1. Packages
  2. Incapsula Provider
  3. API Docs
  4. SecurityRuleException
incapsula 3.33.0 published on Wednesday, Apr 30, 2025 by imperva

incapsula.SecurityRuleException

Explore with Pulumi AI

incapsula logo
incapsula 3.33.0 published on Wednesday, Apr 30, 2025 by imperva

    This resource enables you to configure exceptions to WAF security rules and policies.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as incapsula from "@pulumi/incapsula";
    
    const example_waf_backdoor_rule_exception = new incapsula.SecurityRuleException("example-waf-backdoor-rule-exception", {
        siteId: incapsula_site["example-site"].id,
        ruleId: "api.threats.backdoor",
        clientApps: "488,123",
        countries: "JM,US",
        continents: "NA,AF",
        ips: "1.2.3.6,1.2.3.7",
        urls: "/myurl,/myurl2",
        userAgents: "myUserAgent",
        parameters: "myparam",
    });
    const example_waf_botAccess_control_rule_exception = new incapsula.SecurityRuleException("example-waf-botAccess-control-rule-exception", {
        siteId: incapsula_site["example-site"].id,
        ruleId: "api.threats.bot_access_control",
        clientAppTypes: "DataScraper,",
        ips: "1.2.3.6,1.2.3.7",
        urls: "/myurl,/myurl2",
        userAgents: "myUserAgent",
    });
    const example_waf_cross_site_scripting_rule_exception = new incapsula.SecurityRuleException("example-waf-cross-site-scripting-rule-exception", {
        siteId: incapsula_site["example-site"].id,
        ruleId: "api.threats.cross_site_scripting",
        clientApps: "488,123",
        countries: "JM,US",
        continents: "NA,AF",
        urls: "/myurl,/myurl2",
        parameters: "myparam",
    });
    const example_waf_ddos_rule_exception = new incapsula.SecurityRuleException("example-waf-ddos-rule-exception", {
        siteId: incapsula_site["example-site"].id,
        ruleId: "api.threats.ddos",
        clientApps: "488,123",
        countries: "JM,US",
        continents: "NA,AF",
        ips: "1.2.3.6,1.2.3.7",
        urls: "/myurl,/myurl2",
    });
    const example_waf_illegal_resource_access_rule_exception = new incapsula.SecurityRuleException("example-waf-illegal-resource-access-rule-exception", {
        siteId: incapsula_site["example-site"].id,
        ruleId: "api.threats.illegal_resource_access",
        clientApps: "488,123",
        countries: "JM,US",
        continents: "NA,AF",
        ips: "1.2.3.6,1.2.3.7",
        urls: "/myurl,/myurl2",
        parameters: "myparam",
    });
    const example_waf_remote_file_inclusion_rule_exception = new incapsula.SecurityRuleException("example-waf-remote-file-inclusion-rule-exception", {
        siteId: incapsula_site["example-site"].id,
        ruleId: "api.threats.remote_file_inclusion",
        clientApps: "488,123",
        countries: "JM,US",
        continents: "NA,AF",
        ips: "1.2.3.6,1.2.3.7",
        urls: "/myurl,/myurl2",
        userAgents: "myUserAgent",
        parameters: "myparam",
    });
    const example_waf_sql_injection_rule_exception = new incapsula.SecurityRuleException("example-waf-sql-injection-rule-exception", {
        siteId: incapsula_site["example-site"].id,
        ruleId: "api.threats.sql_injection",
        clientApps: "488,123",
        countries: "JM,US",
        continents: "NA,AF",
        ips: "1.2.3.6,1.2.3.7",
        urls: "/myurl,/myurl2",
    });
    
    import pulumi
    import pulumi_incapsula as incapsula
    
    example_waf_backdoor_rule_exception = incapsula.SecurityRuleException("example-waf-backdoor-rule-exception",
        site_id=incapsula_site["example-site"]["id"],
        rule_id="api.threats.backdoor",
        client_apps="488,123",
        countries="JM,US",
        continents="NA,AF",
        ips="1.2.3.6,1.2.3.7",
        urls="/myurl,/myurl2",
        user_agents="myUserAgent",
        parameters="myparam")
    example_waf_bot_access_control_rule_exception = incapsula.SecurityRuleException("example-waf-botAccess-control-rule-exception",
        site_id=incapsula_site["example-site"]["id"],
        rule_id="api.threats.bot_access_control",
        client_app_types="DataScraper,",
        ips="1.2.3.6,1.2.3.7",
        urls="/myurl,/myurl2",
        user_agents="myUserAgent")
    example_waf_cross_site_scripting_rule_exception = incapsula.SecurityRuleException("example-waf-cross-site-scripting-rule-exception",
        site_id=incapsula_site["example-site"]["id"],
        rule_id="api.threats.cross_site_scripting",
        client_apps="488,123",
        countries="JM,US",
        continents="NA,AF",
        urls="/myurl,/myurl2",
        parameters="myparam")
    example_waf_ddos_rule_exception = incapsula.SecurityRuleException("example-waf-ddos-rule-exception",
        site_id=incapsula_site["example-site"]["id"],
        rule_id="api.threats.ddos",
        client_apps="488,123",
        countries="JM,US",
        continents="NA,AF",
        ips="1.2.3.6,1.2.3.7",
        urls="/myurl,/myurl2")
    example_waf_illegal_resource_access_rule_exception = incapsula.SecurityRuleException("example-waf-illegal-resource-access-rule-exception",
        site_id=incapsula_site["example-site"]["id"],
        rule_id="api.threats.illegal_resource_access",
        client_apps="488,123",
        countries="JM,US",
        continents="NA,AF",
        ips="1.2.3.6,1.2.3.7",
        urls="/myurl,/myurl2",
        parameters="myparam")
    example_waf_remote_file_inclusion_rule_exception = incapsula.SecurityRuleException("example-waf-remote-file-inclusion-rule-exception",
        site_id=incapsula_site["example-site"]["id"],
        rule_id="api.threats.remote_file_inclusion",
        client_apps="488,123",
        countries="JM,US",
        continents="NA,AF",
        ips="1.2.3.6,1.2.3.7",
        urls="/myurl,/myurl2",
        user_agents="myUserAgent",
        parameters="myparam")
    example_waf_sql_injection_rule_exception = incapsula.SecurityRuleException("example-waf-sql-injection-rule-exception",
        site_id=incapsula_site["example-site"]["id"],
        rule_id="api.threats.sql_injection",
        client_apps="488,123",
        countries="JM,US",
        continents="NA,AF",
        ips="1.2.3.6,1.2.3.7",
        urls="/myurl,/myurl2")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/incapsula/v3/incapsula"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := incapsula.NewSecurityRuleException(ctx, "example-waf-backdoor-rule-exception", &incapsula.SecurityRuleExceptionArgs{
    			SiteId:     pulumi.Any(incapsula_site.ExampleSite.Id),
    			RuleId:     pulumi.String("api.threats.backdoor"),
    			ClientApps: pulumi.String("488,123"),
    			Countries:  pulumi.String("JM,US"),
    			Continents: pulumi.String("NA,AF"),
    			Ips:        pulumi.String("1.2.3.6,1.2.3.7"),
    			Urls:       pulumi.String("/myurl,/myurl2"),
    			UserAgents: pulumi.String("myUserAgent"),
    			Parameters: pulumi.String("myparam"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-botAccess-control-rule-exception", &incapsula.SecurityRuleExceptionArgs{
    			SiteId:         pulumi.Any(incapsula_site.ExampleSite.Id),
    			RuleId:         pulumi.String("api.threats.bot_access_control"),
    			ClientAppTypes: pulumi.String("DataScraper,"),
    			Ips:            pulumi.String("1.2.3.6,1.2.3.7"),
    			Urls:           pulumi.String("/myurl,/myurl2"),
    			UserAgents:     pulumi.String("myUserAgent"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-cross-site-scripting-rule-exception", &incapsula.SecurityRuleExceptionArgs{
    			SiteId:     pulumi.Any(incapsula_site.ExampleSite.Id),
    			RuleId:     pulumi.String("api.threats.cross_site_scripting"),
    			ClientApps: pulumi.String("488,123"),
    			Countries:  pulumi.String("JM,US"),
    			Continents: pulumi.String("NA,AF"),
    			Urls:       pulumi.String("/myurl,/myurl2"),
    			Parameters: pulumi.String("myparam"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-ddos-rule-exception", &incapsula.SecurityRuleExceptionArgs{
    			SiteId:     pulumi.Any(incapsula_site.ExampleSite.Id),
    			RuleId:     pulumi.String("api.threats.ddos"),
    			ClientApps: pulumi.String("488,123"),
    			Countries:  pulumi.String("JM,US"),
    			Continents: pulumi.String("NA,AF"),
    			Ips:        pulumi.String("1.2.3.6,1.2.3.7"),
    			Urls:       pulumi.String("/myurl,/myurl2"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-illegal-resource-access-rule-exception", &incapsula.SecurityRuleExceptionArgs{
    			SiteId:     pulumi.Any(incapsula_site.ExampleSite.Id),
    			RuleId:     pulumi.String("api.threats.illegal_resource_access"),
    			ClientApps: pulumi.String("488,123"),
    			Countries:  pulumi.String("JM,US"),
    			Continents: pulumi.String("NA,AF"),
    			Ips:        pulumi.String("1.2.3.6,1.2.3.7"),
    			Urls:       pulumi.String("/myurl,/myurl2"),
    			Parameters: pulumi.String("myparam"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-remote-file-inclusion-rule-exception", &incapsula.SecurityRuleExceptionArgs{
    			SiteId:     pulumi.Any(incapsula_site.ExampleSite.Id),
    			RuleId:     pulumi.String("api.threats.remote_file_inclusion"),
    			ClientApps: pulumi.String("488,123"),
    			Countries:  pulumi.String("JM,US"),
    			Continents: pulumi.String("NA,AF"),
    			Ips:        pulumi.String("1.2.3.6,1.2.3.7"),
    			Urls:       pulumi.String("/myurl,/myurl2"),
    			UserAgents: pulumi.String("myUserAgent"),
    			Parameters: pulumi.String("myparam"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-sql-injection-rule-exception", &incapsula.SecurityRuleExceptionArgs{
    			SiteId:     pulumi.Any(incapsula_site.ExampleSite.Id),
    			RuleId:     pulumi.String("api.threats.sql_injection"),
    			ClientApps: pulumi.String("488,123"),
    			Countries:  pulumi.String("JM,US"),
    			Continents: pulumi.String("NA,AF"),
    			Ips:        pulumi.String("1.2.3.6,1.2.3.7"),
    			Urls:       pulumi.String("/myurl,/myurl2"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Incapsula = Pulumi.Incapsula;
    
    return await Deployment.RunAsync(() => 
    {
        var example_waf_backdoor_rule_exception = new Incapsula.SecurityRuleException("example-waf-backdoor-rule-exception", new()
        {
            SiteId = incapsula_site.Example_site.Id,
            RuleId = "api.threats.backdoor",
            ClientApps = "488,123",
            Countries = "JM,US",
            Continents = "NA,AF",
            Ips = "1.2.3.6,1.2.3.7",
            Urls = "/myurl,/myurl2",
            UserAgents = "myUserAgent",
            Parameters = "myparam",
        });
    
        var example_waf_botAccess_control_rule_exception = new Incapsula.SecurityRuleException("example-waf-botAccess-control-rule-exception", new()
        {
            SiteId = incapsula_site.Example_site.Id,
            RuleId = "api.threats.bot_access_control",
            ClientAppTypes = "DataScraper,",
            Ips = "1.2.3.6,1.2.3.7",
            Urls = "/myurl,/myurl2",
            UserAgents = "myUserAgent",
        });
    
        var example_waf_cross_site_scripting_rule_exception = new Incapsula.SecurityRuleException("example-waf-cross-site-scripting-rule-exception", new()
        {
            SiteId = incapsula_site.Example_site.Id,
            RuleId = "api.threats.cross_site_scripting",
            ClientApps = "488,123",
            Countries = "JM,US",
            Continents = "NA,AF",
            Urls = "/myurl,/myurl2",
            Parameters = "myparam",
        });
    
        var example_waf_ddos_rule_exception = new Incapsula.SecurityRuleException("example-waf-ddos-rule-exception", new()
        {
            SiteId = incapsula_site.Example_site.Id,
            RuleId = "api.threats.ddos",
            ClientApps = "488,123",
            Countries = "JM,US",
            Continents = "NA,AF",
            Ips = "1.2.3.6,1.2.3.7",
            Urls = "/myurl,/myurl2",
        });
    
        var example_waf_illegal_resource_access_rule_exception = new Incapsula.SecurityRuleException("example-waf-illegal-resource-access-rule-exception", new()
        {
            SiteId = incapsula_site.Example_site.Id,
            RuleId = "api.threats.illegal_resource_access",
            ClientApps = "488,123",
            Countries = "JM,US",
            Continents = "NA,AF",
            Ips = "1.2.3.6,1.2.3.7",
            Urls = "/myurl,/myurl2",
            Parameters = "myparam",
        });
    
        var example_waf_remote_file_inclusion_rule_exception = new Incapsula.SecurityRuleException("example-waf-remote-file-inclusion-rule-exception", new()
        {
            SiteId = incapsula_site.Example_site.Id,
            RuleId = "api.threats.remote_file_inclusion",
            ClientApps = "488,123",
            Countries = "JM,US",
            Continents = "NA,AF",
            Ips = "1.2.3.6,1.2.3.7",
            Urls = "/myurl,/myurl2",
            UserAgents = "myUserAgent",
            Parameters = "myparam",
        });
    
        var example_waf_sql_injection_rule_exception = new Incapsula.SecurityRuleException("example-waf-sql-injection-rule-exception", new()
        {
            SiteId = incapsula_site.Example_site.Id,
            RuleId = "api.threats.sql_injection",
            ClientApps = "488,123",
            Countries = "JM,US",
            Continents = "NA,AF",
            Ips = "1.2.3.6,1.2.3.7",
            Urls = "/myurl,/myurl2",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.incapsula.SecurityRuleException;
    import com.pulumi.incapsula.SecurityRuleExceptionArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example_waf_backdoor_rule_exception = new SecurityRuleException("example-waf-backdoor-rule-exception", SecurityRuleExceptionArgs.builder()
                .siteId(incapsula_site.example-site().id())
                .ruleId("api.threats.backdoor")
                .clientApps("488,123")
                .countries("JM,US")
                .continents("NA,AF")
                .ips("1.2.3.6,1.2.3.7")
                .urls("/myurl,/myurl2")
                .userAgents("myUserAgent")
                .parameters("myparam")
                .build());
    
            var example_waf_botAccess_control_rule_exception = new SecurityRuleException("example-waf-botAccess-control-rule-exception", SecurityRuleExceptionArgs.builder()
                .siteId(incapsula_site.example-site().id())
                .ruleId("api.threats.bot_access_control")
                .clientAppTypes("DataScraper,")
                .ips("1.2.3.6,1.2.3.7")
                .urls("/myurl,/myurl2")
                .userAgents("myUserAgent")
                .build());
    
            var example_waf_cross_site_scripting_rule_exception = new SecurityRuleException("example-waf-cross-site-scripting-rule-exception", SecurityRuleExceptionArgs.builder()
                .siteId(incapsula_site.example-site().id())
                .ruleId("api.threats.cross_site_scripting")
                .clientApps("488,123")
                .countries("JM,US")
                .continents("NA,AF")
                .urls("/myurl,/myurl2")
                .parameters("myparam")
                .build());
    
            var example_waf_ddos_rule_exception = new SecurityRuleException("example-waf-ddos-rule-exception", SecurityRuleExceptionArgs.builder()
                .siteId(incapsula_site.example-site().id())
                .ruleId("api.threats.ddos")
                .clientApps("488,123")
                .countries("JM,US")
                .continents("NA,AF")
                .ips("1.2.3.6,1.2.3.7")
                .urls("/myurl,/myurl2")
                .build());
    
            var example_waf_illegal_resource_access_rule_exception = new SecurityRuleException("example-waf-illegal-resource-access-rule-exception", SecurityRuleExceptionArgs.builder()
                .siteId(incapsula_site.example-site().id())
                .ruleId("api.threats.illegal_resource_access")
                .clientApps("488,123")
                .countries("JM,US")
                .continents("NA,AF")
                .ips("1.2.3.6,1.2.3.7")
                .urls("/myurl,/myurl2")
                .parameters("myparam")
                .build());
    
            var example_waf_remote_file_inclusion_rule_exception = new SecurityRuleException("example-waf-remote-file-inclusion-rule-exception", SecurityRuleExceptionArgs.builder()
                .siteId(incapsula_site.example-site().id())
                .ruleId("api.threats.remote_file_inclusion")
                .clientApps("488,123")
                .countries("JM,US")
                .continents("NA,AF")
                .ips("1.2.3.6,1.2.3.7")
                .urls("/myurl,/myurl2")
                .userAgents("myUserAgent")
                .parameters("myparam")
                .build());
    
            var example_waf_sql_injection_rule_exception = new SecurityRuleException("example-waf-sql-injection-rule-exception", SecurityRuleExceptionArgs.builder()
                .siteId(incapsula_site.example-site().id())
                .ruleId("api.threats.sql_injection")
                .clientApps("488,123")
                .countries("JM,US")
                .continents("NA,AF")
                .ips("1.2.3.6,1.2.3.7")
                .urls("/myurl,/myurl2")
                .build());
    
        }
    }
    
    resources:
      example-waf-backdoor-rule-exception:
        type: incapsula:SecurityRuleException
        properties:
          siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
          ruleId: api.threats.backdoor
          clientApps: 488,123
          countries: JM,US
          continents: NA,AF
          ips: 1.2.3.6,1.2.3.7
          urls: /myurl,/myurl2
          userAgents: myUserAgent
          parameters: myparam
      example-waf-botAccess-control-rule-exception:
        type: incapsula:SecurityRuleException
        properties:
          siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
          ruleId: api.threats.bot_access_control
          clientAppTypes: DataScraper,
          ips: 1.2.3.6,1.2.3.7
          urls: /myurl,/myurl2
          userAgents: myUserAgent
      example-waf-cross-site-scripting-rule-exception:
        type: incapsula:SecurityRuleException
        properties:
          siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
          ruleId: api.threats.cross_site_scripting
          clientApps: 488,123
          countries: JM,US
          continents: NA,AF
          urls: /myurl,/myurl2
          parameters: myparam
      example-waf-ddos-rule-exception:
        type: incapsula:SecurityRuleException
        properties:
          siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
          ruleId: api.threats.ddos
          clientApps: 488,123
          countries: JM,US
          continents: NA,AF
          ips: 1.2.3.6,1.2.3.7
          urls: /myurl,/myurl2
      example-waf-illegal-resource-access-rule-exception:
        type: incapsula:SecurityRuleException
        properties:
          siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
          ruleId: api.threats.illegal_resource_access
          clientApps: 488,123
          countries: JM,US
          continents: NA,AF
          ips: 1.2.3.6,1.2.3.7
          urls: /myurl,/myurl2
          parameters: myparam
      example-waf-remote-file-inclusion-rule-exception:
        type: incapsula:SecurityRuleException
        properties:
          siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
          ruleId: api.threats.remote_file_inclusion
          clientApps: 488,123
          countries: JM,US
          continents: NA,AF
          ips: 1.2.3.6,1.2.3.7
          urls: /myurl,/myurl2
          userAgents: myUserAgent
          parameters: myparam
      example-waf-sql-injection-rule-exception:
        type: incapsula:SecurityRuleException
        properties:
          siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
          ruleId: api.threats.sql_injection
          clientApps: 488,123
          countries: JM,US
          continents: NA,AF
          ips: 1.2.3.6,1.2.3.7
          urls: /myurl,/myurl2
    

    Create SecurityRuleException Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SecurityRuleException(name: string, args: SecurityRuleExceptionArgs, opts?: CustomResourceOptions);
    @overload
    def SecurityRuleException(resource_name: str,
                              args: SecurityRuleExceptionArgs,
                              opts: Optional[ResourceOptions] = None)
    
    @overload
    def SecurityRuleException(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              rule_id: Optional[str] = None,
                              site_id: Optional[float] = None,
                              countries: Optional[str] = None,
                              client_app_types: Optional[str] = None,
                              exception_id_only: Optional[str] = None,
                              ips: Optional[str] = None,
                              parameters: Optional[str] = None,
                              continents: Optional[str] = None,
                              security_rule_exception_id: Optional[str] = None,
                              client_apps: Optional[str] = None,
                              url_patterns: Optional[str] = None,
                              urls: Optional[str] = None,
                              user_agents: Optional[str] = None,
                              whitelist_id: Optional[str] = None)
    func NewSecurityRuleException(ctx *Context, name string, args SecurityRuleExceptionArgs, opts ...ResourceOption) (*SecurityRuleException, error)
    public SecurityRuleException(string name, SecurityRuleExceptionArgs args, CustomResourceOptions? opts = null)
    public SecurityRuleException(String name, SecurityRuleExceptionArgs args)
    public SecurityRuleException(String name, SecurityRuleExceptionArgs args, CustomResourceOptions options)
    
    type: incapsula:SecurityRuleException
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SecurityRuleExceptionArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SecurityRuleExceptionArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SecurityRuleExceptionArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SecurityRuleExceptionArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SecurityRuleExceptionArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var securityRuleExceptionResource = new Incapsula.SecurityRuleException("securityRuleExceptionResource", new()
    {
        RuleId = "string",
        SiteId = 0,
        Countries = "string",
        ClientAppTypes = "string",
        ExceptionIdOnly = "string",
        Ips = "string",
        Parameters = "string",
        Continents = "string",
        SecurityRuleExceptionId = "string",
        ClientApps = "string",
        Urls = "string",
        UserAgents = "string",
        WhitelistId = "string",
    });
    
    example, err := incapsula.NewSecurityRuleException(ctx, "securityRuleExceptionResource", &incapsula.SecurityRuleExceptionArgs{
    	RuleId:                  pulumi.String("string"),
    	SiteId:                  pulumi.Float64(0),
    	Countries:               pulumi.String("string"),
    	ClientAppTypes:          pulumi.String("string"),
    	ExceptionIdOnly:         pulumi.String("string"),
    	Ips:                     pulumi.String("string"),
    	Parameters:              pulumi.String("string"),
    	Continents:              pulumi.String("string"),
    	SecurityRuleExceptionId: pulumi.String("string"),
    	ClientApps:              pulumi.String("string"),
    	Urls:                    pulumi.String("string"),
    	UserAgents:              pulumi.String("string"),
    	WhitelistId:             pulumi.String("string"),
    })
    
    var securityRuleExceptionResource = new SecurityRuleException("securityRuleExceptionResource", SecurityRuleExceptionArgs.builder()
        .ruleId("string")
        .siteId(0)
        .countries("string")
        .clientAppTypes("string")
        .exceptionIdOnly("string")
        .ips("string")
        .parameters("string")
        .continents("string")
        .securityRuleExceptionId("string")
        .clientApps("string")
        .urls("string")
        .userAgents("string")
        .whitelistId("string")
        .build());
    
    security_rule_exception_resource = incapsula.SecurityRuleException("securityRuleExceptionResource",
        rule_id="string",
        site_id=0,
        countries="string",
        client_app_types="string",
        exception_id_only="string",
        ips="string",
        parameters="string",
        continents="string",
        security_rule_exception_id="string",
        client_apps="string",
        urls="string",
        user_agents="string",
        whitelist_id="string")
    
    const securityRuleExceptionResource = new incapsula.SecurityRuleException("securityRuleExceptionResource", {
        ruleId: "string",
        siteId: 0,
        countries: "string",
        clientAppTypes: "string",
        exceptionIdOnly: "string",
        ips: "string",
        parameters: "string",
        continents: "string",
        securityRuleExceptionId: "string",
        clientApps: "string",
        urls: "string",
        userAgents: "string",
        whitelistId: "string",
    });
    
    type: incapsula:SecurityRuleException
    properties:
        clientAppTypes: string
        clientApps: string
        continents: string
        countries: string
        exceptionIdOnly: string
        ips: string
        parameters: string
        ruleId: string
        securityRuleExceptionId: string
        siteId: 0
        urls: string
        userAgents: string
        whitelistId: string
    

    SecurityRuleException Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SecurityRuleException resource accepts the following input properties:

    RuleId string
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    SiteId double
    Numeric identifier of the site to operate on.
    ClientAppTypes string
    A comma separated list of client application types.
    ClientApps string
    A comma separated list of client application IDs.
    Continents string
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    Countries string
    A comma separated list of country codes.
    ExceptionIdOnly string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    Ips string
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    Parameters string
    A comma separated list of encoded parameters.
    SecurityRuleExceptionId string
    Unique identifier in the API for the Rule Exception ID.
    UrlPatterns string
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    Urls string
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    UserAgents string
    A comma separated list of encoded user agents.
    WhitelistId string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    RuleId string
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    SiteId float64
    Numeric identifier of the site to operate on.
    ClientAppTypes string
    A comma separated list of client application types.
    ClientApps string
    A comma separated list of client application IDs.
    Continents string
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    Countries string
    A comma separated list of country codes.
    ExceptionIdOnly string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    Ips string
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    Parameters string
    A comma separated list of encoded parameters.
    SecurityRuleExceptionId string
    Unique identifier in the API for the Rule Exception ID.
    UrlPatterns string
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    Urls string
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    UserAgents string
    A comma separated list of encoded user agents.
    WhitelistId string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ruleId String
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    siteId Double
    Numeric identifier of the site to operate on.
    clientAppTypes String
    A comma separated list of client application types.
    clientApps String
    A comma separated list of client application IDs.
    continents String
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries String
    A comma separated list of country codes.
    exceptionIdOnly String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips String
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters String
    A comma separated list of encoded parameters.
    securityRuleExceptionId String
    Unique identifier in the API for the Rule Exception ID.
    urlPatterns String
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls String
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    userAgents String
    A comma separated list of encoded user agents.
    whitelistId String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ruleId string
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    siteId number
    Numeric identifier of the site to operate on.
    clientAppTypes string
    A comma separated list of client application types.
    clientApps string
    A comma separated list of client application IDs.
    continents string
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries string
    A comma separated list of country codes.
    exceptionIdOnly string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips string
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters string
    A comma separated list of encoded parameters.
    securityRuleExceptionId string
    Unique identifier in the API for the Rule Exception ID.
    urlPatterns string
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls string
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    userAgents string
    A comma separated list of encoded user agents.
    whitelistId string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    rule_id str
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    site_id float
    Numeric identifier of the site to operate on.
    client_app_types str
    A comma separated list of client application types.
    client_apps str
    A comma separated list of client application IDs.
    continents str
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries str
    A comma separated list of country codes.
    exception_id_only str
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips str
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters str
    A comma separated list of encoded parameters.
    security_rule_exception_id str
    Unique identifier in the API for the Rule Exception ID.
    url_patterns str
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls str
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    user_agents str
    A comma separated list of encoded user agents.
    whitelist_id str
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ruleId String
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    siteId Number
    Numeric identifier of the site to operate on.
    clientAppTypes String
    A comma separated list of client application types.
    clientApps String
    A comma separated list of client application IDs.
    continents String
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries String
    A comma separated list of country codes.
    exceptionIdOnly String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips String
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters String
    A comma separated list of encoded parameters.
    securityRuleExceptionId String
    Unique identifier in the API for the Rule Exception ID.
    urlPatterns String
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls String
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    userAgents String
    A comma separated list of encoded user agents.
    whitelistId String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SecurityRuleException resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing SecurityRuleException Resource

    Get an existing SecurityRuleException resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SecurityRuleExceptionState, opts?: CustomResourceOptions): SecurityRuleException
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            client_app_types: Optional[str] = None,
            client_apps: Optional[str] = None,
            continents: Optional[str] = None,
            countries: Optional[str] = None,
            exception_id_only: Optional[str] = None,
            ips: Optional[str] = None,
            parameters: Optional[str] = None,
            rule_id: Optional[str] = None,
            security_rule_exception_id: Optional[str] = None,
            site_id: Optional[float] = None,
            url_patterns: Optional[str] = None,
            urls: Optional[str] = None,
            user_agents: Optional[str] = None,
            whitelist_id: Optional[str] = None) -> SecurityRuleException
    func GetSecurityRuleException(ctx *Context, name string, id IDInput, state *SecurityRuleExceptionState, opts ...ResourceOption) (*SecurityRuleException, error)
    public static SecurityRuleException Get(string name, Input<string> id, SecurityRuleExceptionState? state, CustomResourceOptions? opts = null)
    public static SecurityRuleException get(String name, Output<String> id, SecurityRuleExceptionState state, CustomResourceOptions options)
    resources:  _:    type: incapsula:SecurityRuleException    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    ClientAppTypes string
    A comma separated list of client application types.
    ClientApps string
    A comma separated list of client application IDs.
    Continents string
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    Countries string
    A comma separated list of country codes.
    ExceptionIdOnly string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    Ips string
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    Parameters string
    A comma separated list of encoded parameters.
    RuleId string
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    SecurityRuleExceptionId string
    Unique identifier in the API for the Rule Exception ID.
    SiteId double
    Numeric identifier of the site to operate on.
    UrlPatterns string
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    Urls string
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    UserAgents string
    A comma separated list of encoded user agents.
    WhitelistId string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ClientAppTypes string
    A comma separated list of client application types.
    ClientApps string
    A comma separated list of client application IDs.
    Continents string
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    Countries string
    A comma separated list of country codes.
    ExceptionIdOnly string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    Ips string
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    Parameters string
    A comma separated list of encoded parameters.
    RuleId string
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    SecurityRuleExceptionId string
    Unique identifier in the API for the Rule Exception ID.
    SiteId float64
    Numeric identifier of the site to operate on.
    UrlPatterns string
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    Urls string
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    UserAgents string
    A comma separated list of encoded user agents.
    WhitelistId string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    clientAppTypes String
    A comma separated list of client application types.
    clientApps String
    A comma separated list of client application IDs.
    continents String
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries String
    A comma separated list of country codes.
    exceptionIdOnly String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips String
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters String
    A comma separated list of encoded parameters.
    ruleId String
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    securityRuleExceptionId String
    Unique identifier in the API for the Rule Exception ID.
    siteId Double
    Numeric identifier of the site to operate on.
    urlPatterns String
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls String
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    userAgents String
    A comma separated list of encoded user agents.
    whitelistId String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    clientAppTypes string
    A comma separated list of client application types.
    clientApps string
    A comma separated list of client application IDs.
    continents string
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries string
    A comma separated list of country codes.
    exceptionIdOnly string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips string
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters string
    A comma separated list of encoded parameters.
    ruleId string
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    securityRuleExceptionId string
    Unique identifier in the API for the Rule Exception ID.
    siteId number
    Numeric identifier of the site to operate on.
    urlPatterns string
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls string
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    userAgents string
    A comma separated list of encoded user agents.
    whitelistId string
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    client_app_types str
    A comma separated list of client application types.
    client_apps str
    A comma separated list of client application IDs.
    continents str
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries str
    A comma separated list of country codes.
    exception_id_only str
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips str
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters str
    A comma separated list of encoded parameters.
    rule_id str
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    security_rule_exception_id str
    Unique identifier in the API for the Rule Exception ID.
    site_id float
    Numeric identifier of the site to operate on.
    url_patterns str
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls str
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    user_agents str
    A comma separated list of encoded user agents.
    whitelist_id str
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    clientAppTypes String
    A comma separated list of client application types.
    clientApps String
    A comma separated list of client application IDs.
    continents String
    A comma separated list of continent codes.

    • ips= - (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    • urls= - (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
    countries String
    A comma separated list of country codes.
    exceptionIdOnly String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
    ips String
    A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
    parameters String
    A comma separated list of encoded parameters.
    ruleId String
    The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
    securityRuleExceptionId String
    Unique identifier in the API for the Rule Exception ID.
    siteId Number
    Numeric identifier of the site to operate on.
    urlPatterns String
    A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.

    Deprecated: Deprecated

    urls String
    A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
    userAgents String
    A comma separated list of encoded user agents.
    whitelistId String
    The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.

    Import

    Security Rule Exception can be imported using the role site_id, rule_id and rule_exception_id separated by /, e.g.:

    $ pulumi import incapsula:index/securityRuleException:SecurityRuleException demo site_id/rule_id/rule_exception_id
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    incapsula imperva/terraform-provider-incapsula
    License
    Notes
    This Pulumi package is based on the incapsula Terraform Provider.
    incapsula logo
    incapsula 3.33.0 published on Wednesday, Apr 30, 2025 by imperva