datadog.AppsecWafExclusionFilter
Explore with Pulumi AI
Provides a Datadog AppsecWafExclusionFilter resource. This can be used to create and manage Datadog appsec_waf_exclusion_filter.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as datadog from "@pulumi/datadog";
// Create a WAF exclusion filter on a path
const excludeOnPath = new datadog.index.AppsecExclusionFilter("exclude_on_path", {
description: "Exclude false positives on a path",
enabled: true,
pathGlob: "/accounts/*",
rulesTarget: [{
tags: [{
category: "attack_attempt",
type: "lfi",
}],
}],
scope: [{
env: "www",
service: "prod",
}],
});
// Create a WAF exclusion filter for trusted IPs
const trustedIps = new datadog.index.AppsecExclusionFilter("trusted_ips", {
description: "Do not block office IP network",
enabled: true,
ipList: ["198.10.14.53/24"],
onMatch: "monitor",
});
import pulumi
import pulumi_datadog as datadog
# Create a WAF exclusion filter on a path
exclude_on_path = datadog.index.AppsecExclusionFilter("exclude_on_path",
description=Exclude false positives on a path,
enabled=True,
path_glob=/accounts/*,
rules_target=[{
tags: [{
category: attack_attempt,
type: lfi,
}],
}],
scope=[{
env: www,
service: prod,
}])
# Create a WAF exclusion filter for trusted IPs
trusted_ips = datadog.index.AppsecExclusionFilter("trusted_ips",
description=Do not block office IP network,
enabled=True,
ip_list=[198.10.14.53/24],
on_match=monitor)
package main
import (
"github.com/pulumi/pulumi-datadog/sdk/v4/go/datadog"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
// Create a WAF exclusion filter on a path
_, err := datadog.NewAppsecExclusionFilter(ctx, "exclude_on_path", &datadog.AppsecExclusionFilterArgs{
Description: "Exclude false positives on a path",
Enabled: true,
PathGlob: "/accounts/*",
RulesTarget: []map[string]interface{}{
map[string]interface{}{
"tags": []map[string]interface{}{
map[string]interface{}{
"category": "attack_attempt",
"type": "lfi",
},
},
},
},
Scope: []map[string]interface{}{
map[string]interface{}{
"env": "www",
"service": "prod",
},
},
})
if err != nil {
return err
}
// Create a WAF exclusion filter for trusted IPs
_, err = datadog.NewAppsecExclusionFilter(ctx, "trusted_ips", &datadog.AppsecExclusionFilterArgs{
Description: "Do not block office IP network",
Enabled: true,
IpList: []string{
"198.10.14.53/24",
},
OnMatch: "monitor",
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Datadog = Pulumi.Datadog;
return await Deployment.RunAsync(() =>
{
// Create a WAF exclusion filter on a path
var excludeOnPath = new Datadog.Index.AppsecExclusionFilter("exclude_on_path", new()
{
Description = "Exclude false positives on a path",
Enabled = true,
PathGlob = "/accounts/*",
RulesTarget = new[]
{
{
{ "tags", new[]
{
{
{ "category", "attack_attempt" },
{ "type", "lfi" },
},
} },
},
},
Scope = new[]
{
{
{ "env", "www" },
{ "service", "prod" },
},
},
});
// Create a WAF exclusion filter for trusted IPs
var trustedIps = new Datadog.Index.AppsecExclusionFilter("trusted_ips", new()
{
Description = "Do not block office IP network",
Enabled = true,
IpList = new[]
{
"198.10.14.53/24",
},
OnMatch = "monitor",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.datadog.appsecExclusionFilter;
import com.pulumi.datadog.AppsecExclusionFilterArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
// Create a WAF exclusion filter on a path
var excludeOnPath = new AppsecExclusionFilter("excludeOnPath", AppsecExclusionFilterArgs.builder()
.description("Exclude false positives on a path")
.enabled(true)
.pathGlob("/accounts/*")
.rulesTarget(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
.scope(%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
.build());
// Create a WAF exclusion filter for trusted IPs
var trustedIps = new AppsecExclusionFilter("trustedIps", AppsecExclusionFilterArgs.builder()
.description("Do not block office IP network")
.enabled(true)
.ipList("198.10.14.53/24")
.onMatch("monitor")
.build());
}
}
resources:
# Create a WAF exclusion filter on a path
excludeOnPath:
type: datadog:appsecExclusionFilter
name: exclude_on_path
properties:
description: Exclude false positives on a path
enabled: true
pathGlob: /accounts/*
rulesTarget:
- tags:
- category: attack_attempt
type: lfi
scope:
- env: www
service: prod
# Create a WAF exclusion filter for trusted IPs
trustedIps:
type: datadog:appsecExclusionFilter
name: trusted_ips
properties:
description: Do not block office IP network
enabled: true
ipList:
- 198.10.14.53/24
onMatch: monitor
Create AppsecWafExclusionFilter Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AppsecWafExclusionFilter(name: string, args: AppsecWafExclusionFilterArgs, opts?: CustomResourceOptions);
@overload
def AppsecWafExclusionFilter(resource_name: str,
args: AppsecWafExclusionFilterArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AppsecWafExclusionFilter(resource_name: str,
opts: Optional[ResourceOptions] = None,
description: Optional[str] = None,
enabled: Optional[bool] = None,
event_query: Optional[str] = None,
ip_lists: Optional[Sequence[str]] = None,
on_match: Optional[str] = None,
parameters: Optional[Sequence[str]] = None,
path_glob: Optional[str] = None,
rules_targets: Optional[Sequence[AppsecWafExclusionFilterRulesTargetArgs]] = None,
scopes: Optional[Sequence[AppsecWafExclusionFilterScopeArgs]] = None)
func NewAppsecWafExclusionFilter(ctx *Context, name string, args AppsecWafExclusionFilterArgs, opts ...ResourceOption) (*AppsecWafExclusionFilter, error)
public AppsecWafExclusionFilter(string name, AppsecWafExclusionFilterArgs args, CustomResourceOptions? opts = null)
public AppsecWafExclusionFilter(String name, AppsecWafExclusionFilterArgs args)
public AppsecWafExclusionFilter(String name, AppsecWafExclusionFilterArgs args, CustomResourceOptions options)
type: datadog:AppsecWafExclusionFilter
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AppsecWafExclusionFilterArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AppsecWafExclusionFilterArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AppsecWafExclusionFilterArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AppsecWafExclusionFilterArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AppsecWafExclusionFilterArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var appsecWafExclusionFilterResource = new Datadog.AppsecWafExclusionFilter("appsecWafExclusionFilterResource", new()
{
Description = "string",
Enabled = false,
EventQuery = "string",
IpLists = new[]
{
"string",
},
OnMatch = "string",
Parameters = new[]
{
"string",
},
PathGlob = "string",
RulesTargets = new[]
{
new Datadog.Inputs.AppsecWafExclusionFilterRulesTargetArgs
{
RuleId = "string",
Tags = new Datadog.Inputs.AppsecWafExclusionFilterRulesTargetTagsArgs
{
Category = "string",
Type = "string",
},
},
},
Scopes = new[]
{
new Datadog.Inputs.AppsecWafExclusionFilterScopeArgs
{
Env = "string",
Service = "string",
},
},
});
example, err := datadog.NewAppsecWafExclusionFilter(ctx, "appsecWafExclusionFilterResource", &datadog.AppsecWafExclusionFilterArgs{
Description: pulumi.String("string"),
Enabled: pulumi.Bool(false),
EventQuery: pulumi.String("string"),
IpLists: pulumi.StringArray{
pulumi.String("string"),
},
OnMatch: pulumi.String("string"),
Parameters: pulumi.StringArray{
pulumi.String("string"),
},
PathGlob: pulumi.String("string"),
RulesTargets: datadog.AppsecWafExclusionFilterRulesTargetArray{
&datadog.AppsecWafExclusionFilterRulesTargetArgs{
RuleId: pulumi.String("string"),
Tags: &datadog.AppsecWafExclusionFilterRulesTargetTagsArgs{
Category: pulumi.String("string"),
Type: pulumi.String("string"),
},
},
},
Scopes: datadog.AppsecWafExclusionFilterScopeArray{
&datadog.AppsecWafExclusionFilterScopeArgs{
Env: pulumi.String("string"),
Service: pulumi.String("string"),
},
},
})
var appsecWafExclusionFilterResource = new AppsecWafExclusionFilter("appsecWafExclusionFilterResource", AppsecWafExclusionFilterArgs.builder()
.description("string")
.enabled(false)
.eventQuery("string")
.ipLists("string")
.onMatch("string")
.parameters("string")
.pathGlob("string")
.rulesTargets(AppsecWafExclusionFilterRulesTargetArgs.builder()
.ruleId("string")
.tags(AppsecWafExclusionFilterRulesTargetTagsArgs.builder()
.category("string")
.type("string")
.build())
.build())
.scopes(AppsecWafExclusionFilterScopeArgs.builder()
.env("string")
.service("string")
.build())
.build());
appsec_waf_exclusion_filter_resource = datadog.AppsecWafExclusionFilter("appsecWafExclusionFilterResource",
description="string",
enabled=False,
event_query="string",
ip_lists=["string"],
on_match="string",
parameters=["string"],
path_glob="string",
rules_targets=[{
"rule_id": "string",
"tags": {
"category": "string",
"type": "string",
},
}],
scopes=[{
"env": "string",
"service": "string",
}])
const appsecWafExclusionFilterResource = new datadog.AppsecWafExclusionFilter("appsecWafExclusionFilterResource", {
description: "string",
enabled: false,
eventQuery: "string",
ipLists: ["string"],
onMatch: "string",
parameters: ["string"],
pathGlob: "string",
rulesTargets: [{
ruleId: "string",
tags: {
category: "string",
type: "string",
},
}],
scopes: [{
env: "string",
service: "string",
}],
});
type: datadog:AppsecWafExclusionFilter
properties:
description: string
enabled: false
eventQuery: string
ipLists:
- string
onMatch: string
parameters:
- string
pathGlob: string
rulesTargets:
- ruleId: string
tags:
category: string
type: string
scopes:
- env: string
service: string
AppsecWafExclusionFilter Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AppsecWafExclusionFilter resource accepts the following input properties:
- Description string
- A description for the exclusion filter.
- Enabled bool
- Indicates whether the exclusion filter is enabled.
- Event
Query string - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- Ip
Lists List<string> - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- On
Match string - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - Parameters List<string>
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- Path
Glob string - The HTTP path glob expression matched by the exclusion filter.
- Rules
Targets List<AppsecWaf Exclusion Filter Rules Target> - Scopes
List<Appsec
Waf Exclusion Filter Scope>
- Description string
- A description for the exclusion filter.
- Enabled bool
- Indicates whether the exclusion filter is enabled.
- Event
Query string - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- Ip
Lists []string - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- On
Match string - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - Parameters []string
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- Path
Glob string - The HTTP path glob expression matched by the exclusion filter.
- Rules
Targets []AppsecWaf Exclusion Filter Rules Target Args - Scopes
[]Appsec
Waf Exclusion Filter Scope Args
- description String
- A description for the exclusion filter.
- enabled Boolean
- Indicates whether the exclusion filter is enabled.
- event
Query String - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip
Lists List<String> - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on
Match String - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters List<String>
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path
Glob String - The HTTP path glob expression matched by the exclusion filter.
- rules
Targets List<AppsecWaf Exclusion Filter Rules Target> - scopes
List<Appsec
Waf Exclusion Filter Scope>
- description string
- A description for the exclusion filter.
- enabled boolean
- Indicates whether the exclusion filter is enabled.
- event
Query string - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip
Lists string[] - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on
Match string - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters string[]
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path
Glob string - The HTTP path glob expression matched by the exclusion filter.
- rules
Targets AppsecWaf Exclusion Filter Rules Target[] - scopes
Appsec
Waf Exclusion Filter Scope[]
- description str
- A description for the exclusion filter.
- enabled bool
- Indicates whether the exclusion filter is enabled.
- event_
query str - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip_
lists Sequence[str] - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on_
match str - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters Sequence[str]
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path_
glob str - The HTTP path glob expression matched by the exclusion filter.
- rules_
targets Sequence[AppsecWaf Exclusion Filter Rules Target Args] - scopes
Sequence[Appsec
Waf Exclusion Filter Scope Args]
- description String
- A description for the exclusion filter.
- enabled Boolean
- Indicates whether the exclusion filter is enabled.
- event
Query String - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip
Lists List<String> - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on
Match String - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters List<String>
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path
Glob String - The HTTP path glob expression matched by the exclusion filter.
- rules
Targets List<Property Map> - scopes List<Property Map>
Outputs
All input properties are implicitly available as output properties. Additionally, the AppsecWafExclusionFilter resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing AppsecWafExclusionFilter Resource
Get an existing AppsecWafExclusionFilter resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AppsecWafExclusionFilterState, opts?: CustomResourceOptions): AppsecWafExclusionFilter
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
description: Optional[str] = None,
enabled: Optional[bool] = None,
event_query: Optional[str] = None,
ip_lists: Optional[Sequence[str]] = None,
on_match: Optional[str] = None,
parameters: Optional[Sequence[str]] = None,
path_glob: Optional[str] = None,
rules_targets: Optional[Sequence[AppsecWafExclusionFilterRulesTargetArgs]] = None,
scopes: Optional[Sequence[AppsecWafExclusionFilterScopeArgs]] = None) -> AppsecWafExclusionFilter
func GetAppsecWafExclusionFilter(ctx *Context, name string, id IDInput, state *AppsecWafExclusionFilterState, opts ...ResourceOption) (*AppsecWafExclusionFilter, error)
public static AppsecWafExclusionFilter Get(string name, Input<string> id, AppsecWafExclusionFilterState? state, CustomResourceOptions? opts = null)
public static AppsecWafExclusionFilter get(String name, Output<String> id, AppsecWafExclusionFilterState state, CustomResourceOptions options)
resources: _: type: datadog:AppsecWafExclusionFilter get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Description string
- A description for the exclusion filter.
- Enabled bool
- Indicates whether the exclusion filter is enabled.
- Event
Query string - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- Ip
Lists List<string> - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- On
Match string - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - Parameters List<string>
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- Path
Glob string - The HTTP path glob expression matched by the exclusion filter.
- Rules
Targets List<AppsecWaf Exclusion Filter Rules Target> - Scopes
List<Appsec
Waf Exclusion Filter Scope>
- Description string
- A description for the exclusion filter.
- Enabled bool
- Indicates whether the exclusion filter is enabled.
- Event
Query string - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- Ip
Lists []string - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- On
Match string - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - Parameters []string
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- Path
Glob string - The HTTP path glob expression matched by the exclusion filter.
- Rules
Targets []AppsecWaf Exclusion Filter Rules Target Args - Scopes
[]Appsec
Waf Exclusion Filter Scope Args
- description String
- A description for the exclusion filter.
- enabled Boolean
- Indicates whether the exclusion filter is enabled.
- event
Query String - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip
Lists List<String> - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on
Match String - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters List<String>
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path
Glob String - The HTTP path glob expression matched by the exclusion filter.
- rules
Targets List<AppsecWaf Exclusion Filter Rules Target> - scopes
List<Appsec
Waf Exclusion Filter Scope>
- description string
- A description for the exclusion filter.
- enabled boolean
- Indicates whether the exclusion filter is enabled.
- event
Query string - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip
Lists string[] - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on
Match string - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters string[]
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path
Glob string - The HTTP path glob expression matched by the exclusion filter.
- rules
Targets AppsecWaf Exclusion Filter Rules Target[] - scopes
Appsec
Waf Exclusion Filter Scope[]
- description str
- A description for the exclusion filter.
- enabled bool
- Indicates whether the exclusion filter is enabled.
- event_
query str - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip_
lists Sequence[str] - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on_
match str - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters Sequence[str]
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path_
glob str - The HTTP path glob expression matched by the exclusion filter.
- rules_
targets Sequence[AppsecWaf Exclusion Filter Rules Target Args] - scopes
Sequence[Appsec
Waf Exclusion Filter Scope Args]
- description String
- A description for the exclusion filter.
- enabled Boolean
- Indicates whether the exclusion filter is enabled.
- event
Query String - The event query matched by the legacy exclusion filter. Cannot be created nor updated.
- ip
Lists List<String> - The client IP addresses matched by the exclusion filter (CIDR notation is supported).
- on
Match String - The action taken when the exclusion filter matches. When set to
monitor
, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked. - parameters List<String>
- A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
- path
Glob String - The HTTP path glob expression matched by the exclusion filter.
- rules
Targets List<Property Map> - scopes List<Property Map>
Supporting Types
AppsecWafExclusionFilterRulesTarget, AppsecWafExclusionFilterRulesTargetArgs
- Rule
Id string - Target a single WAF rule based on its identifier.
- Appsec
Waf Exclusion Filter Rules Target Tags
- Rule
Id string - Target a single WAF rule based on its identifier.
- Appsec
Waf Exclusion Filter Rules Target Tags
- rule
Id String - Target a single WAF rule based on its identifier.
- Appsec
Waf Exclusion Filter Rules Target Tags
- rule
Id string - Target a single WAF rule based on its identifier.
- Appsec
Waf Exclusion Filter Rules Target Tags
- rule_
id str - Target a single WAF rule based on its identifier.
- Appsec
Waf Exclusion Filter Rules Target Tags
- rule
Id String - Target a single WAF rule based on its identifier.
- Property Map
AppsecWafExclusionFilterRulesTargetTags, AppsecWafExclusionFilterRulesTargetTagsArgs
AppsecWafExclusionFilterScope, AppsecWafExclusionFilterScopeArgs
Import
$ pulumi import datadog:index/appsecWafExclusionFilter:AppsecWafExclusionFilter passlist_entry "45b7032f-0ac4-4b2f-9118-363523c625f6"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Datadog pulumi/pulumi-datadog
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
datadog
Terraform Provider.