1. Packages
  2. Opentelekomcloud Provider
  3. API Docs
  4. WafDedicatedAlarmMaskingRuleV1
opentelekomcloud 1.36.37 published on Thursday, Apr 24, 2025 by opentelekomcloud

opentelekomcloud.WafDedicatedAlarmMaskingRuleV1

Explore with Pulumi AI

opentelekomcloud logo
opentelekomcloud 1.36.37 published on Thursday, Apr 24, 2025 by opentelekomcloud

    Up-to-date reference of API arguments for WAF dedicated Global Protection Whitelist (formerly False Alarm Masking) rule you can get at documentation portal.

    Manages a WAF Dedicated Global Protection Whitelist (formerly False Alarm Masking) Rule resource within OpenTelekomCloud.

    Example Usage

    Basic example

    import * as pulumi from "@pulumi/pulumi";
    import * as opentelekomcloud from "@pulumi/opentelekomcloud";
    
    const policy1 = new opentelekomcloud.WafDedicatedPolicyV1("policy1", {});
    const rule1 = new opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", {
        policyId: policy1.wafDedicatedPolicyV1Id,
        domains: ["www.example.com"],
        rule: "xss",
        description: "description",
        conditions: [{
            category: "url",
            contents: ["/login"],
            logicOperation: "equal",
        }],
    });
    
    import pulumi
    import pulumi_opentelekomcloud as opentelekomcloud
    
    policy1 = opentelekomcloud.WafDedicatedPolicyV1("policy1")
    rule1 = opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1",
        policy_id=policy1.waf_dedicated_policy_v1_id,
        domains=["www.example.com"],
        rule="xss",
        description="description",
        conditions=[{
            "category": "url",
            "contents": ["/login"],
            "logic_operation": "equal",
        }])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/opentelekomcloud/opentelekomcloud"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		policy1, err := opentelekomcloud.NewWafDedicatedPolicyV1(ctx, "policy1", nil)
    		if err != nil {
    			return err
    		}
    		_, err = opentelekomcloud.NewWafDedicatedAlarmMaskingRuleV1(ctx, "rule1", &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args{
    			PolicyId: policy1.WafDedicatedPolicyV1Id,
    			Domains: pulumi.StringArray{
    				pulumi.String("www.example.com"),
    			},
    			Rule:        pulumi.String("xss"),
    			Description: pulumi.String("description"),
    			Conditions: opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArray{
    				&opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArgs{
    					Category: pulumi.String("url"),
    					Contents: pulumi.StringArray{
    						pulumi.String("/login"),
    					},
    					LogicOperation: pulumi.String("equal"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Opentelekomcloud = Pulumi.Opentelekomcloud;
    
    return await Deployment.RunAsync(() => 
    {
        var policy1 = new Opentelekomcloud.WafDedicatedPolicyV1("policy1");
    
        var rule1 = new Opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", new()
        {
            PolicyId = policy1.WafDedicatedPolicyV1Id,
            Domains = new[]
            {
                "www.example.com",
            },
            Rule = "xss",
            Description = "description",
            Conditions = new[]
            {
                new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs
                {
                    Category = "url",
                    Contents = new[]
                    {
                        "/login",
                    },
                    LogicOperation = "equal",
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.opentelekomcloud.WafDedicatedPolicyV1;
    import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1;
    import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args;
    import com.pulumi.opentelekomcloud.inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var policy1 = new WafDedicatedPolicyV1("policy1");
    
            var rule1 = new WafDedicatedAlarmMaskingRuleV1("rule1", WafDedicatedAlarmMaskingRuleV1Args.builder()
                .policyId(policy1.wafDedicatedPolicyV1Id())
                .domains("www.example.com")
                .rule("xss")
                .description("description")
                .conditions(WafDedicatedAlarmMaskingRuleV1ConditionArgs.builder()
                    .category("url")
                    .contents("/login")
                    .logicOperation("equal")
                    .build())
                .build());
    
        }
    }
    
    resources:
      policy1:
        type: opentelekomcloud:WafDedicatedPolicyV1
      rule1:
        type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
        properties:
          policyId: ${policy1.wafDedicatedPolicyV1Id}
          domains:
            - www.example.com
          rule: xss
          description: description
          conditions:
            - category: url
              contents:
                - /login
              logicOperation: equal
    

    Advanced settings with empty contents

    import * as pulumi from "@pulumi/pulumi";
    import * as opentelekomcloud from "@pulumi/opentelekomcloud";
    
    const policy1 = new opentelekomcloud.WafDedicatedPolicyV1("policy1", {});
    const rule1 = new opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", {
        policyId: policy1.wafDedicatedPolicyV1Id,
        domains: ["www.example.com"],
        rule: "all",
        description: "description",
        conditions: [{
            category: "url",
            contents: ["/login"],
            logicOperation: "equal",
        }],
        advancedSettings: {
            index: "cookie",
        },
    });
    
    import pulumi
    import pulumi_opentelekomcloud as opentelekomcloud
    
    policy1 = opentelekomcloud.WafDedicatedPolicyV1("policy1")
    rule1 = opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1",
        policy_id=policy1.waf_dedicated_policy_v1_id,
        domains=["www.example.com"],
        rule="all",
        description="description",
        conditions=[{
            "category": "url",
            "contents": ["/login"],
            "logic_operation": "equal",
        }],
        advanced_settings={
            "index": "cookie",
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/opentelekomcloud/opentelekomcloud"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		policy1, err := opentelekomcloud.NewWafDedicatedPolicyV1(ctx, "policy1", nil)
    		if err != nil {
    			return err
    		}
    		_, err = opentelekomcloud.NewWafDedicatedAlarmMaskingRuleV1(ctx, "rule1", &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args{
    			PolicyId: policy1.WafDedicatedPolicyV1Id,
    			Domains: pulumi.StringArray{
    				pulumi.String("www.example.com"),
    			},
    			Rule:        pulumi.String("all"),
    			Description: pulumi.String("description"),
    			Conditions: opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArray{
    				&opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArgs{
    					Category: pulumi.String("url"),
    					Contents: pulumi.StringArray{
    						pulumi.String("/login"),
    					},
    					LogicOperation: pulumi.String("equal"),
    				},
    			},
    			AdvancedSettings: &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs{
    				Index: pulumi.String("cookie"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Opentelekomcloud = Pulumi.Opentelekomcloud;
    
    return await Deployment.RunAsync(() => 
    {
        var policy1 = new Opentelekomcloud.WafDedicatedPolicyV1("policy1");
    
        var rule1 = new Opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("rule1", new()
        {
            PolicyId = policy1.WafDedicatedPolicyV1Id,
            Domains = new[]
            {
                "www.example.com",
            },
            Rule = "all",
            Description = "description",
            Conditions = new[]
            {
                new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs
                {
                    Category = "url",
                    Contents = new[]
                    {
                        "/login",
                    },
                    LogicOperation = "equal",
                },
            },
            AdvancedSettings = new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
            {
                Index = "cookie",
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.opentelekomcloud.WafDedicatedPolicyV1;
    import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1;
    import com.pulumi.opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args;
    import com.pulumi.opentelekomcloud.inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs;
    import com.pulumi.opentelekomcloud.inputs.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var policy1 = new WafDedicatedPolicyV1("policy1");
    
            var rule1 = new WafDedicatedAlarmMaskingRuleV1("rule1", WafDedicatedAlarmMaskingRuleV1Args.builder()
                .policyId(policy1.wafDedicatedPolicyV1Id())
                .domains("www.example.com")
                .rule("all")
                .description("description")
                .conditions(WafDedicatedAlarmMaskingRuleV1ConditionArgs.builder()
                    .category("url")
                    .contents("/login")
                    .logicOperation("equal")
                    .build())
                .advancedSettings(WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs.builder()
                    .index("cookie")
                    .build())
                .build());
    
        }
    }
    
    resources:
      policy1:
        type: opentelekomcloud:WafDedicatedPolicyV1
      rule1:
        type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
        properties:
          policyId: ${policy1.wafDedicatedPolicyV1Id}
          domains:
            - www.example.com
          rule: all
          description: description
          conditions:
            - category: url
              contents:
                - /login
              logicOperation: equal
          advancedSettings:
            index: cookie
    

    Create WafDedicatedAlarmMaskingRuleV1 Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new WafDedicatedAlarmMaskingRuleV1(name: string, args: WafDedicatedAlarmMaskingRuleV1Args, opts?: CustomResourceOptions);
    @overload
    def WafDedicatedAlarmMaskingRuleV1(resource_name: str,
                                       args: WafDedicatedAlarmMaskingRuleV1Args,
                                       opts: Optional[ResourceOptions] = None)
    
    @overload
    def WafDedicatedAlarmMaskingRuleV1(resource_name: str,
                                       opts: Optional[ResourceOptions] = None,
                                       conditions: Optional[Sequence[WafDedicatedAlarmMaskingRuleV1ConditionArgs]] = None,
                                       domains: Optional[Sequence[str]] = None,
                                       policy_id: Optional[str] = None,
                                       rule: Optional[str] = None,
                                       advanced_settings: Optional[WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs] = None,
                                       description: Optional[str] = None,
                                       timeouts: Optional[WafDedicatedAlarmMaskingRuleV1TimeoutsArgs] = None,
                                       waf_dedicated_alarm_masking_rule_v1_id: Optional[str] = None)
    func NewWafDedicatedAlarmMaskingRuleV1(ctx *Context, name string, args WafDedicatedAlarmMaskingRuleV1Args, opts ...ResourceOption) (*WafDedicatedAlarmMaskingRuleV1, error)
    public WafDedicatedAlarmMaskingRuleV1(string name, WafDedicatedAlarmMaskingRuleV1Args args, CustomResourceOptions? opts = null)
    public WafDedicatedAlarmMaskingRuleV1(String name, WafDedicatedAlarmMaskingRuleV1Args args)
    public WafDedicatedAlarmMaskingRuleV1(String name, WafDedicatedAlarmMaskingRuleV1Args args, CustomResourceOptions options)
    
    type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args WafDedicatedAlarmMaskingRuleV1Args
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args WafDedicatedAlarmMaskingRuleV1Args
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args WafDedicatedAlarmMaskingRuleV1Args
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args WafDedicatedAlarmMaskingRuleV1Args
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args WafDedicatedAlarmMaskingRuleV1Args
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var wafDedicatedAlarmMaskingRuleV1Resource = new Opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource", new()
    {
        Conditions = new[]
        {
            new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1ConditionArgs
            {
                Category = "string",
                LogicOperation = "string",
                Contents = new[]
                {
                    "string",
                },
                Index = "string",
            },
        },
        Domains = new[]
        {
            "string",
        },
        PolicyId = "string",
        Rule = "string",
        AdvancedSettings = new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
        {
            Contents = new[]
            {
                "string",
            },
            Index = "string",
        },
        Description = "string",
        Timeouts = new Opentelekomcloud.Inputs.WafDedicatedAlarmMaskingRuleV1TimeoutsArgs
        {
            Create = "string",
            Delete = "string",
            Update = "string",
        },
        WafDedicatedAlarmMaskingRuleV1Id = "string",
    });
    
    example, err := opentelekomcloud.NewWafDedicatedAlarmMaskingRuleV1(ctx, "wafDedicatedAlarmMaskingRuleV1Resource", &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1Args{
    	Conditions: opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArray{
    		&opentelekomcloud.WafDedicatedAlarmMaskingRuleV1ConditionArgs{
    			Category:       pulumi.String("string"),
    			LogicOperation: pulumi.String("string"),
    			Contents: pulumi.StringArray{
    				pulumi.String("string"),
    			},
    			Index: pulumi.String("string"),
    		},
    	},
    	Domains: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	PolicyId: pulumi.String("string"),
    	Rule:     pulumi.String("string"),
    	AdvancedSettings: &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs{
    		Contents: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Index: pulumi.String("string"),
    	},
    	Description: pulumi.String("string"),
    	Timeouts: &opentelekomcloud.WafDedicatedAlarmMaskingRuleV1TimeoutsArgs{
    		Create: pulumi.String("string"),
    		Delete: pulumi.String("string"),
    		Update: pulumi.String("string"),
    	},
    	WafDedicatedAlarmMaskingRuleV1Id: pulumi.String("string"),
    })
    
    var wafDedicatedAlarmMaskingRuleV1Resource = new WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource", WafDedicatedAlarmMaskingRuleV1Args.builder()
        .conditions(WafDedicatedAlarmMaskingRuleV1ConditionArgs.builder()
            .category("string")
            .logicOperation("string")
            .contents("string")
            .index("string")
            .build())
        .domains("string")
        .policyId("string")
        .rule("string")
        .advancedSettings(WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs.builder()
            .contents("string")
            .index("string")
            .build())
        .description("string")
        .timeouts(WafDedicatedAlarmMaskingRuleV1TimeoutsArgs.builder()
            .create("string")
            .delete("string")
            .update("string")
            .build())
        .wafDedicatedAlarmMaskingRuleV1Id("string")
        .build());
    
    waf_dedicated_alarm_masking_rule_v1_resource = opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource",
        conditions=[{
            "category": "string",
            "logic_operation": "string",
            "contents": ["string"],
            "index": "string",
        }],
        domains=["string"],
        policy_id="string",
        rule="string",
        advanced_settings={
            "contents": ["string"],
            "index": "string",
        },
        description="string",
        timeouts={
            "create": "string",
            "delete": "string",
            "update": "string",
        },
        waf_dedicated_alarm_masking_rule_v1_id="string")
    
    const wafDedicatedAlarmMaskingRuleV1Resource = new opentelekomcloud.WafDedicatedAlarmMaskingRuleV1("wafDedicatedAlarmMaskingRuleV1Resource", {
        conditions: [{
            category: "string",
            logicOperation: "string",
            contents: ["string"],
            index: "string",
        }],
        domains: ["string"],
        policyId: "string",
        rule: "string",
        advancedSettings: {
            contents: ["string"],
            index: "string",
        },
        description: "string",
        timeouts: {
            create: "string",
            "delete": "string",
            update: "string",
        },
        wafDedicatedAlarmMaskingRuleV1Id: "string",
    });
    
    type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1
    properties:
        advancedSettings:
            contents:
                - string
            index: string
        conditions:
            - category: string
              contents:
                - string
              index: string
              logicOperation: string
        description: string
        domains:
            - string
        policyId: string
        rule: string
        timeouts:
            create: string
            delete: string
            update: string
        wafDedicatedAlarmMaskingRuleV1Id: string
    

    WafDedicatedAlarmMaskingRuleV1 Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The WafDedicatedAlarmMaskingRuleV1 resource accepts the following input properties:

    Conditions List<WafDedicatedAlarmMaskingRuleV1Condition>
    Condition list. Changing this creates a new rule. The conditions block supports:
    Domains List<string>
    Domain names to be protected. Changing this creates a new rule.
    PolicyId string
    The WAF policy ID. Changing this creates a new rule.
    Rule string
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    AdvancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettings
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    Description string
    Rule description. Changing this creates a new rule.
    Timeouts WafDedicatedAlarmMaskingRuleV1Timeouts
    WafDedicatedAlarmMaskingRuleV1Id string
    ID of the rule.
    Conditions []WafDedicatedAlarmMaskingRuleV1ConditionArgs
    Condition list. Changing this creates a new rule. The conditions block supports:
    Domains []string
    Domain names to be protected. Changing this creates a new rule.
    PolicyId string
    The WAF policy ID. Changing this creates a new rule.
    Rule string
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    AdvancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    Description string
    Rule description. Changing this creates a new rule.
    Timeouts WafDedicatedAlarmMaskingRuleV1TimeoutsArgs
    WafDedicatedAlarmMaskingRuleV1Id string
    ID of the rule.
    conditions List<WafDedicatedAlarmMaskingRuleV1Condition>
    Condition list. Changing this creates a new rule. The conditions block supports:
    domains List<String>
    Domain names to be protected. Changing this creates a new rule.
    policyId String
    The WAF policy ID. Changing this creates a new rule.
    rule String
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    advancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettings
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    description String
    Rule description. Changing this creates a new rule.
    timeouts WafDedicatedAlarmMaskingRuleV1Timeouts
    wafDedicatedAlarmMaskingRuleV1Id String
    ID of the rule.
    conditions WafDedicatedAlarmMaskingRuleV1Condition[]
    Condition list. Changing this creates a new rule. The conditions block supports:
    domains string[]
    Domain names to be protected. Changing this creates a new rule.
    policyId string
    The WAF policy ID. Changing this creates a new rule.
    rule string
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    advancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettings
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    description string
    Rule description. Changing this creates a new rule.
    timeouts WafDedicatedAlarmMaskingRuleV1Timeouts
    wafDedicatedAlarmMaskingRuleV1Id string
    ID of the rule.
    conditions Sequence[WafDedicatedAlarmMaskingRuleV1ConditionArgs]
    Condition list. Changing this creates a new rule. The conditions block supports:
    domains Sequence[str]
    Domain names to be protected. Changing this creates a new rule.
    policy_id str
    The WAF policy ID. Changing this creates a new rule.
    rule str
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    advanced_settings WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    description str
    Rule description. Changing this creates a new rule.
    timeouts WafDedicatedAlarmMaskingRuleV1TimeoutsArgs
    waf_dedicated_alarm_masking_rule_v1_id str
    ID of the rule.
    conditions List<Property Map>
    Condition list. Changing this creates a new rule. The conditions block supports:
    domains List<String>
    Domain names to be protected. Changing this creates a new rule.
    policyId String
    The WAF policy ID. Changing this creates a new rule.
    rule String
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    advancedSettings Property Map
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    description String
    Rule description. Changing this creates a new rule.
    timeouts Property Map
    wafDedicatedAlarmMaskingRuleV1Id String
    ID of the rule.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the WafDedicatedAlarmMaskingRuleV1 resource produces the following output properties:

    CreatedAt double
    Timestamp the rule is created.
    Id string
    The provider-assigned unique ID for this managed resource.
    Status double
    Rule status. The value can be:
    CreatedAt float64
    Timestamp the rule is created.
    Id string
    The provider-assigned unique ID for this managed resource.
    Status float64
    Rule status. The value can be:
    createdAt Double
    Timestamp the rule is created.
    id String
    The provider-assigned unique ID for this managed resource.
    status Double
    Rule status. The value can be:
    createdAt number
    Timestamp the rule is created.
    id string
    The provider-assigned unique ID for this managed resource.
    status number
    Rule status. The value can be:
    created_at float
    Timestamp the rule is created.
    id str
    The provider-assigned unique ID for this managed resource.
    status float
    Rule status. The value can be:
    createdAt Number
    Timestamp the rule is created.
    id String
    The provider-assigned unique ID for this managed resource.
    status Number
    Rule status. The value can be:

    Look up Existing WafDedicatedAlarmMaskingRuleV1 Resource

    Get an existing WafDedicatedAlarmMaskingRuleV1 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: WafDedicatedAlarmMaskingRuleV1State, opts?: CustomResourceOptions): WafDedicatedAlarmMaskingRuleV1
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            advanced_settings: Optional[WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs] = None,
            conditions: Optional[Sequence[WafDedicatedAlarmMaskingRuleV1ConditionArgs]] = None,
            created_at: Optional[float] = None,
            description: Optional[str] = None,
            domains: Optional[Sequence[str]] = None,
            policy_id: Optional[str] = None,
            rule: Optional[str] = None,
            status: Optional[float] = None,
            timeouts: Optional[WafDedicatedAlarmMaskingRuleV1TimeoutsArgs] = None,
            waf_dedicated_alarm_masking_rule_v1_id: Optional[str] = None) -> WafDedicatedAlarmMaskingRuleV1
    func GetWafDedicatedAlarmMaskingRuleV1(ctx *Context, name string, id IDInput, state *WafDedicatedAlarmMaskingRuleV1State, opts ...ResourceOption) (*WafDedicatedAlarmMaskingRuleV1, error)
    public static WafDedicatedAlarmMaskingRuleV1 Get(string name, Input<string> id, WafDedicatedAlarmMaskingRuleV1State? state, CustomResourceOptions? opts = null)
    public static WafDedicatedAlarmMaskingRuleV1 get(String name, Output<String> id, WafDedicatedAlarmMaskingRuleV1State state, CustomResourceOptions options)
    resources:  _:    type: opentelekomcloud:WafDedicatedAlarmMaskingRuleV1    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AdvancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettings
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    Conditions List<WafDedicatedAlarmMaskingRuleV1Condition>
    Condition list. Changing this creates a new rule. The conditions block supports:
    CreatedAt double
    Timestamp the rule is created.
    Description string
    Rule description. Changing this creates a new rule.
    Domains List<string>
    Domain names to be protected. Changing this creates a new rule.
    PolicyId string
    The WAF policy ID. Changing this creates a new rule.
    Rule string
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    Status double
    Rule status. The value can be:
    Timeouts WafDedicatedAlarmMaskingRuleV1Timeouts
    WafDedicatedAlarmMaskingRuleV1Id string
    ID of the rule.
    AdvancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    Conditions []WafDedicatedAlarmMaskingRuleV1ConditionArgs
    Condition list. Changing this creates a new rule. The conditions block supports:
    CreatedAt float64
    Timestamp the rule is created.
    Description string
    Rule description. Changing this creates a new rule.
    Domains []string
    Domain names to be protected. Changing this creates a new rule.
    PolicyId string
    The WAF policy ID. Changing this creates a new rule.
    Rule string
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    Status float64
    Rule status. The value can be:
    Timeouts WafDedicatedAlarmMaskingRuleV1TimeoutsArgs
    WafDedicatedAlarmMaskingRuleV1Id string
    ID of the rule.
    advancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettings
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    conditions List<WafDedicatedAlarmMaskingRuleV1Condition>
    Condition list. Changing this creates a new rule. The conditions block supports:
    createdAt Double
    Timestamp the rule is created.
    description String
    Rule description. Changing this creates a new rule.
    domains List<String>
    Domain names to be protected. Changing this creates a new rule.
    policyId String
    The WAF policy ID. Changing this creates a new rule.
    rule String
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    status Double
    Rule status. The value can be:
    timeouts WafDedicatedAlarmMaskingRuleV1Timeouts
    wafDedicatedAlarmMaskingRuleV1Id String
    ID of the rule.
    advancedSettings WafDedicatedAlarmMaskingRuleV1AdvancedSettings
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    conditions WafDedicatedAlarmMaskingRuleV1Condition[]
    Condition list. Changing this creates a new rule. The conditions block supports:
    createdAt number
    Timestamp the rule is created.
    description string
    Rule description. Changing this creates a new rule.
    domains string[]
    Domain names to be protected. Changing this creates a new rule.
    policyId string
    The WAF policy ID. Changing this creates a new rule.
    rule string
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    status number
    Rule status. The value can be:
    timeouts WafDedicatedAlarmMaskingRuleV1Timeouts
    wafDedicatedAlarmMaskingRuleV1Id string
    ID of the rule.
    advanced_settings WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    conditions Sequence[WafDedicatedAlarmMaskingRuleV1ConditionArgs]
    Condition list. Changing this creates a new rule. The conditions block supports:
    created_at float
    Timestamp the rule is created.
    description str
    Rule description. Changing this creates a new rule.
    domains Sequence[str]
    Domain names to be protected. Changing this creates a new rule.
    policy_id str
    The WAF policy ID. Changing this creates a new rule.
    rule str
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    status float
    Rule status. The value can be:
    timeouts WafDedicatedAlarmMaskingRuleV1TimeoutsArgs
    waf_dedicated_alarm_masking_rule_v1_id str
    ID of the rule.
    advancedSettings Property Map
    To ignore attacks of a specific field, specify the field in the Advanced settings area. After you add the rule, WAF will stop blocking attacks of the specified field. This parameter is not included if all modules are bypassed. Changing this creates a new rule. The advanced_settings block supports:
    conditions List<Property Map>
    Condition list. Changing this creates a new rule. The conditions block supports:
    createdAt Number
    Timestamp the rule is created.
    description String
    Rule description. Changing this creates a new rule.
    domains List<String>
    Domain names to be protected. Changing this creates a new rule.
    policyId String
    The WAF policy ID. Changing this creates a new rule.
    rule String
    Items to be masked. Changing this creates a new rule. You can provide multiple items and separate them with semicolons (;).

    • If you want to disable a specific built-in rule for a domain name, the value of this parameter is the rule ID. When requests are blocked against a certain built-in rule while you do not want this rule to block requests later, you can query the rule in the Events page on the console and find its rule ID in the Hit Rule column. Then, you can disk the rule by its ID (including 6 digits).
    • If you want to mask a type of basic web protection rules, set this parameter to the name of the type of basic web protection rules.
    status Number
    Rule status. The value can be:
    timeouts Property Map
    wafDedicatedAlarmMaskingRuleV1Id String
    ID of the rule.

    Supporting Types

    WafDedicatedAlarmMaskingRuleV1AdvancedSettings, WafDedicatedAlarmMaskingRuleV1AdvancedSettingsArgs

    Contents List<string>
    Subfield of the specified field type. The default value is all.
    Index string
    Field type. The following field types are supported: Params, Cookie, Header, Body, and Multipart. When you select Params, Cookie, or Header, you can set this parameter to all or configure subfields as required.
    Contents []string
    Subfield of the specified field type. The default value is all.
    Index string
    Field type. The following field types are supported: Params, Cookie, Header, Body, and Multipart. When you select Params, Cookie, or Header, you can set this parameter to all or configure subfields as required.
    contents List<String>
    Subfield of the specified field type. The default value is all.
    index String
    Field type. The following field types are supported: Params, Cookie, Header, Body, and Multipart. When you select Params, Cookie, or Header, you can set this parameter to all or configure subfields as required.
    contents string[]
    Subfield of the specified field type. The default value is all.
    index string
    Field type. The following field types are supported: Params, Cookie, Header, Body, and Multipart. When you select Params, Cookie, or Header, you can set this parameter to all or configure subfields as required.
    contents Sequence[str]
    Subfield of the specified field type. The default value is all.
    index str
    Field type. The following field types are supported: Params, Cookie, Header, Body, and Multipart. When you select Params, Cookie, or Header, you can set this parameter to all or configure subfields as required.
    contents List<String>
    Subfield of the specified field type. The default value is all.
    index String
    Field type. The following field types are supported: Params, Cookie, Header, Body, and Multipart. When you select Params, Cookie, or Header, you can set this parameter to all or configure subfields as required.

    WafDedicatedAlarmMaskingRuleV1Condition, WafDedicatedAlarmMaskingRuleV1ConditionArgs

    Category string
    Field type. The value can be url, ip, params, cookie, or header.
    LogicOperation string
    The matching logic varies depending on the field type.

    • if the field type is ip, the logic can be equal or not_equal.
    • If the field type is url, params, cookie, or header, the logic can be equal, not_equal, contain, not_contain, prefix, not_prefix, suffix, not_suffix.
    Contents List<string>
    Content. The array length is limited to 1. The content format varies depending on the field type.

    • For example, if the field type is ip, the value must be an IP address or IP address range.
    • If the field type is url, the value must be in the standard URL format.
    • IF the field type is params, cookie, or header, the content format is not limited.
    Index string
    Subfield. When category is set to params, cookie, or header, set this parameter based on site requirements. This parameter is mandatory.
    Category string
    Field type. The value can be url, ip, params, cookie, or header.
    LogicOperation string
    The matching logic varies depending on the field type.

    • if the field type is ip, the logic can be equal or not_equal.
    • If the field type is url, params, cookie, or header, the logic can be equal, not_equal, contain, not_contain, prefix, not_prefix, suffix, not_suffix.
    Contents []string
    Content. The array length is limited to 1. The content format varies depending on the field type.

    • For example, if the field type is ip, the value must be an IP address or IP address range.
    • If the field type is url, the value must be in the standard URL format.
    • IF the field type is params, cookie, or header, the content format is not limited.
    Index string
    Subfield. When category is set to params, cookie, or header, set this parameter based on site requirements. This parameter is mandatory.
    category String
    Field type. The value can be url, ip, params, cookie, or header.
    logicOperation String
    The matching logic varies depending on the field type.

    • if the field type is ip, the logic can be equal or not_equal.
    • If the field type is url, params, cookie, or header, the logic can be equal, not_equal, contain, not_contain, prefix, not_prefix, suffix, not_suffix.
    contents List<String>
    Content. The array length is limited to 1. The content format varies depending on the field type.

    • For example, if the field type is ip, the value must be an IP address or IP address range.
    • If the field type is url, the value must be in the standard URL format.
    • IF the field type is params, cookie, or header, the content format is not limited.
    index String
    Subfield. When category is set to params, cookie, or header, set this parameter based on site requirements. This parameter is mandatory.
    category string
    Field type. The value can be url, ip, params, cookie, or header.
    logicOperation string
    The matching logic varies depending on the field type.

    • if the field type is ip, the logic can be equal or not_equal.
    • If the field type is url, params, cookie, or header, the logic can be equal, not_equal, contain, not_contain, prefix, not_prefix, suffix, not_suffix.
    contents string[]
    Content. The array length is limited to 1. The content format varies depending on the field type.

    • For example, if the field type is ip, the value must be an IP address or IP address range.
    • If the field type is url, the value must be in the standard URL format.
    • IF the field type is params, cookie, or header, the content format is not limited.
    index string
    Subfield. When category is set to params, cookie, or header, set this parameter based on site requirements. This parameter is mandatory.
    category str
    Field type. The value can be url, ip, params, cookie, or header.
    logic_operation str
    The matching logic varies depending on the field type.

    • if the field type is ip, the logic can be equal or not_equal.
    • If the field type is url, params, cookie, or header, the logic can be equal, not_equal, contain, not_contain, prefix, not_prefix, suffix, not_suffix.
    contents Sequence[str]
    Content. The array length is limited to 1. The content format varies depending on the field type.

    • For example, if the field type is ip, the value must be an IP address or IP address range.
    • If the field type is url, the value must be in the standard URL format.
    • IF the field type is params, cookie, or header, the content format is not limited.
    index str
    Subfield. When category is set to params, cookie, or header, set this parameter based on site requirements. This parameter is mandatory.
    category String
    Field type. The value can be url, ip, params, cookie, or header.
    logicOperation String
    The matching logic varies depending on the field type.

    • if the field type is ip, the logic can be equal or not_equal.
    • If the field type is url, params, cookie, or header, the logic can be equal, not_equal, contain, not_contain, prefix, not_prefix, suffix, not_suffix.
    contents List<String>
    Content. The array length is limited to 1. The content format varies depending on the field type.

    • For example, if the field type is ip, the value must be an IP address or IP address range.
    • If the field type is url, the value must be in the standard URL format.
    • IF the field type is params, cookie, or header, the content format is not limited.
    index String
    Subfield. When category is set to params, cookie, or header, set this parameter based on site requirements. This parameter is mandatory.

    WafDedicatedAlarmMaskingRuleV1Timeouts, WafDedicatedAlarmMaskingRuleV1TimeoutsArgs

    Create string
    Delete string
    Update string
    Create string
    Delete string
    Update string
    create String
    delete String
    update String
    create string
    delete string
    update string
    create str
    delete str
    update str
    create String
    delete String
    update String

    Import

    Dedicated WAF Web Global Protection Whitelist (formerly False Alarm Masking) rules can be imported using policy_id/id, e.g.

    $ pulumi import opentelekomcloud:index/wafDedicatedAlarmMaskingRuleV1:WafDedicatedAlarmMaskingRuleV1 rule_1 ff95e71c8ae74eba9887193ab22c5757/b39f3a5a1b4f447a8030f0b0703f47f5
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    opentelekomcloud opentelekomcloud/terraform-provider-opentelekomcloud
    License
    Notes
    This Pulumi package is based on the opentelekomcloud Terraform Provider.
    opentelekomcloud logo
    opentelekomcloud 1.36.37 published on Thursday, Apr 24, 2025 by opentelekomcloud