amazonka-wafv2-2.0: Amazon WAFV2 SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.WAFV2.Types.RateBasedStatement

Description

 
Synopsis

Documentation

data RateBasedStatement Source #

A rate-based rule tracks the rate of requests for each originating IP address, and triggers the rule action when the rate exceeds a limit that you specify on the number of requests in any 5-minute time span. You can use this to put a temporary block on requests from an IP address that is sending excessive requests.

WAF tracks and manages web requests separately for each instance of a rate-based rule that you use. For example, if you provide the same rate-based rule settings in two web ACLs, each of the two rule statements represents a separate instance of the rate-based rule and gets its own tracking and management by WAF. If you define a rate-based rule inside a rule group, and then use that rule group in multiple places, each use creates a separate instance of the rate-based rule that gets its own tracking and management by WAF.

When the rule action triggers, WAF blocks additional requests from the IP address until the request rate falls below the limit.

You can optionally nest another statement inside the rate-based statement, to narrow the scope of the rule so that it only counts requests that match the nested statement. For example, based on recent requests that you have seen from an attacker, you might create a rate-based rule with a nested AND rule statement that contains the following nested statements:

  • An IP match statement with an IP set that specified the address 192.0.2.44.
  • A string match statement that searches in the User-Agent header for the string BadBot.

In this rate-based rule, you also define a rate limit. For this example, the rate limit is 1,000. Requests that meet the criteria of both of the nested statements are counted. If the count exceeds 1,000 requests per five minutes, the rule action triggers. Requests that do not meet the criteria of both of the nested statements are not counted towards the rate limit and are not affected by this rule.

You cannot nest a RateBasedStatement inside another statement, for example inside a NotStatement or OrStatement. You can define a RateBasedStatement inside a web ACL and inside a rule group.

See: newRateBasedStatement smart constructor.

Constructors

RateBasedStatement' 

Fields

  • forwardedIPConfig :: Maybe ForwardedIPConfig

    The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.

    If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.

    This is required if AggregateKeyType is set to FORWARDED_IP.

  • scopeDownStatement :: Maybe Statement

    An optional nested statement that narrows the scope of the web requests that are evaluated by the rate-based statement. Requests are only tracked by the rate-based statement if they match the scope-down statement. You can use any nestable Statement in the scope-down statement, and you can nest statements at any level, the same as you can for a rule statement.

  • limit :: Natural

    The limit on requests per 5-minute period for a single originating IP address. If the statement includes a ScopeDownStatement, this limit is applied only to the requests that match the statement.

  • aggregateKeyType :: RateBasedStatementAggregateKeyType

    Setting that indicates how to aggregate the request counts. The options are the following:

    • IP - Aggregate the request counts on the IP address from the web request origin.
    • FORWARDED_IP - Aggregate the request counts on the first IP address in an HTTP header. If you use this, configure the ForwardedIPConfig, to specify the header to use.

Instances

Instances details
FromJSON RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

ToJSON RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

Generic RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

Associated Types

type Rep RateBasedStatement :: Type -> Type #

Read RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

Show RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

NFData RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

Methods

rnf :: RateBasedStatement -> () #

Eq RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

Hashable RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

type Rep RateBasedStatement Source # 
Instance details

Defined in Amazonka.WAFV2.Types.RateBasedStatement

type Rep RateBasedStatement = D1 ('MetaData "RateBasedStatement" "Amazonka.WAFV2.Types.RateBasedStatement" "amazonka-wafv2-2.0-3v3WgpYn7RT5hSd6MsT5dN" 'False) (C1 ('MetaCons "RateBasedStatement'" 'PrefixI 'True) ((S1 ('MetaSel ('Just "forwardedIPConfig") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe ForwardedIPConfig)) :*: S1 ('MetaSel ('Just "scopeDownStatement") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe Statement))) :*: (S1 ('MetaSel ('Just "limit") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 Natural) :*: S1 ('MetaSel ('Just "aggregateKeyType") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 RateBasedStatementAggregateKeyType))))

newRateBasedStatement Source #

Create a value of RateBasedStatement with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:forwardedIPConfig:RateBasedStatement', rateBasedStatement_forwardedIPConfig - The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.

If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.

This is required if AggregateKeyType is set to FORWARDED_IP.

$sel:scopeDownStatement:RateBasedStatement', rateBasedStatement_scopeDownStatement - An optional nested statement that narrows the scope of the web requests that are evaluated by the rate-based statement. Requests are only tracked by the rate-based statement if they match the scope-down statement. You can use any nestable Statement in the scope-down statement, and you can nest statements at any level, the same as you can for a rule statement.

$sel:limit:RateBasedStatement', rateBasedStatement_limit - The limit on requests per 5-minute period for a single originating IP address. If the statement includes a ScopeDownStatement, this limit is applied only to the requests that match the statement.

$sel:aggregateKeyType:RateBasedStatement', rateBasedStatement_aggregateKeyType - Setting that indicates how to aggregate the request counts. The options are the following:

  • IP - Aggregate the request counts on the IP address from the web request origin.
  • FORWARDED_IP - Aggregate the request counts on the first IP address in an HTTP header. If you use this, configure the ForwardedIPConfig, to specify the header to use.

rateBasedStatement_forwardedIPConfig :: Lens' RateBasedStatement (Maybe ForwardedIPConfig) Source #

The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name.

If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.

This is required if AggregateKeyType is set to FORWARDED_IP.

rateBasedStatement_scopeDownStatement :: Lens' RateBasedStatement (Maybe Statement) Source #

An optional nested statement that narrows the scope of the web requests that are evaluated by the rate-based statement. Requests are only tracked by the rate-based statement if they match the scope-down statement. You can use any nestable Statement in the scope-down statement, and you can nest statements at any level, the same as you can for a rule statement.

rateBasedStatement_limit :: Lens' RateBasedStatement Natural Source #

The limit on requests per 5-minute period for a single originating IP address. If the statement includes a ScopeDownStatement, this limit is applied only to the requests that match the statement.

rateBasedStatement_aggregateKeyType :: Lens' RateBasedStatement RateBasedStatementAggregateKeyType Source #

Setting that indicates how to aggregate the request counts. The options are the following:

  • IP - Aggregate the request counts on the IP address from the web request origin.
  • FORWARDED_IP - Aggregate the request counts on the first IP address in an HTTP header. If you use this, configure the ForwardedIPConfig, to specify the header to use.