ves-io-schema-app_security-AppSecurityWafExclusionAPI-GetSuggestedWAFExclusionRule

Examples of performing app_security AppSecurityWafExclusionAPI GetSuggestedWAFExclusionRule

Usecase:

Perform GetSuggestedWAFExclusionRule on app_security

Request:

Request using vesctl:

vesctl request rpc app_security.AppSecurityWafExclusionAPI.GetSuggestedWAFExclusionRule -i request.yaml --uri /public/namespaces/namespace-literal/http_loadbalancers/name-literal/waf_exclusion/suggestion --http-method POST

where file request.yaml has following contents:

{}

vesctl yaml response:

{}

Request using curl:

curl -X 'POST' -d '{}' -H 'Content-Type: application/json' -H 'X-Volterra-Useragent: v1/pgm=_tmp_go-build672621555_b001_apidocs.test/host=docker-desktop' 'https://acmecorp.console.ves.volterra.io/api/config/namespaces/namespace-literal/http_loadbalancers/name-literal/waf_exclusion/suggestion'

curl response:

HTTP/1.1 200 OK
Content-Length: 77
Content-Type: application/json
Date: Wed, 12 May 2021 11:17:29 GMT
Vary: Accept-Encoding

{
  "waf_exclusion_rule": null,
  "name": "",
  "found_existing_rule": null
}