You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description: `Requests that match this value constitute a granular traffic unit.`,
608
+
},
609
+
"enable_each_unique_value": {
610
+
Type: schema.TypeBool,
611
+
Optional: true,
612
+
Description: `If enabled, traffic matching each unique value for the specified type constitutes a separate traffic unit. It can only be set to true if value is empty.`,
Copy file name to clipboardExpand all lines: website/docs/r/compute_security_policy.html.markdown
+33Lines changed: 33 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -430,6 +430,39 @@ The following arguments are supported:
430
430
*`STANDARD` - opaque rules. (default)
431
431
*`PREMIUM` - transparent rules.
432
432
433
+
*`threshold_configs` - (Optional) Configuration options for layer7 adaptive protection for various customizable thresholds. Structure is [documented below](#nested_threshold_configs).
*`name` - The name of config. The name must be 1-63 characters long, and comply with RFC1035. The name must be unique within the security policy.
438
+
439
+
*`auto_deploy_load_threshold` - (Optional) Load threshold above which Adaptive Protection automatically deploy threshold based on the backend load threshold and detect a new rule during an alerted attack.
*`auto_deploy_expiration_sec` - (Optional) Duration over which Adaptive Protection's auto-deployed actions last.
446
+
447
+
*`detection_load_threshold` - (Optional) Detection threshold based on the backend service's load.
448
+
449
+
*`detection_absolute_qps` - (Optional) Detection threshold based on absolute QPS.
450
+
451
+
*`detection_relative_to_baseline_qps` - (Optional) Detection threshold based on QPS relative to the average of baseline traffic.
452
+
453
+
*`traffic_granularity_configs` - (Optional) Configuration options for enabling Adaptive Protection to work on the specified service granularity. Structure is [documented below](#nested_traffic_granularity_configs).
*`type` - The type of this configuration, a granular traffic unit can be one of the following:
458
+
*`HTTP_HEADER_HOST`
459
+
*`HTTP_PATH`
460
+
461
+
*`value` - (Optional) Requests that match this value constitute a granular traffic unit.
462
+
463
+
*`enable_each_unique_value` - (Optional) If enabled, traffic matching each unique value for the specified type constitutes a separate traffic unit. It can only be set to true if value is empty.
0 commit comments