WAF Automation on AWS solution is developed using Terraform which automatically deploys a set of AWS WAF rules that filter common web-based attacks. Users can select from preconfigured protective features that define the rules included in an AWS WAF web access control list (web ACL). Once deployed, AWS WAF protects your Amazon CloudFront distributions or Application Load Balancers by inspecting web requests.
- An active AWS account.
- AWS Command Line Interface (AWS CLI) installed and configured with necessary permissions. For more information about this , refer this documentation.
- Terraform installed and configured. For more information about this , refer this documentation.
terraform init
terraform plan -var-file="testing.tfvars"
terraform apply -var-file="testing.tfvars"
ActivateHttpFloodProtectionParam = yes - AWS Lambda log parser, yes - Amazon Athena log parser,yes - AWS WAF rate based rule
ActivateScannersProbesProtectionParam =yes - AWS Lambda log parser, yes - Amazon Athena log parser
ENDPOINT = ALB , cloudfront
Error: Error deleting WAFv2 IPSet: WAFOptimisticLockException: AWS WAF couldn’t save your changes because someone changed the resource after you started to edit it. Re-apply your changes.
Delete the IPsets manually and retry the terraform destroy command. Reference : hashicorp/terraform-provider-aws#21136
See CONTRIBUTING for more information.
This library is licensed under the MIT-0 License. See the LICENSE file.