Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

CreateRuleGroupRequest

import type { CreateRuleGroupRequest } from "https://aws-api.deno.dev/v0.4/services/wafv2.ts?docs=full";
interface CreateRuleGroupRequest {
Capacity: number;
CustomResponseBodies?: {
[key: string]: CustomResponseBody | null | undefined;
}
| null;
Description?: string | null;
Name: string;
Rules?: Rule[] | null;
Scope: Scope;
Tags?: Tag[] | null;
VisibilityConfig: VisibilityConfig;
}

§Properties

§
Capacity: number
[src]

The web ACL capacity units (WCUs) required for this rule group.

When you create your own rule group, you define this, and you cannot change it after creation. When you add or modify the rules in a rule group, WAF enforces this limit. You can check the capacity for a set of rules using "CheckCapacity".

WAF uses WCUs to calculate and control the operating resources that are used to run your rules, rule groups, and web ACLs. WAF calculates capacity differently for each rule type, to reflect the relative cost of each rule. Simple rules that cost little to run use fewer WCUs than more complex rules that use more processing power. Rule group capacity is fixed at creation, which helps users plan their web ACL WCU usage when they use a rule group. The WCU limit for web ACLs is 1,500.

§
CustomResponseBodies?: {
[key: string]: CustomResponseBody | null | undefined;
}
| null
[src]

A map of custom response keys and content bodies. When you create a rule with a block action, you can send a custom response to the web request. You define these for the rule group, and then use them in the rules that you define in the rule group.

For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide.

For information about the limits on count and size for custom request and response settings, see WAF quotas in the WAF Developer Guide.

§
Description?: string | null
[src]

A description of the rule group that helps with identification.

§
Name: string
[src]

The name of the rule group. You cannot change the name of a rule group after you create it.

§
Rules?: Rule[] | null
[src]

The "Rule" statements used to identify the web requests that you want to allow, block, or count. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.

§
Scope: Scope
[src]

Specifies whether this is for an Amazon CloudFront distribution or for a regional application. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, a Amazon Cognito user pool, or an App Runner service.

To work with CloudFront, you must also specify the Region US East (N. Virginia) as follows:

  • CLI - Specify the Region when you use the CloudFront scope: --scope=CLOUDFRONT --region=us-east-1.
  • API and SDKs - For all calls, use the Region endpoint us-east-1.
§
Tags?: Tag[] | null
[src]

An array of key:value pairs to associate with the resource.

§
VisibilityConfig: VisibilityConfig
[src]

Defines and enables Amazon CloudWatch metrics and web request sample collection.