FirewallPolicy is the Schema for the FirewallPolicys API. Provides an AWS Network Firewall Policy resource.
Type
CRD
Group
networkfirewall.aws.upbound.io
Version
v1beta1
apiVersion: networkfirewall.aws.upbound.io/v1beta1
kind: FirewallPolicy
FirewallPolicySpec defines the desired state of FirewallPolicy
No description provided.
A configuration block describing the rule groups and policy actions to use in the firewall policy. See Firewall Policy below for details.
. Contains variables that you can use to override default Suricata settings in your firewall policy. See Rule Variables for details.
No description provided.
A configuration block that defines a set of IP addresses. See IP Set below for details.
Set of IPv4 or IPv6 addresses in CIDR notation to use for the Suricata HOME_NET variable.
Set of actions to take on a packet if it does not match any stateful rules in the policy. This can only be specified if the policy has a stateful_engine_options block with a rule_order value of STRICT_ORDER. You can specify one of either or neither values of aws:drop_strict or aws:drop_established, as well as any combination of aws:alert_strict and aws:alert_established.
A configuration block that defines options on how the policy handles stateful rules. See Stateful Engine Options below for details.
Set of configuration blocks containing references to the stateful rule groups that are used in the policy. See Stateful Rule Group Reference below for details.
Reference to a RuleGroup in networkfirewall to populate resourceArn.
Policies for referencing.
Selector for a RuleGroup in networkfirewall to populate resourceArn.
Policies for selection.
Set of configuration blocks describing the custom action definitions that are available for use in the firewall policy's stateless_default_actions. See Stateless Custom Action below for details.
A configuration block describing the custom action associated with the action_name. See Action Definition below for details.
A configuration block describing the stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet. You can pair this custom action with any of the standard stateless rule actions. See Publish Metric Action below for details.
Set of actions to take on a packet if it does not match any of the stateless rules in the policy. You must specify one of the standard actions including: aws:drop, aws:pass, or aws:forward_to_sfe. In addition, you can specify custom actions that are compatible with your standard action choice. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe.
Set of actions to take on a fragmented packet if it does not match any of the stateless rules in the policy. You must specify one of the standard actions including: aws:drop, aws:pass, or aws:forward_to_sfe. In addition, you can specify custom actions that are compatible with your standard action choice. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe.
Set of configuration blocks containing references to the stateless rule groups that are used in the policy. See Stateless Rule Group Reference below for details.
Reference to a RuleGroup in networkfirewall to populate resourceArn.
Policies for referencing.
Selector for a RuleGroup in networkfirewall to populate resourceArn.
Policies for selection.
THIS IS A BETA FIELD. It will be honored unless the Management Policies feature flag is disabled. InitProvider holds the same fields as ForProvider, with the exception of Identifier and other resource reference fields. The fields that are in InitProvider are merged into ForProvider when the resource is created. The same fields are also added to the terraform ignore_changes hook, to avoid updating them after creation. This is useful for fields that are required on creation, but we do not desire to update them after creation, for example because of an external controller is managing them, like an autoscaler.
A configuration block describing the rule groups and policy actions to use in the firewall policy. See Firewall Policy below for details.
. Contains variables that you can use to override default Suricata settings in your firewall policy. See Rule Variables for details.
No description provided.
A configuration block that defines a set of IP addresses. See IP Set below for details.
Set of IPv4 or IPv6 addresses in CIDR notation to use for the Suricata HOME_NET variable.
Set of actions to take on a packet if it does not match any stateful rules in the policy. This can only be specified if the policy has a stateful_engine_options block with a rule_order value of STRICT_ORDER. You can specify one of either or neither values of aws:drop_strict or aws:drop_established, as well as any combination of aws:alert_strict and aws:alert_established.
A configuration block that defines options on how the policy handles stateful rules. See Stateful Engine Options below for details.
Set of configuration blocks containing references to the stateful rule groups that are used in the policy. See Stateful Rule Group Reference below for details.
Reference to a RuleGroup in networkfirewall to populate resourceArn.
Policies for referencing.
Selector for a RuleGroup in networkfirewall to populate resourceArn.
Policies for selection.
Set of configuration blocks describing the custom action definitions that are available for use in the firewall policy's stateless_default_actions. See Stateless Custom Action below for details.
A configuration block describing the custom action associated with the action_name. See Action Definition below for details.
A configuration block describing the stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet. You can pair this custom action with any of the standard stateless rule actions. See Publish Metric Action below for details.
Set of actions to take on a packet if it does not match any of the stateless rules in the policy. You must specify one of the standard actions including: aws:drop, aws:pass, or aws:forward_to_sfe. In addition, you can specify custom actions that are compatible with your standard action choice. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe.
Set of actions to take on a fragmented packet if it does not match any of the stateless rules in the policy. You must specify one of the standard actions including: aws:drop, aws:pass, or aws:forward_to_sfe. In addition, you can specify custom actions that are compatible with your standard action choice. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe.
Set of configuration blocks containing references to the stateless rule groups that are used in the policy. See Stateless Rule Group Reference below for details.
Reference to a RuleGroup in networkfirewall to populate resourceArn.
Policies for referencing.
Selector for a RuleGroup in networkfirewall to populate resourceArn.
Policies for selection.
THIS IS A BETA FIELD. It is on by default but can be opted out through a Crossplane feature flag. ManagementPolicies specify the array of actions Crossplane is allowed to take on the managed and external resources. This field is planned to replace the DeletionPolicy field in a future release. Currently, both could be set independently and non-default values would be honored if the feature flag is enabled. If both are custom, the DeletionPolicy field will be ignored. See the design doc for more information: https://github.com/crossplane/crossplane/blob/499895a25d1a1a0ba1604944ef98ac7a1a71f197/design/design-doc-observe-only-resources.md?plain=1#L223 and this one: https://github.com/crossplane/crossplane/blob/444267e84783136daa93568b364a5f01228cacbe/design/one-pager-ignore-changes.md
ProviderConfigReference specifies how the provider that will be used to create, observe, update, and delete this managed resource should be configured.
Policies for referencing.
PublishConnectionDetailsTo specifies the connection secret config which contains a name, metadata and a reference to secret store config to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource.
WriteConnectionSecretToReference specifies the namespace and name of a Secret to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource. This field is planned to be replaced in a future release in favor of PublishConnectionDetailsTo. Currently, both could be set independently and connection details would be published to both without affecting each other.
FirewallPolicyStatus defines the observed state of FirewallPolicy.
No description provided.
A configuration block describing the rule groups and policy actions to use in the firewall policy. See Firewall Policy below for details.
. Contains variables that you can use to override default Suricata settings in your firewall policy. See Rule Variables for details.
No description provided.
A configuration block that defines a set of IP addresses. See IP Set below for details.
Set of IPv4 or IPv6 addresses in CIDR notation to use for the Suricata HOME_NET variable.
Set of actions to take on a packet if it does not match any stateful rules in the policy. This can only be specified if the policy has a stateful_engine_options block with a rule_order value of STRICT_ORDER. You can specify one of either or neither values of aws:drop_strict or aws:drop_established, as well as any combination of aws:alert_strict and aws:alert_established.
A configuration block that defines options on how the policy handles stateful rules. See Stateful Engine Options below for details.
Set of configuration blocks containing references to the stateful rule groups that are used in the policy. See Stateful Rule Group Reference below for details.
Set of configuration blocks describing the custom action definitions that are available for use in the firewall policy's stateless_default_actions. See Stateless Custom Action below for details.
A configuration block describing the custom action associated with the action_name. See Action Definition below for details.
A configuration block describing the stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet. You can pair this custom action with any of the standard stateless rule actions. See Publish Metric Action below for details.
Set of actions to take on a packet if it does not match any of the stateless rules in the policy. You must specify one of the standard actions including: aws:drop, aws:pass, or aws:forward_to_sfe. In addition, you can specify custom actions that are compatible with your standard action choice. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe.
Set of actions to take on a fragmented packet if it does not match any of the stateless rules in the policy. You must specify one of the standard actions including: aws:drop, aws:pass, or aws:forward_to_sfe. In addition, you can specify custom actions that are compatible with your standard action choice. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe.
Set of configuration blocks containing references to the stateless rule groups that are used in the policy. See Stateless Rule Group Reference below for details.
Conditions of the resource.
firewallpolicy
apiVersion: networkfirewall.aws.upbound.io/v1beta1
kind: FirewallPolicy
metadata:
annotations:
meta.upbound.io/example-id: networkfirewall/v1beta1/firewall
uptest.upbound.io/timeout: "3600"
labels:
testing.upbound.io/example-name: example
name: firewallpolicy
spec:
forProvider:
firewallPolicy:
- statelessDefaultActions:
- aws:pass
statelessFragmentDefaultActions:
- aws:drop
statelessRuleGroupReference:
- priority: 1
resourceArnSelector:
matchLabels:
testing.upbound.io/example-name: example
region: us-west-1
tags:
Tag1: Value1
Tag2: Value2
example-default-policy
apiVersion: networkfirewall.aws.upbound.io/v1beta1
kind: FirewallPolicy
metadata:
annotations:
meta.upbound.io/example-id: networkfirewall/v1beta1/firewallpolicy
labels:
testing.upbound.io/example-name: example-default-policy
name: example-default-policy
spec:
forProvider:
firewallPolicy:
- statefulRuleGroupReference:
- resourceArnSelector:
matchLabels:
testing.upbound.io/example-name: example-allow-domainlist
- resourceArnSelector:
matchLabels:
testing.upbound.io/example-name: example-deny
statelessDefaultActions:
- aws:forward_to_sfe
statelessFragmentDefaultActions:
- aws:pass
statelessRuleGroupReference:
- priority: 2
resourceArnSelector:
matchLabels:
testing.upbound.io/example-name: example-forward-all
region: us-west-1
example
apiVersion: networkfirewall.aws.upbound.io/v1beta1
kind: FirewallPolicy
metadata:
annotations:
meta.upbound.io/example-id: networkfirewall/v1beta1/firewallpolicy
labels:
testing.upbound.io/example-name: example
name: example
spec:
forProvider:
firewallPolicy:
- statelessDefaultActions:
- aws:pass
statelessFragmentDefaultActions:
- aws:drop
statelessRuleGroupReference:
- priority: 1
resourceArnSelector:
matchLabels:
testing.upbound.io/example-name: example
region: us-west-1
tags:
Tag1: Value1
Tag2: Value2
© 2022 Upbound, Inc.
Discover the building blocksfor your internal cloud platform.