diff --git a/content/en/api/v2/application-security/examples.json b/content/en/api/v2/application-security/examples.json index 0b8169cb6f9..72fb78e5449 100644 --- a/content/en/api/v2/application-security/examples.json +++ b/content/en/api/v2/application-security/examples.json @@ -62,7 +62,7 @@ } ] }, - "html": "
data
\n[object]
The WAF custom rule data.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookiesShow 11 more
,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data
\n[object]
The WAF custom rule data.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers,server.request.headers.no_cookiesShow 21 more
,server.request.custom-auth,server.request.cookies,server.request.trailers,server.request.body,server.request.body.filenames,server.response.status,server.response.headers.no_cookies,server.response.trailers,server.response.body,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip,server.llm.event,server.llm.guard.verdict,_dd.appsec.fp.http.header,_dd.appsec.fp.http.network,_dd.appsec.fp.session,_dd.appsec.fp.http.endpoint
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data
\nobject
Object for a single WAF custom rule.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookiesShow 11 more
,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data
\nobject
Object for a single WAF custom rule.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers,server.request.headers.no_cookiesShow 21 more
,server.request.custom-auth,server.request.cookies,server.request.trailers,server.request.body,server.request.body.filenames,server.response.status,server.response.headers.no_cookies,server.response.trailers,server.response.body,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip,server.llm.event,server.llm.guard.verdict,_dd.appsec.fp.http.header,_dd.appsec.fp.http.network,_dd.appsec.fp.session,_dd.appsec.fp.http.endpoint
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data [required]
\nobject
Object for a single WAF custom rule.
attributes [required]
\nobject
Create a new WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookiesShow 11 more
,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
type [required]
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data [required]
\nobject
Object for a single WAF custom rule.
attributes [required]
\nobject
Create a new WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers,server.request.headers.no_cookiesShow 21 more
,server.request.custom-auth,server.request.cookies,server.request.trailers,server.request.body,server.request.body.filenames,server.response.status,server.response.headers.no_cookies,server.response.trailers,server.response.body,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip,server.llm.event,server.llm.guard.verdict,_dd.appsec.fp.http.header,_dd.appsec.fp.http.network,_dd.appsec.fp.session,_dd.appsec.fp.http.endpoint
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
type [required]
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data
\nobject
Object for a single WAF custom rule.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookiesShow 11 more
,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data
\nobject
Object for a single WAF custom rule.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers,server.request.headers.no_cookiesShow 21 more
,server.request.custom-auth,server.request.cookies,server.request.trailers,server.request.body,server.request.body.filenames,server.response.status,server.response.headers.no_cookies,server.response.trailers,server.response.body,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip,server.llm.event,server.llm.guard.verdict,_dd.appsec.fp.http.header,_dd.appsec.fp.http.network,_dd.appsec.fp.session,_dd.appsec.fp.http.endpoint
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data
\nobject
Object for a single WAF custom rule.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookiesShow 11 more
,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data
\nobject
Object for a single WAF custom rule.
attributes
\nobject
A WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers,server.request.headers.no_cookiesShow 21 more
,server.request.custom-auth,server.request.cookies,server.request.trailers,server.request.body,server.request.body.filenames,server.response.status,server.response.headers.no_cookies,server.response.trailers,server.response.body,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip,server.llm.event,server.llm.guard.verdict,_dd.appsec.fp.http.header,_dd.appsec.fp.http.network,_dd.appsec.fp.session,_dd.appsec.fp.http.endpoint
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
metadata
\nobject
Metadata associated with the WAF Custom Rule.
added_at
\ndate-time
The date and time the WAF custom rule was created.
added_by
\nstring
The handle of the user who created the WAF custom rule.
added_by_name
\nstring
The name of the user who created the WAF custom rule.
modified_at
\ndate-time
The date and time the WAF custom rule was last updated.
modified_by
\nstring
The handle of the user who last updated the WAF custom rule.
modified_by_name
\nstring
The name of the user who last updated the WAF custom rule.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
id
\nstring
The ID of the custom rule.
type
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data [required]
\nobject
Object for a single WAF Custom Rule.
attributes [required]
\nobject
Update a WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookiesShow 11 more
,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
type [required]
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule
data [required]
\nobject
Object for a single WAF Custom Rule.
attributes [required]
\nobject
Update a WAF custom rule.
action
\nobject
The definition of ApplicationSecurityWafCustomRuleAction object.
action
\nenum
Override the default action to take when the WAF custom rule would block. \nAllowed enum values: redirect_request,block_request
default: block_request
parameters
\nobject
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
\nstring
The location to redirect to when the WAF custom rule triggers.
status_code
\nint64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
\nboolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
\n[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF\nrule to trigger.
operator [required]
\nenum
Operator to use for the WAF Condition. \nAllowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_matchShow 1 more
,capture_data
parameters [required]
\nobject
The scope of the WAF custom rule.
data
\nstring
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
\n[object]
List of inputs on which at least one should match with the given operator.
address [required]
\nenum
Input from the request on which the condition should apply. \nAllowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers,server.request.headers.no_cookiesShow 21 more
,server.request.custom-auth,server.request.cookies,server.request.trailers,server.request.body,server.request.body.filenames,server.response.status,server.response.headers.no_cookies,server.response.trailers,server.response.body,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip,server.llm.event,server.llm.guard.verdict,_dd.appsec.fp.http.header,_dd.appsec.fp.http.network,_dd.appsec.fp.session,_dd.appsec.fp.http.endpoint
key_path
\n[string]
Specific path for the input.
list
\n[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and\n!exact_match operator.
options
\nobject
Options for the operator of this condition.
case_sensitive
\nboolean
Evaluate the value as case sensitive.
min_length
\nint64
Only evaluate this condition if the value has a minimum amount of characters.
regex
\nstring
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
\nstring
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
\nboolean
Indicates whether the WAF custom rule is enabled.
name [required]
\nstring
The Name of the WAF custom rule.
path_glob
\nstring
The path glob for the WAF custom rule.
scope
\n[object]
The scope of the WAF custom rule.
env [required]
\nstring
The environment scope for the WAF custom rule.
service [required]
\nstring
The service scope for the WAF custom rule.
tags [required]
\nobject
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security\nactivity field associated with the traces.
category [required]
\nenum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response. \nAllowed enum values: attack_attempt,business_logic,security_response
type [required]
\nstring
The type of the WAF rule, associated with the category will form the security activity.
type [required]
\nenum
The type of the resource. The value should always be custom_rule. \nAllowed enum values: custom_rule
default: custom_rule