, the specified action is not enforced.
- Priority int
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
- Rate
Limit SecurityOptions Policy Rule Rate Limit Options Response Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- Redirect
Options SecurityPolicy Rule Redirect Options Response Parameters defining the redirect action. Cannot be specified for any other actions.
- Rule
Number string Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
- Rule
Tuple intCount Calculation of the complexity of a single firewall security policy rule.
- Target
Resources []string A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
- Target
Service []stringAccounts A list of service accounts indicating the sets of instances that are applied with this rule.
- action String
The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
- description String
An optional description of this resource. Provide this property when you create the resource.
- direction String
The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
- enable
Logging Boolean Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
- header
Action SecurityPolicy Rule Http Header Action Response Optional, additional actions that are performed on headers.
- kind String
[Output only] Type of the resource. Always compute#securityPolicyRule for security policy rules
- match
Security
Policy Rule Matcher Response A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
- preview Boolean
If set to true, the specified action is not enforced.
- priority Integer
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
- rate
Limit SecurityOptions Policy Rule Rate Limit Options Response Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect
Options SecurityPolicy Rule Redirect Options Response Parameters defining the redirect action. Cannot be specified for any other actions.
- rule
Number String Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
- rule
Tuple IntegerCount Calculation of the complexity of a single firewall security policy rule.
- target
Resources List<String> A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
- target
Service List<String>Accounts A list of service accounts indicating the sets of instances that are applied with this rule.
- action string
The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
- description string
An optional description of this resource. Provide this property when you create the resource.
- direction string
The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
- enable
Logging boolean Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
- header
Action SecurityPolicy Rule Http Header Action Response Optional, additional actions that are performed on headers.
- kind string
[Output only] Type of the resource. Always compute#securityPolicyRule for security policy rules
- match
Security
Policy Rule Matcher Response A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
- preview boolean
If set to true, the specified action is not enforced.
- priority number
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
- rate
Limit SecurityOptions Policy Rule Rate Limit Options Response Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect
Options SecurityPolicy Rule Redirect Options Response Parameters defining the redirect action. Cannot be specified for any other actions.
- rule
Number string Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
- rule
Tuple numberCount Calculation of the complexity of a single firewall security policy rule.
- target
Resources string[] A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
- target
Service string[]Accounts A list of service accounts indicating the sets of instances that are applied with this rule.
- action str
The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
- description str
An optional description of this resource. Provide this property when you create the resource.
- direction str
The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
- enable_
logging bool Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
- header_
action SecurityPolicy Rule Http Header Action Response Optional, additional actions that are performed on headers.
- kind str
[Output only] Type of the resource. Always compute#securityPolicyRule for security policy rules
- match
Security
Policy Rule Matcher Response A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
- preview bool
If set to true, the specified action is not enforced.
- priority int
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
- rate_
limit_ Securityoptions Policy Rule Rate Limit Options Response Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect_
options SecurityPolicy Rule Redirect Options Response Parameters defining the redirect action. Cannot be specified for any other actions.
- rule_
number str Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
- rule_
tuple_ intcount Calculation of the complexity of a single firewall security policy rule.
- target_
resources Sequence[str] A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
- target_
service_ Sequence[str]accounts A list of service accounts indicating the sets of instances that are applied with this rule.
- action String
The Action to perform when the rule is matched. The following are the valid actions: - allow: allow access to target. - deny(): deny access to target, returns the HTTP response code specified (valid values are 403, 404, and 502). - rate_based_ban: limit client traffic to the configured threshold and ban the client if the traffic exceeds the threshold. Configure parameters for this action in RateLimitOptions. Requires rate_limit_options to be set. - redirect: redirect to a different target. This can either be an internal reCAPTCHA redirect, or an external URL-based redirect via a 302 response. Parameters for this action can be configured via redirectOptions. - throttle: limit client traffic to the configured threshold. Configure parameters for this action in rateLimitOptions. Requires rate_limit_options to be set for this.
- description String
An optional description of this resource. Provide this property when you create the resource.
- direction String
The direction in which this rule applies. This field may only be specified when versioned_expr is set to FIREWALL.
- enable
Logging Boolean Denotes whether to enable logging for a particular rule. If logging is enabled, logs will be exported to the configured export destination in Stackdriver. Logs may be exported to BigQuery or Pub/Sub. Note: you cannot enable logging on "goto_next" rules. This field may only be specified when the versioned_expr is set to FIREWALL.
- header
Action Property Map Optional, additional actions that are performed on headers.
- kind String
[Output only] Type of the resource. Always compute#securityPolicyRule for security policy rules
- match Property Map
A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding 'action' is enforced.
- preview Boolean
If set to true, the specified action is not enforced.
- priority Number
An integer indicating the priority of a rule in the list. The priority must be a positive value between 0 and 2147483647. Rules are evaluated from highest to lowest priority where 0 is the highest priority and 2147483647 is the lowest priority.
- rate
Limit Property MapOptions Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect
Options Property Map Parameters defining the redirect action. Cannot be specified for any other actions.
- rule
Number String Identifier for the rule. This is only unique within the given security policy. This can only be set during rule creation, if rule number is not specified it will be generated by the server.
- rule
Tuple NumberCount Calculation of the complexity of a single firewall security policy rule.
- target
Resources List<String> A list of network resource URLs to which this rule applies. This field allows you to control which network's VMs get this rule. If this field is left blank, all VMs within the organization will receive the rule. This field may only be specified when versioned_expr is set to FIREWALL.
- target
Service List<String>Accounts A list of service accounts indicating the sets of instances that are applied with this rule.
Package Details
- Repository
- https://github.com/pulumi/pulumi-google-native
- License
- Apache-2.0