1. Packages
  2. Datadog Provider
  3. API Docs
  4. AppsecWafCustomRule
Datadog v4.47.0 published on Thursday, Mar 20, 2025 by Pulumi

datadog.AppsecWafCustomRule

Explore with Pulumi AI

datadog logo
Datadog v4.47.0 published on Thursday, Mar 20, 2025 by Pulumi

    Provides a Datadog AppsecWafCustomRule resource. This can be used to create and manage Datadog appsec_waf_custom_rule.

    Example Usage

    Coming soon!
    
    Coming soon!
    
    Coming soon!
    
    Coming soon!
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.datadog.AppsecWafCustomRule;
    import com.pulumi.datadog.AppsecWafCustomRuleArgs;
    import com.pulumi.datadog.inputs.AppsecWafCustomRuleConditionArgs;
    import com.pulumi.datadog.inputs.AppsecWafCustomRuleScopeArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // Create a new WAF custom rule to block a custom IoC
            var ioc000 = new AppsecWafCustomRule("ioc000", AppsecWafCustomRuleArgs.builder()
                .name("Block requests from a bad actor")
                .blocking(true)
                .enabled(true)
                .tags(Map.ofEntries(
                    Map.entry("category", "attack_attempt"),
                    Map.entry("type", "custom_ioc")
                ))
                .pathGlob("/db/*")
                .conditions(AppsecWafCustomRuleConditionArgs.builder()
                    .operator("match_regex")
                    .parameters(AppsecWafCustomRuleConditionParametersArgs.builder()
                        .inputs(AppsecWafCustomRuleConditionParametersInputArgs.builder()
                            .address("server.db.statement")
                            .build())
                        .regex("stmt.*")
                        .build())
                    .build())
                .action(AppsecWafCustomRuleActionArgs.builder()
                    .action("redirect_request")
                    .parameters(AppsecWafCustomRuleActionParametersArgs.builder()
                        .statusCode(302)
                        .location("/blocking")
                        .build())
                    .build())
                .build());
    
            // Create a WAF custom rule to track business logic events
            var biz000 = new AppsecWafCustomRule("biz000", AppsecWafCustomRuleArgs.builder()
                .name("Track payments")
                .blocking(false)
                .enabled(true)
                .tags(Map.ofEntries(
                    Map.entry("category", "business_logic"),
                    Map.entry("type", "payment.checkout")
                ))
                .pathGlob("/cart/*")
                .conditions(AppsecWafCustomRuleConditionArgs.builder()
                    .operator("capture_data")
                    .parameters(AppsecWafCustomRuleConditionParametersArgs.builder()
                        .inputs(AppsecWafCustomRuleConditionParametersInputArgs.builder()
                            .address("server.request.query")
                            .keyPaths("payment_id")
                            .build())
                        .value("payment")
                        .build())
                    .build())
                .scopes(AppsecWafCustomRuleScopeArgs.builder()
                    .env("prod")
                    .service("paymentsvc")
                    .build())
                .build());
    
        }
    }
    
    resources:
      # Create a new WAF custom rule to block a custom IoC
      ioc000:
        type: datadog:AppsecWafCustomRule
        properties:
          name: Block requests from a bad actor
          blocking: true
          enabled: true
          tags:
            category: attack_attempt
            type: custom_ioc
          pathGlob: /db/*
          conditions:
            - operator: match_regex
              parameters:
                - inputs:
                    - address: server.db.statement
                  regex: stmt.*
          action:
            - action: redirect_request
              parameters:
                - statusCode: 302
                  location: /blocking
      # Create a WAF custom rule to track business logic events
      biz000:
        type: datadog:AppsecWafCustomRule
        properties:
          name: Track payments
          blocking: false
          enabled: true
          tags:
            category: business_logic
            type: payment.checkout
          pathGlob: /cart/*
          conditions:
            - operator: capture_data
              parameters:
                - inputs:
                    - address: server.request.query
                      keyPaths:
                        - payment_id
                  value: payment
          scopes:
            - env: prod
              service: paymentsvc
    

    Create AppsecWafCustomRule Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new AppsecWafCustomRule(name: string, args: AppsecWafCustomRuleArgs, opts?: CustomResourceOptions);
    @overload
    def AppsecWafCustomRule(resource_name: str,
                            args: AppsecWafCustomRuleArgs,
                            opts: Optional[ResourceOptions] = None)
    
    @overload
    def AppsecWafCustomRule(resource_name: str,
                            opts: Optional[ResourceOptions] = None,
                            blocking: Optional[bool] = None,
                            enabled: Optional[bool] = None,
                            name: Optional[str] = None,
                            tags: Optional[Mapping[str, str]] = None,
                            action: Optional[AppsecWafCustomRuleActionArgs] = None,
                            conditions: Optional[Sequence[AppsecWafCustomRuleConditionArgs]] = None,
                            path_glob: Optional[str] = None,
                            scopes: Optional[Sequence[AppsecWafCustomRuleScopeArgs]] = None)
    func NewAppsecWafCustomRule(ctx *Context, name string, args AppsecWafCustomRuleArgs, opts ...ResourceOption) (*AppsecWafCustomRule, error)
    public AppsecWafCustomRule(string name, AppsecWafCustomRuleArgs args, CustomResourceOptions? opts = null)
    public AppsecWafCustomRule(String name, AppsecWafCustomRuleArgs args)
    public AppsecWafCustomRule(String name, AppsecWafCustomRuleArgs args, CustomResourceOptions options)
    
    type: datadog:AppsecWafCustomRule
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args AppsecWafCustomRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AppsecWafCustomRuleArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AppsecWafCustomRuleArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AppsecWafCustomRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AppsecWafCustomRuleArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var appsecWafCustomRuleResource = new Datadog.AppsecWafCustomRule("appsecWafCustomRuleResource", new()
    {
        Blocking = false,
        Enabled = false,
        Name = "string",
        Tags = 
        {
            { "string", "string" },
        },
        Action = new Datadog.Inputs.AppsecWafCustomRuleActionArgs
        {
            Action = "string",
            Parameters = new Datadog.Inputs.AppsecWafCustomRuleActionParametersArgs
            {
                Location = "string",
                StatusCode = 0,
            },
        },
        Conditions = new[]
        {
            new Datadog.Inputs.AppsecWafCustomRuleConditionArgs
            {
                Operator = "string",
                Parameters = new Datadog.Inputs.AppsecWafCustomRuleConditionParametersArgs
                {
                    Data = "string",
                    Inputs = new[]
                    {
                        new Datadog.Inputs.AppsecWafCustomRuleConditionParametersInputArgs
                        {
                            Address = "string",
                            KeyPaths = new[]
                            {
                                "string",
                            },
                        },
                    },
                    Lists = new[]
                    {
                        "string",
                    },
                    Options = new Datadog.Inputs.AppsecWafCustomRuleConditionParametersOptionsArgs
                    {
                        CaseSensitive = false,
                        MinLength = 0,
                    },
                    Regex = "string",
                    Value = "string",
                },
            },
        },
        PathGlob = "string",
        Scopes = new[]
        {
            new Datadog.Inputs.AppsecWafCustomRuleScopeArgs
            {
                Env = "string",
                Service = "string",
            },
        },
    });
    
    example, err := datadog.NewAppsecWafCustomRule(ctx, "appsecWafCustomRuleResource", &datadog.AppsecWafCustomRuleArgs{
    	Blocking: pulumi.Bool(false),
    	Enabled:  pulumi.Bool(false),
    	Name:     pulumi.String("string"),
    	Tags: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Action: &datadog.AppsecWafCustomRuleActionArgs{
    		Action: pulumi.String("string"),
    		Parameters: &datadog.AppsecWafCustomRuleActionParametersArgs{
    			Location:   pulumi.String("string"),
    			StatusCode: pulumi.Int(0),
    		},
    	},
    	Conditions: datadog.AppsecWafCustomRuleConditionArray{
    		&datadog.AppsecWafCustomRuleConditionArgs{
    			Operator: pulumi.String("string"),
    			Parameters: &datadog.AppsecWafCustomRuleConditionParametersArgs{
    				Data: pulumi.String("string"),
    				Inputs: datadog.AppsecWafCustomRuleConditionParametersInputTypeArray{
    					&datadog.AppsecWafCustomRuleConditionParametersInputTypeArgs{
    						Address: pulumi.String("string"),
    						KeyPaths: pulumi.StringArray{
    							pulumi.String("string"),
    						},
    					},
    				},
    				Lists: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				Options: &datadog.AppsecWafCustomRuleConditionParametersOptionsArgs{
    					CaseSensitive: pulumi.Bool(false),
    					MinLength:     pulumi.Int(0),
    				},
    				Regex: pulumi.String("string"),
    				Value: pulumi.String("string"),
    			},
    		},
    	},
    	PathGlob: pulumi.String("string"),
    	Scopes: datadog.AppsecWafCustomRuleScopeArray{
    		&datadog.AppsecWafCustomRuleScopeArgs{
    			Env:     pulumi.String("string"),
    			Service: pulumi.String("string"),
    		},
    	},
    })
    
    var appsecWafCustomRuleResource = new AppsecWafCustomRule("appsecWafCustomRuleResource", AppsecWafCustomRuleArgs.builder()
        .blocking(false)
        .enabled(false)
        .name("string")
        .tags(Map.of("string", "string"))
        .action(AppsecWafCustomRuleActionArgs.builder()
            .action("string")
            .parameters(AppsecWafCustomRuleActionParametersArgs.builder()
                .location("string")
                .statusCode(0)
                .build())
            .build())
        .conditions(AppsecWafCustomRuleConditionArgs.builder()
            .operator("string")
            .parameters(AppsecWafCustomRuleConditionParametersArgs.builder()
                .data("string")
                .inputs(AppsecWafCustomRuleConditionParametersInputArgs.builder()
                    .address("string")
                    .keyPaths("string")
                    .build())
                .lists("string")
                .options(AppsecWafCustomRuleConditionParametersOptionsArgs.builder()
                    .caseSensitive(false)
                    .minLength(0)
                    .build())
                .regex("string")
                .value("string")
                .build())
            .build())
        .pathGlob("string")
        .scopes(AppsecWafCustomRuleScopeArgs.builder()
            .env("string")
            .service("string")
            .build())
        .build());
    
    appsec_waf_custom_rule_resource = datadog.AppsecWafCustomRule("appsecWafCustomRuleResource",
        blocking=False,
        enabled=False,
        name="string",
        tags={
            "string": "string",
        },
        action={
            "action": "string",
            "parameters": {
                "location": "string",
                "status_code": 0,
            },
        },
        conditions=[{
            "operator": "string",
            "parameters": {
                "data": "string",
                "inputs": [{
                    "address": "string",
                    "key_paths": ["string"],
                }],
                "lists": ["string"],
                "options": {
                    "case_sensitive": False,
                    "min_length": 0,
                },
                "regex": "string",
                "value": "string",
            },
        }],
        path_glob="string",
        scopes=[{
            "env": "string",
            "service": "string",
        }])
    
    const appsecWafCustomRuleResource = new datadog.AppsecWafCustomRule("appsecWafCustomRuleResource", {
        blocking: false,
        enabled: false,
        name: "string",
        tags: {
            string: "string",
        },
        action: {
            action: "string",
            parameters: {
                location: "string",
                statusCode: 0,
            },
        },
        conditions: [{
            operator: "string",
            parameters: {
                data: "string",
                inputs: [{
                    address: "string",
                    keyPaths: ["string"],
                }],
                lists: ["string"],
                options: {
                    caseSensitive: false,
                    minLength: 0,
                },
                regex: "string",
                value: "string",
            },
        }],
        pathGlob: "string",
        scopes: [{
            env: "string",
            service: "string",
        }],
    });
    
    type: datadog:AppsecWafCustomRule
    properties:
        action:
            action: string
            parameters:
                location: string
                statusCode: 0
        blocking: false
        conditions:
            - operator: string
              parameters:
                data: string
                inputs:
                    - address: string
                      keyPaths:
                        - string
                lists:
                    - string
                options:
                    caseSensitive: false
                    minLength: 0
                regex: string
                value: string
        enabled: false
        name: string
        pathGlob: string
        scopes:
            - env: string
              service: string
        tags:
            string: string
    

    AppsecWafCustomRule Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The AppsecWafCustomRule resource accepts the following input properties:

    Blocking bool
    Indicates whether the WAF custom rule will block the request.
    Enabled bool
    Indicates whether the WAF custom rule is enabled.
    Name string
    The Name of the WAF custom rule.
    Tags Dictionary<string, string>
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    Action AppsecWafCustomRuleAction
    Conditions List<AppsecWafCustomRuleCondition>
    PathGlob string
    The path glob for the WAF custom rule.
    Scopes List<AppsecWafCustomRuleScope>
    Blocking bool
    Indicates whether the WAF custom rule will block the request.
    Enabled bool
    Indicates whether the WAF custom rule is enabled.
    Name string
    The Name of the WAF custom rule.
    Tags map[string]string
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    Action AppsecWafCustomRuleActionArgs
    Conditions []AppsecWafCustomRuleConditionArgs
    PathGlob string
    The path glob for the WAF custom rule.
    Scopes []AppsecWafCustomRuleScopeArgs
    blocking Boolean
    Indicates whether the WAF custom rule will block the request.
    enabled Boolean
    Indicates whether the WAF custom rule is enabled.
    name String
    The Name of the WAF custom rule.
    tags Map<String,String>
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action AppsecWafCustomRuleAction
    conditions List<AppsecWafCustomRuleCondition>
    pathGlob String
    The path glob for the WAF custom rule.
    scopes List<AppsecWafCustomRuleScope>
    blocking boolean
    Indicates whether the WAF custom rule will block the request.
    enabled boolean
    Indicates whether the WAF custom rule is enabled.
    name string
    The Name of the WAF custom rule.
    tags {[key: string]: string}
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action AppsecWafCustomRuleAction
    conditions AppsecWafCustomRuleCondition[]
    pathGlob string
    The path glob for the WAF custom rule.
    scopes AppsecWafCustomRuleScope[]
    blocking bool
    Indicates whether the WAF custom rule will block the request.
    enabled bool
    Indicates whether the WAF custom rule is enabled.
    name str
    The Name of the WAF custom rule.
    tags Mapping[str, str]
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action AppsecWafCustomRuleActionArgs
    conditions Sequence[AppsecWafCustomRuleConditionArgs]
    path_glob str
    The path glob for the WAF custom rule.
    scopes Sequence[AppsecWafCustomRuleScopeArgs]
    blocking Boolean
    Indicates whether the WAF custom rule will block the request.
    enabled Boolean
    Indicates whether the WAF custom rule is enabled.
    name String
    The Name of the WAF custom rule.
    tags Map<String>
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action Property Map
    conditions List<Property Map>
    pathGlob String
    The path glob for the WAF custom rule.
    scopes List<Property Map>

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AppsecWafCustomRule resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing AppsecWafCustomRule Resource

    Get an existing AppsecWafCustomRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AppsecWafCustomRuleState, opts?: CustomResourceOptions): AppsecWafCustomRule
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            action: Optional[AppsecWafCustomRuleActionArgs] = None,
            blocking: Optional[bool] = None,
            conditions: Optional[Sequence[AppsecWafCustomRuleConditionArgs]] = None,
            enabled: Optional[bool] = None,
            name: Optional[str] = None,
            path_glob: Optional[str] = None,
            scopes: Optional[Sequence[AppsecWafCustomRuleScopeArgs]] = None,
            tags: Optional[Mapping[str, str]] = None) -> AppsecWafCustomRule
    func GetAppsecWafCustomRule(ctx *Context, name string, id IDInput, state *AppsecWafCustomRuleState, opts ...ResourceOption) (*AppsecWafCustomRule, error)
    public static AppsecWafCustomRule Get(string name, Input<string> id, AppsecWafCustomRuleState? state, CustomResourceOptions? opts = null)
    public static AppsecWafCustomRule get(String name, Output<String> id, AppsecWafCustomRuleState state, CustomResourceOptions options)
    resources:  _:    type: datadog:AppsecWafCustomRule    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Action AppsecWafCustomRuleAction
    Blocking bool
    Indicates whether the WAF custom rule will block the request.
    Conditions List<AppsecWafCustomRuleCondition>
    Enabled bool
    Indicates whether the WAF custom rule is enabled.
    Name string
    The Name of the WAF custom rule.
    PathGlob string
    The path glob for the WAF custom rule.
    Scopes List<AppsecWafCustomRuleScope>
    Tags Dictionary<string, string>
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    Action AppsecWafCustomRuleActionArgs
    Blocking bool
    Indicates whether the WAF custom rule will block the request.
    Conditions []AppsecWafCustomRuleConditionArgs
    Enabled bool
    Indicates whether the WAF custom rule is enabled.
    Name string
    The Name of the WAF custom rule.
    PathGlob string
    The path glob for the WAF custom rule.
    Scopes []AppsecWafCustomRuleScopeArgs
    Tags map[string]string
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action AppsecWafCustomRuleAction
    blocking Boolean
    Indicates whether the WAF custom rule will block the request.
    conditions List<AppsecWafCustomRuleCondition>
    enabled Boolean
    Indicates whether the WAF custom rule is enabled.
    name String
    The Name of the WAF custom rule.
    pathGlob String
    The path glob for the WAF custom rule.
    scopes List<AppsecWafCustomRuleScope>
    tags Map<String,String>
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action AppsecWafCustomRuleAction
    blocking boolean
    Indicates whether the WAF custom rule will block the request.
    conditions AppsecWafCustomRuleCondition[]
    enabled boolean
    Indicates whether the WAF custom rule is enabled.
    name string
    The Name of the WAF custom rule.
    pathGlob string
    The path glob for the WAF custom rule.
    scopes AppsecWafCustomRuleScope[]
    tags {[key: string]: string}
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action AppsecWafCustomRuleActionArgs
    blocking bool
    Indicates whether the WAF custom rule will block the request.
    conditions Sequence[AppsecWafCustomRuleConditionArgs]
    enabled bool
    Indicates whether the WAF custom rule is enabled.
    name str
    The Name of the WAF custom rule.
    path_glob str
    The path glob for the WAF custom rule.
    scopes Sequence[AppsecWafCustomRuleScopeArgs]
    tags Mapping[str, str]
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.
    action Property Map
    blocking Boolean
    Indicates whether the WAF custom rule will block the request.
    conditions List<Property Map>
    enabled Boolean
    Indicates whether the WAF custom rule is enabled.
    name String
    The Name of the WAF custom rule.
    pathGlob String
    The path glob for the WAF custom rule.
    scopes List<Property Map>
    tags Map<String>
    Tags associated with the WAF custom rule. category and type tags are required. Supported categories include business_logic, attack_attempt and security_response.

    Supporting Types

    AppsecWafCustomRuleAction, AppsecWafCustomRuleActionArgs

    Action string
    Override the default action to take when the WAF custom rule would block.
    Parameters AppsecWafCustomRuleActionParameters
    Action string
    Override the default action to take when the WAF custom rule would block.
    Parameters AppsecWafCustomRuleActionParameters
    action String
    Override the default action to take when the WAF custom rule would block.
    parameters AppsecWafCustomRuleActionParameters
    action string
    Override the default action to take when the WAF custom rule would block.
    parameters AppsecWafCustomRuleActionParameters
    action str
    Override the default action to take when the WAF custom rule would block.
    parameters AppsecWafCustomRuleActionParameters
    action String
    Override the default action to take when the WAF custom rule would block.
    parameters Property Map

    AppsecWafCustomRuleActionParameters, AppsecWafCustomRuleActionParametersArgs

    Location string
    The location to redirect to when the WAF custom rule triggers.
    StatusCode int
    The status code to return when the WAF custom rule triggers.
    Location string
    The location to redirect to when the WAF custom rule triggers.
    StatusCode int
    The status code to return when the WAF custom rule triggers.
    location String
    The location to redirect to when the WAF custom rule triggers.
    statusCode Integer
    The status code to return when the WAF custom rule triggers.
    location string
    The location to redirect to when the WAF custom rule triggers.
    statusCode number
    The status code to return when the WAF custom rule triggers.
    location str
    The location to redirect to when the WAF custom rule triggers.
    status_code int
    The status code to return when the WAF custom rule triggers.
    location String
    The location to redirect to when the WAF custom rule triggers.
    statusCode Number
    The status code to return when the WAF custom rule triggers.

    AppsecWafCustomRuleCondition, AppsecWafCustomRuleConditionArgs

    Operator string
    Operator to use for the WAF Condition.
    Parameters AppsecWafCustomRuleConditionParameters
    Operator string
    Operator to use for the WAF Condition.
    Parameters AppsecWafCustomRuleConditionParameters
    operator String
    Operator to use for the WAF Condition.
    parameters AppsecWafCustomRuleConditionParameters
    operator string
    Operator to use for the WAF Condition.
    parameters AppsecWafCustomRuleConditionParameters
    operator str
    Operator to use for the WAF Condition.
    parameters AppsecWafCustomRuleConditionParameters
    operator String
    Operator to use for the WAF Condition.
    parameters Property Map

    AppsecWafCustomRuleConditionParameters, AppsecWafCustomRuleConditionParametersArgs

    Data string
    Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
    Inputs List<AppsecWafCustomRuleConditionParametersInput>
    Lists List<string>
    List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
    Options AppsecWafCustomRuleConditionParametersOptions
    Regex string
    Regex to use with the condition. Only used with matchregex and !matchregex operator.
    Value string
    Store the captured value in the specified tag name. Only used with the capture_data operator.
    Data string
    Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
    Inputs []AppsecWafCustomRuleConditionParametersInputType
    Lists []string
    List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
    Options AppsecWafCustomRuleConditionParametersOptions
    Regex string
    Regex to use with the condition. Only used with matchregex and !matchregex operator.
    Value string
    Store the captured value in the specified tag name. Only used with the capture_data operator.
    data String
    Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
    inputs List<AppsecWafCustomRuleConditionParametersInput>
    lists List<String>
    List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
    options AppsecWafCustomRuleConditionParametersOptions
    regex String
    Regex to use with the condition. Only used with matchregex and !matchregex operator.
    value String
    Store the captured value in the specified tag name. Only used with the capture_data operator.
    data string
    Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
    inputs AppsecWafCustomRuleConditionParametersInput[]
    lists string[]
    List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
    options AppsecWafCustomRuleConditionParametersOptions
    regex string
    Regex to use with the condition. Only used with matchregex and !matchregex operator.
    value string
    Store the captured value in the specified tag name. Only used with the capture_data operator.
    data str
    Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
    inputs Sequence[AppsecWafCustomRuleConditionParametersInput]
    lists Sequence[str]
    List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
    options AppsecWafCustomRuleConditionParametersOptions
    regex str
    Regex to use with the condition. Only used with matchregex and !matchregex operator.
    value str
    Store the captured value in the specified tag name. Only used with the capture_data operator.
    data String
    Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
    inputs List<Property Map>
    lists List<String>
    List of value to use with the condition. Only used with the phrasematch, !phrasematch, exactmatch and !exactmatch operator.
    options Property Map
    regex String
    Regex to use with the condition. Only used with matchregex and !matchregex operator.
    value String
    Store the captured value in the specified tag name. Only used with the capture_data operator.

    AppsecWafCustomRuleConditionParametersInput, AppsecWafCustomRuleConditionParametersInputArgs

    Address string
    Input from the request on which the condition should apply.
    KeyPaths List<string>
    Specific path for the input.
    Address string
    Input from the request on which the condition should apply.
    KeyPaths []string
    Specific path for the input.
    address String
    Input from the request on which the condition should apply.
    keyPaths List<String>
    Specific path for the input.
    address string
    Input from the request on which the condition should apply.
    keyPaths string[]
    Specific path for the input.
    address str
    Input from the request on which the condition should apply.
    key_paths Sequence[str]
    Specific path for the input.
    address String
    Input from the request on which the condition should apply.
    keyPaths List<String>
    Specific path for the input.

    AppsecWafCustomRuleConditionParametersOptions, AppsecWafCustomRuleConditionParametersOptionsArgs

    CaseSensitive bool
    Evaluate the value as case sensitive.
    MinLength int
    Only evaluate this condition if the value has a minimum amount of characters.
    CaseSensitive bool
    Evaluate the value as case sensitive.
    MinLength int
    Only evaluate this condition if the value has a minimum amount of characters.
    caseSensitive Boolean
    Evaluate the value as case sensitive.
    minLength Integer
    Only evaluate this condition if the value has a minimum amount of characters.
    caseSensitive boolean
    Evaluate the value as case sensitive.
    minLength number
    Only evaluate this condition if the value has a minimum amount of characters.
    case_sensitive bool
    Evaluate the value as case sensitive.
    min_length int
    Only evaluate this condition if the value has a minimum amount of characters.
    caseSensitive Boolean
    Evaluate the value as case sensitive.
    minLength Number
    Only evaluate this condition if the value has a minimum amount of characters.

    AppsecWafCustomRuleScope, AppsecWafCustomRuleScopeArgs

    Env string
    The environment scope for the WAF custom rule.
    Service string
    The service scope for the WAF custom rule.
    Env string
    The environment scope for the WAF custom rule.
    Service string
    The service scope for the WAF custom rule.
    env String
    The environment scope for the WAF custom rule.
    service String
    The service scope for the WAF custom rule.
    env string
    The environment scope for the WAF custom rule.
    service string
    The service scope for the WAF custom rule.
    env str
    The environment scope for the WAF custom rule.
    service str
    The service scope for the WAF custom rule.
    env String
    The environment scope for the WAF custom rule.
    service String
    The service scope for the WAF custom rule.

    Import

    $ pulumi import datadog:index/appsecWafCustomRule:AppsecWafCustomRule new_list ""
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Datadog pulumi/pulumi-datadog
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the datadog Terraform Provider.
    datadog logo
    Datadog v4.47.0 published on Thursday, Mar 20, 2025 by Pulumi