Struct aws_sdk_wafv2::types::builders::LoggingConfigurationBuilder
source · #[non_exhaustive]pub struct LoggingConfigurationBuilder { /* private fields */ }
Expand description
A builder for LoggingConfiguration
.
Implementations§
source§impl LoggingConfigurationBuilder
impl LoggingConfigurationBuilder
sourcepub fn resource_arn(self, input: impl Into<String>) -> Self
pub fn resource_arn(self, input: impl Into<String>) -> Self
The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs
.
sourcepub fn set_resource_arn(self, input: Option<String>) -> Self
pub fn set_resource_arn(self, input: Option<String>) -> Self
The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs
.
sourcepub fn get_resource_arn(&self) -> &Option<String>
pub fn get_resource_arn(&self) -> &Option<String>
The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs
.
sourcepub fn log_destination_configs(self, input: impl Into<String>) -> Self
pub fn log_destination_configs(self, input: impl Into<String>) -> Self
Appends an item to log_destination_configs
.
To override the contents of this collection use set_log_destination_configs
.
The logging destination configuration that you want to associate with the web ACL.
You can associate one logging destination to a web ACL.
sourcepub fn set_log_destination_configs(self, input: Option<Vec<String>>) -> Self
pub fn set_log_destination_configs(self, input: Option<Vec<String>>) -> Self
The logging destination configuration that you want to associate with the web ACL.
You can associate one logging destination to a web ACL.
sourcepub fn get_log_destination_configs(&self) -> &Option<Vec<String>>
pub fn get_log_destination_configs(&self) -> &Option<Vec<String>>
The logging destination configuration that you want to associate with the web ACL.
You can associate one logging destination to a web ACL.
sourcepub fn redacted_fields(self, input: FieldToMatch) -> Self
pub fn redacted_fields(self, input: FieldToMatch) -> Self
Appends an item to redacted_fields
.
To override the contents of this collection use set_redacted_fields
.
The parts of the request that you want to keep out of the logs.
For example, if you redact the SingleHeader
field, the HEADER
field in the logs will be REDACTED
for all rules that use the SingleHeader
FieldToMatch
setting.
Redaction applies only to the component that's specified in the rule's FieldToMatch
setting, so the SingleHeader
redaction doesn't apply to rules that use the Headers
FieldToMatch
.
You can specify only the following fields for redaction: UriPath
, QueryString
, SingleHeader
, and Method
.
This setting has no impact on request sampling. With request sampling, the only way to exclude fields is by disabling sampling in the web ACL visibility configuration.
sourcepub fn set_redacted_fields(self, input: Option<Vec<FieldToMatch>>) -> Self
pub fn set_redacted_fields(self, input: Option<Vec<FieldToMatch>>) -> Self
The parts of the request that you want to keep out of the logs.
For example, if you redact the SingleHeader
field, the HEADER
field in the logs will be REDACTED
for all rules that use the SingleHeader
FieldToMatch
setting.
Redaction applies only to the component that's specified in the rule's FieldToMatch
setting, so the SingleHeader
redaction doesn't apply to rules that use the Headers
FieldToMatch
.
You can specify only the following fields for redaction: UriPath
, QueryString
, SingleHeader
, and Method
.
This setting has no impact on request sampling. With request sampling, the only way to exclude fields is by disabling sampling in the web ACL visibility configuration.
sourcepub fn get_redacted_fields(&self) -> &Option<Vec<FieldToMatch>>
pub fn get_redacted_fields(&self) -> &Option<Vec<FieldToMatch>>
The parts of the request that you want to keep out of the logs.
For example, if you redact the SingleHeader
field, the HEADER
field in the logs will be REDACTED
for all rules that use the SingleHeader
FieldToMatch
setting.
Redaction applies only to the component that's specified in the rule's FieldToMatch
setting, so the SingleHeader
redaction doesn't apply to rules that use the Headers
FieldToMatch
.
You can specify only the following fields for redaction: UriPath
, QueryString
, SingleHeader
, and Method
.
This setting has no impact on request sampling. With request sampling, the only way to exclude fields is by disabling sampling in the web ACL visibility configuration.
sourcepub fn managed_by_firewall_manager(self, input: bool) -> Self
pub fn managed_by_firewall_manager(self, input: bool) -> Self
Indicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.
sourcepub fn set_managed_by_firewall_manager(self, input: Option<bool>) -> Self
pub fn set_managed_by_firewall_manager(self, input: Option<bool>) -> Self
Indicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.
sourcepub fn get_managed_by_firewall_manager(&self) -> &Option<bool>
pub fn get_managed_by_firewall_manager(&self) -> &Option<bool>
Indicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.
sourcepub fn logging_filter(self, input: LoggingFilter) -> Self
pub fn logging_filter(self, input: LoggingFilter) -> Self
Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.
sourcepub fn set_logging_filter(self, input: Option<LoggingFilter>) -> Self
pub fn set_logging_filter(self, input: Option<LoggingFilter>) -> Self
Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.
sourcepub fn get_logging_filter(&self) -> &Option<LoggingFilter>
pub fn get_logging_filter(&self) -> &Option<LoggingFilter>
Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.
sourcepub fn log_type(self, input: LogType) -> Self
pub fn log_type(self, input: LogType) -> Self
Used to distinguish between various logging options. Currently, there is one option.
Default: WAF_LOGS
sourcepub fn set_log_type(self, input: Option<LogType>) -> Self
pub fn set_log_type(self, input: Option<LogType>) -> Self
Used to distinguish between various logging options. Currently, there is one option.
Default: WAF_LOGS
sourcepub fn get_log_type(&self) -> &Option<LogType>
pub fn get_log_type(&self) -> &Option<LogType>
Used to distinguish between various logging options. Currently, there is one option.
Default: WAF_LOGS
sourcepub fn log_scope(self, input: LogScope) -> Self
pub fn log_scope(self, input: LogScope) -> Self
The owner of the logging configuration, which must be set to CUSTOMER
for the configurations that you manage.
The log scope SECURITY_LAKE
indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide.
Default: CUSTOMER
sourcepub fn set_log_scope(self, input: Option<LogScope>) -> Self
pub fn set_log_scope(self, input: Option<LogScope>) -> Self
The owner of the logging configuration, which must be set to CUSTOMER
for the configurations that you manage.
The log scope SECURITY_LAKE
indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide.
Default: CUSTOMER
sourcepub fn get_log_scope(&self) -> &Option<LogScope>
pub fn get_log_scope(&self) -> &Option<LogScope>
The owner of the logging configuration, which must be set to CUSTOMER
for the configurations that you manage.
The log scope SECURITY_LAKE
indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide.
Default: CUSTOMER
sourcepub fn build(self) -> Result<LoggingConfiguration, BuildError>
pub fn build(self) -> Result<LoggingConfiguration, BuildError>
Consumes the builder and constructs a LoggingConfiguration
.
This method will fail if any of the following fields are not set:
Trait Implementations§
source§impl Clone for LoggingConfigurationBuilder
impl Clone for LoggingConfigurationBuilder
source§fn clone(&self) -> LoggingConfigurationBuilder
fn clone(&self) -> LoggingConfigurationBuilder
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moresource§impl Debug for LoggingConfigurationBuilder
impl Debug for LoggingConfigurationBuilder
source§impl Default for LoggingConfigurationBuilder
impl Default for LoggingConfigurationBuilder
source§fn default() -> LoggingConfigurationBuilder
fn default() -> LoggingConfigurationBuilder
impl StructuralPartialEq for LoggingConfigurationBuilder
Auto Trait Implementations§
impl Freeze for LoggingConfigurationBuilder
impl RefUnwindSafe for LoggingConfigurationBuilder
impl Send for LoggingConfigurationBuilder
impl Sync for LoggingConfigurationBuilder
impl Unpin for LoggingConfigurationBuilder
impl UnwindSafe for LoggingConfigurationBuilder
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§unsafe fn clone_to_uninit(&self, dst: *mut T)
unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)source§impl<T> Instrument for T
impl<T> Instrument for T
source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
source§impl<T> IntoEither for T
impl<T> IntoEither for T
source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moresource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more