incapsula.SecurityRuleException
Explore with Pulumi AI
This resource enables you to configure exceptions to WAF security rules and policies.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as incapsula from "@pulumi/incapsula";
const example_waf_backdoor_rule_exception = new incapsula.SecurityRuleException("example-waf-backdoor-rule-exception", {
siteId: incapsula_site["example-site"].id,
ruleId: "api.threats.backdoor",
clientApps: "488,123",
countries: "JM,US",
continents: "NA,AF",
ips: "1.2.3.6,1.2.3.7",
urls: "/myurl,/myurl2",
userAgents: "myUserAgent",
parameters: "myparam",
});
const example_waf_botAccess_control_rule_exception = new incapsula.SecurityRuleException("example-waf-botAccess-control-rule-exception", {
siteId: incapsula_site["example-site"].id,
ruleId: "api.threats.bot_access_control",
clientAppTypes: "DataScraper,",
ips: "1.2.3.6,1.2.3.7",
urls: "/myurl,/myurl2",
userAgents: "myUserAgent",
});
const example_waf_cross_site_scripting_rule_exception = new incapsula.SecurityRuleException("example-waf-cross-site-scripting-rule-exception", {
siteId: incapsula_site["example-site"].id,
ruleId: "api.threats.cross_site_scripting",
clientApps: "488,123",
countries: "JM,US",
continents: "NA,AF",
urls: "/myurl,/myurl2",
parameters: "myparam",
});
const example_waf_ddos_rule_exception = new incapsula.SecurityRuleException("example-waf-ddos-rule-exception", {
siteId: incapsula_site["example-site"].id,
ruleId: "api.threats.ddos",
clientApps: "488,123",
countries: "JM,US",
continents: "NA,AF",
ips: "1.2.3.6,1.2.3.7",
urls: "/myurl,/myurl2",
});
const example_waf_illegal_resource_access_rule_exception = new incapsula.SecurityRuleException("example-waf-illegal-resource-access-rule-exception", {
siteId: incapsula_site["example-site"].id,
ruleId: "api.threats.illegal_resource_access",
clientApps: "488,123",
countries: "JM,US",
continents: "NA,AF",
ips: "1.2.3.6,1.2.3.7",
urls: "/myurl,/myurl2",
parameters: "myparam",
});
const example_waf_remote_file_inclusion_rule_exception = new incapsula.SecurityRuleException("example-waf-remote-file-inclusion-rule-exception", {
siteId: incapsula_site["example-site"].id,
ruleId: "api.threats.remote_file_inclusion",
clientApps: "488,123",
countries: "JM,US",
continents: "NA,AF",
ips: "1.2.3.6,1.2.3.7",
urls: "/myurl,/myurl2",
userAgents: "myUserAgent",
parameters: "myparam",
});
const example_waf_sql_injection_rule_exception = new incapsula.SecurityRuleException("example-waf-sql-injection-rule-exception", {
siteId: incapsula_site["example-site"].id,
ruleId: "api.threats.sql_injection",
clientApps: "488,123",
countries: "JM,US",
continents: "NA,AF",
ips: "1.2.3.6,1.2.3.7",
urls: "/myurl,/myurl2",
});
import pulumi
import pulumi_incapsula as incapsula
example_waf_backdoor_rule_exception = incapsula.SecurityRuleException("example-waf-backdoor-rule-exception",
site_id=incapsula_site["example-site"]["id"],
rule_id="api.threats.backdoor",
client_apps="488,123",
countries="JM,US",
continents="NA,AF",
ips="1.2.3.6,1.2.3.7",
urls="/myurl,/myurl2",
user_agents="myUserAgent",
parameters="myparam")
example_waf_bot_access_control_rule_exception = incapsula.SecurityRuleException("example-waf-botAccess-control-rule-exception",
site_id=incapsula_site["example-site"]["id"],
rule_id="api.threats.bot_access_control",
client_app_types="DataScraper,",
ips="1.2.3.6,1.2.3.7",
urls="/myurl,/myurl2",
user_agents="myUserAgent")
example_waf_cross_site_scripting_rule_exception = incapsula.SecurityRuleException("example-waf-cross-site-scripting-rule-exception",
site_id=incapsula_site["example-site"]["id"],
rule_id="api.threats.cross_site_scripting",
client_apps="488,123",
countries="JM,US",
continents="NA,AF",
urls="/myurl,/myurl2",
parameters="myparam")
example_waf_ddos_rule_exception = incapsula.SecurityRuleException("example-waf-ddos-rule-exception",
site_id=incapsula_site["example-site"]["id"],
rule_id="api.threats.ddos",
client_apps="488,123",
countries="JM,US",
continents="NA,AF",
ips="1.2.3.6,1.2.3.7",
urls="/myurl,/myurl2")
example_waf_illegal_resource_access_rule_exception = incapsula.SecurityRuleException("example-waf-illegal-resource-access-rule-exception",
site_id=incapsula_site["example-site"]["id"],
rule_id="api.threats.illegal_resource_access",
client_apps="488,123",
countries="JM,US",
continents="NA,AF",
ips="1.2.3.6,1.2.3.7",
urls="/myurl,/myurl2",
parameters="myparam")
example_waf_remote_file_inclusion_rule_exception = incapsula.SecurityRuleException("example-waf-remote-file-inclusion-rule-exception",
site_id=incapsula_site["example-site"]["id"],
rule_id="api.threats.remote_file_inclusion",
client_apps="488,123",
countries="JM,US",
continents="NA,AF",
ips="1.2.3.6,1.2.3.7",
urls="/myurl,/myurl2",
user_agents="myUserAgent",
parameters="myparam")
example_waf_sql_injection_rule_exception = incapsula.SecurityRuleException("example-waf-sql-injection-rule-exception",
site_id=incapsula_site["example-site"]["id"],
rule_id="api.threats.sql_injection",
client_apps="488,123",
countries="JM,US",
continents="NA,AF",
ips="1.2.3.6,1.2.3.7",
urls="/myurl,/myurl2")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/incapsula/v3/incapsula"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := incapsula.NewSecurityRuleException(ctx, "example-waf-backdoor-rule-exception", &incapsula.SecurityRuleExceptionArgs{
SiteId: pulumi.Any(incapsula_site.ExampleSite.Id),
RuleId: pulumi.String("api.threats.backdoor"),
ClientApps: pulumi.String("488,123"),
Countries: pulumi.String("JM,US"),
Continents: pulumi.String("NA,AF"),
Ips: pulumi.String("1.2.3.6,1.2.3.7"),
Urls: pulumi.String("/myurl,/myurl2"),
UserAgents: pulumi.String("myUserAgent"),
Parameters: pulumi.String("myparam"),
})
if err != nil {
return err
}
_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-botAccess-control-rule-exception", &incapsula.SecurityRuleExceptionArgs{
SiteId: pulumi.Any(incapsula_site.ExampleSite.Id),
RuleId: pulumi.String("api.threats.bot_access_control"),
ClientAppTypes: pulumi.String("DataScraper,"),
Ips: pulumi.String("1.2.3.6,1.2.3.7"),
Urls: pulumi.String("/myurl,/myurl2"),
UserAgents: pulumi.String("myUserAgent"),
})
if err != nil {
return err
}
_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-cross-site-scripting-rule-exception", &incapsula.SecurityRuleExceptionArgs{
SiteId: pulumi.Any(incapsula_site.ExampleSite.Id),
RuleId: pulumi.String("api.threats.cross_site_scripting"),
ClientApps: pulumi.String("488,123"),
Countries: pulumi.String("JM,US"),
Continents: pulumi.String("NA,AF"),
Urls: pulumi.String("/myurl,/myurl2"),
Parameters: pulumi.String("myparam"),
})
if err != nil {
return err
}
_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-ddos-rule-exception", &incapsula.SecurityRuleExceptionArgs{
SiteId: pulumi.Any(incapsula_site.ExampleSite.Id),
RuleId: pulumi.String("api.threats.ddos"),
ClientApps: pulumi.String("488,123"),
Countries: pulumi.String("JM,US"),
Continents: pulumi.String("NA,AF"),
Ips: pulumi.String("1.2.3.6,1.2.3.7"),
Urls: pulumi.String("/myurl,/myurl2"),
})
if err != nil {
return err
}
_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-illegal-resource-access-rule-exception", &incapsula.SecurityRuleExceptionArgs{
SiteId: pulumi.Any(incapsula_site.ExampleSite.Id),
RuleId: pulumi.String("api.threats.illegal_resource_access"),
ClientApps: pulumi.String("488,123"),
Countries: pulumi.String("JM,US"),
Continents: pulumi.String("NA,AF"),
Ips: pulumi.String("1.2.3.6,1.2.3.7"),
Urls: pulumi.String("/myurl,/myurl2"),
Parameters: pulumi.String("myparam"),
})
if err != nil {
return err
}
_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-remote-file-inclusion-rule-exception", &incapsula.SecurityRuleExceptionArgs{
SiteId: pulumi.Any(incapsula_site.ExampleSite.Id),
RuleId: pulumi.String("api.threats.remote_file_inclusion"),
ClientApps: pulumi.String("488,123"),
Countries: pulumi.String("JM,US"),
Continents: pulumi.String("NA,AF"),
Ips: pulumi.String("1.2.3.6,1.2.3.7"),
Urls: pulumi.String("/myurl,/myurl2"),
UserAgents: pulumi.String("myUserAgent"),
Parameters: pulumi.String("myparam"),
})
if err != nil {
return err
}
_, err = incapsula.NewSecurityRuleException(ctx, "example-waf-sql-injection-rule-exception", &incapsula.SecurityRuleExceptionArgs{
SiteId: pulumi.Any(incapsula_site.ExampleSite.Id),
RuleId: pulumi.String("api.threats.sql_injection"),
ClientApps: pulumi.String("488,123"),
Countries: pulumi.String("JM,US"),
Continents: pulumi.String("NA,AF"),
Ips: pulumi.String("1.2.3.6,1.2.3.7"),
Urls: pulumi.String("/myurl,/myurl2"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Incapsula = Pulumi.Incapsula;
return await Deployment.RunAsync(() =>
{
var example_waf_backdoor_rule_exception = new Incapsula.SecurityRuleException("example-waf-backdoor-rule-exception", new()
{
SiteId = incapsula_site.Example_site.Id,
RuleId = "api.threats.backdoor",
ClientApps = "488,123",
Countries = "JM,US",
Continents = "NA,AF",
Ips = "1.2.3.6,1.2.3.7",
Urls = "/myurl,/myurl2",
UserAgents = "myUserAgent",
Parameters = "myparam",
});
var example_waf_botAccess_control_rule_exception = new Incapsula.SecurityRuleException("example-waf-botAccess-control-rule-exception", new()
{
SiteId = incapsula_site.Example_site.Id,
RuleId = "api.threats.bot_access_control",
ClientAppTypes = "DataScraper,",
Ips = "1.2.3.6,1.2.3.7",
Urls = "/myurl,/myurl2",
UserAgents = "myUserAgent",
});
var example_waf_cross_site_scripting_rule_exception = new Incapsula.SecurityRuleException("example-waf-cross-site-scripting-rule-exception", new()
{
SiteId = incapsula_site.Example_site.Id,
RuleId = "api.threats.cross_site_scripting",
ClientApps = "488,123",
Countries = "JM,US",
Continents = "NA,AF",
Urls = "/myurl,/myurl2",
Parameters = "myparam",
});
var example_waf_ddos_rule_exception = new Incapsula.SecurityRuleException("example-waf-ddos-rule-exception", new()
{
SiteId = incapsula_site.Example_site.Id,
RuleId = "api.threats.ddos",
ClientApps = "488,123",
Countries = "JM,US",
Continents = "NA,AF",
Ips = "1.2.3.6,1.2.3.7",
Urls = "/myurl,/myurl2",
});
var example_waf_illegal_resource_access_rule_exception = new Incapsula.SecurityRuleException("example-waf-illegal-resource-access-rule-exception", new()
{
SiteId = incapsula_site.Example_site.Id,
RuleId = "api.threats.illegal_resource_access",
ClientApps = "488,123",
Countries = "JM,US",
Continents = "NA,AF",
Ips = "1.2.3.6,1.2.3.7",
Urls = "/myurl,/myurl2",
Parameters = "myparam",
});
var example_waf_remote_file_inclusion_rule_exception = new Incapsula.SecurityRuleException("example-waf-remote-file-inclusion-rule-exception", new()
{
SiteId = incapsula_site.Example_site.Id,
RuleId = "api.threats.remote_file_inclusion",
ClientApps = "488,123",
Countries = "JM,US",
Continents = "NA,AF",
Ips = "1.2.3.6,1.2.3.7",
Urls = "/myurl,/myurl2",
UserAgents = "myUserAgent",
Parameters = "myparam",
});
var example_waf_sql_injection_rule_exception = new Incapsula.SecurityRuleException("example-waf-sql-injection-rule-exception", new()
{
SiteId = incapsula_site.Example_site.Id,
RuleId = "api.threats.sql_injection",
ClientApps = "488,123",
Countries = "JM,US",
Continents = "NA,AF",
Ips = "1.2.3.6,1.2.3.7",
Urls = "/myurl,/myurl2",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.incapsula.SecurityRuleException;
import com.pulumi.incapsula.SecurityRuleExceptionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example_waf_backdoor_rule_exception = new SecurityRuleException("example-waf-backdoor-rule-exception", SecurityRuleExceptionArgs.builder()
.siteId(incapsula_site.example-site().id())
.ruleId("api.threats.backdoor")
.clientApps("488,123")
.countries("JM,US")
.continents("NA,AF")
.ips("1.2.3.6,1.2.3.7")
.urls("/myurl,/myurl2")
.userAgents("myUserAgent")
.parameters("myparam")
.build());
var example_waf_botAccess_control_rule_exception = new SecurityRuleException("example-waf-botAccess-control-rule-exception", SecurityRuleExceptionArgs.builder()
.siteId(incapsula_site.example-site().id())
.ruleId("api.threats.bot_access_control")
.clientAppTypes("DataScraper,")
.ips("1.2.3.6,1.2.3.7")
.urls("/myurl,/myurl2")
.userAgents("myUserAgent")
.build());
var example_waf_cross_site_scripting_rule_exception = new SecurityRuleException("example-waf-cross-site-scripting-rule-exception", SecurityRuleExceptionArgs.builder()
.siteId(incapsula_site.example-site().id())
.ruleId("api.threats.cross_site_scripting")
.clientApps("488,123")
.countries("JM,US")
.continents("NA,AF")
.urls("/myurl,/myurl2")
.parameters("myparam")
.build());
var example_waf_ddos_rule_exception = new SecurityRuleException("example-waf-ddos-rule-exception", SecurityRuleExceptionArgs.builder()
.siteId(incapsula_site.example-site().id())
.ruleId("api.threats.ddos")
.clientApps("488,123")
.countries("JM,US")
.continents("NA,AF")
.ips("1.2.3.6,1.2.3.7")
.urls("/myurl,/myurl2")
.build());
var example_waf_illegal_resource_access_rule_exception = new SecurityRuleException("example-waf-illegal-resource-access-rule-exception", SecurityRuleExceptionArgs.builder()
.siteId(incapsula_site.example-site().id())
.ruleId("api.threats.illegal_resource_access")
.clientApps("488,123")
.countries("JM,US")
.continents("NA,AF")
.ips("1.2.3.6,1.2.3.7")
.urls("/myurl,/myurl2")
.parameters("myparam")
.build());
var example_waf_remote_file_inclusion_rule_exception = new SecurityRuleException("example-waf-remote-file-inclusion-rule-exception", SecurityRuleExceptionArgs.builder()
.siteId(incapsula_site.example-site().id())
.ruleId("api.threats.remote_file_inclusion")
.clientApps("488,123")
.countries("JM,US")
.continents("NA,AF")
.ips("1.2.3.6,1.2.3.7")
.urls("/myurl,/myurl2")
.userAgents("myUserAgent")
.parameters("myparam")
.build());
var example_waf_sql_injection_rule_exception = new SecurityRuleException("example-waf-sql-injection-rule-exception", SecurityRuleExceptionArgs.builder()
.siteId(incapsula_site.example-site().id())
.ruleId("api.threats.sql_injection")
.clientApps("488,123")
.countries("JM,US")
.continents("NA,AF")
.ips("1.2.3.6,1.2.3.7")
.urls("/myurl,/myurl2")
.build());
}
}
resources:
example-waf-backdoor-rule-exception:
type: incapsula:SecurityRuleException
properties:
siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
ruleId: api.threats.backdoor
clientApps: 488,123
countries: JM,US
continents: NA,AF
ips: 1.2.3.6,1.2.3.7
urls: /myurl,/myurl2
userAgents: myUserAgent
parameters: myparam
example-waf-botAccess-control-rule-exception:
type: incapsula:SecurityRuleException
properties:
siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
ruleId: api.threats.bot_access_control
clientAppTypes: DataScraper,
ips: 1.2.3.6,1.2.3.7
urls: /myurl,/myurl2
userAgents: myUserAgent
example-waf-cross-site-scripting-rule-exception:
type: incapsula:SecurityRuleException
properties:
siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
ruleId: api.threats.cross_site_scripting
clientApps: 488,123
countries: JM,US
continents: NA,AF
urls: /myurl,/myurl2
parameters: myparam
example-waf-ddos-rule-exception:
type: incapsula:SecurityRuleException
properties:
siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
ruleId: api.threats.ddos
clientApps: 488,123
countries: JM,US
continents: NA,AF
ips: 1.2.3.6,1.2.3.7
urls: /myurl,/myurl2
example-waf-illegal-resource-access-rule-exception:
type: incapsula:SecurityRuleException
properties:
siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
ruleId: api.threats.illegal_resource_access
clientApps: 488,123
countries: JM,US
continents: NA,AF
ips: 1.2.3.6,1.2.3.7
urls: /myurl,/myurl2
parameters: myparam
example-waf-remote-file-inclusion-rule-exception:
type: incapsula:SecurityRuleException
properties:
siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
ruleId: api.threats.remote_file_inclusion
clientApps: 488,123
countries: JM,US
continents: NA,AF
ips: 1.2.3.6,1.2.3.7
urls: /myurl,/myurl2
userAgents: myUserAgent
parameters: myparam
example-waf-sql-injection-rule-exception:
type: incapsula:SecurityRuleException
properties:
siteId: ${incapsula_site"example-site"[%!s(MISSING)].id}
ruleId: api.threats.sql_injection
clientApps: 488,123
countries: JM,US
continents: NA,AF
ips: 1.2.3.6,1.2.3.7
urls: /myurl,/myurl2
Create SecurityRuleException Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecurityRuleException(name: string, args: SecurityRuleExceptionArgs, opts?: CustomResourceOptions);
@overload
def SecurityRuleException(resource_name: str,
args: SecurityRuleExceptionArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SecurityRuleException(resource_name: str,
opts: Optional[ResourceOptions] = None,
rule_id: Optional[str] = None,
site_id: Optional[float] = None,
countries: Optional[str] = None,
client_app_types: Optional[str] = None,
exception_id_only: Optional[str] = None,
ips: Optional[str] = None,
parameters: Optional[str] = None,
continents: Optional[str] = None,
security_rule_exception_id: Optional[str] = None,
client_apps: Optional[str] = None,
url_patterns: Optional[str] = None,
urls: Optional[str] = None,
user_agents: Optional[str] = None,
whitelist_id: Optional[str] = None)
func NewSecurityRuleException(ctx *Context, name string, args SecurityRuleExceptionArgs, opts ...ResourceOption) (*SecurityRuleException, error)
public SecurityRuleException(string name, SecurityRuleExceptionArgs args, CustomResourceOptions? opts = null)
public SecurityRuleException(String name, SecurityRuleExceptionArgs args)
public SecurityRuleException(String name, SecurityRuleExceptionArgs args, CustomResourceOptions options)
type: incapsula:SecurityRuleException
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecurityRuleExceptionArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecurityRuleExceptionArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecurityRuleExceptionArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecurityRuleExceptionArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecurityRuleExceptionArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var securityRuleExceptionResource = new Incapsula.SecurityRuleException("securityRuleExceptionResource", new()
{
RuleId = "string",
SiteId = 0,
Countries = "string",
ClientAppTypes = "string",
ExceptionIdOnly = "string",
Ips = "string",
Parameters = "string",
Continents = "string",
SecurityRuleExceptionId = "string",
ClientApps = "string",
Urls = "string",
UserAgents = "string",
WhitelistId = "string",
});
example, err := incapsula.NewSecurityRuleException(ctx, "securityRuleExceptionResource", &incapsula.SecurityRuleExceptionArgs{
RuleId: pulumi.String("string"),
SiteId: pulumi.Float64(0),
Countries: pulumi.String("string"),
ClientAppTypes: pulumi.String("string"),
ExceptionIdOnly: pulumi.String("string"),
Ips: pulumi.String("string"),
Parameters: pulumi.String("string"),
Continents: pulumi.String("string"),
SecurityRuleExceptionId: pulumi.String("string"),
ClientApps: pulumi.String("string"),
Urls: pulumi.String("string"),
UserAgents: pulumi.String("string"),
WhitelistId: pulumi.String("string"),
})
var securityRuleExceptionResource = new SecurityRuleException("securityRuleExceptionResource", SecurityRuleExceptionArgs.builder()
.ruleId("string")
.siteId(0)
.countries("string")
.clientAppTypes("string")
.exceptionIdOnly("string")
.ips("string")
.parameters("string")
.continents("string")
.securityRuleExceptionId("string")
.clientApps("string")
.urls("string")
.userAgents("string")
.whitelistId("string")
.build());
security_rule_exception_resource = incapsula.SecurityRuleException("securityRuleExceptionResource",
rule_id="string",
site_id=0,
countries="string",
client_app_types="string",
exception_id_only="string",
ips="string",
parameters="string",
continents="string",
security_rule_exception_id="string",
client_apps="string",
urls="string",
user_agents="string",
whitelist_id="string")
const securityRuleExceptionResource = new incapsula.SecurityRuleException("securityRuleExceptionResource", {
ruleId: "string",
siteId: 0,
countries: "string",
clientAppTypes: "string",
exceptionIdOnly: "string",
ips: "string",
parameters: "string",
continents: "string",
securityRuleExceptionId: "string",
clientApps: "string",
urls: "string",
userAgents: "string",
whitelistId: "string",
});
type: incapsula:SecurityRuleException
properties:
clientAppTypes: string
clientApps: string
continents: string
countries: string
exceptionIdOnly: string
ips: string
parameters: string
ruleId: string
securityRuleExceptionId: string
siteId: 0
urls: string
userAgents: string
whitelistId: string
SecurityRuleException Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecurityRuleException resource accepts the following input properties:
- Rule
Id string - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- Site
Id double - Numeric identifier of the site to operate on.
- Client
App stringTypes - A comma separated list of client application types.
- Client
Apps string - A comma separated list of client application IDs.
- Continents string
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- Countries string
- A comma separated list of country codes.
- Exception
Id stringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- Ips string
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- Parameters string
- A comma separated list of encoded parameters.
- Security
Rule stringException Id - Unique identifier in the API for the Rule Exception ID.
- Url
Patterns string - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- Urls string
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- User
Agents string - A comma separated list of encoded user agents.
- Whitelist
Id string - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- Rule
Id string - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- Site
Id float64 - Numeric identifier of the site to operate on.
- Client
App stringTypes - A comma separated list of client application types.
- Client
Apps string - A comma separated list of client application IDs.
- Continents string
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- Countries string
- A comma separated list of country codes.
- Exception
Id stringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- Ips string
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- Parameters string
- A comma separated list of encoded parameters.
- Security
Rule stringException Id - Unique identifier in the API for the Rule Exception ID.
- Url
Patterns string - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- Urls string
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- User
Agents string - A comma separated list of encoded user agents.
- Whitelist
Id string - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- rule
Id String - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- site
Id Double - Numeric identifier of the site to operate on.
- client
App StringTypes - A comma separated list of client application types.
- client
Apps String - A comma separated list of client application IDs.
- continents String
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries String
- A comma separated list of country codes.
- exception
Id StringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips String
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters String
- A comma separated list of encoded parameters.
- security
Rule StringException Id - Unique identifier in the API for the Rule Exception ID.
- url
Patterns String - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls String
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user
Agents String - A comma separated list of encoded user agents.
- whitelist
Id String - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- rule
Id string - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- site
Id number - Numeric identifier of the site to operate on.
- client
App stringTypes - A comma separated list of client application types.
- client
Apps string - A comma separated list of client application IDs.
- continents string
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries string
- A comma separated list of country codes.
- exception
Id stringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips string
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters string
- A comma separated list of encoded parameters.
- security
Rule stringException Id - Unique identifier in the API for the Rule Exception ID.
- url
Patterns string - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls string
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user
Agents string - A comma separated list of encoded user agents.
- whitelist
Id string - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- rule_
id str - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- site_
id float - Numeric identifier of the site to operate on.
- client_
app_ strtypes - A comma separated list of client application types.
- client_
apps str - A comma separated list of client application IDs.
- continents str
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries str
- A comma separated list of country codes.
- exception_
id_ stronly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips str
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters str
- A comma separated list of encoded parameters.
- security_
rule_ strexception_ id - Unique identifier in the API for the Rule Exception ID.
- url_
patterns str - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls str
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user_
agents str - A comma separated list of encoded user agents.
- whitelist_
id str - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- rule
Id String - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- site
Id Number - Numeric identifier of the site to operate on.
- client
App StringTypes - A comma separated list of client application types.
- client
Apps String - A comma separated list of client application IDs.
- continents String
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries String
- A comma separated list of country codes.
- exception
Id StringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips String
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters String
- A comma separated list of encoded parameters.
- security
Rule StringException Id - Unique identifier in the API for the Rule Exception ID.
- url
Patterns String - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls String
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user
Agents String - A comma separated list of encoded user agents.
- whitelist
Id String - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecurityRuleException resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SecurityRuleException Resource
Get an existing SecurityRuleException resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecurityRuleExceptionState, opts?: CustomResourceOptions): SecurityRuleException
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
client_app_types: Optional[str] = None,
client_apps: Optional[str] = None,
continents: Optional[str] = None,
countries: Optional[str] = None,
exception_id_only: Optional[str] = None,
ips: Optional[str] = None,
parameters: Optional[str] = None,
rule_id: Optional[str] = None,
security_rule_exception_id: Optional[str] = None,
site_id: Optional[float] = None,
url_patterns: Optional[str] = None,
urls: Optional[str] = None,
user_agents: Optional[str] = None,
whitelist_id: Optional[str] = None) -> SecurityRuleException
func GetSecurityRuleException(ctx *Context, name string, id IDInput, state *SecurityRuleExceptionState, opts ...ResourceOption) (*SecurityRuleException, error)
public static SecurityRuleException Get(string name, Input<string> id, SecurityRuleExceptionState? state, CustomResourceOptions? opts = null)
public static SecurityRuleException get(String name, Output<String> id, SecurityRuleExceptionState state, CustomResourceOptions options)
resources: _: type: incapsula:SecurityRuleException get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Client
App stringTypes - A comma separated list of client application types.
- Client
Apps string - A comma separated list of client application IDs.
- Continents string
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- Countries string
- A comma separated list of country codes.
- Exception
Id stringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- Ips string
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- Parameters string
- A comma separated list of encoded parameters.
- Rule
Id string - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- Security
Rule stringException Id - Unique identifier in the API for the Rule Exception ID.
- Site
Id double - Numeric identifier of the site to operate on.
- Url
Patterns string - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- Urls string
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- User
Agents string - A comma separated list of encoded user agents.
- Whitelist
Id string - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- Client
App stringTypes - A comma separated list of client application types.
- Client
Apps string - A comma separated list of client application IDs.
- Continents string
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- Countries string
- A comma separated list of country codes.
- Exception
Id stringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- Ips string
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- Parameters string
- A comma separated list of encoded parameters.
- Rule
Id string - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- Security
Rule stringException Id - Unique identifier in the API for the Rule Exception ID.
- Site
Id float64 - Numeric identifier of the site to operate on.
- Url
Patterns string - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- Urls string
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- User
Agents string - A comma separated list of encoded user agents.
- Whitelist
Id string - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- client
App StringTypes - A comma separated list of client application types.
- client
Apps String - A comma separated list of client application IDs.
- continents String
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries String
- A comma separated list of country codes.
- exception
Id StringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips String
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters String
- A comma separated list of encoded parameters.
- rule
Id String - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- security
Rule StringException Id - Unique identifier in the API for the Rule Exception ID.
- site
Id Double - Numeric identifier of the site to operate on.
- url
Patterns String - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls String
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user
Agents String - A comma separated list of encoded user agents.
- whitelist
Id String - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- client
App stringTypes - A comma separated list of client application types.
- client
Apps string - A comma separated list of client application IDs.
- continents string
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries string
- A comma separated list of country codes.
- exception
Id stringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips string
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters string
- A comma separated list of encoded parameters.
- rule
Id string - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- security
Rule stringException Id - Unique identifier in the API for the Rule Exception ID.
- site
Id number - Numeric identifier of the site to operate on.
- url
Patterns string - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls string
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user
Agents string - A comma separated list of encoded user agents.
- whitelist
Id string - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- client_
app_ strtypes - A comma separated list of client application types.
- client_
apps str - A comma separated list of client application IDs.
- continents str
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries str
- A comma separated list of country codes.
- exception_
id_ stronly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips str
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters str
- A comma separated list of encoded parameters.
- rule_
id str - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- security_
rule_ strexception_ id - Unique identifier in the API for the Rule Exception ID.
- site_
id float - Numeric identifier of the site to operate on.
- url_
patterns str - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls str
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user_
agents str - A comma separated list of encoded user agents.
- whitelist_
id str - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- client
App StringTypes - A comma separated list of client application types.
- client
Apps String - A comma separated list of client application IDs.
- continents String
- A comma separated list of continent codes.
ips=
- (Optional) A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24urls=
- (Optional) A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs. The resource configures exceptions for the exact URLs listed in this parameter.
- countries String
- A comma separated list of country codes.
- exception
Id StringOnly - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
- ips String
- A comma separated list of IPs or IP ranges, e.g: 192.168.1.1, 192.168.1.1-192.168.1.100 or 192.168.1.1/24
- parameters String
- A comma separated list of encoded parameters.
- rule
Id String - The identifier of the WAF rule, e.g api.threats.cross_site_scripting.
- security
Rule StringException Id - Unique identifier in the API for the Rule Exception ID.
- site
Id Number - Numeric identifier of the site to operate on.
- url
Patterns String - A comma separated list of url patterns. One of: contains | equals | prefix | suffix | not_equals | not_contain | not_prefix | not_suffix. The patterns should be in accordance with the matching urls sent by the urls parameter.
- urls String
- A comma separated list of resource paths. For example, /home and /admin/index.html are resource paths, while http://www.example.com/home is not. Each URL should be encoded separately using percent encoding as specified by RFC 3986 (http://tools.ietf.org/html/rfc3986#section-2.1). An empty URL list will remove all URLs.
- user
Agents String - A comma separated list of encoded user agents.
- whitelist
Id String - The id (an integer) of the whitelist to be set. This field is optional - in case no id is supplied, a new whitelist will be created.
Import
Security Rule Exception can be imported using the role site_id
, rule_id
and rule_exception_id
separated by /, e.g.:
$ pulumi import incapsula:index/securityRuleException:SecurityRuleException demo site_id/rule_id/rule_exception_id
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- incapsula imperva/terraform-provider-incapsula
- License
- Notes
- This Pulumi package is based on the
incapsula
Terraform Provider.