Up-to-date reference of API arguments for WAF dedicated Web Tamper rule you can get at documentation portal.
opentelekomcloud_waf_dedicated_web_tamper_rule_v1¶
Manages a WAF Dedicated Web Tamper Rule resource within OpenTelekomCloud.
Example Usage¶
resource "opentelekomcloud_waf_dedicated_policy_v1" "policy_1" {
name = "policy_at"
}
resource "opentelekomcloud_waf_dedicated_web_tamper_rule_v1" "rule_1" {
policy_id = opentelekomcloud_waf_dedicated_policy_v1.policy_1.id
hostname = "www.domain.com"
url = "/login"
description = "test description"
}
Argument Reference¶
The following arguments are supported:
policy_id
- (Required, ForceNew, String) The WAF policy ID. Changing this creates a new rule.hostname
- (Required, ForceNew, String) Protected website.url
- (Required, ForceNew, String) URL protected by the web tamper protection rule. The value must be in the standard URL format, for example,/admin
description
- (Optional, ForceNew, String) Rule description.update_cache
- (Optional, Bool) To update the cache for a web tamper protection Rule.
Attributes Reference¶
The following attributes are exported:
id
- ID of the rule.status
- Rule status. The value can be:0
: The rule is disabled.1
: The rule is enabled.
created_at
- Timestamp the rule is created.
Import¶
Dedicated WAF Web Tamper Rules can be imported using policy_id/id
, e.g.
terraform import opentelekomcloud_waf_dedicated_web_tamper_rule_v1.rule_1 ff95e71c8ae74eba9887193ab22c5757/b39f3a5a1b4f447a8030f0b0703f47f5