1. Packages
  2. Datadog Provider
  3. API Docs
  4. AppsecWafExclusionFilter
Datadog v4.47.0 published on Thursday, Mar 20, 2025 by Pulumi

datadog.AppsecWafExclusionFilter

Explore with Pulumi AI

datadog logo
Datadog v4.47.0 published on Thursday, Mar 20, 2025 by Pulumi

    Provides a Datadog AppsecWafExclusionFilter resource. This can be used to create and manage Datadog appsec_waf_exclusion_filter.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as datadog from "@pulumi/datadog";
    
    // Create a WAF exclusion filter on a path
    const excludeOnPath = new datadog.index.AppsecExclusionFilter("exclude_on_path", {
        description: "Exclude false positives on a path",
        enabled: true,
        pathGlob: "/accounts/*",
        rulesTarget: [{
            tags: [{
                category: "attack_attempt",
                type: "lfi",
            }],
        }],
        scope: [{
            env: "www",
            service: "prod",
        }],
    });
    // Create a WAF exclusion filter for trusted IPs
    const trustedIps = new datadog.index.AppsecExclusionFilter("trusted_ips", {
        description: "Do not block office IP network",
        enabled: true,
        ipList: ["198.10.14.53/24"],
        onMatch: "monitor",
    });
    
    import pulumi
    import pulumi_datadog as datadog
    
    # Create a WAF exclusion filter on a path
    exclude_on_path = datadog.index.AppsecExclusionFilter("exclude_on_path",
        description=Exclude false positives on a path,
        enabled=True,
        path_glob=/accounts/*,
        rules_target=[{
            tags: [{
                category: attack_attempt,
                type: lfi,
            }],
        }],
        scope=[{
            env: www,
            service: prod,
        }])
    # Create a WAF exclusion filter for trusted IPs
    trusted_ips = datadog.index.AppsecExclusionFilter("trusted_ips",
        description=Do not block office IP network,
        enabled=True,
        ip_list=[198.10.14.53/24],
        on_match=monitor)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-datadog/sdk/v4/go/datadog"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		// Create a WAF exclusion filter on a path
    		_, err := datadog.NewAppsecExclusionFilter(ctx, "exclude_on_path", &datadog.AppsecExclusionFilterArgs{
    			Description: "Exclude false positives on a path",
    			Enabled:     true,
    			PathGlob:    "/accounts/*",
    			RulesTarget: []map[string]interface{}{
    				map[string]interface{}{
    					"tags": []map[string]interface{}{
    						map[string]interface{}{
    							"category": "attack_attempt",
    							"type":     "lfi",
    						},
    					},
    				},
    			},
    			Scope: []map[string]interface{}{
    				map[string]interface{}{
    					"env":     "www",
    					"service": "prod",
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// Create a WAF exclusion filter for trusted IPs
    		_, err = datadog.NewAppsecExclusionFilter(ctx, "trusted_ips", &datadog.AppsecExclusionFilterArgs{
    			Description: "Do not block office IP network",
    			Enabled:     true,
    			IpList: []string{
    				"198.10.14.53/24",
    			},
    			OnMatch: "monitor",
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Datadog = Pulumi.Datadog;
    
    return await Deployment.RunAsync(() => 
    {
        // Create a WAF exclusion filter on a path
        var excludeOnPath = new Datadog.Index.AppsecExclusionFilter("exclude_on_path", new()
        {
            Description = "Exclude false positives on a path",
            Enabled = true,
            PathGlob = "/accounts/*",
            RulesTarget = new[]
            {
                
                {
                    { "tags", new[]
                    {
                        
                        {
                            { "category", "attack_attempt" },
                            { "type", "lfi" },
                        },
                    } },
                },
            },
            Scope = new[]
            {
                
                {
                    { "env", "www" },
                    { "service", "prod" },
                },
            },
        });
    
        // Create a WAF exclusion filter for trusted IPs
        var trustedIps = new Datadog.Index.AppsecExclusionFilter("trusted_ips", new()
        {
            Description = "Do not block office IP network",
            Enabled = true,
            IpList = new[]
            {
                "198.10.14.53/24",
            },
            OnMatch = "monitor",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.datadog.appsecExclusionFilter;
    import com.pulumi.datadog.AppsecExclusionFilterArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // Create a WAF exclusion filter on a path
            var excludeOnPath = new AppsecExclusionFilter("excludeOnPath", AppsecExclusionFilterArgs.builder()
                .description("Exclude false positives on a path")
                .enabled(true)
                .pathGlob("/accounts/*")
                .rulesTarget(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                .scope(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
                .build());
    
            // Create a WAF exclusion filter for trusted IPs
            var trustedIps = new AppsecExclusionFilter("trustedIps", AppsecExclusionFilterArgs.builder()
                .description("Do not block office IP network")
                .enabled(true)
                .ipList("198.10.14.53/24")
                .onMatch("monitor")
                .build());
    
        }
    }
    
    resources:
      # Create a WAF exclusion filter on a path
      excludeOnPath:
        type: datadog:appsecExclusionFilter
        name: exclude_on_path
        properties:
          description: Exclude false positives on a path
          enabled: true
          pathGlob: /accounts/*
          rulesTarget:
            - tags:
                - category: attack_attempt
                  type: lfi
          scope:
            - env: www
              service: prod
      # Create a WAF exclusion filter for trusted IPs
      trustedIps:
        type: datadog:appsecExclusionFilter
        name: trusted_ips
        properties:
          description: Do not block office IP network
          enabled: true
          ipList:
            - 198.10.14.53/24
          onMatch: monitor
    

    Create AppsecWafExclusionFilter Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new AppsecWafExclusionFilter(name: string, args: AppsecWafExclusionFilterArgs, opts?: CustomResourceOptions);
    @overload
    def AppsecWafExclusionFilter(resource_name: str,
                                 args: AppsecWafExclusionFilterArgs,
                                 opts: Optional[ResourceOptions] = None)
    
    @overload
    def AppsecWafExclusionFilter(resource_name: str,
                                 opts: Optional[ResourceOptions] = None,
                                 description: Optional[str] = None,
                                 enabled: Optional[bool] = None,
                                 event_query: Optional[str] = None,
                                 ip_lists: Optional[Sequence[str]] = None,
                                 on_match: Optional[str] = None,
                                 parameters: Optional[Sequence[str]] = None,
                                 path_glob: Optional[str] = None,
                                 rules_targets: Optional[Sequence[AppsecWafExclusionFilterRulesTargetArgs]] = None,
                                 scopes: Optional[Sequence[AppsecWafExclusionFilterScopeArgs]] = None)
    func NewAppsecWafExclusionFilter(ctx *Context, name string, args AppsecWafExclusionFilterArgs, opts ...ResourceOption) (*AppsecWafExclusionFilter, error)
    public AppsecWafExclusionFilter(string name, AppsecWafExclusionFilterArgs args, CustomResourceOptions? opts = null)
    public AppsecWafExclusionFilter(String name, AppsecWafExclusionFilterArgs args)
    public AppsecWafExclusionFilter(String name, AppsecWafExclusionFilterArgs args, CustomResourceOptions options)
    
    type: datadog:AppsecWafExclusionFilter
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AppsecWafExclusionFilterArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AppsecWafExclusionFilterArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AppsecWafExclusionFilterArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AppsecWafExclusionFilterArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AppsecWafExclusionFilterArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var appsecWafExclusionFilterResource = new Datadog.AppsecWafExclusionFilter("appsecWafExclusionFilterResource", new()
    {
        Description = "string",
        Enabled = false,
        EventQuery = "string",
        IpLists = new[]
        {
            "string",
        },
        OnMatch = "string",
        Parameters = new[]
        {
            "string",
        },
        PathGlob = "string",
        RulesTargets = new[]
        {
            new Datadog.Inputs.AppsecWafExclusionFilterRulesTargetArgs
            {
                RuleId = "string",
                Tags = new Datadog.Inputs.AppsecWafExclusionFilterRulesTargetTagsArgs
                {
                    Category = "string",
                    Type = "string",
                },
            },
        },
        Scopes = new[]
        {
            new Datadog.Inputs.AppsecWafExclusionFilterScopeArgs
            {
                Env = "string",
                Service = "string",
            },
        },
    });
    
    example, err := datadog.NewAppsecWafExclusionFilter(ctx, "appsecWafExclusionFilterResource", &datadog.AppsecWafExclusionFilterArgs{
    	Description: pulumi.String("string"),
    	Enabled:     pulumi.Bool(false),
    	EventQuery:  pulumi.String("string"),
    	IpLists: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	OnMatch: pulumi.String("string"),
    	Parameters: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	PathGlob: pulumi.String("string"),
    	RulesTargets: datadog.AppsecWafExclusionFilterRulesTargetArray{
    		&datadog.AppsecWafExclusionFilterRulesTargetArgs{
    			RuleId: pulumi.String("string"),
    			Tags: &datadog.AppsecWafExclusionFilterRulesTargetTagsArgs{
    				Category: pulumi.String("string"),
    				Type:     pulumi.String("string"),
    			},
    		},
    	},
    	Scopes: datadog.AppsecWafExclusionFilterScopeArray{
    		&datadog.AppsecWafExclusionFilterScopeArgs{
    			Env:     pulumi.String("string"),
    			Service: pulumi.String("string"),
    		},
    	},
    })
    
    var appsecWafExclusionFilterResource = new AppsecWafExclusionFilter("appsecWafExclusionFilterResource", AppsecWafExclusionFilterArgs.builder()
        .description("string")
        .enabled(false)
        .eventQuery("string")
        .ipLists("string")
        .onMatch("string")
        .parameters("string")
        .pathGlob("string")
        .rulesTargets(AppsecWafExclusionFilterRulesTargetArgs.builder()
            .ruleId("string")
            .tags(AppsecWafExclusionFilterRulesTargetTagsArgs.builder()
                .category("string")
                .type("string")
                .build())
            .build())
        .scopes(AppsecWafExclusionFilterScopeArgs.builder()
            .env("string")
            .service("string")
            .build())
        .build());
    
    appsec_waf_exclusion_filter_resource = datadog.AppsecWafExclusionFilter("appsecWafExclusionFilterResource",
        description="string",
        enabled=False,
        event_query="string",
        ip_lists=["string"],
        on_match="string",
        parameters=["string"],
        path_glob="string",
        rules_targets=[{
            "rule_id": "string",
            "tags": {
                "category": "string",
                "type": "string",
            },
        }],
        scopes=[{
            "env": "string",
            "service": "string",
        }])
    
    const appsecWafExclusionFilterResource = new datadog.AppsecWafExclusionFilter("appsecWafExclusionFilterResource", {
        description: "string",
        enabled: false,
        eventQuery: "string",
        ipLists: ["string"],
        onMatch: "string",
        parameters: ["string"],
        pathGlob: "string",
        rulesTargets: [{
            ruleId: "string",
            tags: {
                category: "string",
                type: "string",
            },
        }],
        scopes: [{
            env: "string",
            service: "string",
        }],
    });
    
    type: datadog:AppsecWafExclusionFilter
    properties:
        description: string
        enabled: false
        eventQuery: string
        ipLists:
            - string
        onMatch: string
        parameters:
            - string
        pathGlob: string
        rulesTargets:
            - ruleId: string
              tags:
                category: string
                type: string
        scopes:
            - env: string
              service: string
    

    AppsecWafExclusionFilter Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The AppsecWafExclusionFilter resource accepts the following input properties:

    Description string
    A description for the exclusion filter.
    Enabled bool
    Indicates whether the exclusion filter is enabled.
    EventQuery string
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    IpLists List<string>
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    OnMatch string
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    Parameters List<string>
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    PathGlob string
    The HTTP path glob expression matched by the exclusion filter.
    RulesTargets List<AppsecWafExclusionFilterRulesTarget>
    Scopes List<AppsecWafExclusionFilterScope>
    Description string
    A description for the exclusion filter.
    Enabled bool
    Indicates whether the exclusion filter is enabled.
    EventQuery string
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    IpLists []string
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    OnMatch string
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    Parameters []string
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    PathGlob string
    The HTTP path glob expression matched by the exclusion filter.
    RulesTargets []AppsecWafExclusionFilterRulesTargetArgs
    Scopes []AppsecWafExclusionFilterScopeArgs
    description String
    A description for the exclusion filter.
    enabled Boolean
    Indicates whether the exclusion filter is enabled.
    eventQuery String
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ipLists List<String>
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    onMatch String
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters List<String>
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    pathGlob String
    The HTTP path glob expression matched by the exclusion filter.
    rulesTargets List<AppsecWafExclusionFilterRulesTarget>
    scopes List<AppsecWafExclusionFilterScope>
    description string
    A description for the exclusion filter.
    enabled boolean
    Indicates whether the exclusion filter is enabled.
    eventQuery string
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ipLists string[]
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    onMatch string
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters string[]
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    pathGlob string
    The HTTP path glob expression matched by the exclusion filter.
    rulesTargets AppsecWafExclusionFilterRulesTarget[]
    scopes AppsecWafExclusionFilterScope[]
    description str
    A description for the exclusion filter.
    enabled bool
    Indicates whether the exclusion filter is enabled.
    event_query str
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ip_lists Sequence[str]
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    on_match str
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters Sequence[str]
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    path_glob str
    The HTTP path glob expression matched by the exclusion filter.
    rules_targets Sequence[AppsecWafExclusionFilterRulesTargetArgs]
    scopes Sequence[AppsecWafExclusionFilterScopeArgs]
    description String
    A description for the exclusion filter.
    enabled Boolean
    Indicates whether the exclusion filter is enabled.
    eventQuery String
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ipLists List<String>
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    onMatch String
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters List<String>
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    pathGlob String
    The HTTP path glob expression matched by the exclusion filter.
    rulesTargets List<Property Map>
    scopes List<Property Map>

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AppsecWafExclusionFilter resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing AppsecWafExclusionFilter Resource

    Get an existing AppsecWafExclusionFilter resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AppsecWafExclusionFilterState, opts?: CustomResourceOptions): AppsecWafExclusionFilter
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            description: Optional[str] = None,
            enabled: Optional[bool] = None,
            event_query: Optional[str] = None,
            ip_lists: Optional[Sequence[str]] = None,
            on_match: Optional[str] = None,
            parameters: Optional[Sequence[str]] = None,
            path_glob: Optional[str] = None,
            rules_targets: Optional[Sequence[AppsecWafExclusionFilterRulesTargetArgs]] = None,
            scopes: Optional[Sequence[AppsecWafExclusionFilterScopeArgs]] = None) -> AppsecWafExclusionFilter
    func GetAppsecWafExclusionFilter(ctx *Context, name string, id IDInput, state *AppsecWafExclusionFilterState, opts ...ResourceOption) (*AppsecWafExclusionFilter, error)
    public static AppsecWafExclusionFilter Get(string name, Input<string> id, AppsecWafExclusionFilterState? state, CustomResourceOptions? opts = null)
    public static AppsecWafExclusionFilter get(String name, Output<String> id, AppsecWafExclusionFilterState state, CustomResourceOptions options)
    resources:  _:    type: datadog:AppsecWafExclusionFilter    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Description string
    A description for the exclusion filter.
    Enabled bool
    Indicates whether the exclusion filter is enabled.
    EventQuery string
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    IpLists List<string>
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    OnMatch string
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    Parameters List<string>
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    PathGlob string
    The HTTP path glob expression matched by the exclusion filter.
    RulesTargets List<AppsecWafExclusionFilterRulesTarget>
    Scopes List<AppsecWafExclusionFilterScope>
    Description string
    A description for the exclusion filter.
    Enabled bool
    Indicates whether the exclusion filter is enabled.
    EventQuery string
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    IpLists []string
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    OnMatch string
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    Parameters []string
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    PathGlob string
    The HTTP path glob expression matched by the exclusion filter.
    RulesTargets []AppsecWafExclusionFilterRulesTargetArgs
    Scopes []AppsecWafExclusionFilterScopeArgs
    description String
    A description for the exclusion filter.
    enabled Boolean
    Indicates whether the exclusion filter is enabled.
    eventQuery String
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ipLists List<String>
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    onMatch String
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters List<String>
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    pathGlob String
    The HTTP path glob expression matched by the exclusion filter.
    rulesTargets List<AppsecWafExclusionFilterRulesTarget>
    scopes List<AppsecWafExclusionFilterScope>
    description string
    A description for the exclusion filter.
    enabled boolean
    Indicates whether the exclusion filter is enabled.
    eventQuery string
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ipLists string[]
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    onMatch string
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters string[]
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    pathGlob string
    The HTTP path glob expression matched by the exclusion filter.
    rulesTargets AppsecWafExclusionFilterRulesTarget[]
    scopes AppsecWafExclusionFilterScope[]
    description str
    A description for the exclusion filter.
    enabled bool
    Indicates whether the exclusion filter is enabled.
    event_query str
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ip_lists Sequence[str]
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    on_match str
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters Sequence[str]
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    path_glob str
    The HTTP path glob expression matched by the exclusion filter.
    rules_targets Sequence[AppsecWafExclusionFilterRulesTargetArgs]
    scopes Sequence[AppsecWafExclusionFilterScopeArgs]
    description String
    A description for the exclusion filter.
    enabled Boolean
    Indicates whether the exclusion filter is enabled.
    eventQuery String
    The event query matched by the legacy exclusion filter. Cannot be created nor updated.
    ipLists List<String>
    The client IP addresses matched by the exclusion filter (CIDR notation is supported).
    onMatch String
    The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
    parameters List<String>
    A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
    pathGlob String
    The HTTP path glob expression matched by the exclusion filter.
    rulesTargets List<Property Map>
    scopes List<Property Map>

    Supporting Types

    AppsecWafExclusionFilterRulesTarget, AppsecWafExclusionFilterRulesTargetArgs

    RuleId string
    Target a single WAF rule based on its identifier.
    Tags AppsecWafExclusionFilterRulesTargetTags
    RuleId string
    Target a single WAF rule based on its identifier.
    Tags AppsecWafExclusionFilterRulesTargetTags
    ruleId String
    Target a single WAF rule based on its identifier.
    tags AppsecWafExclusionFilterRulesTargetTags
    ruleId string
    Target a single WAF rule based on its identifier.
    tags AppsecWafExclusionFilterRulesTargetTags
    rule_id str
    Target a single WAF rule based on its identifier.
    tags AppsecWafExclusionFilterRulesTargetTags
    ruleId String
    Target a single WAF rule based on its identifier.
    tags Property Map

    AppsecWafExclusionFilterRulesTargetTags, AppsecWafExclusionFilterRulesTargetTagsArgs

    Category string
    The category of the targeted WAF rules.
    Type string
    The type of the targeted WAF rules.
    Category string
    The category of the targeted WAF rules.
    Type string
    The type of the targeted WAF rules.
    category String
    The category of the targeted WAF rules.
    type String
    The type of the targeted WAF rules.
    category string
    The category of the targeted WAF rules.
    type string
    The type of the targeted WAF rules.
    category str
    The category of the targeted WAF rules.
    type str
    The type of the targeted WAF rules.
    category String
    The category of the targeted WAF rules.
    type String
    The type of the targeted WAF rules.

    AppsecWafExclusionFilterScope, AppsecWafExclusionFilterScopeArgs

    Env string
    Deploy on this environment.
    Service string
    Deploy on this service.
    Env string
    Deploy on this environment.
    Service string
    Deploy on this service.
    env String
    Deploy on this environment.
    service String
    Deploy on this service.
    env string
    Deploy on this environment.
    service string
    Deploy on this service.
    env str
    Deploy on this environment.
    service str
    Deploy on this service.
    env String
    Deploy on this environment.
    service String
    Deploy on this service.

    Import

    $ pulumi import datadog:index/appsecWafExclusionFilter:AppsecWafExclusionFilter passlist_entry "45b7032f-0ac4-4b2f-9118-363523c625f6"
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Datadog pulumi/pulumi-datadog
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the datadog Terraform Provider.
    datadog logo
    Datadog v4.47.0 published on Thursday, Mar 20, 2025 by Pulumi