ves-io-schema-app_security-AppSecurityWafExclusionAPI-GetSuggestedWAFExclusionRule

Examples of performing app_security AppSecurityWafExclusionAPI GetSuggestedWAFExclusionRule

Usecase:

Perform GetSuggestedWAFExclusionRule on app_security

Request:

Request using vesctl:

vesctl request rpc app_security.AppSecurityWafExclusionAPI.GetSuggestedWAFExclusionRule -i request.yaml --uri /public/namespaces/namespace-literal/http_loadbalancers/name-literal/waf_exclusion/suggestion --http-method POST

where file request.yaml has following contents:

          {}

        

vesctl yaml response:

          {}

        

Request using curl:

          curl -X 'POST' -d '{}' -H 'Content-Type: application/json' -H 'X-Volterra-Useragent: v1/pgm=_var_folders_2__8qnt6fwd5dvglr1xqq6l8b7w0000gp_T_go-build3109416560_b001_apidocs.test/host=C02FN35BMD6R/svc=S:examplesvc/site=mytestce01' 'https://acmecorp.console.ves.volterra.io/api/config/namespaces/namespace-literal/http_loadbalancers/name-literal/waf_exclusion/suggestion'
        

curl response:

          HTTP/1.1 200 OK
Content-Length: 77
Content-Type: application/json
Date: Thu, 21 Mar 2024 14:04:32 GMT
Vary: Accept-Encoding

{
  "waf_exclusion_rule": null,
  "name": "",
  "found_existing_rule": null
}