You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+26-18Lines changed: 26 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,6 @@ A solution that contains all AWS WAF samples developed so far - waf-reactive-bla
3
3
4
4
For the full solution overview visit [AWS WAF Security Automations](https://aws.amazon.com/answers/security/aws-waf-security-automations/).
5
5
6
-
>Be aware that using the ***Athena log parser*** option with the HTTP Flood Protection and/or Scanner and Probe Protection rules may result in significant Athena charges. The log parser runs a scheduled query against your S3 log bucket every 5 minutes. Charges are based on the amount of logs Athena must scan as part of this query."
7
-
8
6
## File Structure
9
7
This project consists of microservices that facilitate the functional areas of the solution. These microservices are deployed to a serverless environment in AWS Lambda.
10
8
@@ -14,8 +12,9 @@ This project consists of microservices that facilitate the functional areas of t
14
12
|-access-handler/ [microservice for processing bad bots honeypot endpoint access. This AWS Lambda function intercepts the suspicious request and adds the source IP address to the AWS WAF block list]
15
13
|-custom-resource/ [custom helper for CloudFormation deployment template]
16
14
|-helper/ [custom helper for CloudFormation deployment dependency check and auxiliary functions]
17
-
|-log-parser/ [microservice for processing access logs searching for suspicious behavior and add the corresponding source IP addresses to an AWS WAF block list]
15
+
|-log_parser/ [microservice for processing access logs searching for suspicious behavior and add the corresponding source IP addresses to an AWS WAF block list]
18
16
|-reputation-lists-parser/ [microservice for processing third-party IP reputation lists and add malicious IP addresses to an AWS WAF block list]
17
+
|-tests/ [unit tests]
19
18
```
20
19
21
20
## Getting Started
@@ -30,40 +29,49 @@ The following procedures assumes that all of the OS-level configuration has been
30
29
The AWS WAF Security Automations solution is developed with Node.js and Python for the microservices that run in AWS Lambda. The latest version has been tested with Node.js v10.x and Python v3.8.
export TEMPLATE_OUTPUT_BUCKET=<YOUR_TEMPLATE_OUTPUT_BUCKET> # Name for the S3 bucket where the template will be located
50
+
export DIST_OUTPUT_BUCKET=<YOUR_DIST_OUTPUT_BUCKET> # Name for the S3 bucket where customized code will reside
51
+
export SOLUTION_NAME="aws-waf-security-automations" # name of the solution
52
+
export VERSION=<VERSION> # version number for the customized code
53
+
export AWS_REGION=<AWS_REGION> # region where the distributable is deployed
46
54
```
55
+
# _Note:_ You must manually create two buckets in S3 called $TEMPLATE_OUTPUT_BUCKET and $DIST_OUTPUT_BUCKET-$AWS_REGION to copy the distribution. The assets in bucket should be publicly accessible. The build-s3-dist.sh script DOES NOT do this and the CloudFormation template expects/references the REGION specific bucket.
47
56
48
-
#### 04. Build the AWS WAF Security Automations solution for deployment:
57
+
#### 05. Build the AWS WAF Security Automations solution for deployment:
#### 05. Upload deployment assets to your Amazon S3 bucket:
53
-
54
-
Note that you must manually create a bucket in S3 called `$DIST_OUTPUT_BUCKET-$AWS_REGION` to copy the distribution. The build-s3-dist.sh script DOES NOT do this and the CloudFormation template expects/references the REGION specific bucket.
55
-
61
+
#### 06. Upload deployment assets to your Amazon S3 buckets:
# _Note:_ You must use proper acl and profile for the copy operation as applicable.
59
67
60
-
#### 06. Deploy the AWS WAF Security Automations solution:
68
+
#### 07. Deploy the AWS WAF Security Automations solution:
61
69
* From your designated Amazon S3 bucket where you uploaded the deployment assets, copy the link location for the aws-waf-security-automations.template.
62
70
* Using AWS CloudFormation, launch the AWS WAF Security Automations solution stack using the copied Amazon S3 link for the aws-waf-security-automations.template.
63
71
64
72
***
65
73
66
-
Copyright 2019 Amazon.com, Inc. or its affiliates. All Rights Reserved.
74
+
Copyright 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
67
75
68
76
Licensed under the Apache License, Version 2.0 (the "License");
69
77
you may not use this file except in compliance with the License.
0 commit comments