@robinmordasiewicz/f5xc-terraform-mcp 2.4.5 → 2.4.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/docs/resources/addon_subscription.md +5 -5
- package/dist/docs/resources/address_allocator.md +3 -3
- package/dist/docs/resources/advertise_policy.md +39 -39
- package/dist/docs/resources/alert_policy.md +6 -6
- package/dist/docs/resources/alert_receiver.md +57 -57
- package/dist/docs/resources/api_crawler.md +9 -9
- package/dist/docs/resources/api_testing.md +40 -40
- package/dist/docs/resources/apm.md +320 -320
- package/dist/docs/resources/app_api_group.md +10 -10
- package/dist/docs/resources/app_firewall.md +36 -36
- package/dist/docs/resources/app_setting.md +46 -46
- package/dist/docs/resources/app_type.md +3 -3
- package/dist/docs/resources/authentication.md +30 -30
- package/dist/docs/resources/aws_tgw_site.md +184 -184
- package/dist/docs/resources/aws_vpc_site.md +296 -296
- package/dist/docs/resources/azure_vnet_site.md +677 -677
- package/dist/docs/resources/bgp.md +20 -20
- package/dist/docs/resources/bgp_routing_policy.md +4 -4
- package/dist/docs/resources/cdn_cache_rule.md +68 -68
- package/dist/docs/resources/cdn_loadbalancer.md +1166 -1166
- package/dist/docs/resources/certificate.md +4 -4
- package/dist/docs/resources/cloud_connect.md +35 -35
- package/dist/docs/resources/cloud_credentials.md +37 -37
- package/dist/docs/resources/cloud_link.md +16 -16
- package/dist/docs/resources/cluster.md +68 -68
- package/dist/docs/resources/cminstance.md +6 -6
- package/dist/docs/resources/code_base_integration.md +82 -82
- package/dist/docs/resources/container_registry.md +2 -2
- package/dist/docs/resources/data_type.md +12 -12
- package/dist/docs/resources/discovery.md +71 -71
- package/dist/docs/resources/dns_lb_health_check.md +5 -5
- package/dist/docs/resources/dns_load_balancer.md +25 -25
- package/dist/docs/resources/dns_zone.md +144 -144
- package/dist/docs/resources/endpoint.md +1 -1
- package/dist/docs/resources/enhanced_firewall_policy.md +33 -33
- package/dist/docs/resources/external_connector.md +32 -32
- package/dist/docs/resources/fast_acl.md +59 -59
- package/dist/docs/resources/fast_acl_rule.md +2 -2
- package/dist/docs/resources/filter_set.md +3 -3
- package/dist/docs/resources/fleet.md +359 -359
- package/dist/docs/resources/forward_proxy_policy.md +18 -18
- package/dist/docs/resources/gcp_vpc_site.md +280 -280
- package/dist/docs/resources/geo_location_set.md +1 -1
- package/dist/docs/resources/global_log_receiver.md +216 -216
- package/dist/docs/resources/healthcheck.md +2 -2
- package/dist/docs/resources/http_loadbalancer.md +2190 -2190
- package/dist/docs/resources/infraprotect_tunnel.md +9 -9
- package/dist/docs/resources/k8s_cluster.md +39 -39
- package/dist/docs/resources/k8s_cluster_role.md +10 -10
- package/dist/docs/resources/k8s_pod_security_policy.md +9 -9
- package/dist/docs/resources/log_receiver.md +11 -11
- package/dist/docs/resources/malicious_user_mitigation.md +4 -4
- package/dist/docs/resources/nat_policy.md +22 -22
- package/dist/docs/resources/network_connector.md +37 -37
- package/dist/docs/resources/network_firewall.md +15 -15
- package/dist/docs/resources/network_interface.md +78 -78
- package/dist/docs/resources/network_policy.md +21 -21
- package/dist/docs/resources/network_policy_view.md +7 -7
- package/dist/docs/resources/nfv_service.md +306 -306
- package/dist/docs/resources/oidc_provider.md +1 -1
- package/dist/docs/resources/origin_pool.md +151 -151
- package/dist/docs/resources/policy_based_routing.md +71 -71
- package/dist/docs/resources/protocol_inspection.md +8 -8
- package/dist/docs/resources/proxy.md +401 -401
- package/dist/docs/resources/rate_limiter_policy.md +4 -4
- package/dist/docs/resources/registration.md +1 -1
- package/dist/docs/resources/route.md +155 -155
- package/dist/docs/resources/secret_management_access.md +103 -103
- package/dist/docs/resources/secret_policy.md +7 -7
- package/dist/docs/resources/securemesh_site.md +274 -274
- package/dist/docs/resources/securemesh_site_v2.md +940 -940
- package/dist/docs/resources/sensitive_data_policy.md +3 -3
- package/dist/docs/resources/service_policy.md +154 -154
- package/dist/docs/resources/service_policy_rule.md +51 -51
- package/dist/docs/resources/subnet.md +7 -7
- package/dist/docs/resources/tcp_loadbalancer.md +138 -138
- package/dist/docs/resources/tenant_configuration.md +1 -1
- package/dist/docs/resources/ticket_tracking_system.md +2 -2
- package/dist/docs/resources/tunnel.md +16 -16
- package/dist/docs/resources/udp_loadbalancer.md +56 -56
- package/dist/docs/resources/virtual_host.md +146 -146
- package/dist/docs/resources/virtual_network.md +7 -7
- package/dist/docs/resources/voltshare_admin_policy.md +22 -22
- package/dist/docs/resources/voltstack_site.md +778 -778
- package/dist/docs/resources/waf_exclusion_policy.md +22 -22
- package/dist/docs/resources/workload.md +2226 -2226
- package/package.json +1 -1
|
@@ -87,17 +87,17 @@ In addition to all arguments above, the following attributes are exported:
|
|
|
87
87
|
|
|
88
88
|
A [`bigip_virtual_server`](#bigip-virtual-server) block supports the following:
|
|
89
89
|
|
|
90
|
-
<a id="
|
|
90
|
+
<a id="server-575600"></a>• [`bigip_virtual_server`](#server-575600) - Optional Block<br>Object reference. This type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Bigip Virtual Server](#server-575600) below.
|
|
91
91
|
|
|
92
92
|
#### Bigip Virtual Server Bigip Virtual Server
|
|
93
93
|
|
|
94
|
-
A [`bigip_virtual_server`](#
|
|
94
|
+
A [`bigip_virtual_server`](#server-575600) block (within [`bigip_virtual_server`](#bigip-virtual-server)) supports the following:
|
|
95
95
|
|
|
96
|
-
<a id="
|
|
96
|
+
<a id="name-9fb983"></a>• [`name`](#name-9fb983) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
97
97
|
|
|
98
|
-
<a id="
|
|
98
|
+
<a id="namespace-4ecc61"></a>• [`namespace`](#namespace-4ecc61) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
99
99
|
|
|
100
|
-
<a id="
|
|
100
|
+
<a id="tenant-c4d0e6"></a>• [`tenant`](#tenant-c4d0e6) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
101
101
|
|
|
102
102
|
#### CDN Loadbalancer
|
|
103
103
|
|
|
@@ -111,9 +111,9 @@ A [`cdn_loadbalancer`](#cdn-loadbalancer-cdn-loadbalancer) block (within [`cdn_l
|
|
|
111
111
|
|
|
112
112
|
<a id="cdn-loadbalancer-cdn-loadbalancer-name"></a>• [`name`](#cdn-loadbalancer-cdn-loadbalancer-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
113
113
|
|
|
114
|
-
<a id="
|
|
114
|
+
<a id="namespace-8ae5bf"></a>• [`namespace`](#namespace-8ae5bf) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
115
115
|
|
|
116
|
-
<a id="
|
|
116
|
+
<a id="tenant-ea0b41"></a>• [`tenant`](#tenant-ea0b41) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
117
117
|
|
|
118
118
|
#### Elements
|
|
119
119
|
|
|
@@ -133,11 +133,11 @@ A [`http_loadbalancer`](#http-loadbalancer) block supports the following:
|
|
|
133
133
|
|
|
134
134
|
A [`http_loadbalancer`](#http-loadbalancer-http-loadbalancer) block (within [`http_loadbalancer`](#http-loadbalancer)) supports the following:
|
|
135
135
|
|
|
136
|
-
<a id="
|
|
136
|
+
<a id="name-9dca0b"></a>• [`name`](#name-9dca0b) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
137
137
|
|
|
138
|
-
<a id="
|
|
138
|
+
<a id="namespace-c94608"></a>• [`namespace`](#namespace-c94608) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
139
139
|
|
|
140
|
-
<a id="
|
|
140
|
+
<a id="tenant-fa3b49"></a>• [`tenant`](#tenant-fa3b49) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
141
141
|
|
|
142
142
|
#### Timeouts
|
|
143
143
|
|
|
@@ -124,7 +124,7 @@ An [`ai_risk_based_blocking`](#ai-risk-based-blocking) block supports the follow
|
|
|
124
124
|
|
|
125
125
|
<a id="ai-risk-based-blocking-low-risk-action"></a>• [`low_risk_action`](#ai-risk-based-blocking-low-risk-action) - Optional String Defaults to `AI_BLOCK`<br>Possible values are `AI_BLOCK`, `AI_REPORT`<br>[Enum: AI_BLOCK|AI_REPORT] Risk Based Blocking Action. Action to be performed on the request Log and block Log only
|
|
126
126
|
|
|
127
|
-
<a id="
|
|
127
|
+
<a id="action-da1a5e"></a>• [`medium_risk_action`](#action-da1a5e) - Optional String Defaults to `AI_BLOCK`<br>Possible values are `AI_BLOCK`, `AI_REPORT`<br>[Enum: AI_BLOCK|AI_REPORT] Risk Based Blocking Action. Action to be performed on the request Log and block Log only
|
|
128
128
|
|
|
129
129
|
#### Allowed Response Codes
|
|
130
130
|
|
|
@@ -146,67 +146,67 @@ A [`bot_protection_setting`](#bot-protection-setting) block supports the followi
|
|
|
146
146
|
|
|
147
147
|
<a id="bot-protection-setting-good-bot-action"></a>• [`good_bot_action`](#bot-protection-setting-good-bot-action) - Optional String Defaults to `BLOCK`<br>Possible values are `BLOCK`, `REPORT`, `IGNORE`<br>[Enum: BLOCK|REPORT|IGNORE] Bot Action. Action to be performed on the request Log and block Log only Disable detection
|
|
148
148
|
|
|
149
|
-
<a id="
|
|
149
|
+
<a id="action-a39578"></a>• [`malicious_bot_action`](#action-a39578) - Optional String Defaults to `BLOCK`<br>Possible values are `BLOCK`, `REPORT`, `IGNORE`<br>[Enum: BLOCK|REPORT|IGNORE] Bot Action. Action to be performed on the request Log and block Log only Disable detection
|
|
150
150
|
|
|
151
|
-
<a id="
|
|
151
|
+
<a id="action-7e372f"></a>• [`suspicious_bot_action`](#action-7e372f) - Optional String Defaults to `BLOCK`<br>Possible values are `BLOCK`, `REPORT`, `IGNORE`<br>[Enum: BLOCK|REPORT|IGNORE] Bot Action. Action to be performed on the request Log and block Log only Disable detection
|
|
152
152
|
|
|
153
153
|
#### Custom Anonymization
|
|
154
154
|
|
|
155
155
|
A [`custom_anonymization`](#custom-anonymization) block supports the following:
|
|
156
156
|
|
|
157
|
-
<a id="
|
|
157
|
+
<a id="config-0b4528"></a>• [`anonymization_config`](#config-0b4528) - Optional Block<br>Configuration. List of HTTP headers, cookies and query parameters whose values will be masked<br>See [Anonymization Config](#config-0b4528) below.
|
|
158
158
|
|
|
159
159
|
#### Custom Anonymization Anonymization Config
|
|
160
160
|
|
|
161
|
-
An [`anonymization_config`](#
|
|
161
|
+
An [`anonymization_config`](#config-0b4528) block (within [`custom_anonymization`](#custom-anonymization)) supports the following:
|
|
162
162
|
|
|
163
|
-
<a id="
|
|
163
|
+
<a id="cookie-df02b1"></a>• [`cookie`](#cookie-df02b1) - Optional Block<br>Anonymize HTTP Cookie. Configure anonymization for HTTP Cookies<br>See [Cookie](#cookie-df02b1) below.
|
|
164
164
|
|
|
165
|
-
<a id="
|
|
165
|
+
<a id="header-65f784"></a>• [`http_header`](#header-65f784) - Optional Block<br>Anonymize HTTP Header. Configure anonymization for HTTP Headers<br>See [HTTP Header](#header-65f784) below.
|
|
166
166
|
|
|
167
|
-
<a id="
|
|
167
|
+
<a id="parameter-dd1b2a"></a>• [`query_parameter`](#parameter-dd1b2a) - Optional Block<br>Anonymize HTTP Query Parameter. Configure anonymization for HTTP Parameters<br>See [Query Parameter](#parameter-dd1b2a) below.
|
|
168
168
|
|
|
169
169
|
#### Custom Anonymization Anonymization Config Cookie
|
|
170
170
|
|
|
171
|
-
A [`cookie`](#
|
|
171
|
+
A [`cookie`](#cookie-df02b1) block (within [`custom_anonymization.anonymization_config`](#config-0b4528)) supports the following:
|
|
172
172
|
|
|
173
|
-
<a id="
|
|
173
|
+
<a id="name-856338"></a>• [`cookie_name`](#name-856338) - Optional String<br>Cookie Name. Masks the cookie value. The setting does not mask the cookie name
|
|
174
174
|
|
|
175
175
|
#### Custom Anonymization Anonymization Config HTTP Header
|
|
176
176
|
|
|
177
|
-
A [`http_header`](#
|
|
177
|
+
A [`http_header`](#header-65f784) block (within [`custom_anonymization.anonymization_config`](#config-0b4528)) supports the following:
|
|
178
178
|
|
|
179
|
-
<a id="
|
|
179
|
+
<a id="name-ace46c"></a>• [`header_name`](#name-ace46c) - Optional String<br>Header Name. Masks the HTTP header value. The setting does not mask the HTTP header name
|
|
180
180
|
|
|
181
181
|
#### Custom Anonymization Anonymization Config Query Parameter
|
|
182
182
|
|
|
183
|
-
A [`query_parameter`](#
|
|
183
|
+
A [`query_parameter`](#parameter-dd1b2a) block (within [`custom_anonymization.anonymization_config`](#config-0b4528)) supports the following:
|
|
184
184
|
|
|
185
|
-
<a id="
|
|
185
|
+
<a id="name-043171"></a>• [`query_param_name`](#name-043171) - Optional String<br>Query Parameter Name. Masks the query parameter value. The setting does not mask the query parameter name
|
|
186
186
|
|
|
187
187
|
#### Detection Settings
|
|
188
188
|
|
|
189
189
|
A [`detection_settings`](#detection-settings) block supports the following:
|
|
190
190
|
|
|
191
|
-
<a id="
|
|
191
|
+
<a id="setting-37e8d9"></a>• [`bot_protection_setting`](#setting-37e8d9) - Optional Block<br>Bot Protection. Configuration of WAF Bot Protection<br>See [Bot Protection Setting](#setting-37e8d9) below.
|
|
192
192
|
|
|
193
193
|
<a id="detection-settings-default-bot-setting"></a>• [`default_bot_setting`](#detection-settings-default-bot-setting) - Optional Block<br>Enable this option
|
|
194
194
|
|
|
195
|
-
<a id="
|
|
195
|
+
<a id="settings-da3fa7"></a>• [`default_violation_settings`](#settings-da3fa7) - Optional Block<br>Enable this option
|
|
196
196
|
|
|
197
197
|
<a id="detection-settings-disable-staging"></a>• [`disable_staging`](#detection-settings-disable-staging) - Optional Block<br>Enable this option
|
|
198
198
|
|
|
199
199
|
<a id="detection-settings-disable-suppression"></a>• [`disable_suppression`](#detection-settings-disable-suppression) - Optional Block<br>Enable this option
|
|
200
200
|
|
|
201
|
-
<a id="
|
|
201
|
+
<a id="campaigns-7bf1af"></a>• [`disable_threat_campaigns`](#campaigns-7bf1af) - Optional Block<br>Enable this option
|
|
202
202
|
|
|
203
203
|
<a id="detection-settings-enable-suppression"></a>• [`enable_suppression`](#detection-settings-enable-suppression) - Optional Block<br>Enable this option
|
|
204
204
|
|
|
205
|
-
<a id="
|
|
205
|
+
<a id="campaigns-16aa5e"></a>• [`enable_threat_campaigns`](#campaigns-16aa5e) - Optional Block<br>Enable this option
|
|
206
206
|
|
|
207
|
-
<a id="
|
|
207
|
+
<a id="setting-306450"></a>• [`signature_selection_setting`](#setting-306450) - Optional Block<br>Attack Signatures. Attack Signatures are patterns that identify attacks on a web application and its components<br>See [Signature Selection Setting](#setting-306450) below.
|
|
208
208
|
|
|
209
|
-
<a id="
|
|
209
|
+
<a id="signatures-2278ab"></a>• [`stage_new_and_updated_signatures`](#signatures-2278ab) - Optional Block<br>Attack Signatures Staging Settings. Attack Signatures staging configuration<br>See [Stage New And Updated Signatures](#signatures-2278ab) below.
|
|
210
210
|
|
|
211
211
|
<a id="detection-settings-stage-new-signatures"></a>• [`stage_new_signatures`](#detection-settings-stage-new-signatures) - Optional Block<br>Attack Signatures Staging Settings. Attack Signatures staging configuration<br>See [Stage New Signatures](#detection-settings-stage-new-signatures) below.
|
|
212
212
|
|
|
@@ -214,51 +214,51 @@ A [`detection_settings`](#detection-settings) block supports the following:
|
|
|
214
214
|
|
|
215
215
|
#### Detection Settings Bot Protection Setting
|
|
216
216
|
|
|
217
|
-
A [`bot_protection_setting`](#
|
|
217
|
+
A [`bot_protection_setting`](#setting-37e8d9) block (within [`detection_settings`](#detection-settings)) supports the following:
|
|
218
218
|
|
|
219
|
-
<a id="
|
|
219
|
+
<a id="action-1a1e0b"></a>• [`good_bot_action`](#action-1a1e0b) - Optional String Defaults to `BLOCK`<br>Possible values are `BLOCK`, `REPORT`, `IGNORE`<br>[Enum: BLOCK|REPORT|IGNORE] Bot Action. Action to be performed on the request Log and block Log only Disable detection
|
|
220
220
|
|
|
221
|
-
<a id="
|
|
221
|
+
<a id="action-321642"></a>• [`malicious_bot_action`](#action-321642) - Optional String Defaults to `BLOCK`<br>Possible values are `BLOCK`, `REPORT`, `IGNORE`<br>[Enum: BLOCK|REPORT|IGNORE] Bot Action. Action to be performed on the request Log and block Log only Disable detection
|
|
222
222
|
|
|
223
|
-
<a id="
|
|
223
|
+
<a id="action-223ae0"></a>• [`suspicious_bot_action`](#action-223ae0) - Optional String Defaults to `BLOCK`<br>Possible values are `BLOCK`, `REPORT`, `IGNORE`<br>[Enum: BLOCK|REPORT|IGNORE] Bot Action. Action to be performed on the request Log and block Log only Disable detection
|
|
224
224
|
|
|
225
225
|
#### Detection Settings Signature Selection Setting
|
|
226
226
|
|
|
227
|
-
A [`signature_selection_setting`](#
|
|
227
|
+
A [`signature_selection_setting`](#setting-306450) block (within [`detection_settings`](#detection-settings)) supports the following:
|
|
228
228
|
|
|
229
|
-
<a id="
|
|
229
|
+
<a id="settings-72f64b"></a>• [`attack_type_settings`](#settings-72f64b) - Optional Block<br>Attack Type Settings. Specifies attack-type settings to be used by WAF<br>See [Attack Type Settings](#settings-72f64b) below.
|
|
230
230
|
|
|
231
|
-
<a id="
|
|
231
|
+
<a id="settings-067018"></a>• [`default_attack_type_settings`](#settings-067018) - Optional Block<br>Enable this option
|
|
232
232
|
|
|
233
|
-
<a id="
|
|
233
|
+
<a id="signatures-38e545"></a>• [`high_medium_accuracy_signatures`](#signatures-38e545) - Optional Block<br>Enable this option
|
|
234
234
|
|
|
235
|
-
<a id="
|
|
235
|
+
<a id="signatures-b902f3"></a>• [`high_medium_low_accuracy_signatures`](#signatures-b902f3) - Optional Block<br>Enable this option
|
|
236
236
|
|
|
237
|
-
<a id="
|
|
237
|
+
<a id="signatures-a0c47d"></a>• [`only_high_accuracy_signatures`](#signatures-a0c47d) - Optional Block<br>Enable this option
|
|
238
238
|
|
|
239
239
|
#### Detection Settings Signature Selection Setting Attack Type Settings
|
|
240
240
|
|
|
241
|
-
An [`attack_type_settings`](#
|
|
241
|
+
An [`attack_type_settings`](#settings-72f64b) block (within [`detection_settings.signature_selection_setting`](#setting-306450)) supports the following:
|
|
242
242
|
|
|
243
|
-
<a id="
|
|
243
|
+
<a id="types-46774e"></a>• [`disabled_attack_types`](#types-46774e) - Optional List Defaults to `ATTACK_TYPE_NONE`<br>Possible values are `ATTACK_TYPE_NONE`, `ATTACK_TYPE_NON_BROWSER_CLIENT`, `ATTACK_TYPE_OTHER_APPLICATION_ATTACKS`, `ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE`, `ATTACK_TYPE_DETECTION_EVASION`, `ATTACK_TYPE_VULNERABILITY_SCAN`, `ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY`, `ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS`, `ATTACK_TYPE_BUFFER_OVERFLOW`, `ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION`, `ATTACK_TYPE_INFORMATION_LEAKAGE`, `ATTACK_TYPE_DIRECTORY_INDEXING`, `ATTACK_TYPE_PATH_TRAVERSAL`, `ATTACK_TYPE_XPATH_INJECTION`, `ATTACK_TYPE_LDAP_INJECTION`, `ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION`, `ATTACK_TYPE_COMMAND_EXECUTION`, `ATTACK_TYPE_SQL_INJECTION`, `ATTACK_TYPE_CROSS_SITE_SCRIPTING`, `ATTACK_TYPE_DENIAL_OF_SERVICE`, `ATTACK_TYPE_HTTP_PARSER_ATTACK`, `ATTACK_TYPE_SESSION_HIJACKING`, `ATTACK_TYPE_HTTP_RESPONSE_SPLITTING`, `ATTACK_TYPE_FORCEFUL_BROWSING`, `ATTACK_TYPE_REMOTE_FILE_INCLUDE`, `ATTACK_TYPE_MALICIOUS_FILE_UPLOAD`, `ATTACK_TYPE_GRAPHQL_PARSER_ATTACK`<br>[Enum: ATTACK_TYPE_NONE|ATTACK_TYPE_NON_BROWSER_CLIENT|ATTACK_TYPE_OTHER_APPLICATION_ATTACKS|ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE|ATTACK_TYPE_DETECTION_EVASION|ATTACK_TYPE_VULNERABILITY_SCAN|ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY|ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS|ATTACK_TYPE_BUFFER_OVERFLOW|ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION|ATTACK_TYPE_INFORMATION_LEAKAGE|ATTACK_TYPE_DIRECTORY_INDEXING|ATTACK_TYPE_PATH_TRAVERSAL|ATTACK_TYPE_XPATH_INJECTION|ATTACK_TYPE_LDAP_INJECTION|ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION|ATTACK_TYPE_COMMAND_EXECUTION|ATTACK_TYPE_SQL_INJECTION|ATTACK_TYPE_CROSS_SITE_SCRIPTING|ATTACK_TYPE_DENIAL_OF_SERVICE|ATTACK_TYPE_HTTP_PARSER_ATTACK|ATTACK_TYPE_SESSION_HIJACKING|ATTACK_TYPE_HTTP_RESPONSE_SPLITTING|ATTACK_TYPE_FORCEFUL_BROWSING|ATTACK_TYPE_REMOTE_FILE_INCLUDE|ATTACK_TYPE_MALICIOUS_FILE_UPLOAD|ATTACK_TYPE_GRAPHQL_PARSER_ATTACK] Disabled Attack Types. List of Attack Types that will be ignored and not trigger a detection
|
|
244
244
|
|
|
245
245
|
#### Detection Settings Stage New And Updated Signatures
|
|
246
246
|
|
|
247
|
-
A [`stage_new_and_updated_signatures`](#
|
|
247
|
+
A [`stage_new_and_updated_signatures`](#signatures-2278ab) block (within [`detection_settings`](#detection-settings)) supports the following:
|
|
248
248
|
|
|
249
|
-
<a id="
|
|
249
|
+
<a id="period-dbffd2"></a>• [`staging_period`](#period-dbffd2) - Optional Number<br>Staging Period. Define staging period in days. The default staging period is 7 days and the max supported staging period is 20 days
|
|
250
250
|
|
|
251
251
|
#### Detection Settings Stage New Signatures
|
|
252
252
|
|
|
253
253
|
A [`stage_new_signatures`](#detection-settings-stage-new-signatures) block (within [`detection_settings`](#detection-settings)) supports the following:
|
|
254
254
|
|
|
255
|
-
<a id="
|
|
255
|
+
<a id="period-627ff7"></a>• [`staging_period`](#period-627ff7) - Optional Number<br>Staging Period. Define staging period in days. The default staging period is 7 days and the max supported staging period is 20 days
|
|
256
256
|
|
|
257
257
|
#### Detection Settings Violation Settings
|
|
258
258
|
|
|
259
259
|
A [`violation_settings`](#detection-settings-violation-settings) block (within [`detection_settings`](#detection-settings)) supports the following:
|
|
260
260
|
|
|
261
|
-
<a id="
|
|
261
|
+
<a id="types-5a07a0"></a>• [`disabled_violation_types`](#types-5a07a0) - Optional List Defaults to `VIOL_NONE`<br>Possible values are `VIOL_NONE`, `VIOL_FILETYPE`, `VIOL_METHOD`, `VIOL_MANDATORY_HEADER`, `VIOL_HTTP_RESPONSE_STATUS`, `VIOL_REQUEST_MAX_LENGTH`, `VIOL_FILE_UPLOAD`, `VIOL_FILE_UPLOAD_IN_BODY`, `VIOL_XML_MALFORMED`, `VIOL_JSON_MALFORMED`, `VIOL_ASM_COOKIE_MODIFIED`, `VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS`, `VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE`, `VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT`, `VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST`, `VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION`, `VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS`, `VIOL_EVASION_DIRECTORY_TRAVERSALS`, `VIOL_MALFORMED_REQUEST`, `VIOL_EVASION_MULTIPLE_DECODING`, `VIOL_DATA_GUARD`, `VIOL_EVASION_APACHE_WHITESPACE`, `VIOL_COOKIE_MODIFIED`, `VIOL_EVASION_IIS_UNICODE_CODEPOINTS`, `VIOL_EVASION_IIS_BACKSLASHES`, `VIOL_EVASION_PERCENT_U_DECODING`, `VIOL_EVASION_BARE_BYTE_DECODING`, `VIOL_EVASION_BAD_UNESCAPE`, `VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST`, `VIOL_ENCODING`, `VIOL_COOKIE_MALFORMED`, `VIOL_GRAPHQL_FORMAT`, `VIOL_GRAPHQL_MALFORMED`, `VIOL_GRAPHQL_INTROSPECTION_QUERY`<br>[Enum: VIOL_NONE|VIOL_FILETYPE|VIOL_METHOD|VIOL_MANDATORY_HEADER|VIOL_HTTP_RESPONSE_STATUS|VIOL_REQUEST_MAX_LENGTH|VIOL_FILE_UPLOAD|VIOL_FILE_UPLOAD_IN_BODY|VIOL_XML_MALFORMED|VIOL_JSON_MALFORMED|VIOL_ASM_COOKIE_MODIFIED|VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS|VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE|VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT|VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST|VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION|VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS|VIOL_EVASION_DIRECTORY_TRAVERSALS|VIOL_MALFORMED_REQUEST|VIOL_EVASION_MULTIPLE_DECODING|VIOL_DATA_GUARD|VIOL_EVASION_APACHE_WHITESPACE|VIOL_COOKIE_MODIFIED|VIOL_EVASION_IIS_UNICODE_CODEPOINTS|VIOL_EVASION_IIS_BACKSLASHES|VIOL_EVASION_PERCENT_U_DECODING|VIOL_EVASION_BARE_BYTE_DECODING|VIOL_EVASION_BAD_UNESCAPE|VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST|VIOL_ENCODING|VIOL_COOKIE_MALFORMED|VIOL_GRAPHQL_FORMAT|VIOL_GRAPHQL_MALFORMED|VIOL_GRAPHQL_INTROSPECTION_QUERY] Disabled Violations. List of violations to be excluded
|
|
262
262
|
|
|
263
263
|
#### Timeouts
|
|
264
264
|
|
|
@@ -84,11 +84,11 @@ An [`app_type_settings`](#app-type-settings) block supports the following:
|
|
|
84
84
|
|
|
85
85
|
<a id="app-type-settings-app-type-ref"></a>• [`app_type_ref`](#app-type-settings-app-type-ref) - Optional Block<br>AppType. The AppType of App instance in current Namespace. Associating an AppType reference, will enable analysis on this instance's generated data<br>See [App Type Ref](#app-type-settings-app-type-ref) below.
|
|
86
86
|
|
|
87
|
-
<a id="
|
|
87
|
+
<a id="setting-ebbad6"></a>• [`business_logic_markup_setting`](#setting-ebbad6) - Optional Block<br>API Discovery. Settings specifying how API Discovery will be performed<br>See [Business Logic Markup Setting](#setting-ebbad6) below.
|
|
88
88
|
|
|
89
|
-
<a id="
|
|
89
|
+
<a id="setting-7d0042"></a>• [`timeseries_analyses_setting`](#setting-7d0042) - Optional Block<br>DDOS Settings. Configuration for DDOS Detection<br>See [Timeseries Analyses Setting](#setting-7d0042) below.
|
|
90
90
|
|
|
91
|
-
<a id="
|
|
91
|
+
<a id="setting-2c7217"></a>• [`user_behavior_analysis_setting`](#setting-2c7217) - Optional Block<br>User Behavior Analysis Setting. Configuration for user behavior analysis<br>See [User Behavior Analysis Setting](#setting-2c7217) below.
|
|
92
92
|
|
|
93
93
|
#### App Type Settings App Type Ref
|
|
94
94
|
|
|
@@ -98,7 +98,7 @@ An [`app_type_ref`](#app-type-settings-app-type-ref) block (within [`app_type_se
|
|
|
98
98
|
|
|
99
99
|
<a id="app-type-settings-app-type-ref-name"></a>• [`name`](#app-type-settings-app-type-ref-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
|
|
100
100
|
|
|
101
|
-
<a id="
|
|
101
|
+
<a id="namespace-49608f"></a>• [`namespace`](#namespace-49608f) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
|
|
102
102
|
|
|
103
103
|
<a id="app-type-settings-app-type-ref-tenant"></a>• [`tenant`](#app-type-settings-app-type-ref-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
|
|
104
104
|
|
|
@@ -106,105 +106,105 @@ An [`app_type_ref`](#app-type-settings-app-type-ref) block (within [`app_type_se
|
|
|
106
106
|
|
|
107
107
|
#### App Type Settings Business Logic Markup Setting
|
|
108
108
|
|
|
109
|
-
A [`business_logic_markup_setting`](#
|
|
109
|
+
A [`business_logic_markup_setting`](#setting-ebbad6) block (within [`app_type_settings`](#app-type-settings)) supports the following:
|
|
110
110
|
|
|
111
|
-
<a id="
|
|
111
|
+
<a id="disable-d65146"></a>• [`disable`](#disable-d65146) - Optional Block<br>Enable this option
|
|
112
112
|
|
|
113
|
-
<a id="
|
|
113
|
+
<a id="enable-280dfb"></a>• [`enable`](#enable-280dfb) - Optional Block<br>Enable this option
|
|
114
114
|
|
|
115
115
|
#### App Type Settings Timeseries Analyses Setting
|
|
116
116
|
|
|
117
|
-
A [`timeseries_analyses_setting`](#
|
|
117
|
+
A [`timeseries_analyses_setting`](#setting-7d0042) block (within [`app_type_settings`](#app-type-settings)) supports the following:
|
|
118
118
|
|
|
119
|
-
<a id="
|
|
119
|
+
<a id="selectors-2cc4b7"></a>• [`metric_selectors`](#selectors-2cc4b7) - Optional Block<br>Metric Selectors. Define the metric selection criteria, i.e. the metrics source and the actual metrics that should be included in the detection logic<br>See [Metric Selectors](#selectors-2cc4b7) below.
|
|
120
120
|
|
|
121
121
|
#### App Type Settings Timeseries Analyses Setting Metric Selectors
|
|
122
122
|
|
|
123
|
-
A [`metric_selectors`](#
|
|
123
|
+
A [`metric_selectors`](#selectors-2cc4b7) block (within [`app_type_settings.timeseries_analyses_setting`](#setting-7d0042)) supports the following:
|
|
124
124
|
|
|
125
|
-
<a id="
|
|
125
|
+
<a id="metric-bc0de2"></a>• [`metric`](#metric-bc0de2) - Optional List Defaults to `NO_METRICS`<br>Possible values are `NO_METRICS`, `REQUEST_RATE`, `ERROR_RATE`, `LATENCY`, `THROUGHPUT`<br>[Enum: NO_METRICS|REQUEST_RATE|ERROR_RATE|LATENCY|THROUGHPUT] Metrics. Choose one or more metrics to be included in the detection logic
|
|
126
126
|
|
|
127
|
-
<a id="
|
|
127
|
+
<a id="source-60834f"></a>• [`metrics_source`](#source-60834f) - Optional String<br>Possible values are `NONE`, `NODES`, `EDGES`, `VIRTUAL_HOSTS`<br>[Enum: NONE|NODES|EDGES|VIRTUAL_HOSTS] Metrics Source. Supported sources from which Metrics can be analyzed All edges in the service mesh graph. Metrics are analyzed separately between all source and destination service combinations
|
|
128
128
|
|
|
129
129
|
#### App Type Settings User Behavior Analysis Setting
|
|
130
130
|
|
|
131
|
-
An [`user_behavior_analysis_setting`](#
|
|
131
|
+
An [`user_behavior_analysis_setting`](#setting-2c7217) block (within [`app_type_settings`](#app-type-settings)) supports the following:
|
|
132
132
|
|
|
133
|
-
<a id="
|
|
133
|
+
<a id="detection-dd4d64"></a>• [`disable_detection`](#detection-dd4d64) - Optional Block<br>Enable this option
|
|
134
134
|
|
|
135
|
-
<a id="
|
|
135
|
+
<a id="learning-b549ee"></a>• [`disable_learning`](#learning-b549ee) - Optional Block<br>Enable this option
|
|
136
136
|
|
|
137
|
-
<a id="
|
|
137
|
+
<a id="detection-4127d2"></a>• [`enable_detection`](#detection-4127d2) - Optional Block<br>Malicious User Detection Settings. Various factors about user activity are monitored and analysed to determine malicious users. These settings allow tuning those factors used by the system to detect malicious users<br>See [Enable Detection](#detection-4127d2) below.
|
|
138
138
|
|
|
139
|
-
<a id="
|
|
139
|
+
<a id="learning-94d2dc"></a>• [`enable_learning`](#learning-94d2dc) - Optional Block<br>Enable this option
|
|
140
140
|
|
|
141
141
|
#### App Type Settings User Behavior Analysis Setting Enable Detection
|
|
142
142
|
|
|
143
|
-
An [`enable_detection`](#
|
|
143
|
+
An [`enable_detection`](#detection-4127d2) block (within [`app_type_settings.user_behavior_analysis_setting`](#setting-2c7217)) supports the following:
|
|
144
144
|
|
|
145
|
-
<a id="
|
|
145
|
+
<a id="automatic-746f46"></a>• [`bola_detection_automatic`](#automatic-746f46) - Optional Block<br>Enable this option
|
|
146
146
|
|
|
147
|
-
<a id="
|
|
147
|
+
<a id="period-033ee3"></a>• [`cooling_off_period`](#period-033ee3) - Optional Number<br>Cooling off period. Malicious user detection assigns a threat level to each user based on their activity. Once a threat level is assigned, the system continues tracking activity from this user and if no further malicious activity is seen, it gradually reduces the threat assesment to lower levels. This field specifies the time period, in minutes, used by the system to decay a user's threat level from a high to medium or medium to low or low to none
|
|
148
148
|
|
|
149
|
-
<a id="
|
|
149
|
+
<a id="detection-7126e7"></a>• [`exclude_bola_detection`](#detection-7126e7) - Optional Block<br>Enable this option
|
|
150
150
|
|
|
151
|
-
<a id="
|
|
151
|
+
<a id="activity-52c961"></a>• [`exclude_bot_defense_activity`](#activity-52c961) - Optional Block<br>Enable this option
|
|
152
152
|
|
|
153
|
-
<a id="
|
|
153
|
+
<a id="activity-b468a9"></a>• [`exclude_failed_login_activity`](#activity-b468a9) - Optional Block<br>Enable this option
|
|
154
154
|
|
|
155
|
-
<a id="
|
|
155
|
+
<a id="activity-7563be"></a>• [`exclude_forbidden_activity`](#activity-7563be) - Optional Block<br>Enable this option
|
|
156
156
|
|
|
157
|
-
<a id="
|
|
157
|
+
<a id="reputation-222095"></a>• [`exclude_ip_reputation`](#reputation-222095) - Optional Block<br>Enable this option
|
|
158
158
|
|
|
159
|
-
<a id="
|
|
159
|
+
<a id="activity-68b176"></a>• [`exclude_non_existent_url_activity`](#activity-68b176) - Optional Block<br>Enable this option
|
|
160
160
|
|
|
161
|
-
<a id="
|
|
161
|
+
<a id="limit-15e936"></a>• [`exclude_rate_limit`](#limit-15e936) - Optional Block<br>Enable this option
|
|
162
162
|
|
|
163
|
-
<a id="
|
|
163
|
+
<a id="activity-1deb5e"></a>• [`exclude_waf_activity`](#activity-1deb5e) - Optional Block<br>Enable this option
|
|
164
164
|
|
|
165
|
-
<a id="
|
|
165
|
+
<a id="activity-9a50c3"></a>• [`include_bot_defense_activity`](#activity-9a50c3) - Optional Block<br>Enable this option
|
|
166
166
|
|
|
167
|
-
<a id="
|
|
167
|
+
<a id="activity-c790de"></a>• [`include_failed_login_activity`](#activity-c790de) - Optional Block<br>Failed Login Activity Setting. When enabled, the system monitors persistent failed login attempts from a user. A failed login is detected if a request results in a response code of 401. These settings specify how to use failed login activity to determine suspicious behavior<br>See [Include Failed Login Activity](#activity-c790de) below.
|
|
168
168
|
|
|
169
|
-
<a id="
|
|
169
|
+
<a id="activity-c4a4f1"></a>• [`include_forbidden_activity`](#activity-c4a4f1) - Optional Block<br>Forbidden Activity Setting. When L7 policy rules are set up to disallow certain types of requests, the system monitors persistent attempts from a user to send requests which result in policy denies. These settings specify how to use disallowed request activity from a user to determine suspicious behavior<br>See [Include Forbidden Activity](#activity-c4a4f1) below.
|
|
170
170
|
|
|
171
|
-
<a id="
|
|
171
|
+
<a id="reputation-0bd16b"></a>• [`include_ip_reputation`](#reputation-0bd16b) - Optional Block<br>Enable this option
|
|
172
172
|
|
|
173
|
-
<a id="
|
|
173
|
+
<a id="automatic-bd091b"></a>• [`include_non_existent_url_activity_automatic`](#automatic-bd091b) - Optional Block<br>Non-existent URL Automatic Activity Settings<br>See [Include Non Existent URL Activity Automatic](#automatic-bd091b) below.
|
|
174
174
|
|
|
175
|
-
<a id="
|
|
175
|
+
<a id="custom-4188a6"></a>• [`include_non_existent_url_activity_custom`](#custom-4188a6) - Optional Block<br>Non-existent URL Custom Activity Setting<br>See [Include Non Existent URL Activity Custom](#custom-4188a6) below.
|
|
176
176
|
|
|
177
|
-
<a id="
|
|
177
|
+
<a id="limit-48e141"></a>• [`include_rate_limit`](#limit-48e141) - Optional Block<br>Enable this option
|
|
178
178
|
|
|
179
|
-
<a id="
|
|
179
|
+
<a id="activity-6e5eaa"></a>• [`include_waf_activity`](#activity-6e5eaa) - Optional Block<br>Enable this option
|
|
180
180
|
|
|
181
181
|
#### App Type Settings User Behavior Analysis Setting Enable Detection Include Failed Login Activity
|
|
182
182
|
|
|
183
|
-
An [`include_failed_login_activity`](#
|
|
183
|
+
An [`include_failed_login_activity`](#activity-c790de) block (within [`app_type_settings.user_behavior_analysis_setting.enable_detection`](#detection-4127d2)) supports the following:
|
|
184
184
|
|
|
185
|
-
<a id="
|
|
185
|
+
<a id="threshold-097f28"></a>• [`login_failures_threshold`](#threshold-097f28) - Optional Number<br>Login Failures Threshold. The number of failed logins beyond which the system will flag this user as malicious
|
|
186
186
|
|
|
187
187
|
#### App Type Settings User Behavior Analysis Setting Enable Detection Include Forbidden Activity
|
|
188
188
|
|
|
189
|
-
An [`include_forbidden_activity`](#
|
|
189
|
+
An [`include_forbidden_activity`](#activity-c4a4f1) block (within [`app_type_settings.user_behavior_analysis_setting.enable_detection`](#detection-4127d2)) supports the following:
|
|
190
190
|
|
|
191
|
-
<a id="
|
|
191
|
+
<a id="threshold-e225f9"></a>• [`forbidden_requests_threshold`](#threshold-e225f9) - Optional Number<br>Forbidden Requests Threshold. The number of forbidden requests beyond which the system will flag this user as malicious
|
|
192
192
|
|
|
193
193
|
#### App Type Settings User Behavior Analysis Setting Enable Detection Include Non Existent URL Activity Automatic
|
|
194
194
|
|
|
195
|
-
An [`include_non_existent_url_activity_automatic`](#
|
|
195
|
+
An [`include_non_existent_url_activity_automatic`](#automatic-bd091b) block (within [`app_type_settings.user_behavior_analysis_setting.enable_detection`](#detection-4127d2)) supports the following:
|
|
196
196
|
|
|
197
|
-
<a id="
|
|
197
|
+
<a id="high-bdf84f"></a>• [`high`](#high-bdf84f) - Optional Block<br>Enable this option
|
|
198
198
|
|
|
199
|
-
<a id="
|
|
199
|
+
<a id="low-52df9e"></a>• [`low`](#low-52df9e) - Optional Block<br>Enable this option
|
|
200
200
|
|
|
201
|
-
<a id="
|
|
201
|
+
<a id="medium-1bf0c9"></a>• [`medium`](#medium-1bf0c9) - Optional Block<br>Enable this option
|
|
202
202
|
|
|
203
203
|
#### App Type Settings User Behavior Analysis Setting Enable Detection Include Non Existent URL Activity Custom
|
|
204
204
|
|
|
205
|
-
An [`include_non_existent_url_activity_custom`](#
|
|
205
|
+
An [`include_non_existent_url_activity_custom`](#custom-4188a6) block (within [`app_type_settings.user_behavior_analysis_setting.enable_detection`](#detection-4127d2)) supports the following:
|
|
206
206
|
|
|
207
|
-
<a id="
|
|
207
|
+
<a id="threshold-afbca8"></a>• [`nonexistent_requests_threshold`](#threshold-afbca8) - Optional Number<br>Non-existent URL Custom Threshold (percentage). The percentage of non-existent requests beyond which the system will flag this user as malicious
|
|
208
208
|
|
|
209
209
|
#### Timeouts
|
|
210
210
|
|
|
@@ -86,15 +86,15 @@ A [`business_logic_markup_setting`](#business-logic-markup-setting) block suppor
|
|
|
86
86
|
|
|
87
87
|
<a id="business-logic-markup-setting-disable"></a>• [`disable`](#business-logic-markup-setting-disable) - Optional Block<br>Enable this option
|
|
88
88
|
|
|
89
|
-
<a id="
|
|
89
|
+
<a id="settings-c32a65"></a>• [`discovered_api_settings`](#settings-c32a65) - Optional Block<br>Discovered API Settings. Configure Discovered API Settings<br>See [Discovered API Settings](#settings-c32a65) below.
|
|
90
90
|
|
|
91
91
|
<a id="business-logic-markup-setting-enable"></a>• [`enable`](#business-logic-markup-setting-enable) - Optional Block<br>Enable this option
|
|
92
92
|
|
|
93
93
|
#### Business Logic Markup Setting Discovered API Settings
|
|
94
94
|
|
|
95
|
-
A [`discovered_api_settings`](#
|
|
95
|
+
A [`discovered_api_settings`](#settings-c32a65) block (within [`business_logic_markup_setting`](#business-logic-markup-setting)) supports the following:
|
|
96
96
|
|
|
97
|
-
<a id="
|
|
97
|
+
<a id="apis-85d7fa"></a>• [`purge_duration_for_inactive_discovered_apis`](#apis-85d7fa) - Optional Number<br>Purge Duration for Inactive Discovered APIs from Traffic. Inactive discovered API will be deleted after configured duration
|
|
98
98
|
|
|
99
99
|
#### Features
|
|
100
100
|
|