xcsh waf¶
Request inspection, attack signatures, and bot mitigation.
Synopsis¶
Description¶
Signature-based attack detection with customizable blocking responses. Attack type classification, protocol inspection, and AI-driven risk assessment. Exclusion policies override default blocking for trusted traffic. Staged signature testing validates rules before enforcement. Security event metrics track rule hits and blocked requests across namespaces.
Available Commands¶
| Command | Description |
|---|---|
| add-labels | Add-labels Waf resources |
| apply | Apply Waf resources |
| create | Create Waf resources |
| delete | Delete Waf resources |
| get | Get Waf resources |
| list | List Waf resources |
| patch | Patch Waf resources |
| remove-labels | Remove-labels Waf resources |
| replace | Replace Waf resources |
| status | Status Waf resources |