/AWS1/IF_WAF=>UPDATERATEBASEDRULE()¶
About UpdateRateBasedRule¶
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.
For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Inserts or deletes Predicate objects in a rule and updates the
RateLimit in the rule.
Each Predicate object identifies a predicate, such as a ByteMatchSet or an IPSet, that specifies the web requests
that you want to block or count. The RateLimit specifies the number of
requests every five minutes that triggers the rule.
If you add more than one predicate to a RateBasedRule, a request must
match all the predicates and exceed the RateLimit to be counted or blocked.
For example, suppose you add the following to a RateBasedRule:
-
An
IPSetthat matches the IP address192.0.2.44/32 -
A
ByteMatchSetthat matchesBadBotin theUser-Agentheader
Further, you specify a
RateLimit of 1,000.
You then add the RateBasedRule to a WebACL and specify that
you want to block requests that satisfy the rule. For a request to be blocked, it must come
from the IP address 192.0.2.44 and the User-Agent header
in the request must contain the value BadBot. Further, requests that match
these two conditions much be received at a rate of more than 1,000 every five minutes. If
the rate drops below this limit, AWS WAF no longer blocks the requests.
As a second example, suppose you want to limit requests to a particular page on your site. To do this, you could add the following to a
RateBasedRule:
-
A
ByteMatchSetwithFieldToMatchofURI -
A
PositionalConstraintofSTARTS_WITH -
A
TargetStringoflogin
Further, you specify a RateLimit of 1,000.
By adding this RateBasedRule to a WebACL, you could limit requests to your login page without affecting the rest of your site.
Method Signature¶
METHODS /AWS1/IF_WAF~UPDATERATEBASEDRULE
IMPORTING
!IV_RULEID TYPE /AWS1/WAFRESOURCEID OPTIONAL
!IV_CHANGETOKEN TYPE /AWS1/WAFCHANGETOKEN OPTIONAL
!IT_UPDATES TYPE /AWS1/CL_WAFRULEUPDATE=>TT_RULEUPDATES OPTIONAL
!IV_RATELIMIT TYPE /AWS1/WAFRATELIMIT OPTIONAL
RETURNING
VALUE(OO_OUTPUT) TYPE REF TO /aws1/cl_wafupdratebasedrlrsp
RAISING
/AWS1/CX_WAFWAFINTERNALERROREX
/AWS1/CX_WAFWAFINVACCOUNTEX
/AWS1/CX_WAFWAFINVALIDOPEX
/AWS1/CX_WAFWAFINVALIDPARAMEX
/AWS1/CX_WAFWAFLIMITSEXCDEX
/AWS1/CX_WAFWAFNONEXENTCONTA00
/AWS1/CX_WAFWAFNONEXENTITEMEX
/AWS1/CX_WAFWAFREFERENCEDITE00
/AWS1/CX_WAFWAFSTALEDATAEX
/AWS1/CX_WAFCLIENTEXC
/AWS1/CX_WAFSERVEREXC
/AWS1/CX_RT_TECHNICAL_GENERIC
/AWS1/CX_RT_SERVICE_GENERIC.
IMPORTING¶
Required arguments:¶
iv_ruleid TYPE /AWS1/WAFRESOURCEID /AWS1/WAFRESOURCEID¶
The
RuleIdof theRateBasedRulethat you want to update.RuleIdis returned byCreateRateBasedRuleand by ListRateBasedRules.
iv_changetoken TYPE /AWS1/WAFCHANGETOKEN /AWS1/WAFCHANGETOKEN¶
The value returned by the most recent call to GetChangeToken.
it_updates TYPE /AWS1/CL_WAFRULEUPDATE=>TT_RULEUPDATES TT_RULEUPDATES¶
An array of
RuleUpdateobjects that you want to insert into or delete from a RateBasedRule.
iv_ratelimit TYPE /AWS1/WAFRATELIMIT /AWS1/WAFRATELIMIT¶
The maximum number of requests, which have an identical value in the field specified by the
RateKey, allowed in a five-minute period. If the number of requests exceeds theRateLimitand the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule.
RETURNING¶
oo_output TYPE REF TO /aws1/cl_wafupdratebasedrlrsp /AWS1/CL_WAFUPDRATEBASEDRLRSP¶
Domain /AWS1/RT_ACCOUNT_ID Primitive Type NUMC
Examples¶
Syntax Example¶
This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.
DATA(lo_result) = lo_client->updateratebasedrule(
it_updates = VALUE /aws1/cl_wafruleupdate=>tt_ruleupdates(
(
new /aws1/cl_wafruleupdate(
io_predicate = new /aws1/cl_wafpredicate(
iv_dataid = |string|
iv_negated = ABAP_TRUE
iv_type = |string|
)
iv_action = |string|
)
)
)
iv_changetoken = |string|
iv_ratelimit = 123
iv_ruleid = |string|
).
This is an example of reading all possible response values
lo_result = lo_result.
IF lo_result IS NOT INITIAL.
lv_changetoken = lo_result->get_changetoken( ).
ENDIF.