#[non_exhaustive]
pub struct LoggingConfigurationBuilder { /* private fields */ }
Expand description

A builder for LoggingConfiguration.

Implementations§

source§

impl LoggingConfigurationBuilder

source

pub fn resource_arn(self, input: impl Into<String>) -> Self

The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs.

This field is required.
source

pub fn set_resource_arn(self, input: Option<String>) -> Self

The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs.

source

pub fn get_resource_arn(&self) -> &Option<String>

The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs.

source

pub fn log_destination_configs(self, input: impl Into<String>) -> Self

Appends an item to log_destination_configs.

To override the contents of this collection use set_log_destination_configs.

The logging destination configuration that you want to associate with the web ACL.

You can associate one logging destination to a web ACL.

source

pub fn set_log_destination_configs(self, input: Option<Vec<String>>) -> Self

The logging destination configuration that you want to associate with the web ACL.

You can associate one logging destination to a web ACL.

source

pub fn get_log_destination_configs(&self) -> &Option<Vec<String>>

The logging destination configuration that you want to associate with the web ACL.

You can associate one logging destination to a web ACL.

source

pub fn redacted_fields(self, input: FieldToMatch) -> Self

Appends an item to redacted_fields.

To override the contents of this collection use set_redacted_fields.

The parts of the request that you want to keep out of the logs.

For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED for all rules that use the SingleHeader FieldToMatch setting.

Redaction applies only to the component that's specified in the rule's FieldToMatch setting, so the SingleHeader redaction doesn't apply to rules that use the Headers FieldToMatch.

You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, and Method.

This setting has no impact on request sampling. With request sampling, the only way to exclude fields is by disabling sampling in the web ACL visibility configuration.

source

pub fn set_redacted_fields(self, input: Option<Vec<FieldToMatch>>) -> Self

The parts of the request that you want to keep out of the logs.

For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED for all rules that use the SingleHeader FieldToMatch setting.

Redaction applies only to the component that's specified in the rule's FieldToMatch setting, so the SingleHeader redaction doesn't apply to rules that use the Headers FieldToMatch.

You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, and Method.

This setting has no impact on request sampling. With request sampling, the only way to exclude fields is by disabling sampling in the web ACL visibility configuration.

source

pub fn get_redacted_fields(&self) -> &Option<Vec<FieldToMatch>>

The parts of the request that you want to keep out of the logs.

For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED for all rules that use the SingleHeader FieldToMatch setting.

Redaction applies only to the component that's specified in the rule's FieldToMatch setting, so the SingleHeader redaction doesn't apply to rules that use the Headers FieldToMatch.

You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, and Method.

This setting has no impact on request sampling. With request sampling, the only way to exclude fields is by disabling sampling in the web ACL visibility configuration.

source

pub fn managed_by_firewall_manager(self, input: bool) -> Self

Indicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.

source

pub fn set_managed_by_firewall_manager(self, input: Option<bool>) -> Self

Indicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.

source

pub fn get_managed_by_firewall_manager(&self) -> &Option<bool>

Indicates whether the logging configuration was created by Firewall Manager, as part of an WAF policy configuration. If true, only Firewall Manager can modify or delete the configuration.

source

pub fn logging_filter(self, input: LoggingFilter) -> Self

Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.

source

pub fn set_logging_filter(self, input: Option<LoggingFilter>) -> Self

Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.

source

pub fn get_logging_filter(&self) -> &Option<LoggingFilter>

Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.

source

pub fn log_type(self, input: LogType) -> Self

Used to distinguish between various logging options. Currently, there is one option.

Default: WAF_LOGS

source

pub fn set_log_type(self, input: Option<LogType>) -> Self

Used to distinguish between various logging options. Currently, there is one option.

Default: WAF_LOGS

source

pub fn get_log_type(&self) -> &Option<LogType>

Used to distinguish between various logging options. Currently, there is one option.

Default: WAF_LOGS

source

pub fn log_scope(self, input: LogScope) -> Self

The owner of the logging configuration, which must be set to CUSTOMER for the configurations that you manage.

The log scope SECURITY_LAKE indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide.

Default: CUSTOMER

source

pub fn set_log_scope(self, input: Option<LogScope>) -> Self

The owner of the logging configuration, which must be set to CUSTOMER for the configurations that you manage.

The log scope SECURITY_LAKE indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide.

Default: CUSTOMER

source

pub fn get_log_scope(&self) -> &Option<LogScope>

The owner of the logging configuration, which must be set to CUSTOMER for the configurations that you manage.

The log scope SECURITY_LAKE indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide.

Default: CUSTOMER

source

pub fn build(self) -> Result<LoggingConfiguration, BuildError>

Consumes the builder and constructs a LoggingConfiguration. This method will fail if any of the following fields are not set:

Trait Implementations§

source§

impl Clone for LoggingConfigurationBuilder

source§

fn clone(&self) -> LoggingConfigurationBuilder

Returns a copy of the value. Read more
1.0.0 · source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
source§

impl Debug for LoggingConfigurationBuilder

source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
source§

impl Default for LoggingConfigurationBuilder

source§

fn default() -> LoggingConfigurationBuilder

Returns the “default value” for a type. Read more
source§

impl PartialEq for LoggingConfigurationBuilder

source§

fn eq(&self, other: &LoggingConfigurationBuilder) -> bool

Tests for self and other values to be equal, and is used by ==.
1.0.0 · source§

fn ne(&self, other: &Rhs) -> bool

Tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
source§

impl StructuralPartialEq for LoggingConfigurationBuilder

Auto Trait Implementations§

Blanket Implementations§

source§

impl<T> Any for T
where T: 'static + ?Sized,

source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
source§

impl<T> Borrow<T> for T
where T: ?Sized,

source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
source§

impl<T> CloneToUninit for T
where T: Clone,

source§

unsafe fn clone_to_uninit(&self, dst: *mut T)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dst. Read more
source§

impl<T> From<T> for T

source§

fn from(t: T) -> T

Returns the argument unchanged.

source§

impl<T> Instrument for T

source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
source§

impl<T, U> Into<U> for T
where U: From<T>,

source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

source§

impl<T> IntoEither for T

source§

fn into_either(self, into_left: bool) -> Either<Self, Self>

Converts self into a Left variant of Either<Self, Self> if into_left is true. Converts self into a Right variant of Either<Self, Self> otherwise. Read more
source§

fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
where F: FnOnce(&Self) -> bool,

Converts self into a Left variant of Either<Self, Self> if into_left(&self) returns true. Converts self into a Right variant of Either<Self, Self> otherwise. Read more
source§

impl<Unshared, Shared> IntoShared<Shared> for Unshared
where Shared: FromUnshared<Unshared>,

source§

fn into_shared(self) -> Shared

Creates a shared type from an unshared type.
source§

impl<T> Same for T

source§

type Output = T

Should always be Self
source§

impl<T> ToOwned for T
where T: Clone,

source§

type Owned = T

The resulting type after obtaining ownership.
source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

source§

type Error = Infallible

The type returned in the event of a conversion error.
source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
source§

impl<T> WithSubscriber for T

source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more