mirror of
https://github.com/opentffoundation/opentf.git
synced 2026-03-13 10:01:08 -04:00
* docs/aws: Add undocumented fields to all WAF resources * docs/aws: Alphabetically sort WAF resources
1.7 KiB
1.7 KiB
layout, page_title, sidebar_current, description
| layout | page_title | sidebar_current | description |
|---|---|---|---|
| aws | AWS: waf_rule | docs-aws-resource-waf-rule | Provides a AWS WAF rule resource. |
aws_waf_rule
Provides a WAF Rule Resource
Example Usage
resource "aws_waf_ipset" "ipset" {
name = "tfIPSet"
ip_set_descriptors {
type = "IPV4"
value = "192.0.7.0/24"
}
}
resource "aws_waf_rule" "wafrule" {
depends_on = ["aws_waf_ipset.ipset"]
name = "tfWAFRule"
metric_name = "tfWAFRule"
predicates {
data_id = "${aws_waf_ipset.ipset.id}"
negated = false
type = "IPMatch"
}
}
Argument Reference
The following arguments are supported:
metric_name- (Required) The name or description for the Amazon CloudWatch metric of this rule.name- (Required) The name or description of the rule.predicates- (Optional) One of ByteMatchSet, IPSet, SizeConstraintSet, SqlInjectionMatchSet, or XssMatchSet objects to include in a rule.
Nested Blocks
predicates
Arguments
negated- (Required) Set this tofalseif you want to allow, block, or count requests based on the settings in the specifiedByteMatchSet,IPSet,SqlInjectionMatchSet,XssMatchSet, orSizeConstraintSet. For example, if an IPSet includes the IP address192.0.2.44, AWS WAF will allow or block requests based on that IP address. If set totrue, AWS WAF will allow, block, or count requests based on all IP addresses except192.0.2.44.data_id- (Optional) A unique identifier for a predicate in the rule, such as Byte Match Set ID or IPSet ID.type- (Required) The type of predicate in a rule, such asByteMatchSetorIPSet
Remarks
Attributes Reference
The following attributes are exported:
id- The ID of the WAF rule.