/*
* Copyright 2018-2023 Amazon.com, Inc. or its affiliates. All Rights Reserved.
*
* Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
* the License. A copy of the License is located at
*
* http://aws.amazon.com/apache2.0
*
* or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
* CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
* and limitations under the License.
*/
package com.amazonaws.services.waf.model;
import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;
/**
*
* This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the
* developer guide.
*
* For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the
* latest version, AWS WAF has a single set of endpoints for regional and global use.
*
* The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want
* to insert or delete, the priority of the Rule in the WebACL, and the action that you want
* AWS WAF to take when a web request matches the Rule (ALLOW, BLOCK, or
* COUNT).
*
* To specify whether to insert or delete a Rule, use the Action parameter in the
* WebACLUpdate data type.
*
* Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower
* value for Priority are evaluated before Rules with a higher value. The value must be a
* unique integer. If you add multiple Rules to a WebACL, the values don't need to be
* consecutive.
*
* The RuleId for a Rule. You use RuleId to get more information about a
* Rule (see GetRule), update a Rule (see UpdateRule), insert a
* Rule into a WebACL or delete a one from a WebACL (see
* UpdateWebACL), or delete a Rule from AWS WAF (see DeleteRule).
*
* RuleId is returned by CreateRule and by ListRules.
*
* Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the
* Rule. Valid values for Action include the following:
*
* ALLOW: CloudFront responds with the requested object.
*
* BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
*
* COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and then
* continues to inspect the web request based on the remaining rules in the web ACL.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case, you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
* Use the OverrideAction to test your RuleGroup.
*
* Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction
* to None, the RuleGroup will block a request if any individual rule in the
* RuleGroup matches the request and is configured to block that request. However if you first want to
* test the RuleGroup, set the OverrideAction to Count. The
* RuleGroup will then override any block action specified by individual rules contained within the
* group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted
* requests using GetSampledRequests.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
* The rule type, either REGULAR, as defined by Rule, RATE_BASED, as defined by
* RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR. Although
* this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type,
* the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID,
* which does not exist.
*
* An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule
* refers to a RuleGroup.
*
* Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). * One troubleshooting technique is to identify the specific rule within the rule group that is blocking the * legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule * groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the
* action for the rules to COUNT. Therefore, requests that match an ExcludedRule are
* counted but not blocked. The RuleGroup owner will receive COUNT metrics for each
* ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following * steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the * logs, see Logging Web ACL Traffic * Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request,
* the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId
* should be the rule group that contains the rules that you want to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second
* Updates:Action should be INSERT, Updates:ActivatedRule:RuleId should be
* the rule group that you just removed, and ExcludedRules should contain the rules that you want to
* exclude.
*
* Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower
* value for Priority are evaluated before Rules with a higher value. The value must be a
* unique integer. If you add multiple Rules to a WebACL, the values don't need to be
* consecutive.
*
Rules in a WebACL are evaluated. Rules with a
* lower value for Priority are evaluated before Rules with a higher value. The
* value must be a unique integer. If you add multiple Rules to a WebACL, the
* values don't need to be consecutive.
*/
public void setPriority(Integer priority) {
this.priority = priority;
}
/**
*
* Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower
* value for Priority are evaluated before Rules with a higher value. The value must be a
* unique integer. If you add multiple Rules to a WebACL, the values don't need to be
* consecutive.
*
Rules in a WebACL are evaluated. Rules with a
* lower value for Priority are evaluated before Rules with a higher value. The
* value must be a unique integer. If you add multiple Rules to a WebACL, the
* values don't need to be consecutive.
*/
public Integer getPriority() {
return this.priority;
}
/**
*
* Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower
* value for Priority are evaluated before Rules with a higher value. The value must be a
* unique integer. If you add multiple Rules to a WebACL, the values don't need to be
* consecutive.
*
Rules in a WebACL are evaluated. Rules with a
* lower value for Priority are evaluated before Rules with a higher value. The
* value must be a unique integer. If you add multiple Rules to a WebACL, the
* values don't need to be consecutive.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ActivatedRule withPriority(Integer priority) {
setPriority(priority);
return this;
}
/**
*
* The RuleId for a Rule. You use RuleId to get more information about a
* Rule (see GetRule), update a Rule (see UpdateRule), insert a
* Rule into a WebACL or delete a one from a WebACL (see
* UpdateWebACL), or delete a Rule from AWS WAF (see DeleteRule).
*
* RuleId is returned by CreateRule and by ListRules.
*
RuleId for a Rule. You use RuleId to get more information about
* a Rule (see GetRule), update a Rule (see UpdateRule), insert a
* Rule into a WebACL or delete a one from a WebACL (see
* UpdateWebACL), or delete a Rule from AWS WAF (see DeleteRule).
*
* RuleId is returned by CreateRule and by ListRules.
*/
public void setRuleId(String ruleId) {
this.ruleId = ruleId;
}
/**
*
* The RuleId for a Rule. You use RuleId to get more information about a
* Rule (see GetRule), update a Rule (see UpdateRule), insert a
* Rule into a WebACL or delete a one from a WebACL (see
* UpdateWebACL), or delete a Rule from AWS WAF (see DeleteRule).
*
* RuleId is returned by CreateRule and by ListRules.
*
RuleId for a Rule. You use RuleId to get more information
* about a Rule (see GetRule), update a Rule (see UpdateRule),
* insert a Rule into a WebACL or delete a one from a WebACL (see
* UpdateWebACL), or delete a Rule from AWS WAF (see DeleteRule).
*
* RuleId is returned by CreateRule and by ListRules.
*/
public String getRuleId() {
return this.ruleId;
}
/**
*
* The RuleId for a Rule. You use RuleId to get more information about a
* Rule (see GetRule), update a Rule (see UpdateRule), insert a
* Rule into a WebACL or delete a one from a WebACL (see
* UpdateWebACL), or delete a Rule from AWS WAF (see DeleteRule).
*
* RuleId is returned by CreateRule and by ListRules.
*
RuleId for a Rule. You use RuleId to get more information about
* a Rule (see GetRule), update a Rule (see UpdateRule), insert a
* Rule into a WebACL or delete a one from a WebACL (see
* UpdateWebACL), or delete a Rule from AWS WAF (see DeleteRule).
*
* RuleId is returned by CreateRule and by ListRules.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ActivatedRule withRuleId(String ruleId) {
setRuleId(ruleId);
return this;
}
/**
*
* Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the
* Rule. Valid values for Action include the following:
*
* ALLOW: CloudFront responds with the requested object.
*
* BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
*
* COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and then
* continues to inspect the web request based on the remaining rules in the web ACL.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case, you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
Rule. Valid values for Action include the following:
*
* ALLOW: CloudFront responds with the requested object.
*
* BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
*
* COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and
* then continues to inspect the web request based on the remaining rules in the web ACL.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to
* a WebACL. In this case, you do not use ActivatedRule|Action. For all other
* update requests, ActivatedRule|Action is used instead of
* ActivatedRule|OverrideAction.
*/
public void setAction(WafAction action) {
this.action = action;
}
/**
*
* Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the
* Rule. Valid values for Action include the following:
*
* ALLOW: CloudFront responds with the requested object.
*
* BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
*
* COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and then
* continues to inspect the web request based on the remaining rules in the web ACL.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case, you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
Rule. Valid values for Action include the following:
*
* ALLOW: CloudFront responds with the requested object.
*
* BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
*
* COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and
* then continues to inspect the web request based on the remaining rules in the web ACL.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup
* to a WebACL. In this case, you do not use ActivatedRule|Action. For all other
* update requests, ActivatedRule|Action is used instead of
* ActivatedRule|OverrideAction.
*/
public WafAction getAction() {
return this.action;
}
/**
*
* Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the
* Rule. Valid values for Action include the following:
*
* ALLOW: CloudFront responds with the requested object.
*
* BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
*
* COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and then
* continues to inspect the web request based on the remaining rules in the web ACL.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case, you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
Rule. Valid values for Action include the following:
*
* ALLOW: CloudFront responds with the requested object.
*
* BLOCK: CloudFront responds with an HTTP 403 (Forbidden) status code.
*
* COUNT: AWS WAF increments a counter of requests that match the conditions in the rule and
* then continues to inspect the web request based on the remaining rules in the web ACL.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to
* a WebACL. In this case, you do not use ActivatedRule|Action. For all other
* update requests, ActivatedRule|Action is used instead of
* ActivatedRule|OverrideAction.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ActivatedRule withAction(WafAction action) {
setAction(action);
return this;
}
/**
*
* Use the OverrideAction to test your RuleGroup.
*
* Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction
* to None, the RuleGroup will block a request if any individual rule in the
* RuleGroup matches the request and is configured to block that request. However if you first want to
* test the RuleGroup, set the OverrideAction to Count. The
* RuleGroup will then override any block action specified by individual rules contained within the
* group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted
* requests using GetSampledRequests.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
OverrideAction to test your RuleGroup.
*
* Any rule in a RuleGroup can potentially block a request. If you set the
* OverrideAction to None, the RuleGroup will block a request if any
* individual rule in the RuleGroup matches the request and is configured to block that request.
* However if you first want to test the RuleGroup, set the OverrideAction to
* Count. The RuleGroup will then override any block action specified by individual
* rules contained within the group. Instead of blocking matching requests, those requests will be counted.
* You can view a record of counted requests using GetSampledRequests.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to
* a WebACL. In this case you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*/
public void setOverrideAction(WafOverrideAction overrideAction) {
this.overrideAction = overrideAction;
}
/**
*
* Use the OverrideAction to test your RuleGroup.
*
* Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction
* to None, the RuleGroup will block a request if any individual rule in the
* RuleGroup matches the request and is configured to block that request. However if you first want to
* test the RuleGroup, set the OverrideAction to Count. The
* RuleGroup will then override any block action specified by individual rules contained within the
* group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted
* requests using GetSampledRequests.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
OverrideAction to test your RuleGroup.
*
* Any rule in a RuleGroup can potentially block a request. If you set the
* OverrideAction to None, the RuleGroup will block a request if any
* individual rule in the RuleGroup matches the request and is configured to block that
* request. However if you first want to test the RuleGroup, set the
* OverrideAction to Count. The RuleGroup will then override any
* block action specified by individual rules contained within the group. Instead of blocking matching
* requests, those requests will be counted. You can view a record of counted requests using
* GetSampledRequests.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup
* to a WebACL. In this case you do not use ActivatedRule|Action. For all other
* update requests, ActivatedRule|Action is used instead of
* ActivatedRule|OverrideAction.
*/
public WafOverrideAction getOverrideAction() {
return this.overrideAction;
}
/**
*
* Use the OverrideAction to test your RuleGroup.
*
* Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction
* to None, the RuleGroup will block a request if any individual rule in the
* RuleGroup matches the request and is configured to block that request. However if you first want to
* test the RuleGroup, set the OverrideAction to Count. The
* RuleGroup will then override any block action specified by individual rules contained within the
* group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted
* requests using GetSampledRequests.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a
* WebACL. In this case you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
*
OverrideAction to test your RuleGroup.
*
* Any rule in a RuleGroup can potentially block a request. If you set the
* OverrideAction to None, the RuleGroup will block a request if any
* individual rule in the RuleGroup matches the request and is configured to block that request.
* However if you first want to test the RuleGroup, set the OverrideAction to
* Count. The RuleGroup will then override any block action specified by individual
* rules contained within the group. Instead of blocking matching requests, those requests will be counted.
* You can view a record of counted requests using GetSampledRequests.
*
* ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to
* a WebACL. In this case you do not use ActivatedRule|Action. For all other update
* requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction.
* @return Returns a reference to this object so that method calls can be chained together.
*/
public ActivatedRule withOverrideAction(WafOverrideAction overrideAction) {
setOverrideAction(overrideAction);
return this;
}
/**
*
* The rule type, either REGULAR, as defined by Rule, RATE_BASED, as defined by
* RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR. Although
* this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type,
* the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID,
* which does not exist.
*
REGULAR, as defined by Rule, RATE_BASED, as defined
* by RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR.
* Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without
* setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR
* rule with the specified ID, which does not exist.
* @see WafRuleType
*/
public void setType(String type) {
this.type = type;
}
/**
*
* The rule type, either REGULAR, as defined by Rule, RATE_BASED, as defined by
* RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR. Although
* this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type,
* the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID,
* which does not exist.
*
REGULAR, as defined by Rule, RATE_BASED, as
* defined by RateBasedRule, or GROUP, as defined by RuleGroup. The default is
* REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL
* without setting the type, the UpdateWebACL request will fail because the request tries to add a
* REGULAR rule with the specified ID, which does not exist.
* @see WafRuleType
*/
public String getType() {
return this.type;
}
/**
*
* The rule type, either REGULAR, as defined by Rule, RATE_BASED, as defined by
* RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR. Although
* this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type,
* the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID,
* which does not exist.
*
REGULAR, as defined by Rule, RATE_BASED, as defined
* by RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR.
* Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without
* setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR
* rule with the specified ID, which does not exist.
* @return Returns a reference to this object so that method calls can be chained together.
* @see WafRuleType
*/
public ActivatedRule withType(String type) {
setType(type);
return this;
}
/**
*
* The rule type, either REGULAR, as defined by Rule, RATE_BASED, as defined by
* RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR. Although
* this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type,
* the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID,
* which does not exist.
*
REGULAR, as defined by Rule, RATE_BASED, as defined
* by RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR.
* Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without
* setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR
* rule with the specified ID, which does not exist.
* @see WafRuleType
*/
public void setType(WafRuleType type) {
withType(type);
}
/**
*
* The rule type, either REGULAR, as defined by Rule, RATE_BASED, as defined by
* RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR. Although
* this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type,
* the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID,
* which does not exist.
*
REGULAR, as defined by Rule, RATE_BASED, as defined
* by RateBasedRule, or GROUP, as defined by RuleGroup. The default is REGULAR.
* Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without
* setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR
* rule with the specified ID, which does not exist.
* @return Returns a reference to this object so that method calls can be chained together.
* @see WafRuleType
*/
public ActivatedRule withType(WafRuleType type) {
this.type = type.toString();
return this;
}
/**
*
* An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule
* refers to a RuleGroup.
*
* Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). * One troubleshooting technique is to identify the specific rule within the rule group that is blocking the * legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule * groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the
* action for the rules to COUNT. Therefore, requests that match an ExcludedRule are
* counted but not blocked. The RuleGroup owner will receive COUNT metrics for each
* ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following * steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the * logs, see Logging Web ACL Traffic * Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request,
* the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId
* should be the rule group that contains the rules that you want to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second
* Updates:Action should be INSERT, Updates:ActivatedRule:RuleId should be
* the rule group that you just removed, and ExcludedRules should contain the rules that you want to
* exclude.
*
ActivatedRule refers to a RuleGroup.
* * Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false * positives). One troubleshooting technique is to identify the specific rule within the rule group that is * blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules * from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes
* the action for the rules to COUNT. Therefore, requests that match an
* ExcludedRule are counted but not blocked. The RuleGroup owner will receive
* COUNT metrics for each ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the * following steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information * about the logs, see Logging * Web ACL Traffic Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL
* request, the first Updates:Action should be DELETE and
* Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want
* to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the
* second Updates:Action should be INSERT,
* Updates:ActivatedRule:RuleId should be the rule group that you just removed, and
* ExcludedRules should contain the rules that you want to exclude.
*
* An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule
* refers to a RuleGroup.
*
* Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). * One troubleshooting technique is to identify the specific rule within the rule group that is blocking the * legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule * groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the
* action for the rules to COUNT. Therefore, requests that match an ExcludedRule are
* counted but not blocked. The RuleGroup owner will receive COUNT metrics for each
* ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following * steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the * logs, see Logging Web ACL Traffic * Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request,
* the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId
* should be the rule group that contains the rules that you want to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second
* Updates:Action should be INSERT, Updates:ActivatedRule:RuleId should be
* the rule group that you just removed, and ExcludedRules should contain the rules that you want to
* exclude.
*
ActivatedRule refers to a RuleGroup.
* * Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false * positives). One troubleshooting technique is to identify the specific rule within the rule group that is * blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules * from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes
* the action for the rules to COUNT. Therefore, requests that match an
* ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT
* metrics for each ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the * following steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about * the logs, see Logging Web ACL * Traffic Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL
* request, the first Updates:Action should be DELETE and
* Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want
* to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the
* second Updates:Action should be INSERT,
* Updates:ActivatedRule:RuleId should be the rule group that you just removed, and
* ExcludedRules should contain the rules that you want to exclude.
*
* An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule
* refers to a RuleGroup.
*
* Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). * One troubleshooting technique is to identify the specific rule within the rule group that is blocking the * legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule * groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the
* action for the rules to COUNT. Therefore, requests that match an ExcludedRule are
* counted but not blocked. The RuleGroup owner will receive COUNT metrics for each
* ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following * steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the * logs, see Logging Web ACL Traffic * Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request,
* the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId
* should be the rule group that contains the rules that you want to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second
* Updates:Action should be INSERT, Updates:ActivatedRule:RuleId should be
* the rule group that you just removed, and ExcludedRules should contain the rules that you want to
* exclude.
*
* NOTE: This method appends the values to the existing list (if any). Use * {@link #setExcludedRules(java.util.Collection)} or {@link #withExcludedRules(java.util.Collection)} if you want * to override the existing values. *
* * @param excludedRules * An array of rules to exclude from a rule group. This is applicable only when the *ActivatedRule refers to a RuleGroup.
* * Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false * positives). One troubleshooting technique is to identify the specific rule within the rule group that is * blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules * from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes
* the action for the rules to COUNT. Therefore, requests that match an
* ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT
* metrics for each ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the * following steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about * the logs, see Logging Web ACL * Traffic Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL
* request, the first Updates:Action should be DELETE and
* Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want
* to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the
* second Updates:Action should be INSERT,
* Updates:ActivatedRule:RuleId should be the rule group that you just removed, and
* ExcludedRules should contain the rules that you want to exclude.
*
* An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule
* refers to a RuleGroup.
*
* Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). * One troubleshooting technique is to identify the specific rule within the rule group that is blocking the * legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule * groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the
* action for the rules to COUNT. Therefore, requests that match an ExcludedRule are
* counted but not blocked. The RuleGroup owner will receive COUNT metrics for each
* ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following * steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the * logs, see Logging Web ACL Traffic * Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request,
* the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId
* should be the rule group that contains the rules that you want to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second
* Updates:Action should be INSERT, Updates:ActivatedRule:RuleId should be
* the rule group that you just removed, and ExcludedRules should contain the rules that you want to
* exclude.
*
ActivatedRule refers to a RuleGroup.
* * Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false * positives). One troubleshooting technique is to identify the specific rule within the rule group that is * blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules * from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. *
*
* Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes
* the action for the rules to COUNT. Therefore, requests that match an
* ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT
* metrics for each ExcludedRule.
*
* If you want to exclude rules from a rule group that is already associated with a web ACL, perform the * following steps: *
** Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about * the logs, see Logging Web ACL * Traffic Information. *
** Submit an UpdateWebACL request that has two actions: *
*
* The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL
* request, the first Updates:Action should be DELETE and
* Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want
* to exclude.
*
* The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the
* second Updates:Action should be INSERT,
* Updates:ActivatedRule:RuleId should be the rule group that you just removed, and
* ExcludedRules should contain the rules that you want to exclude.
*