Smaws_Client_WAFV2.UpdateWebACL
val request :
Smaws_Lib.Context.t ->
update_web_acl_request ->
(update_web_acl_response,
[> Smaws_Lib.Protocols.AwsJson.error
| `WAFConfigurationWarningException of waf_configuration_warning_exception
| `WAFDuplicateItemException of waf_duplicate_item_exception
| `WAFExpiredManagedRuleGroupVersionException of
waf_expired_managed_rule_group_version_exception
| `WAFInternalErrorException of waf_internal_error_exception
| `WAFInvalidOperationException of waf_invalid_operation_exception
| `WAFInvalidParameterException of waf_invalid_parameter_exception
| `WAFInvalidResourceException of waf_invalid_resource_exception
| `WAFLimitsExceededException of waf_limits_exceeded_exception
| `WAFNonexistentItemException of waf_nonexistent_item_exception
| `WAFOptimisticLockException of waf_optimistic_lock_exception
| `WAFSubscriptionNotFoundException of waf_subscription_not_found_exception
| `WAFUnavailableEntityException of waf_unavailable_entity_exception ])
Stdlib.result
Updates the specified WebACL
. While updating a web ACL, WAF provides continuous coverage to the resources that you have associated with the web ACL.
This operation completely replaces the mutable specifications that you already have for the web ACL with the ones that you provide to this call.
To modify a web ACL, do the following:
GetWebACL
A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has a statement that defines what to look for in web requests and an action that WAF applies to requests that match the statement. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types Rule
, RuleGroup
, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, an Amazon Cognito user pool, an App Runner service, or an Amazon Web Services Verified Access instance.
Temporary inconsistencies during updates
When you create or change a web ACL or other WAF resources, the changes take a small amount of time to propagate to all areas where the resources are stored. The propagation time can be from a few seconds to a number of minutes.
The following are examples of the temporary inconsistencies that you might notice during change propagation: