a10_ddos_violation_actions
Synopsis
Violation Actions Configuration
Parameters
Parameters |
Choices/Defaults |
Comment |
|
---|---|---|---|
state str/required |
[‘noop’, ‘present’, ‘absent’] |
State of the object to be created. |
|
ansible_host str/required |
Host for AXAPI authentication |
||
ansible_username str/required |
Username for AXAPI authentication |
||
ansible_password str/required |
Password for AXAPI authentication |
||
ansible_port int/required |
Port for AXAPI authentication |
||
a10_device_context_id int |
[‘1-8’] |
Device ID for aVCS configuration |
|
a10_partition str |
Destination/target partition for object/command |
||
name str/required |
DDOS violation-actions name |
||
blacklist_src int |
Blacklist-src (in min) (applied only for source action) |
||
blackhole int |
Blackhole the zone (in minute, 0 means infinite) |
||
execute_script str |
Specify DDOS script to run (applied only for zone action) |
||
execute_script_timeout int |
Timeout for script execution (in seconds) (applied only for zone action) |
||
send_notification_only bool |
Forces TPS to only send out notification for the violation-action |
||
notification list |
Field notification |
||
notification_template str |
Specify the notification template name |
||
uuid str |
uuid of the object |
||
user_tag str |
Customized tag |
Examples
Return Values
- modified_values (changed, dict, )
Values modified (or potential changes if using check_mode) as a result of task operation
- axapi_calls (always, list, )
Sequential list of AXAPI calls made by the task
- endpoint (, str, [‘/axapi/v3/slb/virtual_server’, ‘/axapi/v3/file/ssl-cert’])
The AXAPI endpoint being accessed.
- http_method (, str, [‘POST’, ‘GET’])
HTTP method being used by the primary task to interact with the AXAPI endpoint.
- request_body (, complex, )
Params used to query the AXAPI
- response_body (, complex, )
Response from the AXAPI
Status
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by community.