opentelekomcloud.WafDedicatedAlarmMaskingRuleV1
Explore with Pulumi AI
Up-to-date reference of API arguments for WAF dedicated Global Protection Whitelist (formerly False Alarm Masking) rule you can get at documentation portal.
Manages a WAF Dedicated Global Protection Whitelist (formerly False Alarm Masking) Rule resource within OpenTelekomCloud.
Example Usage
Basic example
import * as pulumi from "@pulumi/pulumi";
import * as opentelekomcloud from "@pulumi/opentelekomcloud";
const policy1 = new opentelekomcloud.WafDedicatedPolicyV1("policy1", {});
const rule1 = new opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", {
policyId: policy1.wafDedicatedPolicyV1Id,
domains: ["www.example.com"],
rule: "xss",
description: "description",
conditions: [{
category: "url",
contents: ["/login"],
logicOperation: "equal",
}],
});
import pulumi
import pulumi_opentelekomcloud as opentelekomcloud
policy1 = opentelekomcloud.WafDedicatedPolicyV1("policy1")
rule1 = opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1",
policy_id=policy1.waf_dedicated_policy_v1_id,
domains=["www.example.com"],
rule="xss",
description="description",
conditions=[{
"category": "url",
"contents": ["/login"],
"logic_operation": "equal",
}])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/opentelekomcloud/opentelekomcloud"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
policy1, err := opentelekomcloud.NewWafDedicatedPolicyV1(ctx, "policy1", nil)
if err != nil {
return err
}
_, err = opentelekomcloud.NewWafDedicatedAlarmMaskingRuleV1(ctx, "rule1", &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args{
PolicyId: policy1.WafDedicatedPolicyV1Id,
Domains: pulumi.StringArray{
pulumi.String("www.example.com"),
},
Rule: pulumi.String("xss"),
Description: pulumi.String("description"),
Conditions: opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArray{
&opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArgs{
Category: pulumi.String("url"),
Contents: pulumi.StringArray{
pulumi.String("/login"),
},
LogicOperation: pulumi.String("equal"),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Opentelekomcloud = Pulumi.Opentelekomcloud;
return await Deployment.RunAsync(() =>
{
var policy1 = new Opentelekomcloud.WafDedicatedPolicyV1("policy1");
var rule1 = new Opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", new()
{
PolicyId = policy1.WafDedicatedPolicyV1Id,
Domains = new[]
{
"www.example.com",
},
Rule = "xss",
Description = "description",
Conditions = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs
{
Category = "url",
Contents = new[]
{
"/login",
},
LogicOperation = "equal",
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.opentelekomcloud.WafDedicatedPolicyV1;
import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1;
import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args;
import com.pulumi.opentelekomcloud.inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var policy1 = new WafDedicatedPolicyV1("policy1");
var rule1 = new WafDedicatedAlarmMaskingRuleV1("rule1", WafDedicatedAlarmMaskingRuleV1Args.builder()
.policyId(policy1.wafDedicatedPolicyV1Id())
.domains("www.example.com")
.rule("xss")
.description("description")
.conditions(WafDedicatedAlarmMaskingRuleV1ConditionArgs.builder()
.category("url")
.contents("/login")
.logicOperation("equal")
.build())
.build());
}
}
resources:
policy1:
type: opentelekomcloud:WafDedicatedPolicyV1
rule1:
type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
properties:
policyId: ${policy1.wafDedicatedPolicyV1Id}
domains:
- www.example.com
rule: xss
description: description
conditions:
- category: url
contents:
- /login
logicOperation: equal
Advanced settings with empty contents
import * as pulumi from "@pulumi/pulumi";
import * as opentelekomcloud from "@pulumi/opentelekomcloud";
const policy1 = new opentelekomcloud.WafDedicatedPolicyV1("policy1", {});
const rule1 = new opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", {
policyId: policy1.wafDedicatedPolicyV1Id,
domains: ["www.example.com"],
rule: "all",
description: "description",
conditions: [{
category: "url",
contents: ["/login"],
logicOperation: "equal",
}],
advancedSettings: {
index: "cookie",
},
});
import pulumi
import pulumi_opentelekomcloud as opentelekomcloud
policy1 = opentelekomcloud.WafDedicatedPolicyV1("policy1")
rule1 = opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1",
policy_id=policy1.waf_dedicated_policy_v1_id,
domains=["www.example.com"],
rule="all",
description="description",
conditions=[{
"category": "url",
"contents": ["/login"],
"logic_operation": "equal",
}],
advanced_settings={
"index": "cookie",
})
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/opentelekomcloud/opentelekomcloud"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
policy1, err := opentelekomcloud.NewWafDedicatedPolicyV1(ctx, "policy1", nil)
if err != nil {
return err
}
_, err = opentelekomcloud.NewWafDedicatedAlarmMaskingRuleV1(ctx, "rule1", &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args{
PolicyId: policy1.WafDedicatedPolicyV1Id,
Domains: pulumi.StringArray{
pulumi.String("www.example.com"),
},
Rule: pulumi.String("all"),
Description: pulumi.String("description"),
Conditions: opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArray{
&opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArgs{
Category: pulumi.String("url"),
Contents: pulumi.StringArray{
pulumi.String("/login"),
},
LogicOperation: pulumi.String("equal"),
},
},
AdvancedSettings: &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs{
Index: pulumi.String("cookie"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Opentelekomcloud = Pulumi.Opentelekomcloud;
return await Deployment.RunAsync(() =>
{
var policy1 = new Opentelekomcloud.WafDedicatedPolicyV1("policy1");
var rule1 = new Opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", new()
{
PolicyId = policy1.WafDedicatedPolicyV1Id,
Domains = new[]
{
"www.example.com",
},
Rule = "all",
Description = "description",
Conditions = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs
{
Category = "url",
Contents = new[]
{
"/login",
},
LogicOperation = "equal",
},
},
AdvancedSettings = new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
{
Index = "cookie",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.opentelekomcloud.WafDedicatedPolicyV1;
import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1;
import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args;
import com.pulumi.opentelekomcloud.inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs;
import com.pulumi.opentelekomcloud.inputs.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var policy1 = new WafDedicatedPolicyV1("policy1");
var rule1 = new WafDedicatedAlarmMaskingRuleV1("rule1", WafDedicatedAlarmMaskingRuleV1Args.builder()
.policyId(policy1.wafDedicatedPolicyV1Id())
.domains("www.example.com")
.rule("all")
.description("description")
.conditions(WafDedicatedAlarmMaskingRuleV1ConditionArgs.builder()
.category("url")
.contents("/login")
.logicOperation("equal")
.build())
.advancedSettings(WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs.builder()
.index("cookie")
.build())
.build());
}
}
resources:
policy1:
type: opentelekomcloud:WafDedicatedPolicyV1
rule1:
type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
properties:
policyId: ${policy1.wafDedicatedPolicyV1Id}
domains:
- www.example.com
rule: all
description: description
conditions:
- category: url
contents:
- /login
logicOperation: equal
advancedSettings:
index: cookie
Create WafDedicatedAlarmMaskingRuleV1 Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new WafDedicatedAlarmMaskingRuleV1(name: string, args: WafDedicatedAlarmMaskingRuleV1Args, opts?: CustomResourceOptions);
@overload
def WafDedicatedAlarmMaskingRuleV1(resource_name: str,
args: WafDedicatedAlarmMaskingRuleV1Args,
opts: Optional[ResourceOptions] = None)
@overload
def WafDedicatedAlarmMaskingRuleV1(resource_name: str,
opts: Optional[ResourceOptions] = None,
conditions: Optional[Sequence[WafDedicatedAlarmMaskingRuleV1ConditionArgs]] = None,
domains: Optional[Sequence[str]] = None,
policy_id: Optional[str] = None,
rule: Optional[str] = None,
advanced_settings: Optional[WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs] = None,
description: Optional[str] = None,
timeouts: Optional[WafDedicatedAlarmMaskingRuleV1TimeoutsArgs] = None,
waf_dedicated_alarm_masking_rule_v1_id: Optional[str] = None)
func NewWafDedicatedAlarmMaskingRuleV1(ctx *Context, name string, args WafDedicatedAlarmMaskingRuleV1Args, opts ...ResourceOption) (*WafDedicatedAlarmMaskingRuleV1, error)
public WafDedicatedAlarmMaskingRuleV1(string name, WafDedicatedAlarmMaskingRuleV1Args args, CustomResourceOptions? opts = null)
public WafDedicatedAlarmMaskingRuleV1(String name, WafDedicatedAlarmMaskingRuleV1Args args)
public WafDedicatedAlarmMaskingRuleV1(String name, WafDedicatedAlarmMaskingRuleV1Args args, CustomResourceOptions options)
type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args WafDedicatedAlarmMaskingRuleV1Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args WafDedicatedAlarmMaskingRuleV1Args
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args WafDedicatedAlarmMaskingRuleV1Args
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args WafDedicatedAlarmMaskingRuleV1Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args WafDedicatedAlarmMaskingRuleV1Args
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var wafDedicatedAlarmMaskingRuleV1Resource = new Opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource", new()
{
Conditions = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs
{
Category = "string",
LogicOperation = "string",
Contents = new[]
{
"string",
},
Index = "string",
},
},
Domains = new[]
{
"string",
},
PolicyId = "string",
Rule = "string",
AdvancedSettings = new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
{
Contents = new[]
{
"string",
},
Index = "string",
},
Description = "string",
Timeouts = new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1TimeoutsArgs
{
Create = "string",
Delete = "string",
Update = "string",
},
WafDedicatedAlarmMaskingRuleV1Id = "string",
});
example, err := opentelekomcloud.NewWafDedicatedAlarmMaskingRuleV1(ctx, "wafDedicatedAlarmMaskingRuleV1Resource", &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args{
Conditions: opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArray{
&opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArgs{
Category: pulumi.String("string"),
LogicOperation: pulumi.String("string"),
Contents: pulumi.StringArray{
pulumi.String("string"),
},
Index: pulumi.String("string"),
},
},
Domains: pulumi.StringArray{
pulumi.String("string"),
},
PolicyId: pulumi.String("string"),
Rule: pulumi.String("string"),
AdvancedSettings: &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs{
Contents: pulumi.StringArray{
pulumi.String("string"),
},
Index: pulumi.String("string"),
},
Description: pulumi.String("string"),
Timeouts: &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1TimeoutsArgs{
Create: pulumi.String("string"),
Delete: pulumi.String("string"),
Update: pulumi.String("string"),
},
WafDedicatedAlarmMaskingRuleV1Id: pulumi.String("string"),
})
var wafDedicatedAlarmMaskingRuleV1Resource = new WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource", WafDedicatedAlarmMaskingRuleV1Args.builder()
.conditions(WafDedicatedAlarmMaskingRuleV1ConditionArgs.builder()
.category("string")
.logicOperation("string")
.contents("string")
.index("string")
.build())
.domains("string")
.policyId("string")
.rule("string")
.advancedSettings(WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs.builder()
.contents("string")
.index("string")
.build())
.description("string")
.timeouts(WafDedicatedAlarmMaskingRuleV1TimeoutsArgs.builder()
.create("string")
.delete("string")
.update("string")
.build())
.wafDedicatedAlarmMaskingRuleV1Id("string")
.build());
waf_dedicated_alarm_masking_rule_v1_resource = opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource",
conditions=[{
"category": "string",
"logic_operation": "string",
"contents": ["string"],
"index": "string",
}],
domains=["string"],
policy_id="string",
rule="string",
advanced_settings={
"contents": ["string"],
"index": "string",
},
description="string",
timeouts={
"create": "string",
"delete": "string",
"update": "string",
},
waf_dedicated_alarm_masking_rule_v1_id="string")
const wafDedicatedAlarmMaskingRuleV1Resource = new opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource", {
conditions: [{
category: "string",
logicOperation: "string",
contents: ["string"],
index: "string",
}],
domains: ["string"],
policyId: "string",
rule: "string",
advancedSettings: {
contents: ["string"],
index: "string",
},
description: "string",
timeouts: {
create: "string",
"delete": "string",
update: "string",
},
wafDedicatedAlarmMaskingRuleV1Id: "string",
});
type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
properties:
advancedSettings:
contents:
- string
index: string
conditions:
- category: string
contents:
- string
index: string
logicOperation: string
description: string
domains:
- string
policyId: string
rule: string
timeouts:
create: string
delete: string
update: string
wafDedicatedAlarmMaskingRuleV1Id: string
WafDedicatedAlarmMaskingRuleV1 Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The WafDedicatedAlarmMaskingRuleV1 resource accepts the following input properties:
- Conditions
List<Waf
Dedicated Alarm Masking Rule V1Condition> - Condition list. Changing this creates a new rule.
The
conditions
block supports: - Domains List<string>
- Domain names to be protected. Changing this creates a new rule.
- Policy
Id string - The WAF policy ID. Changing this creates a new rule.
- Rule string
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- Advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - Description string
- Rule description. Changing this creates a new rule.
- Timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts - Waf
Dedicated stringAlarm Masking Rule V1Id - ID of the rule.
- Conditions
[]Waf
Dedicated Alarm Masking Rule V1Condition Args - Condition list. Changing this creates a new rule.
The
conditions
block supports: - Domains []string
- Domain names to be protected. Changing this creates a new rule.
- Policy
Id string - The WAF policy ID. Changing this creates a new rule.
- Rule string
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- Advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings Args - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - Description string
- Rule description. Changing this creates a new rule.
- Timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts Args - Waf
Dedicated stringAlarm Masking Rule V1Id - ID of the rule.
- conditions
List<Waf
Dedicated Alarm Masking Rule V1Condition> - Condition list. Changing this creates a new rule.
The
conditions
block supports: - domains List<String>
- Domain names to be protected. Changing this creates a new rule.
- policy
Id String - The WAF policy ID. Changing this creates a new rule.
- rule String
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - description String
- Rule description. Changing this creates a new rule.
- timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts - waf
Dedicated StringAlarm Masking Rule V1Id - ID of the rule.
- conditions
Waf
Dedicated Alarm Masking Rule V1Condition[] - Condition list. Changing this creates a new rule.
The
conditions
block supports: - domains string[]
- Domain names to be protected. Changing this creates a new rule.
- policy
Id string - The WAF policy ID. Changing this creates a new rule.
- rule string
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - description string
- Rule description. Changing this creates a new rule.
- timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts - waf
Dedicated stringAlarm Masking Rule V1Id - ID of the rule.
- conditions
Sequence[Waf
Dedicated Alarm Masking Rule V1Condition Args] - Condition list. Changing this creates a new rule.
The
conditions
block supports: - domains Sequence[str]
- Domain names to be protected. Changing this creates a new rule.
- policy_
id str - The WAF policy ID. Changing this creates a new rule.
- rule str
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- advanced_
settings WafDedicated Alarm Masking Rule V1Advanced Settings Args - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - description str
- Rule description. Changing this creates a new rule.
- timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts Args - waf_
dedicated_ stralarm_ masking_ rule_ v1_ id - ID of the rule.
- conditions List<Property Map>
- Condition list. Changing this creates a new rule.
The
conditions
block supports: - domains List<String>
- Domain names to be protected. Changing this creates a new rule.
- policy
Id String - The WAF policy ID. Changing this creates a new rule.
- rule String
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- advanced
Settings Property Map - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - description String
- Rule description. Changing this creates a new rule.
- timeouts Property Map
- waf
Dedicated StringAlarm Masking Rule V1Id - ID of the rule.
Outputs
All input properties are implicitly available as output properties. Additionally, the WafDedicatedAlarmMaskingRuleV1 resource produces the following output properties:
- created_
at float - Timestamp the rule is created.
- id str
- The provider-assigned unique ID for this managed resource.
- status float
- Rule status. The value can be:
Look up Existing WafDedicatedAlarmMaskingRuleV1 Resource
Get an existing WafDedicatedAlarmMaskingRuleV1 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: WafDedicatedAlarmMaskingRuleV1State, opts?: CustomResourceOptions): WafDedicatedAlarmMaskingRuleV1
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
advanced_settings: Optional[WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs] = None,
conditions: Optional[Sequence[WafDedicatedAlarmMaskingRuleV1ConditionArgs]] = None,
created_at: Optional[float] = None,
description: Optional[str] = None,
domains: Optional[Sequence[str]] = None,
policy_id: Optional[str] = None,
rule: Optional[str] = None,
status: Optional[float] = None,
timeouts: Optional[WafDedicatedAlarmMaskingRuleV1TimeoutsArgs] = None,
waf_dedicated_alarm_masking_rule_v1_id: Optional[str] = None) -> WafDedicatedAlarmMaskingRuleV1
func GetWafDedicatedAlarmMaskingRuleV1(ctx *Context, name string, id IDInput, state *WafDedicatedAlarmMaskingRuleV1State, opts ...ResourceOption) (*WafDedicatedAlarmMaskingRuleV1, error)
public static WafDedicatedAlarmMaskingRuleV1 Get(string name, Input<string> id, WafDedicatedAlarmMaskingRuleV1State? state, CustomResourceOptions? opts = null)
public static WafDedicatedAlarmMaskingRuleV1 get(String name, Output<String> id, WafDedicatedAlarmMaskingRuleV1State state, CustomResourceOptions options)
resources: _: type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1 get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - Conditions
List<Waf
Dedicated Alarm Masking Rule V1Condition> - Condition list. Changing this creates a new rule.
The
conditions
block supports: - Created
At double - Timestamp the rule is created.
- Description string
- Rule description. Changing this creates a new rule.
- Domains List<string>
- Domain names to be protected. Changing this creates a new rule.
- Policy
Id string - The WAF policy ID. Changing this creates a new rule.
- Rule string
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- Status double
- Rule status. The value can be:
- Timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts - Waf
Dedicated stringAlarm Masking Rule V1Id - ID of the rule.
- Advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings Args - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - Conditions
[]Waf
Dedicated Alarm Masking Rule V1Condition Args - Condition list. Changing this creates a new rule.
The
conditions
block supports: - Created
At float64 - Timestamp the rule is created.
- Description string
- Rule description. Changing this creates a new rule.
- Domains []string
- Domain names to be protected. Changing this creates a new rule.
- Policy
Id string - The WAF policy ID. Changing this creates a new rule.
- Rule string
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- Status float64
- Rule status. The value can be:
- Timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts Args - Waf
Dedicated stringAlarm Masking Rule V1Id - ID of the rule.
- advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - conditions
List<Waf
Dedicated Alarm Masking Rule V1Condition> - Condition list. Changing this creates a new rule.
The
conditions
block supports: - created
At Double - Timestamp the rule is created.
- description String
- Rule description. Changing this creates a new rule.
- domains List<String>
- Domain names to be protected. Changing this creates a new rule.
- policy
Id String - The WAF policy ID. Changing this creates a new rule.
- rule String
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- status Double
- Rule status. The value can be:
- timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts - waf
Dedicated StringAlarm Masking Rule V1Id - ID of the rule.
- advanced
Settings WafDedicated Alarm Masking Rule V1Advanced Settings - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - conditions
Waf
Dedicated Alarm Masking Rule V1Condition[] - Condition list. Changing this creates a new rule.
The
conditions
block supports: - created
At number - Timestamp the rule is created.
- description string
- Rule description. Changing this creates a new rule.
- domains string[]
- Domain names to be protected. Changing this creates a new rule.
- policy
Id string - The WAF policy ID. Changing this creates a new rule.
- rule string
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- status number
- Rule status. The value can be:
- timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts - waf
Dedicated stringAlarm Masking Rule V1Id - ID of the rule.
- advanced_
settings WafDedicated Alarm Masking Rule V1Advanced Settings Args - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - conditions
Sequence[Waf
Dedicated Alarm Masking Rule V1Condition Args] - Condition list. Changing this creates a new rule.
The
conditions
block supports: - created_
at float - Timestamp the rule is created.
- description str
- Rule description. Changing this creates a new rule.
- domains Sequence[str]
- Domain names to be protected. Changing this creates a new rule.
- policy_
id str - The WAF policy ID. Changing this creates a new rule.
- rule str
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- status float
- Rule status. The value can be:
- timeouts
Waf
Dedicated Alarm Masking Rule V1Timeouts Args - waf_
dedicated_ stralarm_ masking_ rule_ v1_ id - ID of the rule.
- advanced
Settings Property Map - To ignore attacks of a specific field, specify the field in the Advanced settings area.
After you add the rule, WAF will stop blocking attacks of the specified field.
This parameter is not included if all modules are bypassed. Changing this creates a new rule.
The
advanced_settings
block supports: - conditions List<Property Map>
- Condition list. Changing this creates a new rule.
The
conditions
block supports: - created
At Number - Timestamp the rule is created.
- description String
- Rule description. Changing this creates a new rule.
- domains List<String>
- Domain names to be protected. Changing this creates a new rule.
- policy
Id String - The WAF policy ID. Changing this creates a new rule.
- rule String
- Items to be masked. Changing this creates a new rule.
You can provide multiple items and separate them with semicolons (;).
- If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
- If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
- status Number
- Rule status. The value can be:
- timeouts Property Map
- waf
Dedicated StringAlarm Masking Rule V1Id - ID of the rule.
Supporting Types
WafDedicatedAlarmMaskingRuleV1AdvancedSettings, WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
- Contents List<string>
- Subfield of the specified field type. The default value is all.
- Index string
- Field type.
The following field types are supported:
Params
,Cookie
,Header
,Body
, andMultipart
. When you selectParams
,Cookie
, orHeader
, you can set this parameter toall
or configure subfields as required.
- Contents []string
- Subfield of the specified field type. The default value is all.
- Index string
- Field type.
The following field types are supported:
Params
,Cookie
,Header
,Body
, andMultipart
. When you selectParams
,Cookie
, orHeader
, you can set this parameter toall
or configure subfields as required.
- contents List<String>
- Subfield of the specified field type. The default value is all.
- index String
- Field type.
The following field types are supported:
Params
,Cookie
,Header
,Body
, andMultipart
. When you selectParams
,Cookie
, orHeader
, you can set this parameter toall
or configure subfields as required.
- contents string[]
- Subfield of the specified field type. The default value is all.
- index string
- Field type.
The following field types are supported:
Params
,Cookie
,Header
,Body
, andMultipart
. When you selectParams
,Cookie
, orHeader
, you can set this parameter toall
or configure subfields as required.
- contents Sequence[str]
- Subfield of the specified field type. The default value is all.
- index str
- Field type.
The following field types are supported:
Params
,Cookie
,Header
,Body
, andMultipart
. When you selectParams
,Cookie
, orHeader
, you can set this parameter toall
or configure subfields as required.
- contents List<String>
- Subfield of the specified field type. The default value is all.
- index String
- Field type.
The following field types are supported:
Params
,Cookie
,Header
,Body
, andMultipart
. When you selectParams
,Cookie
, orHeader
, you can set this parameter toall
or configure subfields as required.
WafDedicatedAlarmMaskingRuleV1Condition, WafDedicatedAlarmMaskingRuleV1ConditionArgs
- Category string
- Field type. The value can be
url
,ip
,params
,cookie
, orheader
. - Logic
Operation string - The matching logic varies depending on the field type.
- if the field type is
ip
, the logic can beequal
ornot_equal
. - If the field type is
url
,params
,cookie
, orheader
, the logic can beequal
,not_equal
,contain
,not_contain
,prefix
,not_prefix
,suffix
,not_suffix
.
- if the field type is
- Contents List<string>
- Content. The array length is limited to 1.
The content format varies depending on the field type.
- For example, if the field type is
ip
, the value must be anIP address
orIP address range
. - If the field type is
url
, the value must be in thestandard URL format
. - IF the field type is
params
,cookie
, orheader
, the content format is not limited.
- For example, if the field type is
- Index string
- Subfield. When
category
is set toparams
,cookie
, orheader
, set this parameter based on site requirements. This parameter is mandatory.
- Category string
- Field type. The value can be
url
,ip
,params
,cookie
, orheader
. - Logic
Operation string - The matching logic varies depending on the field type.
- if the field type is
ip
, the logic can beequal
ornot_equal
. - If the field type is
url
,params
,cookie
, orheader
, the logic can beequal
,not_equal
,contain
,not_contain
,prefix
,not_prefix
,suffix
,not_suffix
.
- if the field type is
- Contents []string
- Content. The array length is limited to 1.
The content format varies depending on the field type.
- For example, if the field type is
ip
, the value must be anIP address
orIP address range
. - If the field type is
url
, the value must be in thestandard URL format
. - IF the field type is
params
,cookie
, orheader
, the content format is not limited.
- For example, if the field type is
- Index string
- Subfield. When
category
is set toparams
,cookie
, orheader
, set this parameter based on site requirements. This parameter is mandatory.
- category String
- Field type. The value can be
url
,ip
,params
,cookie
, orheader
. - logic
Operation String - The matching logic varies depending on the field type.
- if the field type is
ip
, the logic can beequal
ornot_equal
. - If the field type is
url
,params
,cookie
, orheader
, the logic can beequal
,not_equal
,contain
,not_contain
,prefix
,not_prefix
,suffix
,not_suffix
.
- if the field type is
- contents List<String>
- Content. The array length is limited to 1.
The content format varies depending on the field type.
- For example, if the field type is
ip
, the value must be anIP address
orIP address range
. - If the field type is
url
, the value must be in thestandard URL format
. - IF the field type is
params
,cookie
, orheader
, the content format is not limited.
- For example, if the field type is
- index String
- Subfield. When
category
is set toparams
,cookie
, orheader
, set this parameter based on site requirements. This parameter is mandatory.
- category string
- Field type. The value can be
url
,ip
,params
,cookie
, orheader
. - logic
Operation string - The matching logic varies depending on the field type.
- if the field type is
ip
, the logic can beequal
ornot_equal
. - If the field type is
url
,params
,cookie
, orheader
, the logic can beequal
,not_equal
,contain
,not_contain
,prefix
,not_prefix
,suffix
,not_suffix
.
- if the field type is
- contents string[]
- Content. The array length is limited to 1.
The content format varies depending on the field type.
- For example, if the field type is
ip
, the value must be anIP address
orIP address range
. - If the field type is
url
, the value must be in thestandard URL format
. - IF the field type is
params
,cookie
, orheader
, the content format is not limited.
- For example, if the field type is
- index string
- Subfield. When
category
is set toparams
,cookie
, orheader
, set this parameter based on site requirements. This parameter is mandatory.
- category str
- Field type. The value can be
url
,ip
,params
,cookie
, orheader
. - logic_
operation str - The matching logic varies depending on the field type.
- if the field type is
ip
, the logic can beequal
ornot_equal
. - If the field type is
url
,params
,cookie
, orheader
, the logic can beequal
,not_equal
,contain
,not_contain
,prefix
,not_prefix
,suffix
,not_suffix
.
- if the field type is
- contents Sequence[str]
- Content. The array length is limited to 1.
The content format varies depending on the field type.
- For example, if the field type is
ip
, the value must be anIP address
orIP address range
. - If the field type is
url
, the value must be in thestandard URL format
. - IF the field type is
params
,cookie
, orheader
, the content format is not limited.
- For example, if the field type is
- index str
- Subfield. When
category
is set toparams
,cookie
, orheader
, set this parameter based on site requirements. This parameter is mandatory.
- category String
- Field type. The value can be
url
,ip
,params
,cookie
, orheader
. - logic
Operation String - The matching logic varies depending on the field type.
- if the field type is
ip
, the logic can beequal
ornot_equal
. - If the field type is
url
,params
,cookie
, orheader
, the logic can beequal
,not_equal
,contain
,not_contain
,prefix
,not_prefix
,suffix
,not_suffix
.
- if the field type is
- contents List<String>
- Content. The array length is limited to 1.
The content format varies depending on the field type.
- For example, if the field type is
ip
, the value must be anIP address
orIP address range
. - If the field type is
url
, the value must be in thestandard URL format
. - IF the field type is
params
,cookie
, orheader
, the content format is not limited.
- For example, if the field type is
- index String
- Subfield. When
category
is set toparams
,cookie
, orheader
, set this parameter based on site requirements. This parameter is mandatory.
WafDedicatedAlarmMaskingRuleV1Timeouts, WafDedicatedAlarmMaskingRuleV1TimeoutsArgs
Import
Dedicated WAF Web Global Protection Whitelist (formerly False Alarm Masking) rules can be imported using policy_id/id
, e.g.
$ pulumi import opentelekomcloud:index/wafDedicatedAlarmMaskingRuleV1:WafDedicatedAlarmMaskingRuleV1 rule_1 ff95e71c8ae74eba9887193ab22c5757/b39f3a5a1b4f447a8030f0b0703f47f5
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- opentelekomcloud opentelekomcloud/terraform-provider-opentelekomcloud
- License
- Notes
- This Pulumi package is based on the
opentelekomcloud
Terraform Provider.