Yandex Cloud
Поиск
Связаться с намиПодключиться
  • Истории успеха
  • Документация
  • Блог
  • Все сервисы
  • Статус работы сервисов
    • Популярные
    • Инфраструктура и сеть
    • Платформа данных
    • Контейнеры
    • Инструменты разработчика
    • Бессерверные вычисления
    • Безопасность
    • Мониторинг и управление ресурсами
    • ИИ для бизнеса
    • Бизнес-инструменты
  • Все решения
    • По отраслям
    • По типу задач
    • Экономика платформы
    • Безопасность
    • Техническая поддержка
    • Каталог партнёров
    • Обучение и сертификация
    • Облако для стартапов
    • Облако для крупного бизнеса
    • Центр технологий для общества
    • Облако для интеграторов
    • Поддержка IT-бизнеса
    • Облако для фрилансеров
    • Обучение и сертификация
    • Блог
    • Документация
    • Контент-программа
    • Мероприятия и вебинары
    • Контакты, чаты и сообщества
    • Идеи
    • Калькулятор цен
    • Тарифы
    • Промоакции и free tier
    • Правила тарификации
  • Истории успеха
  • Документация
  • Блог
Проект Яндекса
© 2025 ООО «Яндекс.Облако»
Terraform в Yandex Cloud
  • Начало работы
  • Библиотека решений
    • Обзор
    • История изменений (англ.)
          • sws_advanced_rate_limiter_profile
          • sws_security_profile
          • sws_waf_profile

В этой статье:

  • Example usage
  • Schema
  • Optional
  • Read-Only
  • Nested Schema for analyze_request_body
  • Nested Schema for security_rule
  • Nested Schema for security_rule.rule_condition
  • Nested Schema for security_rule.rule_condition.condition
  • Nested Schema for security_rule.rule_condition.condition.authority
  • Nested Schema for security_rule.rule_condition.condition.authority.authorities
  • Nested Schema for security_rule.rule_condition.condition.headers
  • Nested Schema for security_rule.rule_condition.condition.headers.value
  • Nested Schema for security_rule.rule_condition.condition.http_method
  • Nested Schema for security_rule.rule_condition.condition.http_method.http_methods
  • Nested Schema for security_rule.rule_condition.condition.request_uri
  • Nested Schema for security_rule.rule_condition.condition.request_uri.path
  • Nested Schema for security_rule.rule_condition.condition.request_uri.queries
  • Nested Schema for security_rule.rule_condition.condition.request_uri.queries.value
  • Nested Schema for security_rule.rule_condition.condition.source_ip
  • Nested Schema for security_rule.rule_condition.condition.source_ip.geo_ip_match
  • Nested Schema for security_rule.rule_condition.condition.source_ip.geo_ip_not_match
  • Nested Schema for security_rule.rule_condition.condition.source_ip.ip_ranges_match
  • Nested Schema for security_rule.rule_condition.condition.source_ip.ip_ranges_not_match
  • Nested Schema for security_rule.smart_protection
  • Nested Schema for security_rule.smart_protection.condition
  • Nested Schema for security_rule.smart_protection.condition.authority
  • Nested Schema for security_rule.smart_protection.condition.authority.authorities
  • Nested Schema for security_rule.smart_protection.condition.headers
  • Nested Schema for security_rule.smart_protection.condition.headers.value
  • Nested Schema for security_rule.smart_protection.condition.http_method
  • Nested Schema for security_rule.smart_protection.condition.http_method.http_methods
  • Nested Schema for security_rule.smart_protection.condition.request_uri
  • Nested Schema for security_rule.smart_protection.condition.request_uri.path
  • Nested Schema for security_rule.smart_protection.condition.request_uri.queries
  • Nested Schema for security_rule.smart_protection.condition.request_uri.queries.value
  • Nested Schema for security_rule.smart_protection.condition.source_ip
  • Nested Schema for security_rule.smart_protection.condition.source_ip.geo_ip_match
  • Nested Schema for security_rule.smart_protection.condition.source_ip.geo_ip_not_match
  • Nested Schema for security_rule.smart_protection.condition.source_ip.ip_ranges_match
  • Nested Schema for security_rule.smart_protection.condition.source_ip.ip_ranges_not_match
  • Nested Schema for security_rule.waf
  • Nested Schema for security_rule.waf.condition
  • Nested Schema for security_rule.waf.condition.authority
  • Nested Schema for security_rule.waf.condition.authority.authorities
  • Nested Schema for security_rule.waf.condition.headers
  • Nested Schema for security_rule.waf.condition.headers.value
  • Nested Schema for security_rule.waf.condition.http_method
  • Nested Schema for security_rule.waf.condition.http_method.http_methods
  • Nested Schema for security_rule.waf.condition.request_uri
  • Nested Schema for security_rule.waf.condition.request_uri.path
  • Nested Schema for security_rule.waf.condition.request_uri.queries
  • Nested Schema for security_rule.waf.condition.request_uri.queries.value
  • Nested Schema for security_rule.waf.condition.source_ip
  • Nested Schema for security_rule.waf.condition.source_ip.geo_ip_match
  • Nested Schema for security_rule.waf.condition.source_ip.geo_ip_not_match
  • Nested Schema for security_rule.waf.condition.source_ip.ip_ranges_match
  • Nested Schema for security_rule.waf.condition.source_ip.ip_ranges_not_match
  • Nested Schema for timeouts
  • Import
  1. Справочник Terraform
  2. Ресурсы (англ.)
  3. Smart Web Security (SWS)
  4. Resources
  5. sws_security_profile

yandex_sws_security_profile (Resource)

Статья создана
Yandex Cloud
Обновлена 11 сентября 2025 г.
  • Example usage
  • Schema
    • Optional
    • Read-Only
    • Nested Schema for analyze_request_body
    • Nested Schema for security_rule
    • Nested Schema for security_rule.rule_condition
    • Nested Schema for security_rule.rule_condition.condition
    • Nested Schema for security_rule.rule_condition.condition.authority
    • Nested Schema for security_rule.rule_condition.condition.authority.authorities
    • Nested Schema for security_rule.rule_condition.condition.headers
    • Nested Schema for security_rule.rule_condition.condition.headers.value
    • Nested Schema for security_rule.rule_condition.condition.http_method
    • Nested Schema for security_rule.rule_condition.condition.http_method.http_methods
    • Nested Schema for security_rule.rule_condition.condition.request_uri
    • Nested Schema for security_rule.rule_condition.condition.request_uri.path
    • Nested Schema for security_rule.rule_condition.condition.request_uri.queries
    • Nested Schema for security_rule.rule_condition.condition.request_uri.queries.value
    • Nested Schema for security_rule.rule_condition.condition.source_ip
    • Nested Schema for security_rule.rule_condition.condition.source_ip.geo_ip_match
    • Nested Schema for security_rule.rule_condition.condition.source_ip.geo_ip_not_match
    • Nested Schema for security_rule.rule_condition.condition.source_ip.ip_ranges_match
    • Nested Schema for security_rule.rule_condition.condition.source_ip.ip_ranges_not_match
    • Nested Schema for security_rule.smart_protection
    • Nested Schema for security_rule.smart_protection.condition
    • Nested Schema for security_rule.smart_protection.condition.authority
    • Nested Schema for security_rule.smart_protection.condition.authority.authorities
    • Nested Schema for security_rule.smart_protection.condition.headers
    • Nested Schema for security_rule.smart_protection.condition.headers.value
    • Nested Schema for security_rule.smart_protection.condition.http_method
    • Nested Schema for security_rule.smart_protection.condition.http_method.http_methods
    • Nested Schema for security_rule.smart_protection.condition.request_uri
    • Nested Schema for security_rule.smart_protection.condition.request_uri.path
    • Nested Schema for security_rule.smart_protection.condition.request_uri.queries
    • Nested Schema for security_rule.smart_protection.condition.request_uri.queries.value
    • Nested Schema for security_rule.smart_protection.condition.source_ip
    • Nested Schema for security_rule.smart_protection.condition.source_ip.geo_ip_match
    • Nested Schema for security_rule.smart_protection.condition.source_ip.geo_ip_not_match
    • Nested Schema for security_rule.smart_protection.condition.source_ip.ip_ranges_match
    • Nested Schema for security_rule.smart_protection.condition.source_ip.ip_ranges_not_match
    • Nested Schema for security_rule.waf
    • Nested Schema for security_rule.waf.condition
    • Nested Schema for security_rule.waf.condition.authority
    • Nested Schema for security_rule.waf.condition.authority.authorities
    • Nested Schema for security_rule.waf.condition.headers
    • Nested Schema for security_rule.waf.condition.headers.value
    • Nested Schema for security_rule.waf.condition.http_method
    • Nested Schema for security_rule.waf.condition.http_method.http_methods
    • Nested Schema for security_rule.waf.condition.request_uri
    • Nested Schema for security_rule.waf.condition.request_uri.path
    • Nested Schema for security_rule.waf.condition.request_uri.queries
    • Nested Schema for security_rule.waf.condition.request_uri.queries.value
    • Nested Schema for security_rule.waf.condition.source_ip
    • Nested Schema for security_rule.waf.condition.source_ip.geo_ip_match
    • Nested Schema for security_rule.waf.condition.source_ip.geo_ip_not_match
    • Nested Schema for security_rule.waf.condition.source_ip.ip_ranges_match
    • Nested Schema for security_rule.waf.condition.source_ip.ip_ranges_not_match
    • Nested Schema for timeouts
  • Import

With security profiles you can protect your infrastructure from DDoS attacks at the application level (L7).

Creates a Security Profile in the specified folder. For more information, see the official documentation.

Example usageExample usage

//
// Create a new SWS Security Profile (Simple).
//
resource "yandex_sws_security_profile" "demo-profile-simple" {
  name           = "demo-profile-simple"
  default_action = "ALLOW"

  security_rule {
    name     = "smart-protection"
    priority = 99999

    smart_protection {
      mode = "API"
    }
  }
}
//
// Create a new SWS Security Profile (Advanced).
//
resource "yandex_sws_security_profile" "demo-profile-advanced" {
  name                             = "demo-profile-advanced"
  default_action                   = "ALLOW"
  captcha_id                       = "<captcha_id>"
  advanced_rate_limiter_profile_id = "<arl_id>"

  security_rule {
    name     = "smart-protection"
    priority = 99999

    smart_protection {
      mode = "API"
    }
  }

  security_rule {
    name     = "waf"
    priority = 88888

    waf {
      mode           = "API"
      waf_profile_id = "<waf_id>"
    }
  }

  security_rule {
    name     = "rule-condition-1"
    priority = 1

    rule_condition {
      action = "ALLOW"

      condition {
        authority {
          authorities {
            exact_match = "example.com"
          }
          authorities {
            exact_match = "example.net"
          }
        }
      }
    }
  }

  security_rule {
    name     = "rule-condition-2"
    priority = 2

    rule_condition {
      action = "DENY"

      condition {
        http_method {
          http_methods {
            exact_match = "DELETE"
          }
          http_methods {
            exact_match = "PUT"
          }
        }
      }
    }
  }

  security_rule {
    name     = "rule-condition-3"
    priority = 3

    rule_condition {
      action = "DENY"

      condition {
        request_uri {
          path {
            prefix_match = "/form"
          }
          queries {
            key = "firstname"
            value {
              pire_regex_match = ".*ivan.*"
            }
          }
          queries {
            key = "lastname"
            value {
              pire_regex_match = ".*petr.*"
            }
          }
        }

        headers {
          name = "User-Agent"
          value {
            pire_regex_match = ".*curl.*"
          }
        }
        headers {
          name = "Referer"
          value {
            pire_regex_not_match = ".*bot.*"
          }
        }

        source_ip {
          ip_ranges_match {
            ip_ranges = ["1.2.33.44", "2.3.4.56"]
          }
          ip_ranges_not_match {
            ip_ranges = ["8.8.0.0/16", "10::1234:1abc:1/64"]
          }
          geo_ip_match {
            locations = ["ru", "es"]
          }
          geo_ip_not_match {
            locations = ["us", "fm", "gb"]
          }
        }
      }
    }
  }
}

SchemaSchema

OptionalOptional

  • advanced_rate_limiter_profile_id (String) Advanced rate limiter profile ID to use with this security profile. Set empty to use default.
  • analyze_request_body (Block List, Max: 1) Analyze request body. (see below for nested schema)
  • captcha_id (String) Captcha ID to use with this security profile. Set empty to use default.
  • cloud_id (String) The Cloud ID which resource belongs to. If it is not provided, the default provider cloud-id is used.
  • default_action (String) Action to perform if none of rules matched. Possible values: ALLOW or DENY.
  • description (String) The resource description.
  • folder_id (String) The folder identifier that resource belongs to. If it is not provided, the default provider folder-id is used.
  • labels (Map of String) A set of key/value label pairs which assigned to resource.
  • name (String) The resource name.
  • security_rule (Block List) List of security rules.

Важно

Exactly one rule specifier: smart_protection or rule_condition or waf should be specified. (see below for nested schema)

  • timeouts (Block, Optional) (see below for nested schema)

Read-OnlyRead-Only

  • created_at (String) The creation timestamp of the resource.
  • id (String) The ID of this resource.

Nested Schema for Nested Schema for analyze_request_body

Optional:

  • size_limit (Number)
  • size_limit_action (String)

Nested Schema for Nested Schema for security_rule

Optional:

  • description (String) Optional description of the rule. 0-512 characters long.
  • dry_run (Boolean) This mode allows you to test your security profile or a single rule.
  • name (String) Name of the rule. The name is unique within the security profile. 1-50 characters long.
  • priority (Number) Determines the priority for checking the incoming traffic.
  • rule_condition (Block List, Max: 1) Rule actions, see Rule actions. (see below for nested schema)
  • smart_protection (Block List, Max: 1) Smart Protection rule, see Smart Protection rules. (see below for nested schema)
  • waf (Block List, Max: 1) Web Application Firewall (WAF) rule, see WAF rules. (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition

Optional:

  • action (String) Action to perform if this rule matched. Possible values: ALLOW or DENY.
  • condition (Block List, Max: 1) The condition for matching the rule. You can find all possibilities of condition in gRPC specs. (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition.condition

Optional:

  • authority (Block List, Max: 1) (see below for nested schema)
  • headers (Block List) (see below for nested schema)
  • http_method (Block List, Max: 1) (see below for nested schema)
  • request_uri (Block List, Max: 1) (see below for nested schema)
  • source_ip (Block List, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.authority

Optional:

  • authorities (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.authority.authorities

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.headers

Required:

  • value (Block List, Min: 1, Max: 1) (see below for nested schema)

Optional:

  • name (String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.headers.value

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.http_method

Optional:

  • http_methods (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.http_method.http_methods

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.request_uri

Optional:

  • path (Block List, Max: 1) (see below for nested schema)
  • queries (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.request_uri.path

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.request_uri.queries

Required:

  • key (String)
  • value (Block List, Min: 1, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.request_uri.queries.value

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.source_ip

Optional:

  • geo_ip_match (Block List, Max: 1) (see below for nested schema)
  • geo_ip_not_match (Block List, Max: 1) (see below for nested schema)
  • ip_ranges_match (Block List, Max: 1) (see below for nested schema)
  • ip_ranges_not_match (Block List, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.source_ip.geo_ip_match

Optional:

  • locations (List of String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.source_ip.geo_ip_not_match

Optional:

  • locations (List of String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.source_ip.ip_ranges_match

Optional:

  • ip_ranges (List of String)

Nested Schema for Nested Schema for security_rule.rule_condition.condition.source_ip.ip_ranges_not_match

Optional:

  • ip_ranges (List of String)

Nested Schema for Nested Schema for security_rule.smart_protection

Optional:

  • condition (Block List, Max: 1) The condition for matching the rule. You can find all possibilities of condition in gRPC specs. (see below for nested schema)
  • mode (String) Mode of protection. Possible values: FULL (full protection means that the traffic will be checked based on ML models and behavioral analysis, with suspicious requests being sent to SmartCaptcha) or API (API protection means checking the traffic based on ML models and behavioral analysis without sending suspicious requests to SmartCaptcha. The suspicious requests will be blocked).

Nested Schema for Nested Schema for security_rule.smart_protection.condition

Optional:

  • authority (Block List, Max: 1) (see below for nested schema)
  • headers (Block List) (see below for nested schema)
  • http_method (Block List, Max: 1) (see below for nested schema)
  • request_uri (Block List, Max: 1) (see below for nested schema)
  • source_ip (Block List, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.authority

Optional:

  • authorities (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.authority.authorities

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.headers

Required:

  • value (Block List, Min: 1, Max: 1) (see below for nested schema)

Optional:

  • name (String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.headers.value

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.http_method

Optional:

  • http_methods (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.http_method.http_methods

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.request_uri

Optional:

  • path (Block List, Max: 1) (see below for nested schema)
  • queries (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.request_uri.path

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.request_uri.queries

Required:

  • key (String)
  • value (Block List, Min: 1, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.request_uri.queries.value

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.source_ip

Optional:

  • geo_ip_match (Block List, Max: 1) (see below for nested schema)
  • geo_ip_not_match (Block List, Max: 1) (see below for nested schema)
  • ip_ranges_match (Block List, Max: 1) (see below for nested schema)
  • ip_ranges_not_match (Block List, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.source_ip.geo_ip_match

Optional:

  • locations (List of String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.source_ip.geo_ip_not_match

Optional:

  • locations (List of String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.source_ip.ip_ranges_match

Optional:

  • ip_ranges (List of String)

Nested Schema for Nested Schema for security_rule.smart_protection.condition.source_ip.ip_ranges_not_match

Optional:

  • ip_ranges (List of String)

Nested Schema for Nested Schema for security_rule.waf

Required:

  • waf_profile_id (String) ID of WAF profile to use in this rule.

Optional:

  • condition (Block List, Max: 1) The condition for matching the rule. You can find all possibilities of condition in gRPC specs. (see below for nested schema)
  • mode (String) Mode of protection. Possible values: FULL (full protection means that the traffic will be checked based on ML models and behavioral analysis, with suspicious requests being sent to SmartCaptcha) or API (API protection means checking the traffic based on ML models and behavioral analysis without sending suspicious requests to SmartCaptcha. The suspicious requests will be blocked).

Nested Schema for Nested Schema for security_rule.waf.condition

Optional:

  • authority (Block List, Max: 1) (see below for nested schema)
  • headers (Block List) (see below for nested schema)
  • http_method (Block List, Max: 1) (see below for nested schema)
  • request_uri (Block List, Max: 1) (see below for nested schema)
  • source_ip (Block List, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.waf.condition.authority

Optional:

  • authorities (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.waf.condition.authority.authorities

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.waf.condition.headers

Required:

  • value (Block List, Min: 1, Max: 1) (see below for nested schema)

Optional:

  • name (String)

Nested Schema for Nested Schema for security_rule.waf.condition.headers.value

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.waf.condition.http_method

Optional:

  • http_methods (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.waf.condition.http_method.http_methods

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.waf.condition.request_uri

Optional:

  • path (Block List, Max: 1) (see below for nested schema)
  • queries (Block List) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.waf.condition.request_uri.path

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.waf.condition.request_uri.queries

Required:

  • key (String)
  • value (Block List, Min: 1, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.waf.condition.request_uri.queries.value

Optional:

  • exact_match (String)
  • exact_not_match (String)
  • pire_regex_match (String)
  • pire_regex_not_match (String)
  • prefix_match (String)
  • prefix_not_match (String)

Nested Schema for Nested Schema for security_rule.waf.condition.source_ip

Optional:

  • geo_ip_match (Block List, Max: 1) (see below for nested schema)
  • geo_ip_not_match (Block List, Max: 1) (see below for nested schema)
  • ip_ranges_match (Block List, Max: 1) (see below for nested schema)
  • ip_ranges_not_match (Block List, Max: 1) (see below for nested schema)

Nested Schema for Nested Schema for security_rule.waf.condition.source_ip.geo_ip_match

Optional:

  • locations (List of String)

Nested Schema for Nested Schema for security_rule.waf.condition.source_ip.geo_ip_not_match

Optional:

  • locations (List of String)

Nested Schema for Nested Schema for security_rule.waf.condition.source_ip.ip_ranges_match

Optional:

  • ip_ranges (List of String)

Nested Schema for Nested Schema for security_rule.waf.condition.source_ip.ip_ranges_not_match

Optional:

  • ip_ranges (List of String)

Nested Schema for Nested Schema for timeouts

Optional:

  • create (String) A string that can be parsed as a duration consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
  • delete (String) A string that can be parsed as a duration consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours). Setting a timeout for a Delete operation is only applicable if changes are saved into state before the destroy operation occurs.
  • read (String) A string that can be parsed as a duration consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours). Read operations occur during any refresh or planning operation when refresh is enabled.
  • update (String) A string that can be parsed as a duration consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).

ImportImport

The resource can be imported by using their resource ID. For getting the resource ID you can use Yandex Cloud Web Console or YC CLI.

# terraform import yandex_sws_security_profile.<resource Name> <resource Id>
terraform import yandex_sws_security_profile.demo-profile-simple ...

Была ли статья полезна?

Предыдущая
sws_advanced_rate_limiter_profile
Следующая
sws_waf_profile
Проект Яндекса
© 2025 ООО «Яндекс.Облако»