public static interface Body.Builder extends SdkPojo, CopyableBuilder<Body.Builder,Body>
| Modifier and Type | Method and Description |
|---|---|
Body.Builder |
oversizeHandling(OversizeHandling oversizeHandling)
What WAF should do if the body is larger than WAF can inspect.
|
Body.Builder |
oversizeHandling(String oversizeHandling)
What WAF should do if the body is larger than WAF can inspect.
|
equalsBySdkFields, sdkFieldscopyapplyMutation, buildBody.Builder oversizeHandling(String oversizeHandling)
What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection.
The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront
distributions. For CloudFront distributions, you can increase the limit in the web ACL
AssociationConfig, for additional processing fees.
The options for oversize handling are the following:
CONTINUE - Inspect the available body contents normally, according to the rule inspection
criteria.
MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the
request.
NO_MATCH - Treat the web request as not matching the rule statement.
You can combine the MATCH or NO_MATCH settings for oversize handling with your rule
and web ACL action settings, so that you block any request whose body is over the limit.
Default: CONTINUE
oversizeHandling - What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the
entire contents of the web request body if the body exceeds the limit for the resource type. If the
body is larger than the limit, the underlying host service only forwards the contents that are below
the limit to WAF for inspection.
The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront
distributions. For CloudFront distributions, you can increase the limit in the web ACL
AssociationConfig, for additional processing fees.
The options for oversize handling are the following:
CONTINUE - Inspect the available body contents normally, according to the rule inspection
criteria.
MATCH - Treat the web request as matching the rule statement. WAF applies the rule action
to the request.
NO_MATCH - Treat the web request as not matching the rule statement.
You can combine the MATCH or NO_MATCH settings for oversize handling with
your rule and web ACL action settings, so that you block any request whose body is over the limit.
Default: CONTINUE
OversizeHandling,
OversizeHandlingBody.Builder oversizeHandling(OversizeHandling oversizeHandling)
What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection.
The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront
distributions. For CloudFront distributions, you can increase the limit in the web ACL
AssociationConfig, for additional processing fees.
The options for oversize handling are the following:
CONTINUE - Inspect the available body contents normally, according to the rule inspection
criteria.
MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the
request.
NO_MATCH - Treat the web request as not matching the rule statement.
You can combine the MATCH or NO_MATCH settings for oversize handling with your rule
and web ACL action settings, so that you block any request whose body is over the limit.
Default: CONTINUE
oversizeHandling - What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the
entire contents of the web request body if the body exceeds the limit for the resource type. If the
body is larger than the limit, the underlying host service only forwards the contents that are below
the limit to WAF for inspection.
The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront
distributions. For CloudFront distributions, you can increase the limit in the web ACL
AssociationConfig, for additional processing fees.
The options for oversize handling are the following:
CONTINUE - Inspect the available body contents normally, according to the rule inspection
criteria.
MATCH - Treat the web request as matching the rule statement. WAF applies the rule action
to the request.
NO_MATCH - Treat the web request as not matching the rule statement.
You can combine the MATCH or NO_MATCH settings for oversize handling with
your rule and web ACL action settings, so that you block any request whose body is over the limit.
Default: CONTINUE
OversizeHandling,
OversizeHandlingCopyright © 2023. All rights reserved.