Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex Smart Web Security
  • Getting started
    • All guides
      • Creating a profile
      • Editing basic profile settings
      • Getting profile information
      • Deleting a profile
      • Adding a rule
      • Editing a rule
      • Deleting a rule
    • Address lists
    • Viewing operations
    • Configuring monitoring
    • Setting up alerts
    • Configuring logs via Smart Web Security
    • Configuring logs via Application Load Balancer
    • Migrating to WAF with support for Yandex rules
    • Overview
    • Security profiles
    • WAF
    • ARL (request limit)
    • Rules
    • Conditions
    • Lists
    • Protecting domains
    • Logging
    • Quotas and limits
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes
  1. Step-by-step guides
  2. ARL profiles
  3. Adding a rule

Adding a rule to an ARL profile

Written by
Yandex Cloud
Updated at July 29, 2025

You can only add ARL rules to an ARL profile. Basic rules, as well as Smart Protection and WAF rules, are added to a security profile.

Management console
Terraform
API
  1. In the management console, select the folder with the ARL profile.

  2. In the list of services, select Smart Web Security.

  3. In the left-hand panel, select ARL profiles.

  4. Select the profile where you want to add a rule.

  5. Click Add rule and in the window that opens:

    1. Name the rule.

    2. Optionally, provide a description.

    3. Set the rule priority. This priority applies only to ARL rules and is independent of the rule priority in the security profile.

    4. Optionally, enable Enable dry run (logging only) to test the rule and estimate the load on your web service. Requests will not be blocked in this mode.

    5. Under Conditions for traffic, specify the traffic the rule will apply to:

      • All traffic: Rule will apply to all traffic.

      • On condition: Rule will apply to the traffic defined in the Conditions field:

        • IP: IP address, IP address range, IP address region, or address list.
        • HTTP header: HTTP header string.
        • Request URI: Request path.
        • Host: Domain receiving the request.
        • HTTP method: Request method.
        • Cookie: Cookie header string.

        You can set multiple conditions by selecting all the condition types you need in the Conditions field.

        You can also set multiple conditions of the same type by clicking and or or in the section with the condition you need.

        To delete a condition, click .

    6. Under Request counting, select:

      • No grouping: To count each request individually.

      • Grouping by property: To count request groups sharing one or more common properties.

        • Select a grouping property:

          Automatic grouping Grouping by key
          Request path: Request path. HTTP cookie: Cookie header string.
          HTTP method: Request method. HTTP header: HTTP header string.
          IP address: Source IP address of the request. Query params: String in the request parameters.
          Region: IP address region of the requests.
          Host: Domain receiving the request.

          To group by key, specify the key value.

        • Optionally, enable Case-sensitive to put properties with the same values in different cases into different groups.

      Specify a request limit or request limit per group, as well as a time interval (1 second to 60 minutes) for the limit. All requests above the limit will get blocked.

    7. Click Save rule.

With Terraform, you can quickly create a cloud infrastructure in Yandex Cloud and manage it using configuration files. These files store the infrastructure description written in HashiCorp Configuration Language (HCL). If you change the configuration files, Terraform automatically detects which part of your configuration is already deployed, and what should be added or removed.

Terraform is distributed under the Business Source License. The Yandex Cloud provider for Terraform is distributed under the MPL-2.0 license.

For more information about the provider resources, see the relevant documentation on the Terraform website or its mirror.

If you do not have Terraform yet, install it and configure the Yandex Cloud provider.

To add a rule to your ARL profile:

  1. Open the Terraform configuration file and edit the yandex_sws_advanced_rate_limiter_profile description: add the advanced_rate_limiter_rule section containing the security rule.

    # ARL profile
    
    resource "yandex_sws_advanced_rate_limiter_profile" "arl-profile" {
      name        = "<profile_name>"
      description = "<profile_description>"
    
      # Rule 1
    
      advanced_rate_limiter_rule {
        name        = "<rule_name>"
        priority    = <rule_priority>
        description = "<rule_description>"
        dry_run     = true
    
        static_quota {
          action = "DENY"
          limit  = <rule_limit>
          period = <rule_period>
          condition {
            request_uri {
              path {
                exact_match = "/api"
              }
            }
          }
        }
      }
    
      # Rule 2
    
      advanced_rate_limiter_rule {
        name        = "<rule_name>"
        priority    = <rule_priority>
        description = "<rule_description>"
        dry_run     = true
    
        static_quota {
          action = "DENY"
          limit  = <rule_limit>
          period = <rule_period>
          condition {
            source_ip {
              geo_ip_match {
                locations = ["ru", "kz"]
              }
            }
          }
        }
      }
    }
    

    Where:

    • name: ARL profile name.
    • description: ARL profile description. This is an optional setting.
    • labels: ARL profile labels. This is an optional setting.
    • advanced_rate_limiter_rule: Rule section.
      • name: Rule name.
      • priority: Rule priority, a unique number from 1 to 999999. Rules with smaller numerical values apply first.
      • description: Rule description. This is an optional setting.
      • dry_run: Dry run flag. Set it to true to test the rule and estimate the load on your web service. Requests will not be blocked in this mode. However, the system will log triggered rules. This is an optional setting.
      • static_quota: Request count mode where each request is counted individually without grouping. You can only specify either static_quota or dynamic_quota.
        • action: Action if the limit is exceeded. Always set it to DENY.
        • limit: Maximum number of allowed requests per period.
        • period: Time period in seconds during which the limit applies.
        • condition: Condition for applying the rule. This is an optional setting. For more information, see the advanced_rate_limiter_rule.static_quota.condition description in this provider article.
      • dynamic_quota: Request count mode where groups of requests sharing one or more properties are counted. You can only specify either static_quota or dynamic_quota.
        • action: Action if the limit is exceeded. Always set it to DENY.
        • limit: Maximum number of allowed requests per period.
        • period: Time period in seconds during which the limit applies.
        • condition: Condition for applying the rule. This is an optional setting. For more information, see the advanced_rate_limiter_rule.dynamic_quota.condition description in this provider article.
        • characteristic: Description of properties to group requests by. You can only specify either simple_characteristic or key_characteristic.
          • case_insensitive: Case insensitive, if true, or sensitive, if false.
          • key_characteristic: Section of parameters requiring a key (string) to group requests by.
            • type: Grouping type. The possible values are COOKIE_KEY, HEADER_KEY, and QUERY_KEY.
            • value: Key value (string) to group requests by.
          • simple_characteristic: Section with parameters for autogrouping, i.e., requests are automatically grouped by the specified parameter.
            • type: Grouping type. The possible values are REQUEST_PATH, HTTP_METHOD, IP, GEO, and HOST.

    For more information about the yandex_sws_advanced_rate_limiter_profile properties, see this Terraform provider article.

  2. Apply the changes:

    1. In the terminal, go to the directory where you edited the configuration file.

    2. Make sure the configuration file is correct using this command:

      terraform validate
      

      If the configuration is correct, you will get this message:

      Success! The configuration is valid.
      
    3. Run this command:

      terraform plan
      

      You will see a detailed list of resources. No changes will be made at this step. If the configuration contains any errors, Terraform will show them.

    4. Apply the changes:

      terraform apply
      
    5. Type yes and press Enter to confirm the changes.

    You can check the resource updates in the management console.

Get information about the ARL profile and then update the ARL profile using the update REST API method for the AdvancedRateLimiterProfile resource or the AdvancedRateLimiterProfile/Update gRPC API call.

See alsoSee also

  • Editing a rule in a security profile
  • Deleting a rule from a security profile

Was the article helpful?

Previous
Deleting a profile
Next
Editing a rule
© 2025 Direct Cursus Technology L.L.C.