Adding a rule to an ARL profile
You can only add ARL rules to an ARL profile. Basic rules, as well as Smart Protection and WAF rules, are added to a security profile.
-
In the management console
, select the folder the ARL profile resides in. -
From the list of services, select Smart Web Security.
-
In the left-hand panel, select
ARL profiles. -
Select the profile to add a rule to.
-
Click
Add rule and in the window that opens:-
Enter a name for the rule.
-
Optionally, enter a description.
-
Set the rule priority. This priority applies only to ARL rules and is independent of the rule priority in the security profile.
-
(Optional) Enable Enable dry run (logging only) to test the rule and estimate the load on the web service. Requests will not be blocked in this mode.
-
Under Conditions for traffic, specify which traffic the rule will be used to analyze:
-
All traffic
: The rule will be used to analyze the whole traffic. -
On condition
: The rule will be used to analyze the traffic specified in the Conditions field:IP
: IP address, IP address range, IP address region, or address list.HTTP header
: HTTP header string.Request URI
: Request path.Host
: Domain receiving the request.HTTP method
: Request method.Cookie
: Cookie header string.
You can set multiple conditions. To do this, select all the condition types you need in the Conditions field.
You can also set multiple conditions of the same type. To do this, click
and or or in the section with the condition you need.To delete a condition, click
.
-
-
Under Request counting, select:
-
No grouping
: Counting each request individually. -
Grouping by property
: Counting request groups sharing one or more common properties.-
Select a grouping property:
Automatic grouping Grouping by key Request path
: Request pathHTTP cookie
: String in the cookie headerHTTP method
: Request methodHTTP header
: String in the HTTP headerIP address
: IP address the request came fromQuery params
: String in the request parametersRegion
: IP address region of the requestsHost
: Domain receiving the requestTo group by key, specify the key value.
-
(Optional) Enable
Case-sensitive
to put properties with the same values in different cases into different groups.
-
Specify a request limit or request limit per group as well as a time interval (from
1 second
to60 minutes
) for the limit. All requests above the limit will be blocked. -
-
Click Save rule.
-
With Terraform
Terraform is distributed under the Business Source License
For more information about the provider resources, see the documentation on the Terraform
If you do not have Terraform yet, install it and configure its Yandex Cloud provider.
To add a rule to your ARL profile:
-
Open the Terraform configuration file and edit the part with the
yandex_sws_advanced_rate_limiter_profile
resource description: add theadvanced_rate_limiter_rule
section containing the security rule.# ARL profile resource "yandex_sws_advanced_rate_limiter_profile" "arl-profile" { name = "<profile_name>" description = "<profile_description>" # Rule 1 advanced_rate_limiter_rule { name = "<rule_name>" priority = <rule_priority> description = "<rule_description>" dry_run = true static_quota { action = "DENY" limit = <rule_limit> period = <rule_period> condition { request_uri { path { exact_match = "/api" } } } } } # Rule 2 advanced_rate_limiter_rule { name = "<rule_name>" priority = <rule_priority> description = "<rule_description>" dry_run = true static_quota { action = "DENY" limit = <rule_limit> period = <rule_period> condition { source_ip { geo_ip_match { locations = ["ru", "kz"] } } } } } }
Where:
name
: ARL profile name.description
: ARL profile description. This is an optional parameter.labels
: ARL profile labels. This is an optional parameter.advanced_rate_limiter_rule
: Rule section.name
: Rule name.priority
: Rule priority, a unique number from1
to999999
. Rules with smaller numerical values apply first.description
: Rule description. This is an optional parameter.dry_run
: Dry run flag. Set totrue
to test the rule and estimate the load on your web service. Requests will not be blocked in this mode. However, rule triggering will be logged. This is an optional parameter.static_quota
: Request count mode where each request is counted individually without grouping. You can only specify one section, eitherstatic_quota
ordynamic_quota
.action
: Action if the limit is exceeded. The only available value isDENY
.limit
: Maximum number of allowed queries per period.period
: Time period in seconds in which the limit applies.condition
: Condition for applying the rule. This is an optional parameter. For more information, see theadvanced_rate_limiter_rule.static_quota.condition
description in this provider article .
dynamic_quota
: Request count mode where groups of requests sharing one or more properties are counted. You can only specify one section, eitherstatic_quota
ordynamic_quota
.action
: Action if the limit is exceeded. The only available value isDENY
.limit
: Maximum number of allowed queries per period.period
: Time period in seconds in which the limit applies.condition
: Condition for applying the rule. This is an optional parameter. For more information, see theadvanced_rate_limiter_rule.dynamic_quota.condition
description in this provider article .characteristic
: Description of properties to group requests by. You can specify one section, eithersimple_characteristic
orkey_characteristic
.case_insensitive
: Case insensitive, iftrue
, or sensitive, iffalse
.key_characteristic
: Section of parameters requiring a key (string) to group requests by.type
: Grouping type. The possible values areCOOKIE_KEY
,HEADER_KEY
, andQUERY_KEY
.value
: Key value (string) to group requests by.
simple_characteristic
: Section with parameters for autogrouping, i.e., requests are automatically grouped by the specified parameter.type
: Grouping type. The possible values areREQUEST_PATH
,HTTP_METHOD
,IP
,GEO
, andHOST
.
For more information about the
yandex_sws_advanced_rate_limiter_profile
resource parameters, see the provider documentation . -
Apply the changes:
-
In the terminal, go to the directory where you edited the configuration file.
-
Make sure the configuration file is correct using this command:
terraform validate
If the configuration is correct, you will get this message:
Success! The configuration is valid.
-
Run this command:
terraform plan
You will see a detailed list of resources. No changes will be made at this step. Terraform will show any errors found in your configuration.
-
Apply the changes:
terraform apply
-
Type
yes
and press Enter to confirm the changes.
You can check the resources’ updates in the management console
. -
Get information about the ARL profile and then update the ARL profile using the update REST API method for the AdvancedRateLimiterProfile resource or the AdvancedRateLimiterProfile/Update gRPC API call.