Struct aws_sdk_wafv2::model::LoggingConfiguration
source · [−]#[non_exhaustive]pub struct LoggingConfiguration {
pub resource_arn: Option<String>,
pub log_destination_configs: Option<Vec<String>>,
pub redacted_fields: Option<Vec<FieldToMatch>>,
pub managed_by_firewall_manager: bool,
pub logging_filter: Option<LoggingFilter>,
}Expand description
Defines an association between logging destinations and a web ACL resource, for logging from WAF. As part of the association, you can specify parts of the standard logging fields to keep out of the logs and you can specify filters so that you log only a subset of the logging records.
You can define one logging destination per web ACL.
You can access information about the traffic that WAF inspects using the following steps:
-
Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose. For information about configuring logging destinations and the permissions that are required for each, see Logging web ACL traffic information in the WAF Developer Guide.
-
Associate your logging destination to your web ACL using a
PutLoggingConfigurationrequest.
When you successfully enable logging using a PutLoggingConfiguration request, WAF creates an additional role or policy that is required to write logs to the logging destination. For an Amazon CloudWatch Logs log group, WAF creates a resource policy on the log group. For an Amazon S3 bucket, WAF creates a bucket policy. For an Amazon Kinesis Data Firehose, WAF creates a service-linked role.
For additional information about web ACL logging, see Logging web ACL traffic information in the WAF Developer Guide.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.resource_arn: Option<String>The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs.
log_destination_configs: Option<Vec<String>>The logging destination configuration that you want to associate with the web ACL.
You can associate one logging destination to a web ACL.
redacted_fields: Option<Vec<FieldToMatch>>The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be xxx.
You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, Method, and JsonBody.
managed_by_firewall_manager: boolIndicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.
logging_filter: Option<LoggingFilter>Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.
Implementations
sourceimpl LoggingConfiguration
impl LoggingConfiguration
sourcepub fn resource_arn(&self) -> Option<&str>
pub fn resource_arn(&self) -> Option<&str>
The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs.
sourcepub fn log_destination_configs(&self) -> Option<&[String]>
pub fn log_destination_configs(&self) -> Option<&[String]>
The logging destination configuration that you want to associate with the web ACL.
You can associate one logging destination to a web ACL.
sourcepub fn redacted_fields(&self) -> Option<&[FieldToMatch]>
pub fn redacted_fields(&self) -> Option<&[FieldToMatch]>
The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be xxx.
You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, Method, and JsonBody.
sourcepub fn managed_by_firewall_manager(&self) -> bool
pub fn managed_by_firewall_manager(&self) -> bool
Indicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.
sourcepub fn logging_filter(&self) -> Option<&LoggingFilter>
pub fn logging_filter(&self) -> Option<&LoggingFilter>
Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.
sourceimpl LoggingConfiguration
impl LoggingConfiguration
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture LoggingConfiguration
Trait Implementations
sourceimpl Clone for LoggingConfiguration
impl Clone for LoggingConfiguration
sourcefn clone(&self) -> LoggingConfiguration
fn clone(&self) -> LoggingConfiguration
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source. Read more
sourceimpl Debug for LoggingConfiguration
impl Debug for LoggingConfiguration
sourceimpl PartialEq<LoggingConfiguration> for LoggingConfiguration
impl PartialEq<LoggingConfiguration> for LoggingConfiguration
sourcefn eq(&self, other: &LoggingConfiguration) -> bool
fn eq(&self, other: &LoggingConfiguration) -> bool
This method tests for self and other values to be equal, and is used
by ==. Read more
sourcefn ne(&self, other: &LoggingConfiguration) -> bool
fn ne(&self, other: &LoggingConfiguration) -> bool
This method tests for !=.
impl StructuralPartialEq for LoggingConfiguration
Auto Trait Implementations
impl RefUnwindSafe for LoggingConfiguration
impl Send for LoggingConfiguration
impl Sync for LoggingConfiguration
impl Unpin for LoggingConfiguration
impl UnwindSafe for LoggingConfiguration
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber to this type, returning a
WithDispatch wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber to this type, returning a
WithDispatch wrapper. Read more