Link11 WAAP
v5
v5
  • Link11 WAAP Documentation
  • Release Notes
  • Known Issues
  • User Guide
    • Introduction to Link11 WAAP
  • How Link11 WAAP Works
    • Traffic Filtering Process
    • Traffic Reporting and Analytics
    • Policy Mapping and Traffic Routing
    • Tagging
    • UI Overview and Common Elements
  • Console UI Walkthrough
    • Analytics
      • Dashboard
      • Events Log
    • Security
      • Global Filters
      • Flow Control Policies
      • Security Policies
      • Rate Limit Rules
      • ACL Profiles
      • Actions
      • Dynamic Rules
      • Quarantined
      • Content Filter
        • Content Filter Profiles
        • Content Filter Rules
    • Sites
      • Server Groups
      • Proxy Templates
      • Mobile Application Groups
      • Backend Services
      • Edge Functions
      • DNS Records
      • SSL
        • Load Balancers
        • Certificates
    • System
      • Interactive Challenge
      • SSO Configuration
      • Purge CDN Cache
      • Users Management
      • Security Alerts
      • Log Exporters
      • Version Control
      • System DB
      • Publish Changes
    • Account
  • Using the product
    • Best Practices
      • Saving and Publishing Your Changes
      • Enabling Passive Challenges
      • Understanding and Diagnosing Traffic Issues
    • How Do I...
      • Authenticate mobile app users
      • Ban, unban, and allowlist traffic sources
      • Bypass Link11 WAAP for loadtesting or other purposes
      • Configure a new path/section of a site
      • Control caching behavior
      • Enable GraphQL traffic
      • Enable mTLS (mutual TLS)
      • Protect sensitive information in logs and analytics
      • Quickly block an attacker
      • Redirect or block HTTP traffic
      • Run custom code
      • Set rate limits and exemptions
      • Stream event data to a SIEM solution or other destination
    • The Link11 WAAP API
      • Overview
      • Internal data structures
      • Using Swagger UI
      • Using curl
  • Reference Information
    • Acronyms
    • API
      • API access to traffic data
      • Types of namespaces
      • Namespace reference
        • ACL Profiles
        • Actions
        • Backend Services
        • Certificates
        • Configs
        • Content Filter Profiles
        • Content Filter Rules
        • Data queries
        • Dynamic Rules
        • Edge Functions
        • Flow Control Policies
        • Global Filters
        • Load Balancers
        • Log Exporters
        • Mobile Application Groups
        • Planets
        • Proxy Templates
        • Rate Limit Rules
        • Security Alerts
        • Security Policies
        • Server Groups
        • Tags
        • Tools
        • Users
    • Hostile Bot Detection / LWCSI
      • Environmental detection and browser verification
      • Client authentication
      • Biometric behavioral verification
    • HTTP Response Codes
    • Log Exporter Output
    • Pattern Matching Syntax
    • Query Filter Syntax and Best Practices
  • Support
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. Reference Information
  2. API
  3. Namespace reference

Dynamic Rules

PreviousData queriesNextEdge Functions

Last updated 5 months ago

Was this helpful?

Get Dynamic Rules

get

Get all Dynamic Rules in a configuration

Path parameters
configstringRequired
Responses
200
Dynamic Rules retrieved successfully
application/json
400
Input Error
application/json
500
Internal Server Error
application/json
get
GET /api/v4.0/conf/{config}/dynamic-rules HTTP/1.1
Host: 
Accept: */*
{
  "total": 1,
  "items": [
    {
      "action": "text",
      "active": true,
      "description": "",
      "id": "text",
      "include": {
        "relation": "OR",
        "tags": [
          "text"
        ]
      },
      "exclude": {
        "relation": "OR",
        "tags": [
          "text"
        ]
      },
      "name": "text",
      "offload_ip_filtering": true,
      "tags": [
        "text"
      ],
      "target": "text",
      "threshold": 1,
      "timeframe": 1,
      "ttl": 1
    }
  ]
}

Get specific Dynamic Rule

get

Get a Dynamic Rule from the specified configuration

Path parameters
configstringRequired
entry_idstringRequired
Responses
200
Dynamic Rule retrieved successfully
application/json
400
Input Error
application/json
422
Validation Error
application/json
500
Internal Server Error
application/json
get
GET /api/v4.0/conf/{config}/dynamic-rules/{entry_id} HTTP/1.1
Host: 
Accept: */*
{
  "action": "text",
  "active": true,
  "description": "",
  "id": "text",
  "include": {
    "relation": "OR",
    "tags": [
      "text"
    ]
  },
  "exclude": {
    "relation": "OR",
    "tags": [
      "text"
    ]
  },
  "name": "text",
  "offload_ip_filtering": true,
  "tags": [
    "text"
  ],
  "target": "text",
  "threshold": 1,
  "timeframe": 1,
  "ttl": 1
}

Delete Dynamic Rule

delete

Delete an individual Dynamic Rule from the specified configuration

Path parameters
configstringRequired
entry_idstringRequired
Responses
200
Dynamic Rule deleted successfully
application/json
400
Input Error
application/json
422
Validation Error
application/json
500
Internal Server Error
application/json
delete
DELETE /api/v4.0/conf/{config}/dynamic-rules/{entry_id} HTTP/1.1
Host: 
Accept: */*
{
  "message": "Successfully deleted entry"
}
  • GETGet Dynamic Rules
  • GETGet specific Dynamic Rule
  • PUTModify Dynamic Rule
  • POSTCreate Dynamic Rule
  • DELETEDelete Dynamic Rule

Modify Dynamic Rule

put

Update an individual Dynamic Rule within a configuration

Path parameters
configstringRequired
entry_idstringRequired
Body
actionstringRequired
activebooleanRequired
descriptionstringOptionalDefault: ""
idstringRequired

Unique id

Pattern: ^[A-Za-z0-9\-\_]*$
namestringRequired
offload_ip_filteringbooleanRequired
tagsstring[]Optional
targetstringRequired
thresholdintegerRequired
timeframeintegerRequired
ttlintegerRequired
Responses
200
Dynamic Rule updated successfully
application/json
400
Input Error
application/json
422
Validation Error
application/json
500
Internal Server Error
application/json
put
PUT /api/v4.0/conf/{config}/dynamic-rules/{entry_id} HTTP/1.1
Host: 
Content-Type: application/json
Accept: */*
Content-Length: 258

{
  "action": "text",
  "active": true,
  "description": "",
  "id": "text",
  "include": {
    "relation": "OR",
    "tags": [
      "text"
    ]
  },
  "exclude": {
    "relation": "OR",
    "tags": [
      "text"
    ]
  },
  "name": "text",
  "offload_ip_filtering": true,
  "tags": [
    "text"
  ],
  "target": "text",
  "threshold": 1,
  "timeframe": 1,
  "ttl": 1
}
{
  "message": "Successfully updated entry"
}

Create Dynamic Rule

post

Create an individual Dynamic Rule within a configuration

Path parameters
configstringRequired
entry_idstringRequiredPattern: ^[A-Za-z0-9\-\_]*$
Body
actionstringRequired
activebooleanRequired
descriptionstringOptionalDefault: ""
idstringRequired

Unique id

Pattern: ^[A-Za-z0-9\-\_]*$
namestringRequired
offload_ip_filteringbooleanRequired
tagsstring[]Optional
targetstringRequired
thresholdintegerRequired
timeframeintegerRequired
ttlintegerRequired
Responses
201
Dynamic Rule created successfully
application/json
400
Input Error
application/json
422
Validation Error
application/json
500
Internal Server Error
application/json
post
POST /api/v4.0/conf/{config}/dynamic-rules/{entry_id} HTTP/1.1
Host: 
Content-Type: application/json
Accept: */*
Content-Length: 258

{
  "action": "text",
  "active": true,
  "description": "",
  "id": "text",
  "include": {
    "relation": "OR",
    "tags": [
      "text"
    ]
  },
  "exclude": {
    "relation": "OR",
    "tags": [
      "text"
    ]
  },
  "name": "text",
  "offload_ip_filtering": true,
  "tags": [
    "text"
  ],
  "target": "text",
  "threshold": 1,
  "timeframe": 1,
  "ttl": 1
}
{
  "message": "Successfully created entry"
}