amazonka-shield-2.0: Amazon Shield SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.Shield.Types.AttackDetail

Description

 
Synopsis

Documentation

data AttackDetail Source #

The details of a DDoS attack.

See: newAttackDetail smart constructor.

Constructors

AttackDetail' 

Fields

Instances

Instances details
FromJSON AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

Generic AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

Associated Types

type Rep AttackDetail :: Type -> Type #

Read AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

Show AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

NFData AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

Methods

rnf :: AttackDetail -> () #

Eq AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

Hashable AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

type Rep AttackDetail Source # 
Instance details

Defined in Amazonka.Shield.Types.AttackDetail

newAttackDetail :: AttackDetail Source #

Create a value of AttackDetail with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:attackCounters:AttackDetail', attackDetail_attackCounters - List of counters that describe the attack for the specified time period.

$sel:attackId:AttackDetail', attackDetail_attackId - The unique identifier (ID) of the attack.

$sel:attackProperties:AttackDetail', attackDetail_attackProperties - The array of objects that provide details of the Shield event.

For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon CloudWatch metrics. For more information, see Shield metrics and alarms in the WAF Developer Guide.

$sel:endTime:AttackDetail', attackDetail_endTime - The time the attack ended, in Unix time in seconds.

$sel:mitigations:AttackDetail', attackDetail_mitigations - List of mitigation actions taken for the attack.

$sel:resourceArn:AttackDetail', attackDetail_resourceArn - The ARN (Amazon Resource Name) of the resource that was attacked.

$sel:startTime:AttackDetail', attackDetail_startTime - The time the attack started, in Unix time in seconds.

$sel:subResources:AttackDetail', attackDetail_subResources - If applicable, additional detail about the resource being attacked, for example, IP address or URL.

attackDetail_attackCounters :: Lens' AttackDetail (Maybe [SummarizedCounter]) Source #

List of counters that describe the attack for the specified time period.

attackDetail_attackId :: Lens' AttackDetail (Maybe Text) Source #

The unique identifier (ID) of the attack.

attackDetail_attackProperties :: Lens' AttackDetail (Maybe [AttackProperty]) Source #

The array of objects that provide details of the Shield event.

For infrastructure layer events (L3 and L4 events), you can view metrics for top contributors in Amazon CloudWatch metrics. For more information, see Shield metrics and alarms in the WAF Developer Guide.

attackDetail_endTime :: Lens' AttackDetail (Maybe UTCTime) Source #

The time the attack ended, in Unix time in seconds.

attackDetail_mitigations :: Lens' AttackDetail (Maybe [Mitigation]) Source #

List of mitigation actions taken for the attack.

attackDetail_resourceArn :: Lens' AttackDetail (Maybe Text) Source #

The ARN (Amazon Resource Name) of the resource that was attacked.

attackDetail_startTime :: Lens' AttackDetail (Maybe UTCTime) Source #

The time the attack started, in Unix time in seconds.

attackDetail_subResources :: Lens' AttackDetail (Maybe [SubResourceSummary]) Source #

If applicable, additional detail about the resource being attacked, for example, IP address or URL.