Interface RulesSourceList.Builder
- All Superinterfaces:
Buildable,CopyableBuilder<RulesSourceList.Builder,,RulesSourceList> SdkBuilder<RulesSourceList.Builder,,RulesSourceList> SdkPojo
- Enclosing class:
RulesSourceList
-
Method Summary
Modifier and TypeMethodDescriptiongeneratedRulesType(String generatedRulesType) Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.generatedRulesType(GeneratedRulesType generatedRulesType) Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.The domains that you want to inspect for in your traffic flows.targets(Collection<String> targets) The domains that you want to inspect for in your traffic flows.targetTypes(Collection<TargetType> targetTypes) The protocols you want to inspect.targetTypes(TargetType... targetTypes) The protocols you want to inspect.targetTypesWithStrings(String... targetTypes) The protocols you want to inspect.targetTypesWithStrings(Collection<String> targetTypes) The protocols you want to inspect.Methods inherited from interface software.amazon.awssdk.utils.builder.CopyableBuilder
copyMethods inherited from interface software.amazon.awssdk.utils.builder.SdkBuilder
applyMutation, buildMethods inherited from interface software.amazon.awssdk.core.SdkPojo
equalsBySdkFields, sdkFieldNameToField, sdkFields
-
Method Details
-
targets
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
-
Explicit names. For example,
abc.example.commatches only the domainabc.example.com. -
Names that use a domain wildcard, which you indicate with an initial '
.'. For example,.example.commatchesexample.comand matches all subdomains ofexample.com, such asabc.example.comandwww.example.com.
- Parameters:
targets- The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:-
Explicit names. For example,
abc.example.commatches only the domainabc.example.com. -
Names that use a domain wildcard, which you indicate with an initial '
.'. For example,.example.commatchesexample.comand matches all subdomains ofexample.com, such asabc.example.comandwww.example.com.
-
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
-
targets
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
-
Explicit names. For example,
abc.example.commatches only the domainabc.example.com. -
Names that use a domain wildcard, which you indicate with an initial '
.'. For example,.example.commatchesexample.comand matches all subdomains ofexample.com, such asabc.example.comandwww.example.com.
- Parameters:
targets- The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:-
Explicit names. For example,
abc.example.commatches only the domainabc.example.com. -
Names that use a domain wildcard, which you indicate with an initial '
.'. For example,.example.commatchesexample.comand matches all subdomains ofexample.com, such asabc.example.comandwww.example.com.
-
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
-
targetTypesWithStrings
The protocols you want to inspect. Specify
TLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Parameters:
targetTypes- The protocols you want to inspect. SpecifyTLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
targetTypesWithStrings
The protocols you want to inspect. Specify
TLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Parameters:
targetTypes- The protocols you want to inspect. SpecifyTLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
targetTypes
The protocols you want to inspect. Specify
TLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Parameters:
targetTypes- The protocols you want to inspect. SpecifyTLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
targetTypes
The protocols you want to inspect. Specify
TLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Parameters:
targetTypes- The protocols you want to inspect. SpecifyTLS_SNIforHTTPS. SpecifyHTTP_HOSTforHTTP. You can specify either or both.- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
generatedRulesType
Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.
When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
- Parameters:
generatedRulesType- Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
- See Also:
-
generatedRulesType
Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.
When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
- Parameters:
generatedRulesType- Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
- See Also:
-