You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* <p>Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. WAF calculates and logs this fingerprint for each
452
+
* <p>Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. WAF calculates and logs this fingerprint for each
453
453
* request that has enough TLS Client Hello information for the calculation. Almost
454
454
* all web requests include this information.</p>
455
455
* <note>
@@ -763,6 +763,10 @@ export interface UriPath {}
763
763
* <p>In this documentation, the descriptions of the individual fields talk about specifying the web request component to inspect,
764
764
* but for field redaction, you are specifying the component type to redact from the logs. </p>
765
765
* </li>
766
+
* <li>
767
+
* <p>If you have request sampling enabled, the redacted fields configuration for logging has no impact on sampling.
768
+
* The only way to exclude fields from request sampling is by disabling sampling in the web ACL visibility configuration. </p>
* <p>Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. WAF calculates and logs this fingerprint for each
905
+
* <p>Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. WAF calculates and logs this fingerprint for each
902
906
* request that has enough TLS Client Hello information for the calculation. Almost
* <code>JA3Fingerprint</code>: Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. You can use this choice only with a string match <code>ByteMatchStatement</code> with the <code>PositionalConstraint</code> set to
1020
+
* <code>JA3Fingerprint</code>: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. You can use this choice only with a string match <code>ByteMatchStatement</code> with the <code>PositionalConstraint</code> set to
1017
1021
* <code>EXACTLY</code>. </p>
1018
1022
* <p>You can obtain the JA3 fingerprint for client requests from the web ACL logs.
1019
1023
* If WAF is able to calculate the fingerprint, it includes it in the logs.
* <p>Indicates whether WAF should store a sampling of the web requests that
3495
3499
* match the rules. You can view the sampled requests through the WAF console. </p>
3500
+
* <note>
3501
+
* <p>Request sampling doesn't provide a field redaction option, and any field redaction that you specify in your logging configuration doesn't affect sampling.
3502
+
* The only way to exclude fields from request sampling is by disabling sampling in the web ACL visibility configuration. </p>
3503
+
* </note>
3496
3504
* @public
3497
3505
*/
3498
3506
SampledRequestsEnabled: boolean|undefined;
@@ -4367,6 +4375,33 @@ export class WAFAssociatedItemException extends __BaseException {
* <p>Used to distinguish between various logging options. Currently, there is one option.</p>
4417
+
* <p>Default: <code>WAF_LOGS</code>
4418
+
* </p>
4419
+
* @public
4420
+
*/
4421
+
LogType?: LogType;
4422
+
4423
+
/**
4424
+
* <p>The owner of the logging configuration, which must be set to <code>CUSTOMER</code> for the configurations that you manage. </p>
4425
+
* <p>The log scope <code>SECURITY_LAKE</code> indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see
4426
+
* <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Collecting data from Amazon Web Services services</a>
4427
+
* in the <i>Amazon Security Lake user guide</i>. </p>
* <p>Used to distinguish between various logging options. Currently, there is one option.</p>
5151
+
* <p>Default: <code>WAF_LOGS</code>
5152
+
* </p>
5153
+
* @public
5154
+
*/
5155
+
LogType?: LogType;
5156
+
5157
+
/**
5158
+
* <p>The owner of the logging configuration, which must be set to <code>CUSTOMER</code> for the configurations that you manage. </p>
5159
+
* <p>The log scope <code>SECURITY_LAKE</code> indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see
5160
+
* <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Collecting data from Amazon Web Services services</a>
5161
+
* in the <i>Amazon Security Lake user guide</i>. </p>
* <p>Used to distinguish between various logging options. Currently, there is one option.</p>
5366
+
* <p>Default: <code>WAF_LOGS</code>
5367
+
* </p>
5368
+
* @public
5369
+
*/
5370
+
LogType?: LogType;
5371
+
5372
+
/**
5373
+
* <p>The owner of the logging configuration, which must be set to <code>CUSTOMER</code> for the configurations that you manage. </p>
5374
+
* <p>The log scope <code>SECURITY_LAKE</code> indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see
5375
+
* <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Collecting data from Amazon Web Services services</a>
5376
+
* in the <i>Amazon Security Lake user guide</i>. </p>
* <p>The owner of the logging configuration, which must be set to <code>CUSTOMER</code> for the configurations that you manage. </p>
6659
+
* <p>The log scope <code>SECURITY_LAKE</code> indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see
6660
+
* <a href="https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html">Collecting data from Amazon Web Services services</a>
6661
+
* in the <i>Amazon Security Lake user guide</i>. </p>
0 commit comments