/* * Copyright 2018-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with * the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions * and limitations under the License. */ package com.amazonaws.services.shield.model; import java.io.Serializable; import javax.annotation.Generated; import com.amazonaws.protocol.StructuredPojo; import com.amazonaws.protocol.ProtocolMarshaller; /** *
* The details of a DDoS attack. *
* * @see AWS API * Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class AttackDetail implements Serializable, Cloneable, StructuredPojo { /** ** The unique identifier (ID) of the attack. *
*/ private String attackId; /** ** The ARN (Amazon Resource Name) of the resource that was attacked. *
*/ private String resourceArn; /** ** If applicable, additional detail about the resource being attacked, for example, IP address or URL. *
*/ private java.util.List* The time the attack started, in Unix time in seconds. *
*/ private java.util.Date startTime; /** ** The time the attack ended, in Unix time in seconds. *
*/ private java.util.Date endTime; /** ** List of counters that describe the attack for the specified time period. *
*/ private java.util.List* The array of objects that provide details of the Shield event. *
** For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon * CloudWatch metrics. For more information, see Shield * metrics and alarms in the WAF Developer Guide. *
*/ private java.util.List* List of mitigation actions taken for the attack. *
*/ private java.util.List* The unique identifier (ID) of the attack. *
* * @param attackId * The unique identifier (ID) of the attack. */ public void setAttackId(String attackId) { this.attackId = attackId; } /** ** The unique identifier (ID) of the attack. *
* * @return The unique identifier (ID) of the attack. */ public String getAttackId() { return this.attackId; } /** ** The unique identifier (ID) of the attack. *
* * @param attackId * The unique identifier (ID) of the attack. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withAttackId(String attackId) { setAttackId(attackId); return this; } /** ** The ARN (Amazon Resource Name) of the resource that was attacked. *
* * @param resourceArn * The ARN (Amazon Resource Name) of the resource that was attacked. */ public void setResourceArn(String resourceArn) { this.resourceArn = resourceArn; } /** ** The ARN (Amazon Resource Name) of the resource that was attacked. *
* * @return The ARN (Amazon Resource Name) of the resource that was attacked. */ public String getResourceArn() { return this.resourceArn; } /** ** The ARN (Amazon Resource Name) of the resource that was attacked. *
* * @param resourceArn * The ARN (Amazon Resource Name) of the resource that was attacked. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withResourceArn(String resourceArn) { setResourceArn(resourceArn); return this; } /** ** If applicable, additional detail about the resource being attacked, for example, IP address or URL. *
* * @return If applicable, additional detail about the resource being attacked, for example, IP address or URL. */ public java.util.List* If applicable, additional detail about the resource being attacked, for example, IP address or URL. *
* * @param subResources * If applicable, additional detail about the resource being attacked, for example, IP address or URL. */ public void setSubResources(java.util.Collection* If applicable, additional detail about the resource being attacked, for example, IP address or URL. *
** NOTE: This method appends the values to the existing list (if any). Use * {@link #setSubResources(java.util.Collection)} or {@link #withSubResources(java.util.Collection)} if you want to * override the existing values. *
* * @param subResources * If applicable, additional detail about the resource being attacked, for example, IP address or URL. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withSubResources(SubResourceSummary... subResources) { if (this.subResources == null) { setSubResources(new java.util.ArrayList* If applicable, additional detail about the resource being attacked, for example, IP address or URL. *
* * @param subResources * If applicable, additional detail about the resource being attacked, for example, IP address or URL. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withSubResources(java.util.Collection* The time the attack started, in Unix time in seconds. *
* * @param startTime * The time the attack started, in Unix time in seconds. */ public void setStartTime(java.util.Date startTime) { this.startTime = startTime; } /** ** The time the attack started, in Unix time in seconds. *
* * @return The time the attack started, in Unix time in seconds. */ public java.util.Date getStartTime() { return this.startTime; } /** ** The time the attack started, in Unix time in seconds. *
* * @param startTime * The time the attack started, in Unix time in seconds. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withStartTime(java.util.Date startTime) { setStartTime(startTime); return this; } /** ** The time the attack ended, in Unix time in seconds. *
* * @param endTime * The time the attack ended, in Unix time in seconds. */ public void setEndTime(java.util.Date endTime) { this.endTime = endTime; } /** ** The time the attack ended, in Unix time in seconds. *
* * @return The time the attack ended, in Unix time in seconds. */ public java.util.Date getEndTime() { return this.endTime; } /** ** The time the attack ended, in Unix time in seconds. *
* * @param endTime * The time the attack ended, in Unix time in seconds. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withEndTime(java.util.Date endTime) { setEndTime(endTime); return this; } /** ** List of counters that describe the attack for the specified time period. *
* * @return List of counters that describe the attack for the specified time period. */ public java.util.List* List of counters that describe the attack for the specified time period. *
* * @param attackCounters * List of counters that describe the attack for the specified time period. */ public void setAttackCounters(java.util.Collection* List of counters that describe the attack for the specified time period. *
** NOTE: This method appends the values to the existing list (if any). Use * {@link #setAttackCounters(java.util.Collection)} or {@link #withAttackCounters(java.util.Collection)} if you want * to override the existing values. *
* * @param attackCounters * List of counters that describe the attack for the specified time period. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withAttackCounters(SummarizedCounter... attackCounters) { if (this.attackCounters == null) { setAttackCounters(new java.util.ArrayList* List of counters that describe the attack for the specified time period. *
* * @param attackCounters * List of counters that describe the attack for the specified time period. * @return Returns a reference to this object so that method calls can be chained together. */ public AttackDetail withAttackCounters(java.util.Collection* The array of objects that provide details of the Shield event. *
** For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon * CloudWatch metrics. For more information, see Shield * metrics and alarms in the WAF Developer Guide. *
* * @return The array of objects that provide details of the Shield event. *
* For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon
* CloudWatch metrics. For more information, see Shield metrics and alarms in the WAF Developer Guide.
*/
public java.util.List
* The array of objects that provide details of the Shield event.
*
* For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon
* CloudWatch metrics. For more information, see Shield
* metrics and alarms in the WAF Developer Guide.
*
* For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon
* CloudWatch metrics. For more information, see Shield metrics and alarms in the WAF Developer Guide.
*/
public void setAttackProperties(java.util.Collection
* The array of objects that provide details of the Shield event.
*
* For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon
* CloudWatch metrics. For more information, see Shield
* metrics and alarms in the WAF Developer Guide.
*
* NOTE: This method appends the values to the existing list (if any). Use
* {@link #setAttackProperties(java.util.Collection)} or {@link #withAttackProperties(java.util.Collection)} if you
* want to override the existing values.
*
* For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon
* CloudWatch metrics. For more information, see Shield metrics and alarms in the WAF Developer Guide.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public AttackDetail withAttackProperties(AttackProperty... attackProperties) {
if (this.attackProperties == null) {
setAttackProperties(new java.util.ArrayList
* The array of objects that provide details of the Shield event.
*
* For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon
* CloudWatch metrics. For more information, see Shield
* metrics and alarms in the WAF Developer Guide.
*
* For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon
* CloudWatch metrics. For more information, see Shield metrics and alarms in the WAF Developer Guide.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public AttackDetail withAttackProperties(java.util.Collection
* List of mitigation actions taken for the attack.
*
* List of mitigation actions taken for the attack.
*
* List of mitigation actions taken for the attack.
*
* NOTE: This method appends the values to the existing list (if any). Use
* {@link #setMitigations(java.util.Collection)} or {@link #withMitigations(java.util.Collection)} if you want to
* override the existing values.
*
* List of mitigation actions taken for the attack.
*