/AWS1/CL_WAFACTIVATEDRULE¶
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.
For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.
The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete,
the priority of the Rule in the WebACL, and the action that you want AWS WAF to take when a web request matches the Rule
(ALLOW, BLOCK, or COUNT).
To specify whether to insert or delete a Rule, use the Action parameter in the WebACLUpdate data type.
CONSTRUCTOR¶
IMPORTING¶
Required arguments:¶
iv_priority TYPE /AWS1/WAFRULEPRIORITY /AWS1/WAFRULEPRIORITY¶
Specifies the order in which the
Rulesin aWebACLare evaluated. Rules with a lower value forPriorityare evaluated beforeRuleswith a higher value. The value must be a unique integer. If you add multipleRulesto aWebACL, the values don't need to be consecutive.
iv_ruleid TYPE /AWS1/WAFRESOURCEID /AWS1/WAFRESOURCEID¶
The
RuleIdfor aRule. You useRuleIdto get more information about aRule(see GetRule), update aRule(see UpdateRule), insert aRuleinto aWebACLor delete a one from aWebACL(see UpdateWebACL), or delete aRulefrom AWS WAF (see DeleteRule).
RuleIdis returned by CreateRule and by ListRules.
Optional arguments:¶
io_action TYPE REF TO /AWS1/CL_WAFWAFACTION /AWS1/CL_WAFWAFACTION¶
Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the
Rule.
Valid values forActioninclude the following:
ALLOW: CloudFront responds with the requested object.
BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL.
ActivatedRule|OverrideActionapplies only when updating or adding aRuleGroupto aWebACL. In this case, you do not useActivatedRule|Action. For all other update requests,ActivatedRule|Actionis used instead ofActivatedRule|OverrideAction.
io_overrideaction TYPE REF TO /AWS1/CL_WAFWAFOVERRIDEACTION /AWS1/CL_WAFWAFOVERRIDEACTION¶
Use the
OverrideActionto test yourRuleGroup.Any rule in a
RuleGroupcan potentially block a request. If you set theOverrideActiontoNone, theRuleGroupwill block a request if any individual rule in theRuleGroupmatches the request and is configured to block that request. However if you first want to test theRuleGroup, set theOverrideActiontoCount. TheRuleGroupwill then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests.
ActivatedRule|OverrideActionapplies only when updating or adding aRuleGroupto aWebACL. In this case you do not useActivatedRule|Action. For all other update requests,ActivatedRule|Actionis used instead ofActivatedRule|OverrideAction.
iv_type TYPE /AWS1/WAFWAFRULETYPE /AWS1/WAFWAFRULETYPE¶
The rule type, either
REGULAR, as defined by Rule,RATE_BASED, as defined by RateBasedRule, orGROUP, as defined by RuleGroup. The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist.
it_excludedrules TYPE /AWS1/CL_WAFEXCLUDEDRULE=>TT_EXCLUDEDRULES TT_EXCLUDEDRULES¶
An array of rules to exclude from a rule group. This is applicable only when the
ActivatedRulerefers to aRuleGroup.Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL.
Specifying
ExcludedRulesdoes not remove those rules from the rule group. Rather, it changes the action for the rules toCOUNT. Therefore, requests that match anExcludedRuleare counted but not blocked. TheRuleGroupowner will receive COUNT metrics for eachExcludedRule.If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps:
Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information.
Submit an UpdateWebACL request that has two actions:
The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first
Updates:Actionshould beDELETEandUpdates:ActivatedRule:RuleIdshould be the rule group that contains the rules that you want to exclude.The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second
Updates:Actionshould beINSERT,Updates:ActivatedRule:RuleIdshould be the rule group that you just removed, andExcludedRulesshould contain the rules that you want to exclude.
Queryable Attributes¶
Priority¶
Specifies the order in which the
Rulesin aWebACLare evaluated. Rules with a lower value forPriorityare evaluated beforeRuleswith a higher value. The value must be a unique integer. If you add multipleRulesto aWebACL, the values don't need to be consecutive.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_PRIORITY() |
Getter for PRIORITY, with configurable default |
ASK_PRIORITY() |
Getter for PRIORITY w/ exceptions if field has no value |
HAS_PRIORITY() |
Determine if PRIORITY has a value |
RuleId¶
The
RuleIdfor aRule. You useRuleIdto get more information about aRule(see GetRule), update aRule(see UpdateRule), insert aRuleinto aWebACLor delete a one from aWebACL(see UpdateWebACL), or delete aRulefrom AWS WAF (see DeleteRule).
RuleIdis returned by CreateRule and by ListRules.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_RULEID() |
Getter for RULEID, with configurable default |
ASK_RULEID() |
Getter for RULEID w/ exceptions if field has no value |
HAS_RULEID() |
Determine if RULEID has a value |
Action¶
Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the
Rule.
Valid values forActioninclude the following:
ALLOW: CloudFront responds with the requested object.
BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL.
ActivatedRule|OverrideActionapplies only when updating or adding aRuleGroupto aWebACL. In this case, you do not useActivatedRule|Action. For all other update requests,ActivatedRule|Actionis used instead ofActivatedRule|OverrideAction.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_ACTION() |
Getter for ACTION |
OverrideAction¶
Use the
OverrideActionto test yourRuleGroup.Any rule in a
RuleGroupcan potentially block a request. If you set theOverrideActiontoNone, theRuleGroupwill block a request if any individual rule in theRuleGroupmatches the request and is configured to block that request. However if you first want to test theRuleGroup, set theOverrideActiontoCount. TheRuleGroupwill then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests.
ActivatedRule|OverrideActionapplies only when updating or adding aRuleGroupto aWebACL. In this case you do not useActivatedRule|Action. For all other update requests,ActivatedRule|Actionis used instead ofActivatedRule|OverrideAction.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_OVERRIDEACTION() |
Getter for OVERRIDEACTION |
Type¶
The rule type, either
REGULAR, as defined by Rule,RATE_BASED, as defined by RateBasedRule, orGROUP, as defined by RuleGroup. The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_TYPE() |
Getter for TYPE, with configurable default |
ASK_TYPE() |
Getter for TYPE w/ exceptions if field has no value |
HAS_TYPE() |
Determine if TYPE has a value |
ExcludedRules¶
An array of rules to exclude from a rule group. This is applicable only when the
ActivatedRulerefers to aRuleGroup.Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL.
Specifying
ExcludedRulesdoes not remove those rules from the rule group. Rather, it changes the action for the rules toCOUNT. Therefore, requests that match anExcludedRuleare counted but not blocked. TheRuleGroupowner will receive COUNT metrics for eachExcludedRule.If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps:
Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information.
Submit an UpdateWebACL request that has two actions:
The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first
Updates:Actionshould beDELETEandUpdates:ActivatedRule:RuleIdshould be the rule group that contains the rules that you want to exclude.The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second
Updates:Actionshould beINSERT,Updates:ActivatedRule:RuleIdshould be the rule group that you just removed, andExcludedRulesshould contain the rules that you want to exclude.
Accessible with the following methods¶
| Method | Description |
|---|---|
GET_EXCLUDEDRULES() |
Getter for EXCLUDEDRULES, with configurable default |
ASK_EXCLUDEDRULES() |
Getter for EXCLUDEDRULES w/ exceptions if field has no value |
HAS_EXCLUDEDRULES() |
Determine if EXCLUDEDRULES has a value |
Public Local Types In This Class¶
Internal table types, representing arrays and maps of this class, are defined as local types:
TT_ACTIVATEDRULES¶
TYPES TT_ACTIVATEDRULES TYPE STANDARD TABLE OF REF TO /AWS1/CL_WAFACTIVATEDRULE WITH DEFAULT KEY
.