Google Cloud Classic v7.29.0 published on Wednesday, Jun 26, 2024 by Pulumi
gcp.compute.getSecurityPolicy
Explore with Pulumi AI
To get more information about Google Compute Security Policy, see:
- API documentation
- How-to Guides
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as gcp from "@pulumi/gcp";
const sp1 = gcp.compute.getSecurityPolicy({
name: "my-policy",
project: "my-project",
});
const sp2 = gcp.compute.getSecurityPolicy({
selfLink: "https://www.googleapis.com/compute/v1/projects/my-project/global/securityPolicies/my-policy",
});
import pulumi
import pulumi_gcp as gcp
sp1 = gcp.compute.get_security_policy(name="my-policy",
project="my-project")
sp2 = gcp.compute.get_security_policy(self_link="https://www.googleapis.com/compute/v1/projects/my-project/global/securityPolicies/my-policy")
package main
import (
"github.com/pulumi/pulumi-gcp/sdk/v7/go/gcp/compute"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := compute.LookupSecurityPolicy(ctx, &compute.LookupSecurityPolicyArgs{
Name: pulumi.StringRef("my-policy"),
Project: pulumi.StringRef("my-project"),
}, nil)
if err != nil {
return err
}
_, err = compute.LookupSecurityPolicy(ctx, &compute.LookupSecurityPolicyArgs{
SelfLink: pulumi.StringRef("https://www.googleapis.com/compute/v1/projects/my-project/global/securityPolicies/my-policy"),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Gcp = Pulumi.Gcp;
return await Deployment.RunAsync(() =>
{
var sp1 = Gcp.Compute.GetSecurityPolicy.Invoke(new()
{
Name = "my-policy",
Project = "my-project",
});
var sp2 = Gcp.Compute.GetSecurityPolicy.Invoke(new()
{
SelfLink = "https://www.googleapis.com/compute/v1/projects/my-project/global/securityPolicies/my-policy",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.ComputeFunctions;
import com.pulumi.gcp.compute.inputs.GetSecurityPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var sp1 = ComputeFunctions.getSecurityPolicy(GetSecurityPolicyArgs.builder()
.name("my-policy")
.project("my-project")
.build());
final var sp2 = ComputeFunctions.getSecurityPolicy(GetSecurityPolicyArgs.builder()
.selfLink("https://www.googleapis.com/compute/v1/projects/my-project/global/securityPolicies/my-policy")
.build());
}
}
variables:
sp1:
fn::invoke:
Function: gcp:compute:getSecurityPolicy
Arguments:
name: my-policy
project: my-project
sp2:
fn::invoke:
Function: gcp:compute:getSecurityPolicy
Arguments:
selfLink: https://www.googleapis.com/compute/v1/projects/my-project/global/securityPolicies/my-policy
Using getSecurityPolicy
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSecurityPolicy(args: GetSecurityPolicyArgs, opts?: InvokeOptions): Promise<GetSecurityPolicyResult>
function getSecurityPolicyOutput(args: GetSecurityPolicyOutputArgs, opts?: InvokeOptions): Output<GetSecurityPolicyResult>
def get_security_policy(name: Optional[str] = None,
project: Optional[str] = None,
self_link: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSecurityPolicyResult
def get_security_policy_output(name: Optional[pulumi.Input[str]] = None,
project: Optional[pulumi.Input[str]] = None,
self_link: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSecurityPolicyResult]
func LookupSecurityPolicy(ctx *Context, args *LookupSecurityPolicyArgs, opts ...InvokeOption) (*LookupSecurityPolicyResult, error)
func LookupSecurityPolicyOutput(ctx *Context, args *LookupSecurityPolicyOutputArgs, opts ...InvokeOption) LookupSecurityPolicyResultOutput
> Note: This function is named LookupSecurityPolicy
in the Go SDK.
public static class GetSecurityPolicy
{
public static Task<GetSecurityPolicyResult> InvokeAsync(GetSecurityPolicyArgs args, InvokeOptions? opts = null)
public static Output<GetSecurityPolicyResult> Invoke(GetSecurityPolicyInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetSecurityPolicyResult> getSecurityPolicy(GetSecurityPolicyArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: gcp:compute/getSecurityPolicy:getSecurityPolicy
arguments:
# arguments dictionary
The following arguments are supported:
getSecurityPolicy Result
The following output properties are available:
- Adaptive
Protection List<GetConfigs Security Policy Adaptive Protection Config> - Advanced
Options List<GetConfigs Security Policy Advanced Options Config> - Description string
- Fingerprint string
- Id string
- The provider-assigned unique ID for this managed resource.
- Recaptcha
Options List<GetConfigs Security Policy Recaptcha Options Config> - Rules
List<Get
Security Policy Rule> - Type string
- Name string
- Project string
- Self
Link string
- Adaptive
Protection []GetConfigs Security Policy Adaptive Protection Config - Advanced
Options []GetConfigs Security Policy Advanced Options Config - Description string
- Fingerprint string
- Id string
- The provider-assigned unique ID for this managed resource.
- Recaptcha
Options []GetConfigs Security Policy Recaptcha Options Config - Rules
[]Get
Security Policy Rule Type - Type string
- Name string
- Project string
- Self
Link string
- adaptive
Protection List<GetConfigs Security Policy Adaptive Protection Config> - advanced
Options List<GetConfigs Security Policy Advanced Options Config> - description String
- fingerprint String
- id String
- The provider-assigned unique ID for this managed resource.
- recaptcha
Options List<GetConfigs Security Policy Recaptcha Options Config> - rules
List<Get
Security Policy Rule> - type String
- name String
- project String
- self
Link String
- adaptive
Protection GetConfigs Security Policy Adaptive Protection Config[] - advanced
Options GetConfigs Security Policy Advanced Options Config[] - description string
- fingerprint string
- id string
- The provider-assigned unique ID for this managed resource.
- recaptcha
Options GetConfigs Security Policy Recaptcha Options Config[] - rules
Get
Security Policy Rule[] - type string
- name string
- project string
- self
Link string
- adaptive_
protection_ Sequence[Getconfigs Security Policy Adaptive Protection Config] - advanced_
options_ Sequence[Getconfigs Security Policy Advanced Options Config] - description str
- fingerprint str
- id str
- The provider-assigned unique ID for this managed resource.
- recaptcha_
options_ Sequence[Getconfigs Security Policy Recaptcha Options Config] - rules
Sequence[Get
Security Policy Rule] - type str
- name str
- project str
- self_
link str
- adaptive
Protection List<Property Map>Configs - advanced
Options List<Property Map>Configs - description String
- fingerprint String
- id String
- The provider-assigned unique ID for this managed resource.
- recaptcha
Options List<Property Map>Configs - rules List<Property Map>
- type String
- name String
- project String
- self
Link String
Supporting Types
GetSecurityPolicyAdaptiveProtectionConfig
- Auto
Deploy List<GetConfigs Security Policy Adaptive Protection Config Auto Deploy Config> - Auto Deploy Config of this security policy
- Layer7Ddos
Defense List<GetConfigs Security Policy Adaptive Protection Config Layer7Ddos Defense Config> - Layer 7 DDoS Defense Config of this security policy
- Auto
Deploy []GetConfigs Security Policy Adaptive Protection Config Auto Deploy Config - Auto Deploy Config of this security policy
- Layer7Ddos
Defense []GetConfigs Security Policy Adaptive Protection Config Layer7Ddos Defense Config - Layer 7 DDoS Defense Config of this security policy
- auto
Deploy List<GetConfigs Security Policy Adaptive Protection Config Auto Deploy Config> - Auto Deploy Config of this security policy
- layer7Ddos
Defense List<GetConfigs Security Policy Adaptive Protection Config Layer7Ddos Defense Config> - Layer 7 DDoS Defense Config of this security policy
- auto
Deploy GetConfigs Security Policy Adaptive Protection Config Auto Deploy Config[] - Auto Deploy Config of this security policy
- layer7Ddos
Defense GetConfigs Security Policy Adaptive Protection Config Layer7Ddos Defense Config[] - Layer 7 DDoS Defense Config of this security policy
- auto_
deploy_ Sequence[Getconfigs Security Policy Adaptive Protection Config Auto Deploy Config] - Auto Deploy Config of this security policy
- layer7_
ddos_ Sequence[Getdefense_ configs Security Policy Adaptive Protection Config Layer7Ddos Defense Config] - Layer 7 DDoS Defense Config of this security policy
- auto
Deploy List<Property Map>Configs - Auto Deploy Config of this security policy
- layer7Ddos
Defense List<Property Map>Configs - Layer 7 DDoS Defense Config of this security policy
GetSecurityPolicyAdaptiveProtectionConfigAutoDeployConfig
- Confidence
Threshold double - Rules are only automatically deployed for alerts on potential attacks with confidence scores greater than this threshold.
- Expiration
Sec int - Google Cloud Armor stops applying the action in the automatically deployed rule to an identified attacker after this duration. The rule continues to operate against new requests.
- Impacted
Baseline doubleThreshold - Rules are only automatically deployed when the estimated impact to baseline traffic from the suggested mitigation is below this threshold.
- Load
Threshold double - Identifies new attackers only when the load to the backend service that is under attack exceeds this threshold.
- Confidence
Threshold float64 - Rules are only automatically deployed for alerts on potential attacks with confidence scores greater than this threshold.
- Expiration
Sec int - Google Cloud Armor stops applying the action in the automatically deployed rule to an identified attacker after this duration. The rule continues to operate against new requests.
- Impacted
Baseline float64Threshold - Rules are only automatically deployed when the estimated impact to baseline traffic from the suggested mitigation is below this threshold.
- Load
Threshold float64 - Identifies new attackers only when the load to the backend service that is under attack exceeds this threshold.
- confidence
Threshold Double - Rules are only automatically deployed for alerts on potential attacks with confidence scores greater than this threshold.
- expiration
Sec Integer - Google Cloud Armor stops applying the action in the automatically deployed rule to an identified attacker after this duration. The rule continues to operate against new requests.
- impacted
Baseline DoubleThreshold - Rules are only automatically deployed when the estimated impact to baseline traffic from the suggested mitigation is below this threshold.
- load
Threshold Double - Identifies new attackers only when the load to the backend service that is under attack exceeds this threshold.
- confidence
Threshold number - Rules are only automatically deployed for alerts on potential attacks with confidence scores greater than this threshold.
- expiration
Sec number - Google Cloud Armor stops applying the action in the automatically deployed rule to an identified attacker after this duration. The rule continues to operate against new requests.
- impacted
Baseline numberThreshold - Rules are only automatically deployed when the estimated impact to baseline traffic from the suggested mitigation is below this threshold.
- load
Threshold number - Identifies new attackers only when the load to the backend service that is under attack exceeds this threshold.
- confidence_
threshold float - Rules are only automatically deployed for alerts on potential attacks with confidence scores greater than this threshold.
- expiration_
sec int - Google Cloud Armor stops applying the action in the automatically deployed rule to an identified attacker after this duration. The rule continues to operate against new requests.
- impacted_
baseline_ floatthreshold - Rules are only automatically deployed when the estimated impact to baseline traffic from the suggested mitigation is below this threshold.
- load_
threshold float - Identifies new attackers only when the load to the backend service that is under attack exceeds this threshold.
- confidence
Threshold Number - Rules are only automatically deployed for alerts on potential attacks with confidence scores greater than this threshold.
- expiration
Sec Number - Google Cloud Armor stops applying the action in the automatically deployed rule to an identified attacker after this duration. The rule continues to operate against new requests.
- impacted
Baseline NumberThreshold - Rules are only automatically deployed when the estimated impact to baseline traffic from the suggested mitigation is below this threshold.
- load
Threshold Number - Identifies new attackers only when the load to the backend service that is under attack exceeds this threshold.
GetSecurityPolicyAdaptiveProtectionConfigLayer7DdosDefenseConfig
- Enable bool
- If set to true, enables CAAP for L7 DDoS detection.
- Rule
Visibility string - Rule visibility. Supported values include: "STANDARD", "PREMIUM".
- Enable bool
- If set to true, enables CAAP for L7 DDoS detection.
- Rule
Visibility string - Rule visibility. Supported values include: "STANDARD", "PREMIUM".
- enable Boolean
- If set to true, enables CAAP for L7 DDoS detection.
- rule
Visibility String - Rule visibility. Supported values include: "STANDARD", "PREMIUM".
- enable boolean
- If set to true, enables CAAP for L7 DDoS detection.
- rule
Visibility string - Rule visibility. Supported values include: "STANDARD", "PREMIUM".
- enable bool
- If set to true, enables CAAP for L7 DDoS detection.
- rule_
visibility str - Rule visibility. Supported values include: "STANDARD", "PREMIUM".
- enable Boolean
- If set to true, enables CAAP for L7 DDoS detection.
- rule
Visibility String - Rule visibility. Supported values include: "STANDARD", "PREMIUM".
GetSecurityPolicyAdvancedOptionsConfig
- Json
Custom List<GetConfigs Security Policy Advanced Options Config Json Custom Config> - Custom configuration to apply the JSON parsing. Only applicable when JSON parsing is set to STANDARD.
- Json
Parsing string - JSON body parsing. Supported values include: "DISABLED", "STANDARD".
- Log
Level string - Logging level. Supported values include: "NORMAL", "VERBOSE".
- User
Ip List<string>Request Headers - An optional list of case-insensitive request header names to use for resolving the callers client IP address.
- Json
Custom []GetConfigs Security Policy Advanced Options Config Json Custom Config - Custom configuration to apply the JSON parsing. Only applicable when JSON parsing is set to STANDARD.
- Json
Parsing string - JSON body parsing. Supported values include: "DISABLED", "STANDARD".
- Log
Level string - Logging level. Supported values include: "NORMAL", "VERBOSE".
- User
Ip []stringRequest Headers - An optional list of case-insensitive request header names to use for resolving the callers client IP address.
- json
Custom List<GetConfigs Security Policy Advanced Options Config Json Custom Config> - Custom configuration to apply the JSON parsing. Only applicable when JSON parsing is set to STANDARD.
- json
Parsing String - JSON body parsing. Supported values include: "DISABLED", "STANDARD".
- log
Level String - Logging level. Supported values include: "NORMAL", "VERBOSE".
- user
Ip List<String>Request Headers - An optional list of case-insensitive request header names to use for resolving the callers client IP address.
- json
Custom GetConfigs Security Policy Advanced Options Config Json Custom Config[] - Custom configuration to apply the JSON parsing. Only applicable when JSON parsing is set to STANDARD.
- json
Parsing string - JSON body parsing. Supported values include: "DISABLED", "STANDARD".
- log
Level string - Logging level. Supported values include: "NORMAL", "VERBOSE".
- user
Ip string[]Request Headers - An optional list of case-insensitive request header names to use for resolving the callers client IP address.
- json_
custom_ Sequence[Getconfigs Security Policy Advanced Options Config Json Custom Config] - Custom configuration to apply the JSON parsing. Only applicable when JSON parsing is set to STANDARD.
- json_
parsing str - JSON body parsing. Supported values include: "DISABLED", "STANDARD".
- log_
level str - Logging level. Supported values include: "NORMAL", "VERBOSE".
- user_
ip_ Sequence[str]request_ headers - An optional list of case-insensitive request header names to use for resolving the callers client IP address.
- json
Custom List<Property Map>Configs - Custom configuration to apply the JSON parsing. Only applicable when JSON parsing is set to STANDARD.
- json
Parsing String - JSON body parsing. Supported values include: "DISABLED", "STANDARD".
- log
Level String - Logging level. Supported values include: "NORMAL", "VERBOSE".
- user
Ip List<String>Request Headers - An optional list of case-insensitive request header names to use for resolving the callers client IP address.
GetSecurityPolicyAdvancedOptionsConfigJsonCustomConfig
- Content
Types List<string> - A list of custom Content-Type header values to apply the JSON parsing.
- Content
Types []string - A list of custom Content-Type header values to apply the JSON parsing.
- content
Types List<String> - A list of custom Content-Type header values to apply the JSON parsing.
- content
Types string[] - A list of custom Content-Type header values to apply the JSON parsing.
- content_
types Sequence[str] - A list of custom Content-Type header values to apply the JSON parsing.
- content
Types List<String> - A list of custom Content-Type header values to apply the JSON parsing.
GetSecurityPolicyRecaptchaOptionsConfig
- Redirect
Site stringKey - A field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- Redirect
Site stringKey - A field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect
Site StringKey - A field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect
Site stringKey - A field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect_
site_ strkey - A field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
- redirect
Site StringKey - A field to supply a reCAPTCHA site key to be used for all the rules using the redirect action with the type of GOOGLE_RECAPTCHA under the security policy. The specified site key needs to be created from the reCAPTCHA API. The user is responsible for the validity of the specified site key. If not specified, a Google-managed site key is used.
GetSecurityPolicyRule
- Action string
- Action to take when match matches the request.
- Description string
- An optional description of this rule. Max size is 64.
- Header
Actions List<GetSecurity Policy Rule Header Action> - Additional actions that are performed on headers.
- Matches
List<Get
Security Policy Rule Match> - A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding action is enforced.
- Preconfigured
Waf List<GetConfigs Security Policy Rule Preconfigured Waf Config> - Preconfigured WAF configuration to be applied for the rule. If the rule does not evaluate preconfigured WAF rules, i.e., if evaluatePreconfiguredWaf() is not used, this field will have no effect.
- Preview bool
- When set to true, the action specified above is not enforced. Stackdriver logs for requests that trigger a preview action are annotated as such.
- Priority int
- An unique positive integer indicating the priority of evaluation for a rule. Rules are evaluated from highest priority (lowest numerically) to lowest priority (highest numerically) in order.
- Rate
Limit List<GetOptions Security Policy Rule Rate Limit Option> - Rate limit threshold for this security policy. Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- Redirect
Options List<GetSecurity Policy Rule Redirect Option> - Parameters defining the redirect action. Cannot be specified for any other actions.
- Action string
- Action to take when match matches the request.
- Description string
- An optional description of this rule. Max size is 64.
- Header
Actions []GetSecurity Policy Rule Header Action - Additional actions that are performed on headers.
- Matches
[]Get
Security Policy Rule Match - A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding action is enforced.
- Preconfigured
Waf []GetConfigs Security Policy Rule Preconfigured Waf Config - Preconfigured WAF configuration to be applied for the rule. If the rule does not evaluate preconfigured WAF rules, i.e., if evaluatePreconfiguredWaf() is not used, this field will have no effect.
- Preview bool
- When set to true, the action specified above is not enforced. Stackdriver logs for requests that trigger a preview action are annotated as such.
- Priority int
- An unique positive integer indicating the priority of evaluation for a rule. Rules are evaluated from highest priority (lowest numerically) to lowest priority (highest numerically) in order.
- Rate
Limit []GetOptions Security Policy Rule Rate Limit Option - Rate limit threshold for this security policy. Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- Redirect
Options []GetSecurity Policy Rule Redirect Option - Parameters defining the redirect action. Cannot be specified for any other actions.
- action String
- Action to take when match matches the request.
- description String
- An optional description of this rule. Max size is 64.
- header
Actions List<GetSecurity Policy Rule Header Action> - Additional actions that are performed on headers.
- matches
List<Get
Security Policy Rule Match> - A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding action is enforced.
- preconfigured
Waf List<GetConfigs Security Policy Rule Preconfigured Waf Config> - Preconfigured WAF configuration to be applied for the rule. If the rule does not evaluate preconfigured WAF rules, i.e., if evaluatePreconfiguredWaf() is not used, this field will have no effect.
- preview Boolean
- When set to true, the action specified above is not enforced. Stackdriver logs for requests that trigger a preview action are annotated as such.
- priority Integer
- An unique positive integer indicating the priority of evaluation for a rule. Rules are evaluated from highest priority (lowest numerically) to lowest priority (highest numerically) in order.
- rate
Limit List<GetOptions Security Policy Rule Rate Limit Option> - Rate limit threshold for this security policy. Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect
Options List<GetSecurity Policy Rule Redirect Option> - Parameters defining the redirect action. Cannot be specified for any other actions.
- action string
- Action to take when match matches the request.
- description string
- An optional description of this rule. Max size is 64.
- header
Actions GetSecurity Policy Rule Header Action[] - Additional actions that are performed on headers.
- matches
Get
Security Policy Rule Match[] - A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding action is enforced.
- preconfigured
Waf GetConfigs Security Policy Rule Preconfigured Waf Config[] - Preconfigured WAF configuration to be applied for the rule. If the rule does not evaluate preconfigured WAF rules, i.e., if evaluatePreconfiguredWaf() is not used, this field will have no effect.
- preview boolean
- When set to true, the action specified above is not enforced. Stackdriver logs for requests that trigger a preview action are annotated as such.
- priority number
- An unique positive integer indicating the priority of evaluation for a rule. Rules are evaluated from highest priority (lowest numerically) to lowest priority (highest numerically) in order.
- rate
Limit GetOptions Security Policy Rule Rate Limit Option[] - Rate limit threshold for this security policy. Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect
Options GetSecurity Policy Rule Redirect Option[] - Parameters defining the redirect action. Cannot be specified for any other actions.
- action str
- Action to take when match matches the request.
- description str
- An optional description of this rule. Max size is 64.
- header_
actions Sequence[GetSecurity Policy Rule Header Action] - Additional actions that are performed on headers.
- matches
Sequence[Get
Security Policy Rule Match] - A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding action is enforced.
- preconfigured_
waf_ Sequence[Getconfigs Security Policy Rule Preconfigured Waf Config] - Preconfigured WAF configuration to be applied for the rule. If the rule does not evaluate preconfigured WAF rules, i.e., if evaluatePreconfiguredWaf() is not used, this field will have no effect.
- preview bool
- When set to true, the action specified above is not enforced. Stackdriver logs for requests that trigger a preview action are annotated as such.
- priority int
- An unique positive integer indicating the priority of evaluation for a rule. Rules are evaluated from highest priority (lowest numerically) to lowest priority (highest numerically) in order.
- rate_
limit_ Sequence[Getoptions Security Policy Rule Rate Limit Option] - Rate limit threshold for this security policy. Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect_
options Sequence[GetSecurity Policy Rule Redirect Option] - Parameters defining the redirect action. Cannot be specified for any other actions.
- action String
- Action to take when match matches the request.
- description String
- An optional description of this rule. Max size is 64.
- header
Actions List<Property Map> - Additional actions that are performed on headers.
- matches List<Property Map>
- A match condition that incoming traffic is evaluated against. If it evaluates to true, the corresponding action is enforced.
- preconfigured
Waf List<Property Map>Configs - Preconfigured WAF configuration to be applied for the rule. If the rule does not evaluate preconfigured WAF rules, i.e., if evaluatePreconfiguredWaf() is not used, this field will have no effect.
- preview Boolean
- When set to true, the action specified above is not enforced. Stackdriver logs for requests that trigger a preview action are annotated as such.
- priority Number
- An unique positive integer indicating the priority of evaluation for a rule. Rules are evaluated from highest priority (lowest numerically) to lowest priority (highest numerically) in order.
- rate
Limit List<Property Map>Options - Rate limit threshold for this security policy. Must be specified if the action is "rate_based_ban" or "throttle". Cannot be specified for any other actions.
- redirect
Options List<Property Map> - Parameters defining the redirect action. Cannot be specified for any other actions.
GetSecurityPolicyRuleHeaderAction
- Request
Headers List<GetTo Adds Security Policy Rule Header Action Request Headers To Add> - The list of request headers to add or overwrite if they're already present.
- Request
Headers []GetTo Adds Security Policy Rule Header Action Request Headers To Add - The list of request headers to add or overwrite if they're already present.
- request
Headers List<GetTo Adds Security Policy Rule Header Action Request Headers To Add> - The list of request headers to add or overwrite if they're already present.
- request
Headers GetTo Adds Security Policy Rule Header Action Request Headers To Add[] - The list of request headers to add or overwrite if they're already present.
- request_
headers_ Sequence[Getto_ adds Security Policy Rule Header Action Request Headers To Add] - The list of request headers to add or overwrite if they're already present.
- request
Headers List<Property Map>To Adds - The list of request headers to add or overwrite if they're already present.
GetSecurityPolicyRuleHeaderActionRequestHeadersToAdd
- Header
Name string - The name of the header to set.
- Header
Value string - The value to set the named header to.
- Header
Name string - The name of the header to set.
- Header
Value string - The value to set the named header to.
- header
Name String - The name of the header to set.
- header
Value String - The value to set the named header to.
- header
Name string - The name of the header to set.
- header
Value string - The value to set the named header to.
- header_
name str - The name of the header to set.
- header_
value str - The value to set the named header to.
- header
Name String - The name of the header to set.
- header
Value String - The value to set the named header to.
GetSecurityPolicyRuleMatch
- Configs
List<Get
Security Policy Rule Match Config> - The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- Expr
Options List<GetSecurity Policy Rule Match Expr Option> - The configuration options available when specifying a user defined CEVAL expression (i.e., 'expr').
- Exprs
List<Get
Security Policy Rule Match Expr> - User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- Versioned
Expr string - Predefined rule expression. If this field is specified, config must also be specified. Available options: SRC_IPS_V1: Must specify the corresponding src_ip_ranges field in config.
- Configs
[]Get
Security Policy Rule Match Config - The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- Expr
Options []GetSecurity Policy Rule Match Expr Option - The configuration options available when specifying a user defined CEVAL expression (i.e., 'expr').
- Exprs
[]Get
Security Policy Rule Match Expr - User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- Versioned
Expr string - Predefined rule expression. If this field is specified, config must also be specified. Available options: SRC_IPS_V1: Must specify the corresponding src_ip_ranges field in config.
- configs
List<Get
Security Policy Rule Match Config> - The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr
Options List<GetSecurity Policy Rule Match Expr Option> - The configuration options available when specifying a user defined CEVAL expression (i.e., 'expr').
- exprs
List<Get
Security Policy Rule Match Expr> - User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned
Expr String - Predefined rule expression. If this field is specified, config must also be specified. Available options: SRC_IPS_V1: Must specify the corresponding src_ip_ranges field in config.
- configs
Get
Security Policy Rule Match Config[] - The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr
Options GetSecurity Policy Rule Match Expr Option[] - The configuration options available when specifying a user defined CEVAL expression (i.e., 'expr').
- exprs
Get
Security Policy Rule Match Expr[] - User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned
Expr string - Predefined rule expression. If this field is specified, config must also be specified. Available options: SRC_IPS_V1: Must specify the corresponding src_ip_ranges field in config.
- configs
Sequence[Get
Security Policy Rule Match Config] - The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr_
options Sequence[GetSecurity Policy Rule Match Expr Option] - The configuration options available when specifying a user defined CEVAL expression (i.e., 'expr').
- exprs
Sequence[Get
Security Policy Rule Match Expr] - User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned_
expr str - Predefined rule expression. If this field is specified, config must also be specified. Available options: SRC_IPS_V1: Must specify the corresponding src_ip_ranges field in config.
- configs List<Property Map>
- The configuration options available when specifying versioned_expr. This field must be specified if versioned_expr is specified and cannot be specified if versioned_expr is not specified.
- expr
Options List<Property Map> - The configuration options available when specifying a user defined CEVAL expression (i.e., 'expr').
- exprs List<Property Map>
- User defined CEVAL expression. A CEVAL expression is used to specify match criteria such as origin.ip, source.region_code and contents in the request header.
- versioned
Expr String - Predefined rule expression. If this field is specified, config must also be specified. Available options: SRC_IPS_V1: Must specify the corresponding src_ip_ranges field in config.
GetSecurityPolicyRuleMatchConfig
- Src
Ip List<string>Ranges - Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).
- Src
Ip []stringRanges - Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).
- src
Ip List<String>Ranges - Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).
- src
Ip string[]Ranges - Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).
- src_
ip_ Sequence[str]ranges - Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).
- src
Ip List<String>Ranges - Set of IP addresses or ranges (IPV4 or IPV6) in CIDR notation to match against inbound traffic. There is a limit of 10 IP ranges per rule. A value of '*' matches all IPs (can be used to override the default behavior).
GetSecurityPolicyRuleMatchExpr
- Expression string
- Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
- Expression string
- Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
- expression String
- Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
- expression string
- Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
- expression str
- Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
- expression String
- Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
GetSecurityPolicyRuleMatchExprOption
- Recaptcha
Options List<GetSecurity Policy Rule Match Expr Option Recaptcha Option> - reCAPTCHA configuration options to be applied for the rule. If the rule does not evaluate reCAPTCHA tokens, this field has no effect.
- Recaptcha
Options []GetSecurity Policy Rule Match Expr Option Recaptcha Option - reCAPTCHA configuration options to be applied for the rule. If the rule does not evaluate reCAPTCHA tokens, this field has no effect.
- recaptcha
Options List<GetSecurity Policy Rule Match Expr Option Recaptcha Option> - reCAPTCHA configuration options to be applied for the rule. If the rule does not evaluate reCAPTCHA tokens, this field has no effect.
- recaptcha
Options GetSecurity Policy Rule Match Expr Option Recaptcha Option[] - reCAPTCHA configuration options to be applied for the rule. If the rule does not evaluate reCAPTCHA tokens, this field has no effect.
- recaptcha_
options Sequence[GetSecurity Policy Rule Match Expr Option Recaptcha Option] - reCAPTCHA configuration options to be applied for the rule. If the rule does not evaluate reCAPTCHA tokens, this field has no effect.
- recaptcha
Options List<Property Map> - reCAPTCHA configuration options to be applied for the rule. If the rule does not evaluate reCAPTCHA tokens, this field has no effect.
GetSecurityPolicyRuleMatchExprOptionRecaptchaOption
- Action
Token List<string>Site Keys - A list of site keys to be used during the validation of reCAPTCHA action-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created
- Session
Token List<string>Site Keys - A list of site keys to be used during the validation of reCAPTCHA session-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created.
- Action
Token []stringSite Keys - A list of site keys to be used during the validation of reCAPTCHA action-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created
- Session
Token []stringSite Keys - A list of site keys to be used during the validation of reCAPTCHA session-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created.
- action
Token List<String>Site Keys - A list of site keys to be used during the validation of reCAPTCHA action-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created
- session
Token List<String>Site Keys - A list of site keys to be used during the validation of reCAPTCHA session-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created.
- action
Token string[]Site Keys - A list of site keys to be used during the validation of reCAPTCHA action-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created
- session
Token string[]Site Keys - A list of site keys to be used during the validation of reCAPTCHA session-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created.
- action_
token_ Sequence[str]site_ keys - A list of site keys to be used during the validation of reCAPTCHA action-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created
- session_
token_ Sequence[str]site_ keys - A list of site keys to be used during the validation of reCAPTCHA session-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created.
- action
Token List<String>Site Keys - A list of site keys to be used during the validation of reCAPTCHA action-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created
- session
Token List<String>Site Keys - A list of site keys to be used during the validation of reCAPTCHA session-tokens. The provided site keys need to be created from reCAPTCHA API under the same project where the security policy is created.
GetSecurityPolicyRulePreconfiguredWafConfig
- Exclusions
List<Get
Security Policy Rule Preconfigured Waf Config Exclusion> - An exclusion to apply during preconfigured WAF evaluation.
- Exclusions
[]Get
Security Policy Rule Preconfigured Waf Config Exclusion - An exclusion to apply during preconfigured WAF evaluation.
- exclusions
List<Get
Security Policy Rule Preconfigured Waf Config Exclusion> - An exclusion to apply during preconfigured WAF evaluation.
- exclusions
Get
Security Policy Rule Preconfigured Waf Config Exclusion[] - An exclusion to apply during preconfigured WAF evaluation.
- exclusions
Sequence[Get
Security Policy Rule Preconfigured Waf Config Exclusion] - An exclusion to apply during preconfigured WAF evaluation.
- exclusions List<Property Map>
- An exclusion to apply during preconfigured WAF evaluation.
GetSecurityPolicyRulePreconfiguredWafConfigExclusion
- List<Get
Security Policy Rule Preconfigured Waf Config Exclusion Request Cooky> - Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
- Request
Headers List<GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Header> - Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
- Request
Query List<GetParams Security Policy Rule Preconfigured Waf Config Exclusion Request Query Param> - Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation. Note that the parameter can be in the query string or in the POST body.
- Request
Uris List<GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Uri> - Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation. When specifying this field, the query or fragment part should be excluded.
- Target
Rule List<string>Ids - A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion. If omitted, it refers to all the rule IDs under the WAF rule set.
- Target
Rule stringSet - Target WAF rule set to apply the preconfigured WAF exclusion.
- []Get
Security Policy Rule Preconfigured Waf Config Exclusion Request Cooky - Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
- Request
Headers []GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Header - Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
- Request
Query []GetParams Security Policy Rule Preconfigured Waf Config Exclusion Request Query Param - Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation. Note that the parameter can be in the query string or in the POST body.
- Request
Uris []GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Uri - Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation. When specifying this field, the query or fragment part should be excluded.
- Target
Rule []stringIds - A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion. If omitted, it refers to all the rule IDs under the WAF rule set.
- Target
Rule stringSet - Target WAF rule set to apply the preconfigured WAF exclusion.
- List<Get
Security Policy Rule Preconfigured Waf Config Exclusion Request Cooky> - Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
- request
Headers List<GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Header> - Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
- request
Query List<GetParams Security Policy Rule Preconfigured Waf Config Exclusion Request Query Param> - Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation. Note that the parameter can be in the query string or in the POST body.
- request
Uris List<GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Uri> - Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation. When specifying this field, the query or fragment part should be excluded.
- target
Rule List<String>Ids - A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion. If omitted, it refers to all the rule IDs under the WAF rule set.
- target
Rule StringSet - Target WAF rule set to apply the preconfigured WAF exclusion.
- Get
Security Policy Rule Preconfigured Waf Config Exclusion Request Cooky[] - Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
- request
Headers GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Header[] - Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
- request
Query GetParams Security Policy Rule Preconfigured Waf Config Exclusion Request Query Param[] - Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation. Note that the parameter can be in the query string or in the POST body.
- request
Uris GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Uri[] - Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation. When specifying this field, the query or fragment part should be excluded.
- target
Rule string[]Ids - A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion. If omitted, it refers to all the rule IDs under the WAF rule set.
- target
Rule stringSet - Target WAF rule set to apply the preconfigured WAF exclusion.
- Sequence[Get
Security Policy Rule Preconfigured Waf Config Exclusion Request Cooky] - Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
- request_
headers Sequence[GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Header] - Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
- request_
query_ Sequence[Getparams Security Policy Rule Preconfigured Waf Config Exclusion Request Query Param] - Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation. Note that the parameter can be in the query string or in the POST body.
- request_
uris Sequence[GetSecurity Policy Rule Preconfigured Waf Config Exclusion Request Uri] - Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation. When specifying this field, the query or fragment part should be excluded.
- target_
rule_ Sequence[str]ids - A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion. If omitted, it refers to all the rule IDs under the WAF rule set.
- target_
rule_ strset - Target WAF rule set to apply the preconfigured WAF exclusion.
- List<Property Map>
- Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
- request
Headers List<Property Map> - Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
- request
Query List<Property Map>Params - Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation. Note that the parameter can be in the query string or in the POST body.
- request
Uris List<Property Map> - Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation. When specifying this field, the query or fragment part should be excluded.
- target
Rule List<String>Ids - A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion. If omitted, it refers to all the rule IDs under the WAF rule set.
- target
Rule StringSet - Target WAF rule set to apply the preconfigured WAF exclusion.
GetSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator str
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value str
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
GetSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator str
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value str
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
GetSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator str
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value str
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
GetSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- Operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- Value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator string
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value string
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator str
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value str
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
- operator String
- You can specify an exact match or a partial match by using a field operator and a field value. Available options: EQUALS: The operator matches if the field value equals the specified value. STARTS_WITH: The operator matches if the field value starts with the specified value. ENDS_WITH: The operator matches if the field value ends with the specified value. CONTAINS: The operator matches if the field value contains the specified value. EQUALS_ANY: The operator matches if the field value is any value.
- value String
- A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation. The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
GetSecurityPolicyRuleRateLimitOption
- Ban
Duration intSec - Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- Ban
Thresholds List<GetSecurity Policy Rule Rate Limit Option Ban Threshold> - Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
- Conform
Action string - Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- Enforce
On stringKey - Determines the key to enforce the rateLimitThreshold on
- Enforce
On List<GetKey Configs Security Policy Rule Rate Limit Option Enforce On Key Config> - Enforce On Key Config of this security policy
- Enforce
On stringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- Exceed
Action string - Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- Exceed
Redirect List<GetOptions Security Policy Rule Rate Limit Option Exceed Redirect Option> - Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- Rate
Limit List<GetThresholds Security Policy Rule Rate Limit Option Rate Limit Threshold> - Threshold at which to begin ratelimiting.
- Ban
Duration intSec - Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- Ban
Thresholds []GetSecurity Policy Rule Rate Limit Option Ban Threshold - Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
- Conform
Action string - Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- Enforce
On stringKey - Determines the key to enforce the rateLimitThreshold on
- Enforce
On []GetKey Configs Security Policy Rule Rate Limit Option Enforce On Key Config - Enforce On Key Config of this security policy
- Enforce
On stringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- Exceed
Action string - Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- Exceed
Redirect []GetOptions Security Policy Rule Rate Limit Option Exceed Redirect Option - Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- Rate
Limit []GetThresholds Security Policy Rule Rate Limit Option Rate Limit Threshold - Threshold at which to begin ratelimiting.
- ban
Duration IntegerSec - Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban
Thresholds List<GetSecurity Policy Rule Rate Limit Option Ban Threshold> - Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
- conform
Action String - Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce
On StringKey - Determines the key to enforce the rateLimitThreshold on
- enforce
On List<GetKey Configs Security Policy Rule Rate Limit Option Enforce On Key Config> - Enforce On Key Config of this security policy
- enforce
On StringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed
Action String - Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed
Redirect List<GetOptions Security Policy Rule Rate Limit Option Exceed Redirect Option> - Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate
Limit List<GetThresholds Security Policy Rule Rate Limit Option Rate Limit Threshold> - Threshold at which to begin ratelimiting.
- ban
Duration numberSec - Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban
Thresholds GetSecurity Policy Rule Rate Limit Option Ban Threshold[] - Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
- conform
Action string - Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce
On stringKey - Determines the key to enforce the rateLimitThreshold on
- enforce
On GetKey Configs Security Policy Rule Rate Limit Option Enforce On Key Config[] - Enforce On Key Config of this security policy
- enforce
On stringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed
Action string - Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed
Redirect GetOptions Security Policy Rule Rate Limit Option Exceed Redirect Option[] - Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate
Limit GetThresholds Security Policy Rule Rate Limit Option Rate Limit Threshold[] - Threshold at which to begin ratelimiting.
- ban_
duration_ intsec - Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban_
thresholds Sequence[GetSecurity Policy Rule Rate Limit Option Ban Threshold] - Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
- conform_
action str - Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce_
on_ strkey - Determines the key to enforce the rateLimitThreshold on
- enforce_
on_ Sequence[Getkey_ configs Security Policy Rule Rate Limit Option Enforce On Key Config] - Enforce On Key Config of this security policy
- enforce_
on_ strkey_ name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed_
action str - Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed_
redirect_ Sequence[Getoptions Security Policy Rule Rate Limit Option Exceed Redirect Option] - Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate_
limit_ Sequence[Getthresholds Security Policy Rule Rate Limit Option Rate Limit Threshold] - Threshold at which to begin ratelimiting.
- ban
Duration NumberSec - Can only be specified if the action for the rule is "rate_based_ban". If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
- ban
Thresholds List<Property Map> - Can only be specified if the action for the rule is "rate_based_ban". If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
- conform
Action String - Action to take for requests that are under the configured rate limit threshold. Valid option is "allow" only.
- enforce
On StringKey - Determines the key to enforce the rateLimitThreshold on
- enforce
On List<Property Map>Key Configs - Enforce On Key Config of this security policy
- enforce
On StringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- exceed
Action String - Action to take for requests that are above the configured rate limit threshold, to either deny with a specified HTTP response code, or redirect to a different endpoint. Valid options are "deny()" where valid values for status are 403, 404, 429, and 502, and "redirect" where the redirect parameters come from exceedRedirectOptions below.
- exceed
Redirect List<Property Map>Options - Parameters defining the redirect action that is used as the exceed action. Cannot be specified if the exceed action is not redirect.
- rate
Limit List<Property Map>Thresholds - Threshold at which to begin ratelimiting.
GetSecurityPolicyRuleRateLimitOptionBanThreshold
- Count int
- Number of HTTP(S) requests for calculating the threshold.
- Interval
Sec int - Interval over which the threshold is computed.
- Count int
- Number of HTTP(S) requests for calculating the threshold.
- Interval
Sec int - Interval over which the threshold is computed.
- count Integer
- Number of HTTP(S) requests for calculating the threshold.
- interval
Sec Integer - Interval over which the threshold is computed.
- count number
- Number of HTTP(S) requests for calculating the threshold.
- interval
Sec number - Interval over which the threshold is computed.
- count int
- Number of HTTP(S) requests for calculating the threshold.
- interval_
sec int - Interval over which the threshold is computed.
- count Number
- Number of HTTP(S) requests for calculating the threshold.
- interval
Sec Number - Interval over which the threshold is computed.
GetSecurityPolicyRuleRateLimitOptionEnforceOnKeyConfig
- Enforce
On stringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- Enforce
On stringKey Type - Determines the key to enforce the rate_limit_threshold on
- Enforce
On stringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- Enforce
On stringKey Type - Determines the key to enforce the rate_limit_threshold on
- enforce
On StringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- enforce
On StringKey Type - Determines the key to enforce the rate_limit_threshold on
- enforce
On stringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- enforce
On stringKey Type - Determines the key to enforce the rate_limit_threshold on
- enforce_
on_ strkey_ name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- enforce_
on_ strkey_ type - Determines the key to enforce the rate_limit_threshold on
- enforce
On StringKey Name - Rate limit key name applicable only for the following key types: HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
- enforce
On StringKey Type - Determines the key to enforce the rate_limit_threshold on
GetSecurityPolicyRuleRateLimitOptionExceedRedirectOption
GetSecurityPolicyRuleRateLimitOptionRateLimitThreshold
- Count int
- Number of HTTP(S) requests for calculating the threshold.
- Interval
Sec int - Interval over which the threshold is computed.
- Count int
- Number of HTTP(S) requests for calculating the threshold.
- Interval
Sec int - Interval over which the threshold is computed.
- count Integer
- Number of HTTP(S) requests for calculating the threshold.
- interval
Sec Integer - Interval over which the threshold is computed.
- count number
- Number of HTTP(S) requests for calculating the threshold.
- interval
Sec number - Interval over which the threshold is computed.
- count int
- Number of HTTP(S) requests for calculating the threshold.
- interval_
sec int - Interval over which the threshold is computed.
- count Number
- Number of HTTP(S) requests for calculating the threshold.
- interval
Sec Number - Interval over which the threshold is computed.
GetSecurityPolicyRuleRedirectOption
- Target string
- Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
- Type string
- Type of the redirect action. Available options: EXTERNAL_302: Must specify the corresponding target field in config. GOOGLE_RECAPTCHA: Cannot specify target field in config.
- Target string
- Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
- Type string
- Type of the redirect action. Available options: EXTERNAL_302: Must specify the corresponding target field in config. GOOGLE_RECAPTCHA: Cannot specify target field in config.
- target String
- Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
- type String
- Type of the redirect action. Available options: EXTERNAL_302: Must specify the corresponding target field in config. GOOGLE_RECAPTCHA: Cannot specify target field in config.
- target string
- Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
- type string
- Type of the redirect action. Available options: EXTERNAL_302: Must specify the corresponding target field in config. GOOGLE_RECAPTCHA: Cannot specify target field in config.
- target str
- Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
- type str
- Type of the redirect action. Available options: EXTERNAL_302: Must specify the corresponding target field in config. GOOGLE_RECAPTCHA: Cannot specify target field in config.
- target String
- Target for the redirect action. This is required if the type is EXTERNAL_302 and cannot be specified for GOOGLE_RECAPTCHA.
- type String
- Type of the redirect action. Available options: EXTERNAL_302: Must specify the corresponding target field in config. GOOGLE_RECAPTCHA: Cannot specify target field in config.
Package Details
- Repository
- Google Cloud (GCP) Classic pulumi/pulumi-gcp
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
google-beta
Terraform Provider.