Datadog Application Security provides protection against
application-level attacks that aim to exploit code-level vulnerabilities,
such as Server-Side-Request-Forgery (SSRF), SQL injection, Log4Shell, and
Reflected Cross-Site-Scripting (XSS). You can monitor and protect apps
hosted directly on a server, Docker, Kubernetes, Amazon ECS, and (for
supported languages) AWS Fargate.
Response object for a single WAF exclusion filter.
Expand All
Field
Type
Description
data
object
A JSON:API resource for an WAF exclusion filter.
attributes
object
Attributes describing a WAF exclusion filter.
description
string
A description for the exclusion filter.
enabled
boolean
Indicates whether the exclusion filter is enabled.
event_query
string
The event query matched by the legacy exclusion filter. Cannot be created nor updated.
ip_list
[string]
The client IP addresses matched by the exclusion filter (CIDR notation is supported).
metadata
object
Extra information about the exclusion filter.
added_at
date-time
The creation date of the exclusion filter.
added_by
string
The handle of the user who created the exclusion filter.
added_by_name
string
The name of the user who created the exclusion filter.
modified_at
date-time
The last modification date of the exclusion filter.
modified_by
string
The handle of the user who last modified the exclusion filter.
modified_by_name
string
The name of the user who last modified the exclusion filter.
on_match
enum
The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
Allowed enum values: monitor
parameters
[string]
A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
path_glob
string
The HTTP path glob expression matched by the exclusion filter.
rules_target
[object]
The WAF rules targeted by the exclusion filter.
rule_id
string
Target a single WAF rule based on its identifier.
tags
object
Target multiple WAF rules based on their tags.
category
string
The category of the targeted WAF rules.
type
string
The type of the targeted WAF rules.
scope
[object]
The services where the exclusion filter is deployed.
env
string
Deploy on this environment.
service
string
Deploy on this service.
search_query
string
Generated event search query for traces matching the exclusion filter.
id
string
The identifier of the WAF exclusion filter.
type
enum
Type of the resource. The value should always be exclusion_filter.
Allowed enum values: exclusion_filter
default: exclusion_filter
{"data":{"attributes":{"description":"Exclude false positives on a path","enabled":true,"event_query":"string","ip_list":["198.51.100.72"],"metadata":{"added_at":"2019-09-19T10:00:00.000Z","added_by":"string","added_by_name":"string","modified_at":"2019-09-19T10:00:00.000Z","modified_by":"string","modified_by_name":"string"},"on_match":"string","parameters":["list.search.query"],"path_glob":"/accounts/*","rules_target":[{"rule_id":"dog-913-009","tags":{"category":"attack_attempt","type":"lfi"}}],"scope":[{"env":"www","service":"prod"}],"search_query":"string"},"id":"3dd-0uc-h1s","type":"exclusion_filter"}}
"""
Get a WAF exclusion filter returns "OK" response
"""fromosimportenvironfromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApi# there is a valid "exclusion_filter" in the systemEXCLUSION_FILTER_DATA_ID=environ["EXCLUSION_FILTER_DATA_ID"]configuration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.get_application_security_waf_exclusion_filter(exclusion_filter_id=EXCLUSION_FILTER_DATA_ID,)print(response)
# Get a WAF exclusion filter returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.new# there is a valid "exclusion_filter" in the systemEXCLUSION_FILTER_DATA_ID=ENV["EXCLUSION_FILTER_DATA_ID"]papi_instance.get_application_security_waf_exclusion_filter(EXCLUSION_FILTER_DATA_ID)
// Get a WAF exclusion filter returns "OK" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){// there is a valid "exclusion_filter" in the system
ExclusionFilterDataID:=os.Getenv("EXCLUSION_FILTER_DATA_ID")ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.GetApplicationSecurityWafExclusionFilter(ctx,ExclusionFilterDataID)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.GetApplicationSecurityWafExclusionFilter`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.GetApplicationSecurityWafExclusionFilter`:\n%s\n",responseContent)}
// Get a WAF exclusion filter returns "OK" responseimportcom.datadog.api.client.ApiClient;importcom.datadog.api.client.ApiException;importcom.datadog.api.client.v2.api.ApplicationSecurityApi;importcom.datadog.api.client.v2.model.ApplicationSecurityWafExclusionFilterResponse;publicclassExample{publicstaticvoidmain(String[]args){ApiClientdefaultClient=ApiClient.getDefaultApiClient();ApplicationSecurityApiapiInstance=newApplicationSecurityApi(defaultClient);// there is a valid "exclusion_filter" in the systemStringEXCLUSION_FILTER_DATA_ID=System.getenv("EXCLUSION_FILTER_DATA_ID");try{ApplicationSecurityWafExclusionFilterResponseresult=apiInstance.getApplicationSecurityWafExclusionFilter(EXCLUSION_FILTER_DATA_ID);System.out.println(result);}catch(ApiExceptione){System.err.println("Exception when calling ApplicationSecurityApi#getApplicationSecurityWafExclusionFilter");System.err.println("Status code: "+e.getCode());System.err.println("Reason: "+e.getResponseBody());System.err.println("Response headers: "+e.getResponseHeaders());e.printStackTrace();}}}
// Get a WAF exclusion filter returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;#[tokio::main]asyncfnmain(){// there is a valid "exclusion_filter" in the system
letexclusion_filter_data_id=std::env::var("EXCLUSION_FILTER_DATA_ID").unwrap();letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.get_application_security_waf_exclusion_filter(exclusion_filter_data_id.clone()).await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Get a WAF exclusion filter returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);// there is a valid "exclusion_filter" in the system
constEXCLUSION_FILTER_DATA_ID=process.env.EXCLUSION_FILTER_DATA_IDasstring;constparams: v2.ApplicationSecurityApiGetApplicationSecurityWafExclusionFilterRequest={exclusionFilterId: EXCLUSION_FILTER_DATA_ID,};apiInstance.getApplicationSecurityWafExclusionFilter(params).then((data: v2.ApplicationSecurityWafExclusionFilterResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
Create a new WAF exclusion filter with the given parameters.
A request matched by an exclusion filter will be ignored by the Application Security WAF product.
Go to https://app.datadoghq.com/security/appsec/passlist to review existing exclusion filters (also called passlist entries).
This endpoint requires the appsec_protect_write permission.
Object for creating a single WAF exclusion filter.
attributes [required]
object
Attributes for creating a WAF exclusion filter.
description [required]
string
A description for the exclusion filter.
enabled [required]
boolean
Indicates whether the exclusion filter is enabled.
ip_list
[string]
The client IP addresses matched by the exclusion filter (CIDR notation is supported).
on_match
enum
The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
Allowed enum values: monitor
parameters
[string]
A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
path_glob
string
The HTTP path glob expression matched by the exclusion filter.
rules_target
[object]
The WAF rules targeted by the exclusion filter.
rule_id
string
Target a single WAF rule based on its identifier.
tags
object
Target multiple WAF rules based on their tags.
category
string
The category of the targeted WAF rules.
type
string
The type of the targeted WAF rules.
scope
[object]
The services where the exclusion filter is deployed.
env
string
Deploy on this environment.
service
string
Deploy on this service.
type [required]
enum
Type of the resource. The value should always be exclusion_filter.
Allowed enum values: exclusion_filter
default: exclusion_filter
{"data":{"attributes":{"description":"Exclude false positives on a path","enabled":true,"parameters":["list.search.query"],"path_glob":"/accounts/*","rules_target":[{"tags":{"category":"attack_attempt","type":"lfi"}}],"scope":[{"env":"www","service":"prod"}]},"type":"exclusion_filter"}}
Response object for a single WAF exclusion filter.
Expand All
Field
Type
Description
data
object
A JSON:API resource for an WAF exclusion filter.
attributes
object
Attributes describing a WAF exclusion filter.
description
string
A description for the exclusion filter.
enabled
boolean
Indicates whether the exclusion filter is enabled.
event_query
string
The event query matched by the legacy exclusion filter. Cannot be created nor updated.
ip_list
[string]
The client IP addresses matched by the exclusion filter (CIDR notation is supported).
metadata
object
Extra information about the exclusion filter.
added_at
date-time
The creation date of the exclusion filter.
added_by
string
The handle of the user who created the exclusion filter.
added_by_name
string
The name of the user who created the exclusion filter.
modified_at
date-time
The last modification date of the exclusion filter.
modified_by
string
The handle of the user who last modified the exclusion filter.
modified_by_name
string
The name of the user who last modified the exclusion filter.
on_match
enum
The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
Allowed enum values: monitor
parameters
[string]
A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
path_glob
string
The HTTP path glob expression matched by the exclusion filter.
rules_target
[object]
The WAF rules targeted by the exclusion filter.
rule_id
string
Target a single WAF rule based on its identifier.
tags
object
Target multiple WAF rules based on their tags.
category
string
The category of the targeted WAF rules.
type
string
The type of the targeted WAF rules.
scope
[object]
The services where the exclusion filter is deployed.
env
string
Deploy on this environment.
service
string
Deploy on this service.
search_query
string
Generated event search query for traces matching the exclusion filter.
id
string
The identifier of the WAF exclusion filter.
type
enum
Type of the resource. The value should always be exclusion_filter.
Allowed enum values: exclusion_filter
default: exclusion_filter
{"data":{"attributes":{"description":"Exclude false positives on a path","enabled":true,"event_query":"string","ip_list":["198.51.100.72"],"metadata":{"added_at":"2019-09-19T10:00:00.000Z","added_by":"string","added_by_name":"string","modified_at":"2019-09-19T10:00:00.000Z","modified_by":"string","modified_by_name":"string"},"on_match":"string","parameters":["list.search.query"],"path_glob":"/accounts/*","rules_target":[{"rule_id":"dog-913-009","tags":{"category":"attack_attempt","type":"lfi"}}],"scope":[{"env":"www","service":"prod"}],"search_query":"string"},"id":"3dd-0uc-h1s","type":"exclusion_filter"}}
// Create a WAF exclusion filter returns "OK" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){body:=datadogV2.ApplicationSecurityWafExclusionFilterCreateRequest{Data:datadogV2.ApplicationSecurityWafExclusionFilterCreateData{Attributes:datadogV2.ApplicationSecurityWafExclusionFilterCreateAttributes{Description:"Exclude false positives on a path",Enabled:true,Parameters:[]string{"list.search.query",},PathGlob:datadog.PtrString("/accounts/*"),RulesTarget:[]datadogV2.ApplicationSecurityWafExclusionFilterRulesTarget{{Tags:&datadogV2.ApplicationSecurityWafExclusionFilterRulesTargetTags{Category:datadog.PtrString("attack_attempt"),Type:datadog.PtrString("lfi"),},},},Scope:[]datadogV2.ApplicationSecurityWafExclusionFilterScope{{Env:datadog.PtrString("www"),Service:datadog.PtrString("prod"),},},},Type:datadogV2.APPLICATIONSECURITYWAFEXCLUSIONFILTERTYPE_EXCLUSION_FILTER,},}ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.CreateApplicationSecurityWafExclusionFilter(ctx,body)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.CreateApplicationSecurityWafExclusionFilter`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.CreateApplicationSecurityWafExclusionFilter`:\n%s\n",responseContent)}
"""
Create a WAF exclusion filter returns "OK" response
"""fromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApifromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_create_attributesimport(ApplicationSecurityWafExclusionFilterCreateAttributes,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_create_dataimport(ApplicationSecurityWafExclusionFilterCreateData,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_create_requestimport(ApplicationSecurityWafExclusionFilterCreateRequest,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_rules_targetimport(ApplicationSecurityWafExclusionFilterRulesTarget,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_rules_target_tagsimport(ApplicationSecurityWafExclusionFilterRulesTargetTags,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_scopeimport(ApplicationSecurityWafExclusionFilterScope,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_typeimport(ApplicationSecurityWafExclusionFilterType,)body=ApplicationSecurityWafExclusionFilterCreateRequest(data=ApplicationSecurityWafExclusionFilterCreateData(attributes=ApplicationSecurityWafExclusionFilterCreateAttributes(description="Exclude false positives on a path",enabled=True,parameters=["list.search.query",],path_glob="/accounts/*",rules_target=[ApplicationSecurityWafExclusionFilterRulesTarget(tags=ApplicationSecurityWafExclusionFilterRulesTargetTags(category="attack_attempt",type="lfi",),),],scope=[ApplicationSecurityWafExclusionFilterScope(env="www",service="prod",),],),type=ApplicationSecurityWafExclusionFilterType.EXCLUSION_FILTER,),)configuration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.create_application_security_waf_exclusion_filter(body=body)print(response)
# Create a WAF exclusion filter returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.newbody=DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterCreateRequest.new({data:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterCreateData.new({attributes:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterCreateAttributes.new({description:"Exclude false positives on a path",enabled:true,parameters:["list.search.query",],path_glob:"/accounts/*",rules_target:[DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterRulesTarget.new({tags:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterRulesTargetTags.new({category:"attack_attempt",type:"lfi",}),}),],scope:[DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterScope.new({env:"www",service:"prod",}),],}),type:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterType::EXCLUSION_FILTER,}),})papi_instance.create_application_security_waf_exclusion_filter(body)
// Create a WAF exclusion filter returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterCreateAttributes;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterCreateData;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterCreateRequest;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterRulesTarget;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterRulesTargetTags;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterScope;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterType;usestd::collections::BTreeMap;#[tokio::main]asyncfnmain(){letbody=ApplicationSecurityWafExclusionFilterCreateRequest::new(ApplicationSecurityWafExclusionFilterCreateData::new(ApplicationSecurityWafExclusionFilterCreateAttributes::new("Exclude false positives on a path".to_string(),true,).parameters(vec!["list.search.query".to_string()]).path_glob("/accounts/*".to_string()).rules_target(vec![ApplicationSecurityWafExclusionFilterRulesTarget::new().tags(ApplicationSecurityWafExclusionFilterRulesTargetTags::new().category("attack_attempt".to_string()).type_("lfi".to_string()).additional_properties(BTreeMap::from([])),)]).scope(vec![ApplicationSecurityWafExclusionFilterScope::new().env("www".to_string()).service("prod".to_string())]),ApplicationSecurityWafExclusionFilterType::EXCLUSION_FILTER,),);letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.create_application_security_waf_exclusion_filter(body).await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Create a WAF exclusion filter returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);constparams: v2.ApplicationSecurityApiCreateApplicationSecurityWafExclusionFilterRequest={body:{data:{attributes:{description:"Exclude false positives on a path",enabled: true,parameters:["list.search.query"],pathGlob:"/accounts/*",rulesTarget:[{tags:{category:"attack_attempt",type:"lfi",},},],scope:[{env:"www",service:"prod",},],},type:"exclusion_filter",},},};apiInstance.createApplicationSecurityWafExclusionFilter(params).then((data: v2.ApplicationSecurityWafExclusionFilterResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
Response object for multiple WAF exclusion filters.
Expand All
Field
Type
Description
data
[object]
A list of WAF exclusion filters.
attributes
object
Attributes describing a WAF exclusion filter.
description
string
A description for the exclusion filter.
enabled
boolean
Indicates whether the exclusion filter is enabled.
event_query
string
The event query matched by the legacy exclusion filter. Cannot be created nor updated.
ip_list
[string]
The client IP addresses matched by the exclusion filter (CIDR notation is supported).
metadata
object
Extra information about the exclusion filter.
added_at
date-time
The creation date of the exclusion filter.
added_by
string
The handle of the user who created the exclusion filter.
added_by_name
string
The name of the user who created the exclusion filter.
modified_at
date-time
The last modification date of the exclusion filter.
modified_by
string
The handle of the user who last modified the exclusion filter.
modified_by_name
string
The name of the user who last modified the exclusion filter.
on_match
enum
The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
Allowed enum values: monitor
parameters
[string]
A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
path_glob
string
The HTTP path glob expression matched by the exclusion filter.
rules_target
[object]
The WAF rules targeted by the exclusion filter.
rule_id
string
Target a single WAF rule based on its identifier.
tags
object
Target multiple WAF rules based on their tags.
category
string
The category of the targeted WAF rules.
type
string
The type of the targeted WAF rules.
scope
[object]
The services where the exclusion filter is deployed.
env
string
Deploy on this environment.
service
string
Deploy on this service.
search_query
string
Generated event search query for traces matching the exclusion filter.
id
string
The identifier of the WAF exclusion filter.
type
enum
Type of the resource. The value should always be exclusion_filter.
Allowed enum values: exclusion_filter
default: exclusion_filter
{"data":[{"attributes":{"description":"Exclude false positives on a path","enabled":true,"event_query":"string","ip_list":["198.51.100.72"],"metadata":{"added_at":"2019-09-19T10:00:00.000Z","added_by":"string","added_by_name":"string","modified_at":"2019-09-19T10:00:00.000Z","modified_by":"string","modified_by_name":"string"},"on_match":"string","parameters":["list.search.query"],"path_glob":"/accounts/*","rules_target":[{"rule_id":"dog-913-009","tags":{"category":"attack_attempt","type":"lfi"}}],"scope":[{"env":"www","service":"prod"}],"search_query":"string"},"id":"3dd-0uc-h1s","type":"exclusion_filter"}]}
"""
List all WAF exclusion filters returns "OK" response
"""fromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApiconfiguration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.list_application_security_waf_exclusion_filters()print(response)
# List all WAF exclusion filters returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.newpapi_instance.list_application_security_waf_exclusion_filters()
// List all WAF exclusion filters returns "OK" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.ListApplicationSecurityWafExclusionFilters(ctx)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.ListApplicationSecurityWafExclusionFilters`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.ListApplicationSecurityWafExclusionFilters`:\n%s\n",responseContent)}
// List all WAF exclusion filters returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;#[tokio::main]asyncfnmain(){letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.list_application_security_waf_exclusion_filters().await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* List all WAF exclusion filters returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);apiInstance.listApplicationSecurityWafExclusionFilters().then((data: v2.ApplicationSecurityWafExclusionFiltersResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
Update a specific WAF exclusion filter using its identifier.
Returns the exclusion filter object when the request is successful.
This endpoint requires the appsec_protect_write permission.
Object for updating a single WAF exclusion filter.
attributes [required]
object
Attributes for updating a WAF exclusion filter.
description [required]
string
A description for the exclusion filter.
enabled [required]
boolean
Indicates whether the exclusion filter is enabled.
ip_list
[string]
The client IP addresses matched by the exclusion filter (CIDR notation is supported).
on_match
enum
The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
Allowed enum values: monitor
parameters
[string]
A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
path_glob
string
The HTTP path glob expression matched by the exclusion filter.
rules_target
[object]
The WAF rules targeted by the exclusion filter.
rule_id
string
Target a single WAF rule based on its identifier.
tags
object
Target multiple WAF rules based on their tags.
category
string
The category of the targeted WAF rules.
type
string
The type of the targeted WAF rules.
scope
[object]
The services where the exclusion filter is deployed.
env
string
Deploy on this environment.
service
string
Deploy on this service.
type [required]
enum
Type of the resource. The value should always be exclusion_filter.
Allowed enum values: exclusion_filter
default: exclusion_filter
{"data":{"attributes":{"description":"Exclude false positives on a path","enabled":false,"ip_list":["198.51.100.72"],"on_match":"monitor"},"type":"exclusion_filter"}}
Response object for a single WAF exclusion filter.
Expand All
Field
Type
Description
data
object
A JSON:API resource for an WAF exclusion filter.
attributes
object
Attributes describing a WAF exclusion filter.
description
string
A description for the exclusion filter.
enabled
boolean
Indicates whether the exclusion filter is enabled.
event_query
string
The event query matched by the legacy exclusion filter. Cannot be created nor updated.
ip_list
[string]
The client IP addresses matched by the exclusion filter (CIDR notation is supported).
metadata
object
Extra information about the exclusion filter.
added_at
date-time
The creation date of the exclusion filter.
added_by
string
The handle of the user who created the exclusion filter.
added_by_name
string
The name of the user who created the exclusion filter.
modified_at
date-time
The last modification date of the exclusion filter.
modified_by
string
The handle of the user who last modified the exclusion filter.
modified_by_name
string
The name of the user who last modified the exclusion filter.
on_match
enum
The action taken when the exclusion filter matches. When set to monitor, security traces are emitted but the requests are not blocked. By default, security traces are not emitted and the requests are not blocked.
Allowed enum values: monitor
parameters
[string]
A list of parameters matched by the exclusion filter in the HTTP query string and HTTP request body. Nested parameters can be matched by joining fields with a dot character.
path_glob
string
The HTTP path glob expression matched by the exclusion filter.
rules_target
[object]
The WAF rules targeted by the exclusion filter.
rule_id
string
Target a single WAF rule based on its identifier.
tags
object
Target multiple WAF rules based on their tags.
category
string
The category of the targeted WAF rules.
type
string
The type of the targeted WAF rules.
scope
[object]
The services where the exclusion filter is deployed.
env
string
Deploy on this environment.
service
string
Deploy on this service.
search_query
string
Generated event search query for traces matching the exclusion filter.
id
string
The identifier of the WAF exclusion filter.
type
enum
Type of the resource. The value should always be exclusion_filter.
Allowed enum values: exclusion_filter
default: exclusion_filter
{"data":{"attributes":{"description":"Exclude false positives on a path","enabled":true,"event_query":"string","ip_list":["198.51.100.72"],"metadata":{"added_at":"2019-09-19T10:00:00.000Z","added_by":"string","added_by_name":"string","modified_at":"2019-09-19T10:00:00.000Z","modified_by":"string","modified_by_name":"string"},"on_match":"string","parameters":["list.search.query"],"path_glob":"/accounts/*","rules_target":[{"rule_id":"dog-913-009","tags":{"category":"attack_attempt","type":"lfi"}}],"scope":[{"env":"www","service":"prod"}],"search_query":"string"},"id":"3dd-0uc-h1s","type":"exclusion_filter"}}
// Update a WAF exclusion filter returns "OK" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){// there is a valid "exclusion_filter" in the system
ExclusionFilterDataID:=os.Getenv("EXCLUSION_FILTER_DATA_ID")body:=datadogV2.ApplicationSecurityWafExclusionFilterUpdateRequest{Data:datadogV2.ApplicationSecurityWafExclusionFilterUpdateData{Attributes:datadogV2.ApplicationSecurityWafExclusionFilterUpdateAttributes{Description:"Exclude false positives on a path",Enabled:false,IpList:[]string{"198.51.100.72",},OnMatch:datadogV2.APPLICATIONSECURITYWAFEXCLUSIONFILTERONMATCH_MONITOR.Ptr(),},Type:datadogV2.APPLICATIONSECURITYWAFEXCLUSIONFILTERTYPE_EXCLUSION_FILTER,},}ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.UpdateApplicationSecurityWafExclusionFilter(ctx,ExclusionFilterDataID,body)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.UpdateApplicationSecurityWafExclusionFilter`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.UpdateApplicationSecurityWafExclusionFilter`:\n%s\n",responseContent)}
// Update a WAF exclusion filter returns "OK" responseimportcom.datadog.api.client.ApiClient;importcom.datadog.api.client.ApiException;importcom.datadog.api.client.v2.api.ApplicationSecurityApi;importcom.datadog.api.client.v2.model.ApplicationSecurityWafExclusionFilterOnMatch;importcom.datadog.api.client.v2.model.ApplicationSecurityWafExclusionFilterResponse;importcom.datadog.api.client.v2.model.ApplicationSecurityWafExclusionFilterType;importcom.datadog.api.client.v2.model.ApplicationSecurityWafExclusionFilterUpdateAttributes;importcom.datadog.api.client.v2.model.ApplicationSecurityWafExclusionFilterUpdateData;importcom.datadog.api.client.v2.model.ApplicationSecurityWafExclusionFilterUpdateRequest;importjava.util.Collections;publicclassExample{publicstaticvoidmain(String[]args){ApiClientdefaultClient=ApiClient.getDefaultApiClient();ApplicationSecurityApiapiInstance=newApplicationSecurityApi(defaultClient);// there is a valid "exclusion_filter" in the systemStringEXCLUSION_FILTER_DATA_ID=System.getenv("EXCLUSION_FILTER_DATA_ID");ApplicationSecurityWafExclusionFilterUpdateRequestbody=newApplicationSecurityWafExclusionFilterUpdateRequest().data(newApplicationSecurityWafExclusionFilterUpdateData().attributes(newApplicationSecurityWafExclusionFilterUpdateAttributes().description("Exclude false positives on a path").enabled(false).ipList(Collections.singletonList("198.51.100.72")).onMatch(ApplicationSecurityWafExclusionFilterOnMatch.MONITOR)).type(ApplicationSecurityWafExclusionFilterType.EXCLUSION_FILTER));try{ApplicationSecurityWafExclusionFilterResponseresult=apiInstance.updateApplicationSecurityWafExclusionFilter(EXCLUSION_FILTER_DATA_ID,body);System.out.println(result);}catch(ApiExceptione){System.err.println("Exception when calling"+" ApplicationSecurityApi#updateApplicationSecurityWafExclusionFilter");System.err.println("Status code: "+e.getCode());System.err.println("Reason: "+e.getResponseBody());System.err.println("Response headers: "+e.getResponseHeaders());e.printStackTrace();}}}
"""
Update a WAF exclusion filter returns "OK" response
"""fromosimportenvironfromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApifromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_on_matchimport(ApplicationSecurityWafExclusionFilterOnMatch,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_typeimport(ApplicationSecurityWafExclusionFilterType,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_update_attributesimport(ApplicationSecurityWafExclusionFilterUpdateAttributes,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_update_dataimport(ApplicationSecurityWafExclusionFilterUpdateData,)fromdatadog_api_client.v2.model.application_security_waf_exclusion_filter_update_requestimport(ApplicationSecurityWafExclusionFilterUpdateRequest,)# there is a valid "exclusion_filter" in the systemEXCLUSION_FILTER_DATA_ID=environ["EXCLUSION_FILTER_DATA_ID"]body=ApplicationSecurityWafExclusionFilterUpdateRequest(data=ApplicationSecurityWafExclusionFilterUpdateData(attributes=ApplicationSecurityWafExclusionFilterUpdateAttributes(description="Exclude false positives on a path",enabled=False,ip_list=["198.51.100.72",],on_match=ApplicationSecurityWafExclusionFilterOnMatch.MONITOR,),type=ApplicationSecurityWafExclusionFilterType.EXCLUSION_FILTER,),)configuration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.update_application_security_waf_exclusion_filter(exclusion_filter_id=EXCLUSION_FILTER_DATA_ID,body=body)print(response)
# Update a WAF exclusion filter returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.new# there is a valid "exclusion_filter" in the systemEXCLUSION_FILTER_DATA_ID=ENV["EXCLUSION_FILTER_DATA_ID"]body=DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterUpdateRequest.new({data:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterUpdateData.new({attributes:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterUpdateAttributes.new({description:"Exclude false positives on a path",enabled:false,ip_list:["198.51.100.72",],on_match:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterOnMatch::MONITOR,}),type:DatadogAPIClient::V2::ApplicationSecurityWafExclusionFilterType::EXCLUSION_FILTER,}),})papi_instance.update_application_security_waf_exclusion_filter(EXCLUSION_FILTER_DATA_ID,body)
// Update a WAF exclusion filter returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterOnMatch;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterType;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterUpdateAttributes;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterUpdateData;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafExclusionFilterUpdateRequest;#[tokio::main]asyncfnmain(){// there is a valid "exclusion_filter" in the system
letexclusion_filter_data_id=std::env::var("EXCLUSION_FILTER_DATA_ID").unwrap();letbody=ApplicationSecurityWafExclusionFilterUpdateRequest::new(ApplicationSecurityWafExclusionFilterUpdateData::new(ApplicationSecurityWafExclusionFilterUpdateAttributes::new("Exclude false positives on a path".to_string(),false,).ip_list(vec!["198.51.100.72".to_string()]).on_match(ApplicationSecurityWafExclusionFilterOnMatch::MONITOR),ApplicationSecurityWafExclusionFilterType::EXCLUSION_FILTER,),);letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.update_application_security_waf_exclusion_filter(exclusion_filter_data_id.clone(),body).await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Update a WAF exclusion filter returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);// there is a valid "exclusion_filter" in the system
constEXCLUSION_FILTER_DATA_ID=process.env.EXCLUSION_FILTER_DATA_IDasstring;constparams: v2.ApplicationSecurityApiUpdateApplicationSecurityWafExclusionFilterRequest={body:{data:{attributes:{description:"Exclude false positives on a path",enabled: false,ipList:["198.51.100.72"],onMatch:"monitor",},type:"exclusion_filter",},},exclusionFilterId: EXCLUSION_FILTER_DATA_ID,};apiInstance.updateApplicationSecurityWafExclusionFilter(params).then((data: v2.ApplicationSecurityWafExclusionFilterResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
"""
Delete a WAF exclusion filter returns "OK" response
"""fromosimportenvironfromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApi# there is a valid "exclusion_filter" in the systemEXCLUSION_FILTER_DATA_ID=environ["EXCLUSION_FILTER_DATA_ID"]configuration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)api_instance.delete_application_security_waf_exclusion_filter(exclusion_filter_id=EXCLUSION_FILTER_DATA_ID,)
# Delete a WAF exclusion filter returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.new# there is a valid "exclusion_filter" in the systemEXCLUSION_FILTER_DATA_ID=ENV["EXCLUSION_FILTER_DATA_ID"]api_instance.delete_application_security_waf_exclusion_filter(EXCLUSION_FILTER_DATA_ID)
// Delete a WAF exclusion filter returns "OK" response
packagemainimport("context""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){// there is a valid "exclusion_filter" in the system
ExclusionFilterDataID:=os.Getenv("EXCLUSION_FILTER_DATA_ID")ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)r,err:=api.DeleteApplicationSecurityWafExclusionFilter(ctx,ExclusionFilterDataID)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.DeleteApplicationSecurityWafExclusionFilter`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}}
// Delete a WAF exclusion filter returns "OK" responseimportcom.datadog.api.client.ApiClient;importcom.datadog.api.client.ApiException;importcom.datadog.api.client.v2.api.ApplicationSecurityApi;publicclassExample{publicstaticvoidmain(String[]args){ApiClientdefaultClient=ApiClient.getDefaultApiClient();ApplicationSecurityApiapiInstance=newApplicationSecurityApi(defaultClient);// there is a valid "exclusion_filter" in the systemStringEXCLUSION_FILTER_DATA_ID=System.getenv("EXCLUSION_FILTER_DATA_ID");try{apiInstance.deleteApplicationSecurityWafExclusionFilter(EXCLUSION_FILTER_DATA_ID);}catch(ApiExceptione){System.err.println("Exception when calling"+" ApplicationSecurityApi#deleteApplicationSecurityWafExclusionFilter");System.err.println("Status code: "+e.getCode());System.err.println("Reason: "+e.getResponseBody());System.err.println("Response headers: "+e.getResponseHeaders());e.printStackTrace();}}}
// Delete a WAF exclusion filter returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;#[tokio::main]asyncfnmain(){// there is a valid "exclusion_filter" in the system
letexclusion_filter_data_id=std::env::var("EXCLUSION_FILTER_DATA_ID").unwrap();letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.delete_application_security_waf_exclusion_filter(exclusion_filter_data_id.clone()).await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Delete a WAF exclusion filter returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);// there is a valid "exclusion_filter" in the system
constEXCLUSION_FILTER_DATA_ID=process.env.EXCLUSION_FILTER_DATA_IDasstring;constparams: v2.ApplicationSecurityApiDeleteApplicationSecurityWafExclusionFilterRequest={exclusionFilterId: EXCLUSION_FILTER_DATA_ID,};apiInstance.deleteApplicationSecurityWafExclusionFilter(params).then((data: any)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
Response object that includes a single WAF custom rule.
Expand All
Field
Type
Description
data
object
Object for a single WAF custom rule.
attributes
object
A WAF custom rule.
action
object
The definition of ApplicationSecurityWafCustomRuleAction object.
action
enum
Override the default action to take when the WAF custom rule would block.
Allowed enum values: redirect_request,block_request
default: block_request
parameters
object
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
string
The location to redirect to when the WAF custom rule triggers.
status_code
int64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
boolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF
rule to trigger.
operator [required]
enum
Operator to use for the WAF Condition.
Allowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_match,capture_data
parameters [required]
object
The scope of the WAF custom rule.
data
string
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
[object]
List of inputs on which at least one should match with the given operator.
address [required]
enum
Input from the request on which the condition should apply.
Allowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookies,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
[string]
Specific path for the input.
list
[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and
!exact_match operator.
options
object
Options for the operator of this condition.
case_sensitive
boolean
Evaluate the value as case sensitive.
min_length
int64
Only evaluate this condition if the value has a minimum amount of characters.
regex
string
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
string
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
boolean
Indicates whether the WAF custom rule is enabled.
metadata
object
Metadata associated with the WAF Custom Rule.
added_at
date-time
The date and time the WAF custom rule was created.
added_by
string
The handle of the user who created the WAF custom rule.
added_by_name
string
The name of the user who created the WAF custom rule.
modified_at
date-time
The date and time the WAF custom rule was last updated.
modified_by
string
The handle of the user who last updated the WAF custom rule.
modified_by_name
string
The name of the user who last updated the WAF custom rule.
name [required]
string
The Name of the WAF custom rule.
path_glob
string
The path glob for the WAF custom rule.
scope
[object]
The scope of the WAF custom rule.
env [required]
string
The environment scope for the WAF custom rule.
service [required]
string
The service scope for the WAF custom rule.
tags [required]
object
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security
activity field associated with the traces.
category [required]
enum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response.
Allowed enum values: attack_attempt,business_logic,security_responses
type [required]
string
The type of the WAF rule, associated with the category will form the security activity.
id
string
The ID of the custom rule.
type
enum
The type of the resource. The value should always be custom_rule.
Allowed enum values: custom_rule
default: custom_rule
{"data":{"attributes":{"action":{"action":"block_request","parameters":{"location":"/blocking","status_code":403}},"blocking":false,"conditions":[{"operator":"match_regex","parameters":{"data":"blocked_users","inputs":[{"address":"server.db.statement","key_path":[]}],"list":[],"options":{"case_sensitive":false,"min_length":"integer"},"regex":"path.*","value":"custom_tag"}}],"enabled":false,"metadata":{"added_at":"2021-01-01T00:00:00Z","added_by":"john.doe@datadoghq.com","added_by_name":"John Doe","modified_at":"2021-01-01T00:00:00Z","modified_by":"john.doe@datadoghq.com","modified_by_name":"John Doe"},"name":"Block request from bad useragent","path_glob":"/api/search/*","scope":[{"env":"prod","service":"billing-service"}],"tags":{"category":"business_logic","type":"users.login.success"}},"id":"2857c47d-1e3a-4300-8b2f-dc24089c084b","type":"custom_rule"}}
"""
Get a WAF custom rule returns "OK" response
"""fromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApiconfiguration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.get_application_security_waf_custom_rule(custom_rule_id="custom_rule_id",)print(response)
# Get a WAF custom rule returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.newpapi_instance.get_application_security_waf_custom_rule("custom_rule_id")
// Get a WAF custom rule returns "OK" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.GetApplicationSecurityWafCustomRule(ctx,"custom_rule_id")iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.GetApplicationSecurityWafCustomRule`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.GetApplicationSecurityWafCustomRule`:\n%s\n",responseContent)}
// Get a WAF custom rule returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;#[tokio::main]asyncfnmain(){letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.get_application_security_waf_custom_rule("custom_rule_id".to_string()).await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Get a WAF custom rule returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);constparams: v2.ApplicationSecurityApiGetApplicationSecurityWafCustomRuleRequest={customRuleId:"custom_rule_id",};apiInstance.getApplicationSecurityWafCustomRule(params).then((data: v2.ApplicationSecurityWafCustomRuleResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
The definition of ApplicationSecurityWafCustomRuleAction object.
action
enum
Override the default action to take when the WAF custom rule would block.
Allowed enum values: redirect_request,block_request
default: block_request
parameters
object
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
string
The location to redirect to when the WAF custom rule triggers.
status_code
int64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
boolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF
rule to trigger
operator [required]
enum
Operator to use for the WAF Condition.
Allowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_match,capture_data
parameters [required]
object
The scope of the WAF custom rule.
data
string
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
[object]
List of inputs on which at least one should match with the given operator.
address [required]
enum
Input from the request on which the condition should apply.
Allowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookies,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
[string]
Specific path for the input.
list
[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and
!exact_match operator.
options
object
Options for the operator of this condition.
case_sensitive
boolean
Evaluate the value as case sensitive.
min_length
int64
Only evaluate this condition if the value has a minimum amount of characters.
regex
string
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
string
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
boolean
Indicates whether the WAF custom rule is enabled.
name [required]
string
The Name of the WAF custom rule.
path_glob
string
The path glob for the WAF custom rule.
scope
[object]
The scope of the WAF custom rule.
env [required]
string
The environment scope for the WAF custom rule.
service [required]
string
The service scope for the WAF custom rule.
tags [required]
object
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security
activity field associated with the traces.
category [required]
enum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response.
Allowed enum values: attack_attempt,business_logic,security_responses
type [required]
string
The type of the WAF rule, associated with the category will form the security activity.
type [required]
enum
The type of the resource. The value should always be custom_rule.
Allowed enum values: custom_rule
default: custom_rule
{"data":{"attributes":{"action":{"action":"block_request","parameters":{"location":"/blocking","status_code":403}},"blocking":false,"conditions":[{"operator":"match_regex","parameters":{"data":"blocked_users","inputs":[{"address":"server.db.statement","key_path":[]}],"list":[],"options":{"case_sensitive":false,"min_length":"integer"},"regex":"path.*","value":"custom_tag"}}],"enabled":false,"name":"Block request from a bad useragent","path_glob":"/api/search/*","scope":[{"env":"prod","service":"billing-service"}],"tags":{"category":"business_logic","type":"users.login.success"}},"type":"custom_rule"}}
Response object that includes a single WAF custom rule.
Expand All
Field
Type
Description
data
object
Object for a single WAF custom rule.
attributes
object
A WAF custom rule.
action
object
The definition of ApplicationSecurityWafCustomRuleAction object.
action
enum
Override the default action to take when the WAF custom rule would block.
Allowed enum values: redirect_request,block_request
default: block_request
parameters
object
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
string
The location to redirect to when the WAF custom rule triggers.
status_code
int64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
boolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF
rule to trigger.
operator [required]
enum
Operator to use for the WAF Condition.
Allowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_match,capture_data
parameters [required]
object
The scope of the WAF custom rule.
data
string
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
[object]
List of inputs on which at least one should match with the given operator.
address [required]
enum
Input from the request on which the condition should apply.
Allowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookies,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
[string]
Specific path for the input.
list
[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and
!exact_match operator.
options
object
Options for the operator of this condition.
case_sensitive
boolean
Evaluate the value as case sensitive.
min_length
int64
Only evaluate this condition if the value has a minimum amount of characters.
regex
string
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
string
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
boolean
Indicates whether the WAF custom rule is enabled.
metadata
object
Metadata associated with the WAF Custom Rule.
added_at
date-time
The date and time the WAF custom rule was created.
added_by
string
The handle of the user who created the WAF custom rule.
added_by_name
string
The name of the user who created the WAF custom rule.
modified_at
date-time
The date and time the WAF custom rule was last updated.
modified_by
string
The handle of the user who last updated the WAF custom rule.
modified_by_name
string
The name of the user who last updated the WAF custom rule.
name [required]
string
The Name of the WAF custom rule.
path_glob
string
The path glob for the WAF custom rule.
scope
[object]
The scope of the WAF custom rule.
env [required]
string
The environment scope for the WAF custom rule.
service [required]
string
The service scope for the WAF custom rule.
tags [required]
object
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security
activity field associated with the traces.
category [required]
enum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response.
Allowed enum values: attack_attempt,business_logic,security_responses
type [required]
string
The type of the WAF rule, associated with the category will form the security activity.
id
string
The ID of the custom rule.
type
enum
The type of the resource. The value should always be custom_rule.
Allowed enum values: custom_rule
default: custom_rule
{"data":{"attributes":{"action":{"action":"block_request","parameters":{"location":"/blocking","status_code":403}},"blocking":false,"conditions":[{"operator":"match_regex","parameters":{"data":"blocked_users","inputs":[{"address":"server.db.statement","key_path":[]}],"list":[],"options":{"case_sensitive":false,"min_length":"integer"},"regex":"path.*","value":"custom_tag"}}],"enabled":false,"metadata":{"added_at":"2021-01-01T00:00:00Z","added_by":"john.doe@datadoghq.com","added_by_name":"John Doe","modified_at":"2021-01-01T00:00:00Z","modified_by":"john.doe@datadoghq.com","modified_by_name":"John Doe"},"name":"Block request from bad useragent","path_glob":"/api/search/*","scope":[{"env":"prod","service":"billing-service"}],"tags":{"category":"business_logic","type":"users.login.success"}},"id":"2857c47d-1e3a-4300-8b2f-dc24089c084b","type":"custom_rule"}}
"""
Create a WAF custom rule returns "Created" response
"""fromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApifromdatadog_api_client.v2.model.application_security_waf_custom_rule_actionimport(ApplicationSecurityWafCustomRuleAction,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_action_actionimport(ApplicationSecurityWafCustomRuleActionAction,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_action_parametersimport(ApplicationSecurityWafCustomRuleActionParameters,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_conditionimport(ApplicationSecurityWafCustomRuleCondition,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_inputimport(ApplicationSecurityWafCustomRuleConditionInput,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_input_addressimport(ApplicationSecurityWafCustomRuleConditionInputAddress,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_operatorimport(ApplicationSecurityWafCustomRuleConditionOperator,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_optionsimport(ApplicationSecurityWafCustomRuleConditionOptions,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_parametersimport(ApplicationSecurityWafCustomRuleConditionParameters,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_create_attributesimport(ApplicationSecurityWafCustomRuleCreateAttributes,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_create_dataimport(ApplicationSecurityWafCustomRuleCreateData,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_create_requestimport(ApplicationSecurityWafCustomRuleCreateRequest,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_scopeimportApplicationSecurityWafCustomRuleScopefromdatadog_api_client.v2.model.application_security_waf_custom_rule_tagsimportApplicationSecurityWafCustomRuleTagsfromdatadog_api_client.v2.model.application_security_waf_custom_rule_tags_categoryimport(ApplicationSecurityWafCustomRuleTagsCategory,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_typeimportApplicationSecurityWafCustomRuleTypebody=ApplicationSecurityWafCustomRuleCreateRequest(data=ApplicationSecurityWafCustomRuleCreateData(attributes=ApplicationSecurityWafCustomRuleCreateAttributes(action=ApplicationSecurityWafCustomRuleAction(action=ApplicationSecurityWafCustomRuleActionAction.BLOCK_REQUEST,parameters=ApplicationSecurityWafCustomRuleActionParameters(location="/blocking",status_code=403,),),blocking=False,conditions=[ApplicationSecurityWafCustomRuleCondition(operator=ApplicationSecurityWafCustomRuleConditionOperator.MATCH_REGEX,parameters=ApplicationSecurityWafCustomRuleConditionParameters(data="blocked_users",inputs=[ApplicationSecurityWafCustomRuleConditionInput(address=ApplicationSecurityWafCustomRuleConditionInputAddress.SERVER_DB_STATEMENT,key_path=[],),],list=[],options=ApplicationSecurityWafCustomRuleConditionOptions(case_sensitive=False,min_length=0,),regex="path.*",value="custom_tag",),),],enabled=False,name="Block request from a bad useragent",path_glob="/api/search/*",scope=[ApplicationSecurityWafCustomRuleScope(env="prod",service="billing-service",),],tags=ApplicationSecurityWafCustomRuleTags(category=ApplicationSecurityWafCustomRuleTagsCategory.BUSINESS_LOGIC,type="users.login.success",),),type=ApplicationSecurityWafCustomRuleType.CUSTOM_RULE,),)configuration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.create_application_security_waf_custom_rule(body=body)print(response)
# Create a WAF custom rule returns "Created" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.newbody=DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleCreateRequest.new({data:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleCreateData.new({attributes:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleCreateAttributes.new({action:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleAction.new({action:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleActionAction::BLOCK_REQUEST,parameters:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleActionParameters.new({location:"/blocking",status_code:403,}),}),blocking:false,conditions:[DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleCondition.new({operator:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionOperator::MATCH_REGEX,parameters:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionParameters.new({data:"blocked_users",inputs:[DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionInput.new({address:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionInputAddress::SERVER_DB_STATEMENT,key_path:[],}),],list:[],options:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionOptions.new({case_sensitive:false,min_length:0,}),regex:"path.*",value:"custom_tag",}),}),],enabled:false,name:"Block request from a bad useragent",path_glob:"/api/search/*",scope:[DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleScope.new({env:"prod",service:"billing-service",}),],tags:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleTags.new({category:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleTagsCategory::BUSINESS_LOGIC,type:"users.login.success",}),}),type:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleType::CUSTOM_RULE,}),})papi_instance.create_application_security_waf_custom_rule(body)
// Create a WAF custom rule returns "Created" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){body:=datadogV2.ApplicationSecurityWafCustomRuleCreateRequest{Data:datadogV2.ApplicationSecurityWafCustomRuleCreateData{Attributes:datadogV2.ApplicationSecurityWafCustomRuleCreateAttributes{Action:&datadogV2.ApplicationSecurityWafCustomRuleAction{Action:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULEACTIONACTION_BLOCK_REQUEST.Ptr(),Parameters:&datadogV2.ApplicationSecurityWafCustomRuleActionParameters{Location:datadog.PtrString("/blocking"),StatusCode:datadog.PtrInt64(403),},},Blocking:false,Conditions:[]datadogV2.ApplicationSecurityWafCustomRuleCondition{{Operator:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULECONDITIONOPERATOR_MATCH_REGEX,Parameters:datadogV2.ApplicationSecurityWafCustomRuleConditionParameters{Data:datadog.PtrString("blocked_users"),Inputs:[]datadogV2.ApplicationSecurityWafCustomRuleConditionInput{{Address:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULECONDITIONINPUTADDRESS_SERVER_DB_STATEMENT,KeyPath:[]string{},},},List:[]string{},Options:&datadogV2.ApplicationSecurityWafCustomRuleConditionOptions{CaseSensitive:datadog.PtrBool(false),MinLength:datadog.PtrInt64(0),},Regex:datadog.PtrString("path.*"),Value:datadog.PtrString("custom_tag"),},},},Enabled:false,Name:"Block request from a bad useragent",PathGlob:datadog.PtrString("/api/search/*"),Scope:[]datadogV2.ApplicationSecurityWafCustomRuleScope{{Env:"prod",Service:"billing-service",},},Tags:datadogV2.ApplicationSecurityWafCustomRuleTags{Category:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULETAGSCATEGORY_BUSINESS_LOGIC,Type:"users.login.success",},},Type:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULETYPE_CUSTOM_RULE,},}ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.CreateApplicationSecurityWafCustomRule(ctx,body)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.CreateApplicationSecurityWafCustomRule`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.CreateApplicationSecurityWafCustomRule`:\n%s\n",responseContent)}
// Create a WAF custom rule returns "Created" responseimportcom.datadog.api.client.ApiClient;importcom.datadog.api.client.ApiException;importcom.datadog.api.client.v2.api.ApplicationSecurityApi;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleAction;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleActionAction;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleActionParameters;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleCondition;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionInput;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionInputAddress;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionOperator;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionOptions;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionParameters;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleCreateAttributes;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleCreateData;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleCreateRequest;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleResponse;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleScope;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleTags;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleTagsCategory;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleType;importjava.util.Collections;publicclassExample{publicstaticvoidmain(String[]args){ApiClientdefaultClient=ApiClient.getDefaultApiClient();ApplicationSecurityApiapiInstance=newApplicationSecurityApi(defaultClient);ApplicationSecurityWafCustomRuleCreateRequestbody=newApplicationSecurityWafCustomRuleCreateRequest().data(newApplicationSecurityWafCustomRuleCreateData().attributes(newApplicationSecurityWafCustomRuleCreateAttributes().action(newApplicationSecurityWafCustomRuleAction().action(ApplicationSecurityWafCustomRuleActionAction.BLOCK_REQUEST).parameters(newApplicationSecurityWafCustomRuleActionParameters().location("/blocking").statusCode(403L))).blocking(false).conditions(Collections.singletonList(newApplicationSecurityWafCustomRuleCondition().operator(ApplicationSecurityWafCustomRuleConditionOperator.MATCH_REGEX).parameters(newApplicationSecurityWafCustomRuleConditionParameters().data("blocked_users").inputs(Collections.singletonList(newApplicationSecurityWafCustomRuleConditionInput().address(ApplicationSecurityWafCustomRuleConditionInputAddress.SERVER_DB_STATEMENT))).options(newApplicationSecurityWafCustomRuleConditionOptions().caseSensitive(false).minLength(0L)).regex("path.*").value("custom_tag")))).enabled(false).name("Block request from a bad useragent").pathGlob("/api/search/*").scope(Collections.singletonList(newApplicationSecurityWafCustomRuleScope().env("prod").service("billing-service"))).tags(newApplicationSecurityWafCustomRuleTags().category(ApplicationSecurityWafCustomRuleTagsCategory.BUSINESS_LOGIC).type("users.login.success"))).type(ApplicationSecurityWafCustomRuleType.CUSTOM_RULE));try{ApplicationSecurityWafCustomRuleResponseresult=apiInstance.createApplicationSecurityWafCustomRule(body);System.out.println(result);}catch(ApiExceptione){System.err.println("Exception when calling ApplicationSecurityApi#createApplicationSecurityWafCustomRule");System.err.println("Status code: "+e.getCode());System.err.println("Reason: "+e.getResponseBody());System.err.println("Response headers: "+e.getResponseHeaders());e.printStackTrace();}}}
// Create a WAF custom rule returns "Created" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleAction;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleActionAction;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleActionParameters;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleCondition;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionInput;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionInputAddress;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionOperator;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionOptions;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionParameters;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleCreateAttributes;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleCreateData;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleCreateRequest;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleScope;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleTags;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleTagsCategory;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleType;usestd::collections::BTreeMap;#[tokio::main]asyncfnmain(){letbody=ApplicationSecurityWafCustomRuleCreateRequest::new(ApplicationSecurityWafCustomRuleCreateData::new(ApplicationSecurityWafCustomRuleCreateAttributes::new(false,vec![ApplicationSecurityWafCustomRuleCondition::new(ApplicationSecurityWafCustomRuleConditionOperator::MATCH_REGEX,ApplicationSecurityWafCustomRuleConditionParameters::new(vec![ApplicationSecurityWafCustomRuleConditionInput::new(ApplicationSecurityWafCustomRuleConditionInputAddress::SERVER_DB_STATEMENT,).key_path(vec![])],).data("blocked_users".to_string()).list(vec![]).options(ApplicationSecurityWafCustomRuleConditionOptions::new().case_sensitive(false).min_length(0),).regex("path.*".to_string()).value("custom_tag".to_string()),)],false,"Block request from a bad useragent".to_string(),ApplicationSecurityWafCustomRuleTags::new(ApplicationSecurityWafCustomRuleTagsCategory::BUSINESS_LOGIC,"users.login.success".to_string(),).additional_properties(BTreeMap::from([])),).action(ApplicationSecurityWafCustomRuleAction::new().action(ApplicationSecurityWafCustomRuleActionAction::BLOCK_REQUEST).parameters(ApplicationSecurityWafCustomRuleActionParameters::new().location("/blocking".to_string()).status_code(403),),).path_glob("/api/search/*".to_string()).scope(vec![ApplicationSecurityWafCustomRuleScope::new("prod".to_string(),"billing-service".to_string(),)],),ApplicationSecurityWafCustomRuleType::CUSTOM_RULE,),);letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.create_application_security_waf_custom_rule(body).await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Create a WAF custom rule returns "Created" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);constparams: v2.ApplicationSecurityApiCreateApplicationSecurityWafCustomRuleRequest={body:{data:{attributes:{action:{action:"block_request",parameters:{location:"/blocking",statusCode: 403,},},blocking: false,conditions:[{operator:"match_regex",parameters:{data:"blocked_users",inputs:[{address:"server.db.statement",keyPath:[],},],list:[],options:{caseSensitive: false,minLength: 0,},regex:"path.*",value:"custom_tag",},},],enabled: false,name:"Block request from a bad useragent",pathGlob:"/api/search/*",scope:[{env:"prod",service:"billing-service",},],tags:{category:"business_logic",type:"users.login.success",},},type:"custom_rule",},},};apiInstance.createApplicationSecurityWafCustomRule(params).then((data: v2.ApplicationSecurityWafCustomRuleResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
Response object that includes a list of WAF custom rules.
Expand All
Field
Type
Description
data
[object]
The WAF custom rule data.
attributes
object
A WAF custom rule.
action
object
The definition of ApplicationSecurityWafCustomRuleAction object.
action
enum
Override the default action to take when the WAF custom rule would block.
Allowed enum values: redirect_request,block_request
default: block_request
parameters
object
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
string
The location to redirect to when the WAF custom rule triggers.
status_code
int64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
boolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF
rule to trigger.
operator [required]
enum
Operator to use for the WAF Condition.
Allowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_match,capture_data
parameters [required]
object
The scope of the WAF custom rule.
data
string
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
[object]
List of inputs on which at least one should match with the given operator.
address [required]
enum
Input from the request on which the condition should apply.
Allowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookies,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
[string]
Specific path for the input.
list
[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and
!exact_match operator.
options
object
Options for the operator of this condition.
case_sensitive
boolean
Evaluate the value as case sensitive.
min_length
int64
Only evaluate this condition if the value has a minimum amount of characters.
regex
string
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
string
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
boolean
Indicates whether the WAF custom rule is enabled.
metadata
object
Metadata associated with the WAF Custom Rule.
added_at
date-time
The date and time the WAF custom rule was created.
added_by
string
The handle of the user who created the WAF custom rule.
added_by_name
string
The name of the user who created the WAF custom rule.
modified_at
date-time
The date and time the WAF custom rule was last updated.
modified_by
string
The handle of the user who last updated the WAF custom rule.
modified_by_name
string
The name of the user who last updated the WAF custom rule.
name [required]
string
The Name of the WAF custom rule.
path_glob
string
The path glob for the WAF custom rule.
scope
[object]
The scope of the WAF custom rule.
env [required]
string
The environment scope for the WAF custom rule.
service [required]
string
The service scope for the WAF custom rule.
tags [required]
object
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security
activity field associated with the traces.
category [required]
enum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response.
Allowed enum values: attack_attempt,business_logic,security_responses
type [required]
string
The type of the WAF rule, associated with the category will form the security activity.
id
string
The ID of the custom rule.
type
enum
The type of the resource. The value should always be custom_rule.
Allowed enum values: custom_rule
default: custom_rule
{"data":[{"attributes":{"action":{"action":"block_request","parameters":{"location":"/blocking","status_code":403}},"blocking":false,"conditions":[{"operator":"match_regex","parameters":{"data":"blocked_users","inputs":[{"address":"server.db.statement","key_path":[]}],"list":[],"options":{"case_sensitive":false,"min_length":"integer"},"regex":"path.*","value":"custom_tag"}}],"enabled":false,"metadata":{"added_at":"2021-01-01T00:00:00Z","added_by":"john.doe@datadoghq.com","added_by_name":"John Doe","modified_at":"2021-01-01T00:00:00Z","modified_by":"john.doe@datadoghq.com","modified_by_name":"John Doe"},"name":"Block request from bad useragent","path_glob":"/api/search/*","scope":[{"env":"prod","service":"billing-service"}],"tags":{"category":"business_logic","type":"users.login.success"}},"id":"2857c47d-1e3a-4300-8b2f-dc24089c084b","type":"custom_rule"}]}
"""
List all WAF custom rules returns "OK" response
"""fromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApiconfiguration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.list_application_security_waf_custom_rules()print(response)
# List all WAF custom rules returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.newpapi_instance.list_application_security_waf_custom_rules()
// List all WAF custom rules returns "OK" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.ListApplicationSecurityWAFCustomRules(ctx)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.ListApplicationSecurityWAFCustomRules`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.ListApplicationSecurityWAFCustomRules`:\n%s\n",responseContent)}
// List all WAF custom rules returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;#[tokio::main]asyncfnmain(){letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.list_application_security_waf_custom_rules().await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* List all WAF custom rules returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);apiInstance.listApplicationSecurityWAFCustomRules().then((data: v2.ApplicationSecurityWafCustomRuleListResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
The definition of ApplicationSecurityWafCustomRuleAction object.
action
enum
Override the default action to take when the WAF custom rule would block.
Allowed enum values: redirect_request,block_request
default: block_request
parameters
object
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
string
The location to redirect to when the WAF custom rule triggers.
status_code
int64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
boolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF
rule to trigger.
operator [required]
enum
Operator to use for the WAF Condition.
Allowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_match,capture_data
parameters [required]
object
The scope of the WAF custom rule.
data
string
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
[object]
List of inputs on which at least one should match with the given operator.
address [required]
enum
Input from the request on which the condition should apply.
Allowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookies,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
[string]
Specific path for the input.
list
[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and
!exact_match operator.
options
object
Options for the operator of this condition.
case_sensitive
boolean
Evaluate the value as case sensitive.
min_length
int64
Only evaluate this condition if the value has a minimum amount of characters.
regex
string
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
string
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
boolean
Indicates whether the WAF custom rule is enabled.
name [required]
string
The Name of the WAF custom rule.
path_glob
string
The path glob for the WAF custom rule.
scope
[object]
The scope of the WAF custom rule.
env [required]
string
The environment scope for the WAF custom rule.
service [required]
string
The service scope for the WAF custom rule.
tags [required]
object
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security
activity field associated with the traces.
category [required]
enum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response.
Allowed enum values: attack_attempt,business_logic,security_responses
type [required]
string
The type of the WAF rule, associated with the category will form the security activity.
type [required]
enum
The type of the resource. The value should always be custom_rule.
Allowed enum values: custom_rule
Response object that includes a single WAF custom rule.
Expand All
Field
Type
Description
data
object
Object for a single WAF custom rule.
attributes
object
A WAF custom rule.
action
object
The definition of ApplicationSecurityWafCustomRuleAction object.
action
enum
Override the default action to take when the WAF custom rule would block.
Allowed enum values: redirect_request,block_request
default: block_request
parameters
object
The definition of ApplicationSecurityWafCustomRuleActionParameters object.
location
string
The location to redirect to when the WAF custom rule triggers.
status_code
int64
The status code to return when the WAF custom rule triggers.
default: 403
blocking [required]
boolean
Indicates whether the WAF custom rule will block the request.
conditions [required]
[object]
Conditions for which the WAF Custom Rule will triggers, all conditions needs to match in order for the WAF
rule to trigger.
operator [required]
enum
Operator to use for the WAF Condition.
Allowed enum values: match_regex,!match_regex,phrase_match,!phrase_match,is_xss,is_sqli,exact_match,!exact_match,ip_match,!ip_match,capture_data
parameters [required]
object
The scope of the WAF custom rule.
data
string
Identifier of a list of data from the denylist. Can only be used as substitution from the list parameter.
inputs [required]
[object]
List of inputs on which at least one should match with the given operator.
address [required]
enum
Input from the request on which the condition should apply.
Allowed enum values: server.db.statement,server.io.fs.file,server.io.net.url,server.sys.shell.cmd,server.request.method,server.request.uri.raw,server.request.path_params,server.request.query,server.request.headers.no_cookies,server.request.cookies,server.request.trailers,server.request.body,server.response.status,server.response.headers.no_cookies,server.response.trailers,grpc.server.request.metadata,grpc.server.request.message,grpc.server.method,graphql.server.all_resolvers,usr.id,http.client_ip
key_path
[string]
Specific path for the input.
list
[string]
List of value to use with the condition. Only used with the phrase_match, !phrase_match, exact_match and
!exact_match operator.
options
object
Options for the operator of this condition.
case_sensitive
boolean
Evaluate the value as case sensitive.
min_length
int64
Only evaluate this condition if the value has a minimum amount of characters.
regex
string
Regex to use with the condition. Only used with match_regex and !match_regex operator.
value
string
Store the captured value in the specified tag name. Only used with the capture_data operator.
enabled [required]
boolean
Indicates whether the WAF custom rule is enabled.
metadata
object
Metadata associated with the WAF Custom Rule.
added_at
date-time
The date and time the WAF custom rule was created.
added_by
string
The handle of the user who created the WAF custom rule.
added_by_name
string
The name of the user who created the WAF custom rule.
modified_at
date-time
The date and time the WAF custom rule was last updated.
modified_by
string
The handle of the user who last updated the WAF custom rule.
modified_by_name
string
The name of the user who last updated the WAF custom rule.
name [required]
string
The Name of the WAF custom rule.
path_glob
string
The path glob for the WAF custom rule.
scope
[object]
The scope of the WAF custom rule.
env [required]
string
The environment scope for the WAF custom rule.
service [required]
string
The service scope for the WAF custom rule.
tags [required]
object
Tags associated with the WAF Custom Rule. The concatenation of category and type will form the security
activity field associated with the traces.
category [required]
enum
The category of the WAF Rule, can be either business_logic, attack_attempt or security_response.
Allowed enum values: attack_attempt,business_logic,security_responses
type [required]
string
The type of the WAF rule, associated with the category will form the security activity.
id
string
The ID of the custom rule.
type
enum
The type of the resource. The value should always be custom_rule.
Allowed enum values: custom_rule
default: custom_rule
{"data":{"attributes":{"action":{"action":"block_request","parameters":{"location":"/blocking","status_code":403}},"blocking":false,"conditions":[{"operator":"match_regex","parameters":{"data":"blocked_users","inputs":[{"address":"server.db.statement","key_path":[]}],"list":[],"options":{"case_sensitive":false,"min_length":"integer"},"regex":"path.*","value":"custom_tag"}}],"enabled":false,"metadata":{"added_at":"2021-01-01T00:00:00Z","added_by":"john.doe@datadoghq.com","added_by_name":"John Doe","modified_at":"2021-01-01T00:00:00Z","modified_by":"john.doe@datadoghq.com","modified_by_name":"John Doe"},"name":"Block request from bad useragent","path_glob":"/api/search/*","scope":[{"env":"prod","service":"billing-service"}],"tags":{"category":"business_logic","type":"users.login.success"}},"id":"2857c47d-1e3a-4300-8b2f-dc24089c084b","type":"custom_rule"}}
// Update a WAF Custom Rule returns "OK" response
packagemainimport("context""encoding/json""fmt""os""github.com/DataDog/datadog-api-client-go/v2/api/datadog""github.com/DataDog/datadog-api-client-go/v2/api/datadogV2")funcmain(){// there is a valid "custom_rule" in the system
CustomRuleDataID:=os.Getenv("CUSTOM_RULE_DATA_ID")body:=datadogV2.ApplicationSecurityWafCustomRuleUpdateRequest{Data:datadogV2.ApplicationSecurityWafCustomRuleUpdateData{Type:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULETYPE_CUSTOM_RULE,Attributes:datadogV2.ApplicationSecurityWafCustomRuleUpdateAttributes{Blocking:false,Conditions:[]datadogV2.ApplicationSecurityWafCustomRuleCondition{{Operator:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULECONDITIONOPERATOR_MATCH_REGEX,Parameters:datadogV2.ApplicationSecurityWafCustomRuleConditionParameters{Inputs:[]datadogV2.ApplicationSecurityWafCustomRuleConditionInput{{Address:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULECONDITIONINPUTADDRESS_SERVER_REQUEST_QUERY,KeyPath:[]string{"id",},},},Regex:datadog.PtrString("badactor"),},},},Enabled:false,Name:"test",PathGlob:datadog.PtrString("/test"),Scope:[]datadogV2.ApplicationSecurityWafCustomRuleScope{{Env:"test",Service:"test",},},Tags:datadogV2.ApplicationSecurityWafCustomRuleTags{Category:datadogV2.APPLICATIONSECURITYWAFCUSTOMRULETAGSCATEGORY_ATTACK_ATTEMPT,Type:"test",},},},}ctx:=datadog.NewDefaultContext(context.Background())configuration:=datadog.NewConfiguration()apiClient:=datadog.NewAPIClient(configuration)api:=datadogV2.NewApplicationSecurityApi(apiClient)resp,r,err:=api.UpdateApplicationSecurityWafCustomRule(ctx,CustomRuleDataID,body)iferr!=nil{fmt.Fprintf(os.Stderr,"Error when calling `ApplicationSecurityApi.UpdateApplicationSecurityWafCustomRule`: %v\n",err)fmt.Fprintf(os.Stderr,"Full HTTP response: %v\n",r)}responseContent,_:=json.MarshalIndent(resp,""," ")fmt.Fprintf(os.Stdout,"Response from `ApplicationSecurityApi.UpdateApplicationSecurityWafCustomRule`:\n%s\n",responseContent)}
// Update a WAF Custom Rule returns "OK" responseimportcom.datadog.api.client.ApiClient;importcom.datadog.api.client.ApiException;importcom.datadog.api.client.v2.api.ApplicationSecurityApi;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleCondition;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionInput;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionInputAddress;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionOperator;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleConditionParameters;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleResponse;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleScope;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleTags;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleTagsCategory;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleType;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleUpdateAttributes;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleUpdateData;importcom.datadog.api.client.v2.model.ApplicationSecurityWafCustomRuleUpdateRequest;importjava.util.Collections;publicclassExample{publicstaticvoidmain(String[]args){ApiClientdefaultClient=ApiClient.getDefaultApiClient();ApplicationSecurityApiapiInstance=newApplicationSecurityApi(defaultClient);// there is a valid "custom_rule" in the systemStringCUSTOM_RULE_DATA_ID=System.getenv("CUSTOM_RULE_DATA_ID");ApplicationSecurityWafCustomRuleUpdateRequestbody=newApplicationSecurityWafCustomRuleUpdateRequest().data(newApplicationSecurityWafCustomRuleUpdateData().type(ApplicationSecurityWafCustomRuleType.CUSTOM_RULE).attributes(newApplicationSecurityWafCustomRuleUpdateAttributes().blocking(false).conditions(Collections.singletonList(newApplicationSecurityWafCustomRuleCondition().operator(ApplicationSecurityWafCustomRuleConditionOperator.MATCH_REGEX).parameters(newApplicationSecurityWafCustomRuleConditionParameters().inputs(Collections.singletonList(newApplicationSecurityWafCustomRuleConditionInput().address(ApplicationSecurityWafCustomRuleConditionInputAddress.SERVER_REQUEST_QUERY).keyPath(Collections.singletonList("id")))).regex("badactor")))).enabled(false).name("test").pathGlob("/test").scope(Collections.singletonList(newApplicationSecurityWafCustomRuleScope().env("test").service("test"))).tags(newApplicationSecurityWafCustomRuleTags().category(ApplicationSecurityWafCustomRuleTagsCategory.ATTACK_ATTEMPT).type("test"))));try{ApplicationSecurityWafCustomRuleResponseresult=apiInstance.updateApplicationSecurityWafCustomRule(CUSTOM_RULE_DATA_ID,body);System.out.println(result);}catch(ApiExceptione){System.err.println("Exception when calling ApplicationSecurityApi#updateApplicationSecurityWafCustomRule");System.err.println("Status code: "+e.getCode());System.err.println("Reason: "+e.getResponseBody());System.err.println("Response headers: "+e.getResponseHeaders());e.printStackTrace();}}}
"""
Update a WAF Custom Rule returns "OK" response
"""fromosimportenvironfromdatadog_api_clientimportApiClient,Configurationfromdatadog_api_client.v2.api.application_security_apiimportApplicationSecurityApifromdatadog_api_client.v2.model.application_security_waf_custom_rule_conditionimport(ApplicationSecurityWafCustomRuleCondition,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_inputimport(ApplicationSecurityWafCustomRuleConditionInput,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_input_addressimport(ApplicationSecurityWafCustomRuleConditionInputAddress,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_operatorimport(ApplicationSecurityWafCustomRuleConditionOperator,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_condition_parametersimport(ApplicationSecurityWafCustomRuleConditionParameters,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_scopeimportApplicationSecurityWafCustomRuleScopefromdatadog_api_client.v2.model.application_security_waf_custom_rule_tagsimportApplicationSecurityWafCustomRuleTagsfromdatadog_api_client.v2.model.application_security_waf_custom_rule_tags_categoryimport(ApplicationSecurityWafCustomRuleTagsCategory,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_typeimportApplicationSecurityWafCustomRuleTypefromdatadog_api_client.v2.model.application_security_waf_custom_rule_update_attributesimport(ApplicationSecurityWafCustomRuleUpdateAttributes,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_update_dataimport(ApplicationSecurityWafCustomRuleUpdateData,)fromdatadog_api_client.v2.model.application_security_waf_custom_rule_update_requestimport(ApplicationSecurityWafCustomRuleUpdateRequest,)# there is a valid "custom_rule" in the systemCUSTOM_RULE_DATA_ID=environ["CUSTOM_RULE_DATA_ID"]body=ApplicationSecurityWafCustomRuleUpdateRequest(data=ApplicationSecurityWafCustomRuleUpdateData(type=ApplicationSecurityWafCustomRuleType.CUSTOM_RULE,attributes=ApplicationSecurityWafCustomRuleUpdateAttributes(blocking=False,conditions=[ApplicationSecurityWafCustomRuleCondition(operator=ApplicationSecurityWafCustomRuleConditionOperator.MATCH_REGEX,parameters=ApplicationSecurityWafCustomRuleConditionParameters(inputs=[ApplicationSecurityWafCustomRuleConditionInput(address=ApplicationSecurityWafCustomRuleConditionInputAddress.SERVER_REQUEST_QUERY,key_path=["id",],),],regex="badactor",),),],enabled=False,name="test",path_glob="/test",scope=[ApplicationSecurityWafCustomRuleScope(env="test",service="test",),],tags=ApplicationSecurityWafCustomRuleTags(category=ApplicationSecurityWafCustomRuleTagsCategory.ATTACK_ATTEMPT,type="test",),),),)configuration=Configuration()withApiClient(configuration)asapi_client:api_instance=ApplicationSecurityApi(api_client)response=api_instance.update_application_security_waf_custom_rule(custom_rule_id=CUSTOM_RULE_DATA_ID,body=body)print(response)
# Update a WAF Custom Rule returns "OK" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.new# there is a valid "custom_rule" in the systemCUSTOM_RULE_DATA_ID=ENV["CUSTOM_RULE_DATA_ID"]body=DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleUpdateRequest.new({data:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleUpdateData.new({type:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleType::CUSTOM_RULE,attributes:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleUpdateAttributes.new({blocking:false,conditions:[DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleCondition.new({operator:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionOperator::MATCH_REGEX,parameters:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionParameters.new({inputs:[DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionInput.new({address:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleConditionInputAddress::SERVER_REQUEST_QUERY,key_path:["id",],}),],regex:"badactor",}),}),],enabled:false,name:"test",path_glob:"/test",scope:[DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleScope.new({env:"test",service:"test",}),],tags:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleTags.new({category:DatadogAPIClient::V2::ApplicationSecurityWafCustomRuleTagsCategory::ATTACK_ATTEMPT,type:"test",}),}),}),})papi_instance.update_application_security_waf_custom_rule(CUSTOM_RULE_DATA_ID,body)
// Update a WAF Custom Rule returns "OK" response
usedatadog_api_client::datadog;usedatadog_api_client::datadogV2::api_application_security::ApplicationSecurityAPI;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleCondition;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionInput;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionInputAddress;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionOperator;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleConditionParameters;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleScope;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleTags;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleTagsCategory;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleType;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleUpdateAttributes;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleUpdateData;usedatadog_api_client::datadogV2::model::ApplicationSecurityWafCustomRuleUpdateRequest;usestd::collections::BTreeMap;#[tokio::main]asyncfnmain(){// there is a valid "custom_rule" in the system
letcustom_rule_data_id=std::env::var("CUSTOM_RULE_DATA_ID").unwrap();letbody=ApplicationSecurityWafCustomRuleUpdateRequest::new(ApplicationSecurityWafCustomRuleUpdateData::new(ApplicationSecurityWafCustomRuleUpdateAttributes::new(false,vec![ApplicationSecurityWafCustomRuleCondition::new(ApplicationSecurityWafCustomRuleConditionOperator::MATCH_REGEX,ApplicationSecurityWafCustomRuleConditionParameters::new(vec![ApplicationSecurityWafCustomRuleConditionInput::new(ApplicationSecurityWafCustomRuleConditionInputAddress::SERVER_REQUEST_QUERY,).key_path(vec!["id".to_string()])],).regex("badactor".to_string()),)],false,"test".to_string(),ApplicationSecurityWafCustomRuleTags::new(ApplicationSecurityWafCustomRuleTagsCategory::ATTACK_ATTEMPT,"test".to_string(),).additional_properties(BTreeMap::from([])),).path_glob("/test".to_string()).scope(vec![ApplicationSecurityWafCustomRuleScope::new("test".to_string(),"test".to_string())]),ApplicationSecurityWafCustomRuleType::CUSTOM_RULE,),);letconfiguration=datadog::Configuration::new();letapi=ApplicationSecurityAPI::with_config(configuration);letresp=api.update_application_security_waf_custom_rule(custom_rule_data_id.clone(),body).await;ifletOk(value)=resp{println!("{:#?}",value);}else{println!("{:#?}",resp.unwrap_err());}}
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Update a WAF Custom Rule returns "OK" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);// there is a valid "custom_rule" in the system
constCUSTOM_RULE_DATA_ID=process.env.CUSTOM_RULE_DATA_IDasstring;constparams: v2.ApplicationSecurityApiUpdateApplicationSecurityWafCustomRuleRequest={body:{data:{type:"custom_rule",attributes:{blocking: false,conditions:[{operator:"match_regex",parameters:{inputs:[{address:"server.request.query",keyPath:["id"],},],regex:"badactor",},},],enabled: false,name:"test",pathGlob:"/test",scope:[{env:"test",service:"test",},],tags:{category:"attack_attempt",type:"test",},},},},customRuleId: CUSTOM_RULE_DATA_ID,};apiInstance.updateApplicationSecurityWafCustomRule(params).then((data: v2.ApplicationSecurityWafCustomRuleResponse)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));
# Delete a WAF Custom Rule returns "No Content" responserequire"datadog_api_client"api_instance=DatadogAPIClient::V2::ApplicationSecurityAPI.newapi_instance.delete_application_security_waf_custom_rule("custom_rule_id")
DD_SITE="datadoghq.comus3.datadoghq.comus5.datadoghq.comdatadoghq.euap1.datadoghq.comddog-gov.com"DD_API_KEY="<API-KEY>"DD_APP_KEY="<APP-KEY>"cargo run
/**
* Delete a WAF Custom Rule returns "No Content" response
*/import{client,v2}from"@datadog/datadog-api-client";constconfiguration=client.createConfiguration();constapiInstance=newv2.ApplicationSecurityApi(configuration);constparams: v2.ApplicationSecurityApiDeleteApplicationSecurityWafCustomRuleRequest={customRuleId:"custom_rule_id",};apiInstance.deleteApplicationSecurityWafCustomRule(params).then((data: any)=>{console.log("API called successfully. Returned data: "+JSON.stringify(data));}).catch((error: any)=>console.error(error));