Rule

akamai_appsec_rule

Modifies a Kona Rule Set rule's action, conditions, and exceptions.

Scopes: Rule

Example

terraform {
  required_providers {
    akamai = {
      source = "akamai/akamai"
    }
  }
}

provider "akamai" {
  edgerc = "~/.edgerc"
}

// USE CASE: User wants to add an action and condition-exception information to a rule by using a JSON-formatted input file.

data "akamai_appsec_configuration" "configuration" {
  name = "Documentation"
}
resource "akamai_appsec_rule" "rule" {
  config_id           = data.akamai_appsec_configuration.configuration.config_id
  security_policy_id  = "gms1_134637"
  rule_id             = 60029316
  rule_action         = "deny"
  condition_exception = file("${path.module}/condition_exception.json")
}

Argument reference

This resource supports the following arguments:

  • config_id (Required). Unique identifier of the security configuration associated with the Kona Rule Set rule being modified.

  • security_policy_id (Required). Unique identifier of the security policy associated with the Kona Rule Set rule being modified.

  • rule_id (Required). Unique identifier of the rule being modified.

  • rule_action - (Required except when the policy in ASE AUTO mode) Allowed values are:

    • alert. Record the event.
    • deny. Block the request.
    • denycustom{custom_deny_id}. Take the action specified by the custom deny.
    • none. Take no action. or none to take no action.

    ASE Beta. if policy is in ASE_AUTO mode, only condition_exception can be modified, "ASE" (Adaptive Security Engine) is currently in beta. Please contact your Akamai representative to learn more.

ūüöß

Beta

If policy is in ASE_AUTO mode, only condition_exception can be modified, "ASE" (Adaptive Security Engine) is currently in beta. Please contact your Akamai representative to learn more.

  • condition_exception (Optional). Path to a JSON file containing a description of the conditions and exceptions to be associated with a rule.