managedServiceData property
Details about the service that are specific to the service type, in JSON
format. For service type SHIELD_ADVANCED, this is an empty
string.
-
Example:
NETWORK_FIREWALL"{"type":"NETWORK_FIREWALL","networkFirewallStatelessRuleGroupReferences":{\"resourceARN\":\"arn:aws:network-firewall:us-west-1:1234567891011:stateless-rulegroup/rulegroup2\",\"priority\":10},"networkFirewallStatelessDefaultActions":\"aws:pass\",\"custom1\","networkFirewallStatelessFragmentDefaultActions":\"custom2\",\"aws:pass\","networkFirewallStatelessCustomActions":[{"actionName":"custom1","actionDefinition":{"publishMetricAction":{"dimensions":{\"value\":\"dimension1\"}}}},{"actionName":"custom2","actionDefinition":{"publishMetricAction":{"dimensions":{\"value\":\"dimension2\"}}}}],"networkFirewallStatefulRuleGroupReferences":{\"resourceARN\":\"arn:aws:network-firewall:us-west-1:1234567891011:stateful-rulegroup/rulegroup1\"},"networkFirewallOrchestrationConfig":{"singleFirewallEndpointPerVPC":true,"allowedIPV4CidrList":\"10.24.34.0/28\"} }" -
Example:
WAFV2"{"type":"WAFV2","preProcessRuleGroups":{\"ruleGroupArn\":null,\"overrideAction\":{\"type\":\"NONE\"},\"managedRuleGroupIdentifier\":{\"version\":null,\"vendorName\":\"AWS\",\"managedRuleGroupName\":\"AWSManagedRulesAmazonIpReputationList\"},\"ruleGroupType\":\"ManagedRuleGroup\",\"excludeRules\":[]},"postProcessRuleGroups":[],"defaultAction":{"type":"ALLOW"},"overrideCustomerWebACLAssociation":false,"loggingConfiguration":{"logDestinationConfigs":\"arn:aws:firehose:us-west-2:12345678912:deliverystream/aws-waf-logs-fms-admin-destination\","redactedFields":{\"redactedFieldType\":\"SingleHeader\",\"redactedFieldValue\":\"Cookies\"},{\"redactedFieldType\":\"Method\"}}}"In the
loggingConfiguration, you can specify onelogDestinationConfigs, you can optionally provide up to 20redactedFields, and theRedactedFieldTypemust be one ofURI,QUERY_STRING,HEADER, orMETHOD. -
Example:
WAF Classic"{"type": "WAF", "ruleGroups":{\"id\":\"12345678-1bcd-9012-efga-0987654321ab\", \"overrideAction\" : {\"type\": \"COUNT\"}}, "defaultAction": {"type": "BLOCK"}}" -
Example:
SECURITY_GROUPS_COMMON"{"type":"SECURITY_GROUPS_COMMON","revertManualSecurityGroupChanges":false,"exclusiveResourceSecurityGroupManagement":false, "applyToAllEC2InstanceENIs":false,"securityGroups":{\"id\":\" sg-000e55995d61a06bd\"}}" -
Example:
SECURITY_GROUPS_CONTENT_AUDIT"{"type":"SECURITY_GROUPS_CONTENT_AUDIT","securityGroups":{\"id\":\"sg-000e55995d61a06bd\"},"securityGroupAction":{"type":"ALLOW"}}"The security group action for content audit can be
ALLOWorDENY. ForALLOW, all in-scope security group rules must be within the allowed range of the policy's security group rules. ForDENY, all in-scope security group rules must not contain a value or a range that matches a rule value or range in the policy security group. -
Example:
SECURITY_GROUPS_USAGE_AUDIT"{"type":"SECURITY_GROUPS_USAGE_AUDIT","deleteUnusedSecurityGroups":true,"coalesceRedundantSecurityGroups":true}"
Implementation
final String? managedServiceData;