datadog.AppsecWafCustomRule
Explore with Pulumi AI
Provides a Datadog AppsecWafCustomRule resource. This can be used to create and manage Datadog appsec_waf_custom_rule.
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.datadog.AppsecWafCustomRule;
import com.pulumi.datadog.AppsecWafCustomRuleArgs;
import com.pulumi.datadog.inputs.AppsecWafCustomRuleConditionArgs;
import com.pulumi.datadog.inputs.AppsecWafCustomRuleScopeArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
// Create a new WAF custom rule to block a custom IoC
var ioc000 = new AppsecWafCustomRule("ioc000", AppsecWafCustomRuleArgs.builder()
.name("Block requests from a bad actor")
.blocking(true)
.enabled(true)
.tags(Map.ofEntries(
Map.entry("category", "attack_attempt"),
Map.entry("type", "custom_ioc")
))
.pathGlob("/db/*")
.conditions(AppsecWafCustomRuleConditionArgs.builder()
.operator("match_regex")
.parameters(AppsecWafCustomRuleConditionParametersArgs.builder()
.inputs(AppsecWafCustomRuleConditionParametersInputArgs.builder()
.address("server.db.statement")
.build())
.regex("stmt.*")
.build())
.build())
.action(AppsecWafCustomRuleActionArgs.builder()
.action("redirect_request")
.parameters(AppsecWafCustomRuleActionParametersArgs.builder()
.statusCode(302)
.location("/blocking")
.build())
.build())
.build());
// Create a WAF custom rule to track business logic events
var biz000 = new AppsecWafCustomRule("biz000", AppsecWafCustomRuleArgs.builder()
.name("Track payments")
.blocking(false)
.enabled(true)
.tags(Map.ofEntries(
Map.entry("category", "business_logic"),
Map.entry("type", "payment.checkout")
))
.pathGlob("/cart/*")
.conditions(AppsecWafCustomRuleConditionArgs.builder()
.operator("capture_data")
.parameters(AppsecWafCustomRuleConditionParametersArgs.builder()
.inputs(AppsecWafCustomRuleConditionParametersInputArgs.builder()
.address("server.request.query")
.keyPaths("payment_id")
.build())
.value("payment")
.build())
.build())
.scopes(AppsecWafCustomRuleScopeArgs.builder()
.env("prod")
.service("paymentsvc")
.build())
.build());
}
}
resources:
# Create a new WAF custom rule to block a custom IoC
ioc000:
type: datadog:AppsecWafCustomRule
properties:
name: Block requests from a bad actor
blocking: true
enabled: true
tags:
category: attack_attempt
type: custom_ioc
pathGlob: /db/*
conditions:
- operator: match_regex
parameters:
- inputs:
- address: server.db.statement
regex: stmt.*
action:
- action: redirect_request
parameters:
- statusCode: 302
location: /blocking
# Create a WAF custom rule to track business logic events
biz000:
type: datadog:AppsecWafCustomRule
properties:
name: Track payments
blocking: false
enabled: true
tags:
category: business_logic
type: payment.checkout
pathGlob: /cart/*
conditions:
- operator: capture_data
parameters:
- inputs:
- address: server.request.query
keyPaths:
- payment_id
value: payment
scopes:
- env: prod
service: paymentsvc
Create AppsecWafCustomRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AppsecWafCustomRule(name: string, args: AppsecWafCustomRuleArgs, opts?: CustomResourceOptions);
@overload
def AppsecWafCustomRule(resource_name: str,
args: AppsecWafCustomRuleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AppsecWafCustomRule(resource_name: str,
opts: Optional[ResourceOptions] = None,
blocking: Optional[bool] = None,
enabled: Optional[bool] = None,
name: Optional[str] = None,
tags: Optional[Mapping[str, str]] = None,
action: Optional[AppsecWafCustomRuleActionArgs] = None,
conditions: Optional[Sequence[AppsecWafCustomRuleConditionArgs]] = None,
path_glob: Optional[str] = None,
scopes: Optional[Sequence[AppsecWafCustomRuleScopeArgs]] = None)
func NewAppsecWafCustomRule(ctx *Context, name string, args AppsecWafCustomRuleArgs, opts ...ResourceOption) (*AppsecWafCustomRule, error)
public AppsecWafCustomRule(string name, AppsecWafCustomRuleArgs args, CustomResourceOptions? opts = null)
public AppsecWafCustomRule(String name, AppsecWafCustomRuleArgs args)
public AppsecWafCustomRule(String name, AppsecWafCustomRuleArgs args, CustomResourceOptions options)
type: datadog:AppsecWafCustomRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AppsecWafCustomRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AppsecWafCustomRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AppsecWafCustomRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AppsecWafCustomRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AppsecWafCustomRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var appsecWafCustomRuleResource = new Datadog.AppsecWafCustomRule("appsecWafCustomRuleResource", new()
{
Blocking = false,
Enabled = false,
Name = "string",
Tags =
{
{ "string", "string" },
},
Action = new Datadog.Inputs.AppsecWafCustomRuleActionArgs
{
Action = "string",
Parameters = new Datadog.Inputs.AppsecWafCustomRuleActionParametersArgs
{
Location = "string",
StatusCode = 0,
},
},
Conditions = new[]
{
new Datadog.Inputs.AppsecWafCustomRuleConditionArgs
{
Operator = "string",
Parameters = new Datadog.Inputs.AppsecWafCustomRuleConditionParametersArgs
{
Data = "string",
Inputs = new[]
{
new Datadog.Inputs.AppsecWafCustomRuleConditionParametersInputArgs
{
Address = "string",
KeyPaths = new[]
{
"string",
},
},
},
Lists = new[]
{
"string",
},
Options = new Datadog.Inputs.AppsecWafCustomRuleConditionParametersOptionsArgs
{
CaseSensitive = false,
MinLength = 0,
},
Regex = "string",
Value = "string",
},
},
},
PathGlob = "string",
Scopes = new[]
{
new Datadog.Inputs.AppsecWafCustomRuleScopeArgs
{
Env = "string",
Service = "string",
},
},
});
example, err := datadog.NewAppsecWafCustomRule(ctx, "appsecWafCustomRuleResource", &datadog.AppsecWafCustomRuleArgs{
Blocking: pulumi.Bool(false),
Enabled: pulumi.Bool(false),
Name: pulumi.String("string"),
Tags: pulumi.StringMap{
"string": pulumi.String("string"),
},
Action: &datadog.AppsecWafCustomRuleActionArgs{
Action: pulumi.String("string"),
Parameters: &datadog.AppsecWafCustomRuleActionParametersArgs{
Location: pulumi.String("string"),
StatusCode: pulumi.Int(0),
},
},
Conditions: datadog.AppsecWafCustomRuleConditionArray{
&datadog.AppsecWafCustomRuleConditionArgs{
Operator: pulumi.String("string"),
Parameters: &datadog.AppsecWafCustomRuleConditionParametersArgs{
Data: pulumi.String("string"),
Inputs: datadog.AppsecWafCustomRuleConditionParametersInputTypeArray{
&datadog.AppsecWafCustomRuleConditionParametersInputTypeArgs{
Address: pulumi.String("string"),
KeyPaths: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Lists: pulumi.StringArray{
pulumi.String("string"),
},
Options: &datadog.AppsecWafCustomRuleConditionParametersOptionsArgs{
CaseSensitive: pulumi.Bool(false),
MinLength: pulumi.Int(0),
},
Regex: pulumi.String("string"),
Value: pulumi.String("string"),
},
},
},
PathGlob: pulumi.String("string"),
Scopes: datadog.AppsecWafCustomRuleScopeArray{
&datadog.AppsecWafCustomRuleScopeArgs{
Env: pulumi.String("string"),
Service: pulumi.String("string"),
},
},
})
var appsecWafCustomRuleResource = new AppsecWafCustomRule("appsecWafCustomRuleResource", AppsecWafCustomRuleArgs.builder()
.blocking(false)
.enabled(false)
.name("string")
.tags(Map.of("string", "string"))
.action(AppsecWafCustomRuleActionArgs.builder()
.action("string")
.parameters(AppsecWafCustomRuleActionParametersArgs.builder()
.location("string")
.statusCode(0)
.build())
.build())
.conditions(AppsecWafCustomRuleConditionArgs.builder()
.operator("string")
.parameters(AppsecWafCustomRuleConditionParametersArgs.builder()
.data("string")
.inputs(AppsecWafCustomRuleConditionParametersInputArgs.builder()
.address("string")
.keyPaths("string")
.build())
.lists("string")
.options(AppsecWafCustomRuleConditionParametersOptionsArgs.builder()
.caseSensitive(false)
.minLength(0)
.build())
.regex("string")
.value("string")
.build())
.build())
.pathGlob("string")
.scopes(AppsecWafCustomRuleScopeArgs.builder()
.env("string")
.service("string")
.build())
.build());
appsec_waf_custom_rule_resource = datadog.AppsecWafCustomRule("appsecWafCustomRuleResource",
blocking=False,
enabled=False,
name="string",
tags={
"string": "string",
},
action={
"action": "string",
"parameters": {
"location": "string",
"status_code": 0,
},
},
conditions=[{
"operator": "string",
"parameters": {
"data": "string",
"inputs": [{
"address": "string",
"key_paths": ["string"],
}],
"lists": ["string"],
"options": {
"case_sensitive": False,
"min_length": 0,
},
"regex": "string",
"value": "string",
},
}],
path_glob="string",
scopes=[{
"env": "string",
"service": "string",
}])
const appsecWafCustomRuleResource = new datadog.AppsecWafCustomRule("appsecWafCustomRuleResource", {
blocking: false,
enabled: false,
name: "string",
tags: {
string: "string",
},
action: {
action: "string",
parameters: {
location: "string",
statusCode: 0,
},
},
conditions: [{
operator: "string",
parameters: {
data: "string",
inputs: [{
address: "string",
keyPaths: ["string"],
}],
lists: ["string"],
options: {
caseSensitive: false,
minLength: 0,
},
regex: "string",
value: "string",
},
}],
pathGlob: "string",
scopes: [{
env: "string",
service: "string",
}],
});
type: datadog:AppsecWafCustomRule
properties:
action:
action: string
parameters:
location: string
statusCode: 0
blocking: false
conditions:
- operator: string
parameters:
data: string
inputs:
- address: string
keyPaths:
- string
lists:
- string
options:
caseSensitive: false
minLength: 0
regex: string
value: string
enabled: false
name: string
pathGlob: string
scopes:
- env: string
service: string
tags:
string: string
AppsecWafCustomRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AppsecWafCustomRule resource accepts the following input properties:
- Blocking bool
- Indicates whether the WAF custom rule will block the request.
- Enabled bool
- Indicates whether the WAF custom rule is enabled.
- Name string
- The Name of the WAF custom rule.
- Dictionary<string, string>
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
. - Action
Appsec
Waf Custom Rule Action - Conditions
List<Appsec
Waf Custom Rule Condition> - Path
Glob string - The path glob for the WAF custom rule.
- Scopes
List<Appsec
Waf Custom Rule Scope>
- Blocking bool
- Indicates whether the WAF custom rule will block the request.
- Enabled bool
- Indicates whether the WAF custom rule is enabled.
- Name string
- The Name of the WAF custom rule.
- map[string]string
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
. - Action
Appsec
Waf Custom Rule Action Args - Conditions
[]Appsec
Waf Custom Rule Condition Args - Path
Glob string - The path glob for the WAF custom rule.
- Scopes
[]Appsec
Waf Custom Rule Scope Args
- blocking Boolean
- Indicates whether the WAF custom rule will block the request.
- enabled Boolean
- Indicates whether the WAF custom rule is enabled.
- name String
- The Name of the WAF custom rule.
- Map<String,String>
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
. - action
Appsec
Waf Custom Rule Action - conditions
List<Appsec
Waf Custom Rule Condition> - path
Glob String - The path glob for the WAF custom rule.
- scopes
List<Appsec
Waf Custom Rule Scope>
- blocking boolean
- Indicates whether the WAF custom rule will block the request.
- enabled boolean
- Indicates whether the WAF custom rule is enabled.
- name string
- The Name of the WAF custom rule.
- {[key: string]: string}
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
. - action
Appsec
Waf Custom Rule Action - conditions
Appsec
Waf Custom Rule Condition[] - path
Glob string - The path glob for the WAF custom rule.
- scopes
Appsec
Waf Custom Rule Scope[]
- blocking bool
- Indicates whether the WAF custom rule will block the request.
- enabled bool
- Indicates whether the WAF custom rule is enabled.
- name str
- The Name of the WAF custom rule.
- Mapping[str, str]
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
. - action
Appsec
Waf Custom Rule Action Args - conditions
Sequence[Appsec
Waf Custom Rule Condition Args] - path_
glob str - The path glob for the WAF custom rule.
- scopes
Sequence[Appsec
Waf Custom Rule Scope Args]
- blocking Boolean
- Indicates whether the WAF custom rule will block the request.
- enabled Boolean
- Indicates whether the WAF custom rule is enabled.
- name String
- The Name of the WAF custom rule.
- Map<String>
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
. - action Property Map
- conditions List<Property Map>
- path
Glob String - The path glob for the WAF custom rule.
- scopes List<Property Map>
Outputs
All input properties are implicitly available as output properties. Additionally, the AppsecWafCustomRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing AppsecWafCustomRule Resource
Get an existing AppsecWafCustomRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AppsecWafCustomRuleState, opts?: CustomResourceOptions): AppsecWafCustomRule
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[AppsecWafCustomRuleActionArgs] = None,
blocking: Optional[bool] = None,
conditions: Optional[Sequence[AppsecWafCustomRuleConditionArgs]] = None,
enabled: Optional[bool] = None,
name: Optional[str] = None,
path_glob: Optional[str] = None,
scopes: Optional[Sequence[AppsecWafCustomRuleScopeArgs]] = None,
tags: Optional[Mapping[str, str]] = None) -> AppsecWafCustomRule
func GetAppsecWafCustomRule(ctx *Context, name string, id IDInput, state *AppsecWafCustomRuleState, opts ...ResourceOption) (*AppsecWafCustomRule, error)
public static AppsecWafCustomRule Get(string name, Input<string> id, AppsecWafCustomRuleState? state, CustomResourceOptions? opts = null)
public static AppsecWafCustomRule get(String name, Output<String> id, AppsecWafCustomRuleState state, CustomResourceOptions options)
resources: _: type: datadog:AppsecWafCustomRule get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action
Appsec
Waf Custom Rule Action - Blocking bool
- Indicates whether the WAF custom rule will block the request.
- Conditions
List<Appsec
Waf Custom Rule Condition> - Enabled bool
- Indicates whether the WAF custom rule is enabled.
- Name string
- The Name of the WAF custom rule.
- Path
Glob string - The path glob for the WAF custom rule.
- Scopes
List<Appsec
Waf Custom Rule Scope> - Dictionary<string, string>
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
.
- Action
Appsec
Waf Custom Rule Action Args - Blocking bool
- Indicates whether the WAF custom rule will block the request.
- Conditions
[]Appsec
Waf Custom Rule Condition Args - Enabled bool
- Indicates whether the WAF custom rule is enabled.
- Name string
- The Name of the WAF custom rule.
- Path
Glob string - The path glob for the WAF custom rule.
- Scopes
[]Appsec
Waf Custom Rule Scope Args - map[string]string
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
.
- action
Appsec
Waf Custom Rule Action - blocking Boolean
- Indicates whether the WAF custom rule will block the request.
- conditions
List<Appsec
Waf Custom Rule Condition> - enabled Boolean
- Indicates whether the WAF custom rule is enabled.
- name String
- The Name of the WAF custom rule.
- path
Glob String - The path glob for the WAF custom rule.
- scopes
List<Appsec
Waf Custom Rule Scope> - Map<String,String>
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
.
- action
Appsec
Waf Custom Rule Action - blocking boolean
- Indicates whether the WAF custom rule will block the request.
- conditions
Appsec
Waf Custom Rule Condition[] - enabled boolean
- Indicates whether the WAF custom rule is enabled.
- name string
- The Name of the WAF custom rule.
- path
Glob string - The path glob for the WAF custom rule.
- scopes
Appsec
Waf Custom Rule Scope[] - {[key: string]: string}
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
.
- action
Appsec
Waf Custom Rule Action Args - blocking bool
- Indicates whether the WAF custom rule will block the request.
- conditions
Sequence[Appsec
Waf Custom Rule Condition Args] - enabled bool
- Indicates whether the WAF custom rule is enabled.
- name str
- The Name of the WAF custom rule.
- path_
glob str - The path glob for the WAF custom rule.
- scopes
Sequence[Appsec
Waf Custom Rule Scope Args] - Mapping[str, str]
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
.
- action Property Map
- blocking Boolean
- Indicates whether the WAF custom rule will block the request.
- conditions List<Property Map>
- enabled Boolean
- Indicates whether the WAF custom rule is enabled.
- name String
- The Name of the WAF custom rule.
- path
Glob String - The path glob for the WAF custom rule.
- scopes List<Property Map>
- Map<String>
- Tags associated with the WAF custom rule.
category
andtype
tags are required. Supported categories includebusiness_logic
,attack_attempt
andsecurity_response
.
Supporting Types
AppsecWafCustomRuleAction, AppsecWafCustomRuleActionArgs
- Action string
- Override the default action to take when the WAF custom rule would block.
- Parameters
Appsec
Waf Custom Rule Action Parameters
- Action string
- Override the default action to take when the WAF custom rule would block.
- Parameters
Appsec
Waf Custom Rule Action Parameters
- action String
- Override the default action to take when the WAF custom rule would block.
- parameters
Appsec
Waf Custom Rule Action Parameters
- action string
- Override the default action to take when the WAF custom rule would block.
- parameters
Appsec
Waf Custom Rule Action Parameters
- action str
- Override the default action to take when the WAF custom rule would block.
- parameters
Appsec
Waf Custom Rule Action Parameters
- action String
- Override the default action to take when the WAF custom rule would block.
- parameters Property Map
AppsecWafCustomRuleActionParameters, AppsecWafCustomRuleActionParametersArgs
- Location string
- The location to redirect to when the WAF custom rule triggers.
- Status
Code int - The status code to return when the WAF custom rule triggers.
- Location string
- The location to redirect to when the WAF custom rule triggers.
- Status
Code int - The status code to return when the WAF custom rule triggers.
- location String
- The location to redirect to when the WAF custom rule triggers.
- status
Code Integer - The status code to return when the WAF custom rule triggers.
- location string
- The location to redirect to when the WAF custom rule triggers.
- status
Code number - The status code to return when the WAF custom rule triggers.
- location str
- The location to redirect to when the WAF custom rule triggers.
- status_
code int - The status code to return when the WAF custom rule triggers.
- location String
- The location to redirect to when the WAF custom rule triggers.
- status
Code Number - The status code to return when the WAF custom rule triggers.
AppsecWafCustomRuleCondition, AppsecWafCustomRuleConditionArgs
- Operator string
- Operator to use for the WAF Condition.
- Parameters
Appsec
Waf Custom Rule Condition Parameters
- Operator string
- Operator to use for the WAF Condition.
- Parameters
Appsec
Waf Custom Rule Condition Parameters
- operator String
- Operator to use for the WAF Condition.
- parameters
Appsec
Waf Custom Rule Condition Parameters
- operator string
- Operator to use for the WAF Condition.
- parameters
Appsec
Waf Custom Rule Condition Parameters
- operator str
- Operator to use for the WAF Condition.
- parameters
Appsec
Waf Custom Rule Condition Parameters
- operator String
- Operator to use for the WAF Condition.
- parameters Property Map
AppsecWafCustomRuleConditionParameters, AppsecWafCustomRuleConditionParametersArgs
- Data string
- Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
- Inputs
List<Appsec
Waf Custom Rule Condition Parameters Input> - Lists List<string>
- List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
- Options
Appsec
Waf Custom Rule Condition Parameters Options - Regex string
- Regex to use with the condition. Only used with matchregex and !matchregex operator.
- Value string
- Store the captured value in the specified tag name. Only used with the capture_data operator.
- Data string
- Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
- Inputs
[]Appsec
Waf Custom Rule Condition Parameters Input Type - Lists []string
- List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
- Options
Appsec
Waf Custom Rule Condition Parameters Options - Regex string
- Regex to use with the condition. Only used with matchregex and !matchregex operator.
- Value string
- Store the captured value in the specified tag name. Only used with the capture_data operator.
- data String
- Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
- inputs
List<Appsec
Waf Custom Rule Condition Parameters Input> - lists List<String>
- List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
- options
Appsec
Waf Custom Rule Condition Parameters Options - regex String
- Regex to use with the condition. Only used with matchregex and !matchregex operator.
- value String
- Store the captured value in the specified tag name. Only used with the capture_data operator.
- data string
- Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
- inputs
Appsec
Waf Custom Rule Condition Parameters Input[] - lists string[]
- List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
- options
Appsec
Waf Custom Rule Condition Parameters Options - regex string
- Regex to use with the condition. Only used with matchregex and !matchregex operator.
- value string
- Store the captured value in the specified tag name. Only used with the capture_data operator.
- data str
- Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
- inputs
Sequence[Appsec
Waf Custom Rule Condition Parameters Input] - lists Sequence[str]
- List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
- options
Appsec
Waf Custom Rule Condition Parameters Options - regex str
- Regex to use with the condition. Only used with matchregex and !matchregex operator.
- value str
- Store the captured value in the specified tag name. Only used with the capture_data operator.
- data String
- Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
- inputs List<Property Map>
- lists List<String>
- List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
- options Property Map
- regex String
- Regex to use with the condition. Only used with matchregex and !matchregex operator.
- value String
- Store the captured value in the specified tag name. Only used with the capture_data operator.
AppsecWafCustomRuleConditionParametersInput, AppsecWafCustomRuleConditionParametersInputArgs
AppsecWafCustomRuleConditionParametersOptions, AppsecWafCustomRuleConditionParametersOptionsArgs
- Case
Sensitive bool - Evaluate the value as case sensitive.
- Min
Length int - Only evaluate this condition if the value has a minimum amount of characters.
- Case
Sensitive bool - Evaluate the value as case sensitive.
- Min
Length int - Only evaluate this condition if the value has a minimum amount of characters.
- case
Sensitive Boolean - Evaluate the value as case sensitive.
- min
Length Integer - Only evaluate this condition if the value has a minimum amount of characters.
- case
Sensitive boolean - Evaluate the value as case sensitive.
- min
Length number - Only evaluate this condition if the value has a minimum amount of characters.
- case_
sensitive bool - Evaluate the value as case sensitive.
- min_
length int - Only evaluate this condition if the value has a minimum amount of characters.
- case
Sensitive Boolean - Evaluate the value as case sensitive.
- min
Length Number - Only evaluate this condition if the value has a minimum amount of characters.
AppsecWafCustomRuleScope, AppsecWafCustomRuleScopeArgs
Import
$ pulumi import datadog:index/appsecWafCustomRule:AppsecWafCustomRule new_list ""
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Datadog pulumi/pulumi-datadog
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
datadog
Terraform Provider.