-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
request body inspection not configurable for front door waf #17909
Comments
I'm not setting anything but for my deployment the check is enabled with this tf config:
|
yeah sorry for not being precise: In my screenshot above I disabled it manually and terraform does not recognize a change so it seems terraform is not watching that field at all and enables it by default. |
@WodansSon is this something that will be covered in the new WAF policy rules with #17715 ? |
@sebader @hassbert The legacy Frontdoor resource is being retired so there is no further active development on these resources moving forward. However, that said, this was originally going to be ported to the new CDN resources but was removed for GA due to issues and will be supported in the near future. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Is there an existing issue for this?
Community Note
Description
For Azure Front Door WAF it's currently not supported within the azurerm_frontdoor_firewall_policy resource to set (enable or disable) the request body inspection. See the option in the Azure Portal:
On the azurerm_application_gateway resource it's configurable.
I would suggest to implement the same on the azurerm_frontdoor_firewall_policy.
New or Affected Resource(s)/Data Source(s)
azurerm_frontdoor_firewall_policy
Potential Terraform Configuration
References
No response
The text was updated successfully, but these errors were encountered: