AWS::WAFv2::LoggingConfigurationDefines an association between logging destinations and a web ACL resource, for logging from AWS WAF . As part of the association, you can specify parts of the standard logging fields to keep out of the logs and you can specify filters so that you log only a subset of the logging records. If you configure data protection for the web ACL, the protection applies to the data that AWS WAF sends to the logs. > You can define one logging destination per web ACL. You can access information about the traffic that AWS WAF inspects using the following steps: - Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose. The name that you give the destination must start with `aws-waf-logs-` . Depending on the type of destination, you might need to configure additional settings or permissions. For configuration requirements and pricing information for each destination type, see [Logging web ACL traffic](https://docs.aws.amazon.com/waf/latest/developerguide/logging.html) in the *AWS WAF Developer Guide* . - Associate your logging destination to your web ACL using a `PutLoggingConfiguration` request. When you successfully enable logging using a `PutLoggingConfiguration` request, AWS WAF creates an additional role or policy that is required to write logs to the logging destination. For an Amazon CloudWatch Logs log group, AWS WAF creates a resource policy on the log group. For an Amazon S3 bucket, AWS WAF creates a bucket policy. For an Amazon Kinesis Data Firehose, AWS WAF creates a service-linked role. For additional information about web ACL logging, see [Logging web ACL traffic information](https://docs.aws.amazon.com/waf/latest/developerguide/logging.html) in the *AWS WAF Developer Guide* .
import { CfnLoggingConfiguration } from 'aws-cdk-lib/aws-wafv2';Or use the module namespace:
import * as wafv2 from 'aws-cdk-lib/aws-wafv2';
// wafv2.CfnLoggingConfigurationConfiguration passed to the constructor as CfnLoggingConfigurationProps.
logDestinationConfigsRequiredstring | IDeliveryStreamRef | ILogGroupRef | IBucketRef[]The logging destination configuration that you want to associate with the web ACL. > You can associate one logging destination to a web ACL.
resourceArnRequiredstring | IWebACLRefThe Amazon Resource Name (ARN) of the web ACL that you want to associate with `LogDestinationConfigs` .
loggingFilterOptionalanyFiltering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.
redactedFieldsOptionalIResolvable | IResolvable | FieldToMatchProperty[]The parts of the request that you want to keep out of the logs. For example, if you redact the `SingleHeader` field, the `HEADER` field in the logs will be `REDACTED` for all rules that use the `SingleHeader` `FieldToMatch` setting. If you configure data protection for the web ACL, the protection applies to the data that AWS WAF sends to the logs. Redaction applies only to the component that's specified in the rule's `FieldToMatch` setting, so the `SingleHeader` redaction doesn't apply to rules that use the `Headers` `FieldToMatch` . > You can specify only the following fields for redaction: `UriPath` , `QueryString` , `SingleHeader` , and `Method` . > This setting has no impact on request sampling. You can only exclude fields from request sampling by disabling sampling in the web ACL visibility configuration or by configuring data protection for the web ACL.
This L1 construct maps directly to the following CloudFormation resource type.
Our bi-weekly newsletter teaches hands-on AWS fundamentals. No certification fluff - just practical knowledge.
Subscribe to Newsletteraws-wafv2AWS::WAFv2::LoggingConfiguration