volcengine.waf.Vulnerability
Explore with Pulumi AI
Provides a resource to manage waf vulnerability
Example Usage
Example coming soon!
Example coming soon!
Example coming soon!
Example coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.volcengine.waf.Vulnerability;
import com.pulumi.volcengine.waf.VulnerabilityArgs;
import com.pulumi.volcengine.waf.inputs.VulnerabilityAdvanceConfigArgs;
import com.pulumi.volcengine.waf.inputs.VulnerabilityAdvanceConfigAutoTraversalArgs;
import com.pulumi.volcengine.waf.inputs.VulnerabilityAdvanceConfigAutoTraversalRuleArgs;
import com.pulumi.volcengine.waf.inputs.VulnerabilityAdvanceConfigFreqScanArgs;
import com.pulumi.volcengine.waf.inputs.VulnerabilityAdvanceConfigFreqScanRuleArgs;
import com.pulumi.volcengine.waf.inputs.VulnerabilitySystemRuleSwitchArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var foo = new Vulnerability("foo", VulnerabilityArgs.builder()
.action("block")
.advanceConfig(VulnerabilityAdvanceConfigArgs.builder()
.autoTraversal(VulnerabilityAdvanceConfigAutoTraversalArgs.builder()
.enable(true)
.rule(VulnerabilityAdvanceConfigAutoTraversalRuleArgs.builder()
.action(2)
.countTime(5)
.effectTime(60)
.effectTimeViewUnit("s")
.field("CLIENTIP")
.hitRequestCount(30)
.responseHttpStatus(
404,
400)
.responseHttpStatusHitPercent(60)
.build())
.ruleTag("N000000000001")
.build())
.freqScan(VulnerabilityAdvanceConfigFreqScanArgs.builder()
.enable(true)
.rule(VulnerabilityAdvanceConfigFreqScanRuleArgs.builder()
.action(2)
.countTime(5)
.effectTime(60)
.effectTimeViewUnit("s")
.field("CLIENTIP")
.hitRequestCount(20)
.build())
.ruleTag("P000000000001")
.build())
.build())
.host("www.tf-test.com")
.ruleMode("custom")
.systemRuleSwitches(
VulnerabilitySystemRuleSwitchArgs.builder()
.customSystemRuleSwitch(1)
.ruleId(48279)
.build(),
VulnerabilitySystemRuleSwitchArgs.builder()
.customSystemRuleSwitch(1)
.ruleId(47792)
.build())
.build());
}
}
resources:
foo:
type: volcengine:waf:Vulnerability
properties:
action: block
advanceConfig:
autoTraversal:
enable: true
rule:
action: 2
countTime: 5
effectTime: 60
effectTimeViewUnit: s
field: CLIENTIP
hitRequestCount: 30
responseHttpStatus:
- 404
- 400
responseHttpStatusHitPercent: 60
ruleTag: N000000000001
freqScan:
enable: true
rule:
action: 2
countTime: 5
effectTime: 60
effectTimeViewUnit: s
field: CLIENTIP
hitRequestCount: 20
ruleTag: P000000000001
host: www.tf-test.com
ruleMode: custom
systemRuleSwitches:
- customSystemRuleSwitch: 1
ruleId: 48279
- customSystemRuleSwitch: 1
ruleId: 47792
Create Vulnerability Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Vulnerability(name: string, args: VulnerabilityArgs, opts?: CustomResourceOptions);
@overload
def Vulnerability(resource_name: str,
args: VulnerabilityArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Vulnerability(resource_name: str,
opts: Optional[ResourceOptions] = None,
host: Optional[str] = None,
action: Optional[str] = None,
advance_config: Optional[VulnerabilityAdvanceConfigArgs] = None,
rule_mode: Optional[str] = None,
system_rule_switches: Optional[Sequence[VulnerabilitySystemRuleSwitchArgs]] = None)
func NewVulnerability(ctx *Context, name string, args VulnerabilityArgs, opts ...ResourceOption) (*Vulnerability, error)
public Vulnerability(string name, VulnerabilityArgs args, CustomResourceOptions? opts = null)
public Vulnerability(String name, VulnerabilityArgs args)
public Vulnerability(String name, VulnerabilityArgs args, CustomResourceOptions options)
type: volcengine:waf:Vulnerability
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args VulnerabilityArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args VulnerabilityArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args VulnerabilityArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args VulnerabilityArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args VulnerabilityArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var vulnerabilityResource = new Volcengine.Waf.Vulnerability("vulnerabilityResource", new()
{
Host = "string",
Action = "string",
AdvanceConfig = new Volcengine.Waf.Inputs.VulnerabilityAdvanceConfigArgs
{
AutoTraversal = new Volcengine.Waf.Inputs.VulnerabilityAdvanceConfigAutoTraversalArgs
{
Enable = false,
Rule = new Volcengine.Waf.Inputs.VulnerabilityAdvanceConfigAutoTraversalRuleArgs
{
Action = 0,
CountTime = 0,
EffectTime = 0,
EffectTimeViewUnit = "string",
Field = "string",
HitRequestCount = 0,
ResponseHttpStatusHitPercent = 0,
ResponseHttpStatuses = new[]
{
0,
},
},
RuleTag = "string",
},
FreqScan = new Volcengine.Waf.Inputs.VulnerabilityAdvanceConfigFreqScanArgs
{
Enable = false,
Rule = new Volcengine.Waf.Inputs.VulnerabilityAdvanceConfigFreqScanRuleArgs
{
Action = 0,
CountTime = 0,
EffectTime = 0,
EffectTimeViewUnit = "string",
Field = "string",
HitRequestCount = 0,
},
RuleTag = "string",
},
},
RuleMode = "string",
SystemRuleSwitches = new[]
{
new Volcengine.Waf.Inputs.VulnerabilitySystemRuleSwitchArgs
{
CustomSystemRuleSwitch = 0,
RuleId = 0,
},
},
});
example, err := waf.NewVulnerability(ctx, "vulnerabilityResource", &waf.VulnerabilityArgs{
Host: pulumi.String("string"),
Action: pulumi.String("string"),
AdvanceConfig: &waf.VulnerabilityAdvanceConfigArgs{
AutoTraversal: &waf.VulnerabilityAdvanceConfigAutoTraversalArgs{
Enable: pulumi.Bool(false),
Rule: &waf.VulnerabilityAdvanceConfigAutoTraversalRuleArgs{
Action: pulumi.Int(0),
CountTime: pulumi.Int(0),
EffectTime: pulumi.Int(0),
EffectTimeViewUnit: pulumi.String("string"),
Field: pulumi.String("string"),
HitRequestCount: pulumi.Int(0),
ResponseHttpStatusHitPercent: pulumi.Int(0),
ResponseHttpStatuses: pulumi.IntArray{
pulumi.Int(0),
},
},
RuleTag: pulumi.String("string"),
},
FreqScan: &waf.VulnerabilityAdvanceConfigFreqScanArgs{
Enable: pulumi.Bool(false),
Rule: &waf.VulnerabilityAdvanceConfigFreqScanRuleArgs{
Action: pulumi.Int(0),
CountTime: pulumi.Int(0),
EffectTime: pulumi.Int(0),
EffectTimeViewUnit: pulumi.String("string"),
Field: pulumi.String("string"),
HitRequestCount: pulumi.Int(0),
},
RuleTag: pulumi.String("string"),
},
},
RuleMode: pulumi.String("string"),
SystemRuleSwitches: waf.VulnerabilitySystemRuleSwitchArray{
&waf.VulnerabilitySystemRuleSwitchArgs{
CustomSystemRuleSwitch: pulumi.Int(0),
RuleId: pulumi.Int(0),
},
},
})
var vulnerabilityResource = new Vulnerability("vulnerabilityResource", VulnerabilityArgs.builder()
.host("string")
.action("string")
.advanceConfig(VulnerabilityAdvanceConfigArgs.builder()
.autoTraversal(VulnerabilityAdvanceConfigAutoTraversalArgs.builder()
.enable(false)
.rule(VulnerabilityAdvanceConfigAutoTraversalRuleArgs.builder()
.action(0)
.countTime(0)
.effectTime(0)
.effectTimeViewUnit("string")
.field("string")
.hitRequestCount(0)
.responseHttpStatusHitPercent(0)
.responseHttpStatuses(0)
.build())
.ruleTag("string")
.build())
.freqScan(VulnerabilityAdvanceConfigFreqScanArgs.builder()
.enable(false)
.rule(VulnerabilityAdvanceConfigFreqScanRuleArgs.builder()
.action(0)
.countTime(0)
.effectTime(0)
.effectTimeViewUnit("string")
.field("string")
.hitRequestCount(0)
.build())
.ruleTag("string")
.build())
.build())
.ruleMode("string")
.systemRuleSwitches(VulnerabilitySystemRuleSwitchArgs.builder()
.customSystemRuleSwitch(0)
.ruleId(0)
.build())
.build());
vulnerability_resource = volcengine.waf.Vulnerability("vulnerabilityResource",
host="string",
action="string",
advance_config={
"auto_traversal": {
"enable": False,
"rule": {
"action": 0,
"count_time": 0,
"effect_time": 0,
"effect_time_view_unit": "string",
"field": "string",
"hit_request_count": 0,
"response_http_status_hit_percent": 0,
"response_http_statuses": [0],
},
"rule_tag": "string",
},
"freq_scan": {
"enable": False,
"rule": {
"action": 0,
"count_time": 0,
"effect_time": 0,
"effect_time_view_unit": "string",
"field": "string",
"hit_request_count": 0,
},
"rule_tag": "string",
},
},
rule_mode="string",
system_rule_switches=[{
"custom_system_rule_switch": 0,
"rule_id": 0,
}])
const vulnerabilityResource = new volcengine.waf.Vulnerability("vulnerabilityResource", {
host: "string",
action: "string",
advanceConfig: {
autoTraversal: {
enable: false,
rule: {
action: 0,
countTime: 0,
effectTime: 0,
effectTimeViewUnit: "string",
field: "string",
hitRequestCount: 0,
responseHttpStatusHitPercent: 0,
responseHttpStatuses: [0],
},
ruleTag: "string",
},
freqScan: {
enable: false,
rule: {
action: 0,
countTime: 0,
effectTime: 0,
effectTimeViewUnit: "string",
field: "string",
hitRequestCount: 0,
},
ruleTag: "string",
},
},
ruleMode: "string",
systemRuleSwitches: [{
customSystemRuleSwitch: 0,
ruleId: 0,
}],
});
type: volcengine:waf:Vulnerability
properties:
action: string
advanceConfig:
autoTraversal:
enable: false
rule:
action: 0
countTime: 0
effectTime: 0
effectTimeViewUnit: string
field: string
hitRequestCount: 0
responseHttpStatusHitPercent: 0
responseHttpStatuses:
- 0
ruleTag: string
freqScan:
enable: false
rule:
action: 0
countTime: 0
effectTime: 0
effectTimeViewUnit: string
field: string
hitRequestCount: 0
ruleTag: string
host: string
ruleMode: string
systemRuleSwitches:
- customSystemRuleSwitch: 0
ruleId: 0
Vulnerability Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Vulnerability resource accepts the following input properties:
- Host string
- Protect website domain names.
- Action string
- Protection mode.
- Advance
Config VulnerabilityAdvance Config - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- Rule
Mode string - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- System
Rule List<VulnerabilitySwitches System Rule Switch> - Custom rule switch.
- Host string
- Protect website domain names.
- Action string
- Protection mode.
- Advance
Config VulnerabilityAdvance Config Args - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- Rule
Mode string - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- System
Rule []VulnerabilitySwitches System Rule Switch Args - Custom rule switch.
- host String
- Protect website domain names.
- action String
- Protection mode.
- advance
Config VulnerabilityAdvance Config - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- rule
Mode String - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system
Rule List<VulnerabilitySwitches System Rule Switch> - Custom rule switch.
- host string
- Protect website domain names.
- action string
- Protection mode.
- advance
Config VulnerabilityAdvance Config - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- rule
Mode string - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system
Rule VulnerabilitySwitches System Rule Switch[] - Custom rule switch.
- host str
- Protect website domain names.
- action str
- Protection mode.
- advance_
config VulnerabilityAdvance Config Args - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- rule_
mode str - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system_
rule_ Sequence[Vulnerabilityswitches System Rule Switch Args] - Custom rule switch.
- host String
- Protect website domain names.
- action String
- Protection mode.
- advance
Config Property Map - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- rule
Mode String - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system
Rule List<Property Map>Switches - Custom rule switch.
Outputs
All input properties are implicitly available as output properties. Additionally, the Vulnerability resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Rule
Details List<VulnerabilityRule Detail> - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- Id string
- The provider-assigned unique ID for this managed resource.
- Rule
Details []VulnerabilityRule Detail - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- id String
- The provider-assigned unique ID for this managed resource.
- rule
Details List<VulnerabilityRule Detail> - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- id string
- The provider-assigned unique ID for this managed resource.
- rule
Details VulnerabilityRule Detail[] - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- id str
- The provider-assigned unique ID for this managed resource.
- rule_
details Sequence[VulnerabilityRule Detail] - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- id String
- The provider-assigned unique ID for this managed resource.
- rule
Details List<Property Map> - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
Look up Existing Vulnerability Resource
Get an existing Vulnerability resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: VulnerabilityState, opts?: CustomResourceOptions): Vulnerability
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
advance_config: Optional[VulnerabilityAdvanceConfigArgs] = None,
host: Optional[str] = None,
rule_details: Optional[Sequence[VulnerabilityRuleDetailArgs]] = None,
rule_mode: Optional[str] = None,
system_rule_switches: Optional[Sequence[VulnerabilitySystemRuleSwitchArgs]] = None) -> Vulnerability
func GetVulnerability(ctx *Context, name string, id IDInput, state *VulnerabilityState, opts ...ResourceOption) (*Vulnerability, error)
public static Vulnerability Get(string name, Input<string> id, VulnerabilityState? state, CustomResourceOptions? opts = null)
public static Vulnerability get(String name, Output<String> id, VulnerabilityState state, CustomResourceOptions options)
resources: _: type: volcengine:waf:Vulnerability get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- Protection mode.
- Advance
Config VulnerabilityAdvance Config - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- Host string
- Protect website domain names.
- Rule
Details List<VulnerabilityRule Detail> - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- Rule
Mode string - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- System
Rule List<VulnerabilitySwitches System Rule Switch> - Custom rule switch.
- Action string
- Protection mode.
- Advance
Config VulnerabilityAdvance Config Args - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- Host string
- Protect website domain names.
- Rule
Details []VulnerabilityRule Detail Args - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- Rule
Mode string - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- System
Rule []VulnerabilitySwitches System Rule Switch Args - Custom rule switch.
- action String
- Protection mode.
- advance
Config VulnerabilityAdvance Config - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- host String
- Protect website domain names.
- rule
Details List<VulnerabilityRule Detail> - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- rule
Mode String - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system
Rule List<VulnerabilitySwitches System Rule Switch> - Custom rule switch.
- action string
- Protection mode.
- advance
Config VulnerabilityAdvance Config - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- host string
- Protect website domain names.
- rule
Details VulnerabilityRule Detail[] - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- rule
Mode string - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system
Rule VulnerabilitySwitches System Rule Switch[] - Custom rule switch.
- action str
- Protection mode.
- advance_
config VulnerabilityAdvance Config Args - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- host str
- Protect website domain names.
- rule_
details Sequence[VulnerabilityRule Detail Args] - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- rule_
mode str - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system_
rule_ Sequence[Vulnerabilityswitches System Rule Switch Args] - Custom rule switch.
- action String
- Protection mode.
- advance
Config Property Map - The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
- host String
- Protect website domain names.
- rule
Details List<Property Map> - Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
- rule
Mode String - The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
- system
Rule List<Property Map>Switches - Custom rule switch.
Supporting Types
VulnerabilityAdvanceConfig, VulnerabilityAdvanceConfigArgs
- Auto
Traversal VulnerabilityAdvance Config Auto Traversal - Configuration of the automatic blocking capability for directory traversal.
- Freq
Scan VulnerabilityAdvance Config Freq Scan - Configuration of high-frequency scanning automatic blocking capability.
- Auto
Traversal VulnerabilityAdvance Config Auto Traversal - Configuration of the automatic blocking capability for directory traversal.
- Freq
Scan VulnerabilityAdvance Config Freq Scan - Configuration of high-frequency scanning automatic blocking capability.
- auto
Traversal VulnerabilityAdvance Config Auto Traversal - Configuration of the automatic blocking capability for directory traversal.
- freq
Scan VulnerabilityAdvance Config Freq Scan - Configuration of high-frequency scanning automatic blocking capability.
- auto
Traversal VulnerabilityAdvance Config Auto Traversal - Configuration of the automatic blocking capability for directory traversal.
- freq
Scan VulnerabilityAdvance Config Freq Scan - Configuration of high-frequency scanning automatic blocking capability.
- auto_
traversal VulnerabilityAdvance Config Auto Traversal - Configuration of the automatic blocking capability for directory traversal.
- freq_
scan VulnerabilityAdvance Config Freq Scan - Configuration of high-frequency scanning automatic blocking capability.
- auto
Traversal Property Map - Configuration of the automatic blocking capability for directory traversal.
- freq
Scan Property Map - Configuration of high-frequency scanning automatic blocking capability.
VulnerabilityAdvanceConfigAutoTraversal, VulnerabilityAdvanceConfigAutoTraversalArgs
- Enable bool
- Rule switch, controlling whether the current rule takes effect.
- Rule
Vulnerability
Advance Config Auto Traversal Rule - Rule detail.
- Rule
Tag string - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- Enable bool
- Rule switch, controlling whether the current rule takes effect.
- Rule
Vulnerability
Advance Config Auto Traversal Rule - Rule detail.
- Rule
Tag string - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable Boolean
- Rule switch, controlling whether the current rule takes effect.
- rule
Vulnerability
Advance Config Auto Traversal Rule - Rule detail.
- rule
Tag String - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable boolean
- Rule switch, controlling whether the current rule takes effect.
- rule
Vulnerability
Advance Config Auto Traversal Rule - Rule detail.
- rule
Tag string - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable bool
- Rule switch, controlling whether the current rule takes effect.
- rule
Vulnerability
Advance Config Auto Traversal Rule - Rule detail.
- rule_
tag str - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable Boolean
- Rule switch, controlling whether the current rule takes effect.
- rule Property Map
- Rule detail.
- rule
Tag String - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
VulnerabilityAdvanceConfigAutoTraversalRule, VulnerabilityAdvanceConfigAutoTraversalRuleArgs
- Action int
- Disposal action.
- Count
Time int - Disposal action.
- Effect
Time int - Ban time (seconds).
- Effect
Time stringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- Field string
- statistical object.
- Hit
Request intCount - The number of request triggers.
- Response
Http intStatus Hit Percent - Hit percentage: 0-99.
- Response
Http List<int>Statuses - Response status code.
- Action int
- Disposal action.
- Count
Time int - Disposal action.
- Effect
Time int - Ban time (seconds).
- Effect
Time stringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- Field string
- statistical object.
- Hit
Request intCount - The number of request triggers.
- Response
Http intStatus Hit Percent - Hit percentage: 0-99.
- Response
Http []intStatuses - Response status code.
- action Integer
- Disposal action.
- count
Time Integer - Disposal action.
- effect
Time Integer - Ban time (seconds).
- effect
Time StringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field String
- statistical object.
- hit
Request IntegerCount - The number of request triggers.
- response
Http IntegerStatus Hit Percent - Hit percentage: 0-99.
- response
Http List<Integer>Statuses - Response status code.
- action number
- Disposal action.
- count
Time number - Disposal action.
- effect
Time number - Ban time (seconds).
- effect
Time stringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field string
- statistical object.
- hit
Request numberCount - The number of request triggers.
- response
Http numberStatus Hit Percent - Hit percentage: 0-99.
- response
Http number[]Statuses - Response status code.
- action int
- Disposal action.
- count_
time int - Disposal action.
- effect_
time int - Ban time (seconds).
- effect_
time_ strview_ unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field str
- statistical object.
- hit_
request_ intcount - The number of request triggers.
- response_
http_ intstatus_ hit_ percent - Hit percentage: 0-99.
- response_
http_ Sequence[int]statuses - Response status code.
- action Number
- Disposal action.
- count
Time Number - Disposal action.
- effect
Time Number - Ban time (seconds).
- effect
Time StringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field String
- statistical object.
- hit
Request NumberCount - The number of request triggers.
- response
Http NumberStatus Hit Percent - Hit percentage: 0-99.
- response
Http List<Number>Statuses - Response status code.
VulnerabilityAdvanceConfigFreqScan, VulnerabilityAdvanceConfigFreqScanArgs
- Enable bool
- Rule switch, controlling whether the current rule takes effect.
- Rule
Vulnerability
Advance Config Freq Scan Rule - Rule detail.
- Rule
Tag string - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- Enable bool
- Rule switch, controlling whether the current rule takes effect.
- Rule
Vulnerability
Advance Config Freq Scan Rule - Rule detail.
- Rule
Tag string - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable Boolean
- Rule switch, controlling whether the current rule takes effect.
- rule
Vulnerability
Advance Config Freq Scan Rule - Rule detail.
- rule
Tag String - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable boolean
- Rule switch, controlling whether the current rule takes effect.
- rule
Vulnerability
Advance Config Freq Scan Rule - Rule detail.
- rule
Tag string - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable bool
- Rule switch, controlling whether the current rule takes effect.
- rule
Vulnerability
Advance Config Freq Scan Rule - Rule detail.
- rule_
tag str - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
- enable Boolean
- Rule switch, controlling whether the current rule takes effect.
- rule Property Map
- Rule detail.
- rule
Tag String - Directory traversal automatically blocks the rule label, that is, the complete rule ID.
VulnerabilityAdvanceConfigFreqScanRule, VulnerabilityAdvanceConfigFreqScanRuleArgs
- Action int
- Disposal action.
- Count
Time int - Disposal action.
- Effect
Time int - Ban time (seconds).
- Effect
Time stringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- Field string
- statistical object.
- Hit
Request intCount - The number of request triggers.
- Action int
- Disposal action.
- Count
Time int - Disposal action.
- Effect
Time int - Ban time (seconds).
- Effect
Time stringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- Field string
- statistical object.
- Hit
Request intCount - The number of request triggers.
- action Integer
- Disposal action.
- count
Time Integer - Disposal action.
- effect
Time Integer - Ban time (seconds).
- effect
Time StringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field String
- statistical object.
- hit
Request IntegerCount - The number of request triggers.
- action number
- Disposal action.
- count
Time number - Disposal action.
- effect
Time number - Ban time (seconds).
- effect
Time stringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field string
- statistical object.
- hit
Request numberCount - The number of request triggers.
- action int
- Disposal action.
- count_
time int - Disposal action.
- effect_
time int - Ban time (seconds).
- effect_
time_ strview_ unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field str
- statistical object.
- hit_
request_ intcount - The number of request triggers.
- action Number
- Disposal action.
- count
Time Number - Disposal action.
- effect
Time Number - Ban time (seconds).
- effect
Time StringView Unit - The body records the units displayed at the front end of the length: s, min, hour, and day.
- field String
- statistical object.
- hit
Request NumberCount - The number of request triggers.
VulnerabilityRuleDetail, VulnerabilityRuleDetailArgs
- Accuracy int
- The accuracy of the rules. Only when updating the custom vulnerability rules.
- Cve
Id string - The ID of CVE. Only when updating the custom vulnerability rules.
- Description string
- The description of the rules. Only when updating the custom vulnerability rules.
- Risk
Level int - Risk grade. Only when updating the custom vulnerability rules.
- Rule
Name string - The name of rule. Only when updating the custom vulnerability rules.
- Rule
Set stringName - First-level rule category. Only when updating the custom vulnerability rules.
- Rule
Tag string - Rule label, that is, the complete rule ID. Only when updating the custom vulnerability rules.
- Subcategory string
- Secondary rule category. Only when updating the custom vulnerability rules.
- Update
Time string - The update time of the rules. Only when updating the custom vulnerability rules.
- Accuracy int
- The accuracy of the rules. Only when updating the custom vulnerability rules.
- Cve
Id string - The ID of CVE. Only when updating the custom vulnerability rules.
- Description string
- The description of the rules. Only when updating the custom vulnerability rules.
- Risk
Level int - Risk grade. Only when updating the custom vulnerability rules.
- Rule
Name string - The name of rule. Only when updating the custom vulnerability rules.
- Rule
Set stringName - First-level rule category. Only when updating the custom vulnerability rules.
- Rule
Tag string - Rule label, that is, the complete rule ID. Only when updating the custom vulnerability rules.
- Subcategory string
- Secondary rule category. Only when updating the custom vulnerability rules.
- Update
Time string - The update time of the rules. Only when updating the custom vulnerability rules.
- accuracy Integer
- The accuracy of the rules. Only when updating the custom vulnerability rules.
- cve
Id String - The ID of CVE. Only when updating the custom vulnerability rules.
- description String
- The description of the rules. Only when updating the custom vulnerability rules.
- risk
Level Integer - Risk grade. Only when updating the custom vulnerability rules.
- rule
Name String - The name of rule. Only when updating the custom vulnerability rules.
- rule
Set StringName - First-level rule category. Only when updating the custom vulnerability rules.
- rule
Tag String - Rule label, that is, the complete rule ID. Only when updating the custom vulnerability rules.
- subcategory String
- Secondary rule category. Only when updating the custom vulnerability rules.
- update
Time String - The update time of the rules. Only when updating the custom vulnerability rules.
- accuracy number
- The accuracy of the rules. Only when updating the custom vulnerability rules.
- cve
Id string - The ID of CVE. Only when updating the custom vulnerability rules.
- description string
- The description of the rules. Only when updating the custom vulnerability rules.
- risk
Level number - Risk grade. Only when updating the custom vulnerability rules.
- rule
Name string - The name of rule. Only when updating the custom vulnerability rules.
- rule
Set stringName - First-level rule category. Only when updating the custom vulnerability rules.
- rule
Tag string - Rule label, that is, the complete rule ID. Only when updating the custom vulnerability rules.
- subcategory string
- Secondary rule category. Only when updating the custom vulnerability rules.
- update
Time string - The update time of the rules. Only when updating the custom vulnerability rules.
- accuracy int
- The accuracy of the rules. Only when updating the custom vulnerability rules.
- cve_
id str - The ID of CVE. Only when updating the custom vulnerability rules.
- description str
- The description of the rules. Only when updating the custom vulnerability rules.
- risk_
level int - Risk grade. Only when updating the custom vulnerability rules.
- rule_
name str - The name of rule. Only when updating the custom vulnerability rules.
- rule_
set_ strname - First-level rule category. Only when updating the custom vulnerability rules.
- rule_
tag str - Rule label, that is, the complete rule ID. Only when updating the custom vulnerability rules.
- subcategory str
- Secondary rule category. Only when updating the custom vulnerability rules.
- update_
time str - The update time of the rules. Only when updating the custom vulnerability rules.
- accuracy Number
- The accuracy of the rules. Only when updating the custom vulnerability rules.
- cve
Id String - The ID of CVE. Only when updating the custom vulnerability rules.
- description String
- The description of the rules. Only when updating the custom vulnerability rules.
- risk
Level Number - Risk grade. Only when updating the custom vulnerability rules.
- rule
Name String - The name of rule. Only when updating the custom vulnerability rules.
- rule
Set StringName - First-level rule category. Only when updating the custom vulnerability rules.
- rule
Tag String - Rule label, that is, the complete rule ID. Only when updating the custom vulnerability rules.
- subcategory String
- Secondary rule category. Only when updating the custom vulnerability rules.
- update
Time String - The update time of the rules. Only when updating the custom vulnerability rules.
VulnerabilitySystemRuleSwitch, VulnerabilitySystemRuleSwitchArgs
- Custom
System intRule Switch - Custom rule switch.
- Rule
Id int - The ID of rule.
- Custom
System intRule Switch - Custom rule switch.
- Rule
Id int - The ID of rule.
- custom
System IntegerRule Switch - Custom rule switch.
- rule
Id Integer - The ID of rule.
- custom
System numberRule Switch - Custom rule switch.
- rule
Id number - The ID of rule.
- custom_
system_ intrule_ switch - Custom rule switch.
- rule_
id int - The ID of rule.
- custom
System NumberRule Switch - Custom rule switch.
- rule
Id Number - The ID of rule.
Import
WafVulnerability can be imported using the id, e.g.
$ pulumi import volcengine:waf/vulnerability:Vulnerability default resource_id
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- volcengine volcengine/pulumi-volcengine
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
volcengine
Terraform Provider.