update_logging_configuration
(**kwargs)¶Sets the logging configuration for the specified firewall.
To change the logging configuration, retrieve the LoggingConfiguration by calling DescribeLoggingConfiguration, then change it and provide the modified object to this update call. You must change the logging configuration one LogDestinationConfig at a time inside the retrieved LoggingConfiguration object.
You can perform only one of the following actions in any call to UpdateLoggingConfiguration
:
LogDestinationConfig
array element to LogDestinationConfigs
.LogDestinationConfig
array element from LogDestinationConfigs
.LogDestination
setting in a single LogDestinationConfig
array element.You can't change the LogDestinationType
or LogType
in a LogDestinationConfig
. To change these settings, delete the existing LogDestinationConfig
object and create a new one, using two separate calls to this update operation.
See also: AWS API Documentation
Request Syntax
response = client.update_logging_configuration(
FirewallArn='string',
FirewallName='string',
LoggingConfiguration={
'LogDestinationConfigs': [
{
'LogType': 'ALERT'|'FLOW',
'LogDestinationType': 'S3'|'CloudWatchLogs'|'KinesisDataFirehose',
'LogDestination': {
'string': 'string'
}
},
]
}
)
The Amazon Resource Name (ARN) of the firewall.
You must specify the ARN or the name, and you can specify both.
The descriptive name of the firewall. You can't change the name of a firewall after you create it.
You must specify the ARN or the name, and you can specify both.
Defines how Network Firewall performs logging for a firewall. If you omit this setting, Network Firewall disables logging for the firewall.
Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
Defines where Network Firewall sends logs for the firewall for one log type. This is used in LoggingConfiguration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to DROP
or ALERT
.
The type of log to send. Alert logs report traffic that matches a StatefulRule with an action setting that sends an alert log message. Flow logs are standard network traffic flow logs.
The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type.
bucketName
, and optionally provide a prefix, with key prefix
. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET
and the prefix alerts
: "LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" }
logGroup
. The following example specifies a log group named alert-log-group
: "LogDestination": { "logGroup": "alert-log-group" }
deliveryStream
. The following example specifies a delivery stream named alert-delivery-stream
: "LogDestination": { "deliveryStream": "alert-delivery-stream" }
dict
Response Syntax
{
'FirewallArn': 'string',
'FirewallName': 'string',
'LoggingConfiguration': {
'LogDestinationConfigs': [
{
'LogType': 'ALERT'|'FLOW',
'LogDestinationType': 'S3'|'CloudWatchLogs'|'KinesisDataFirehose',
'LogDestination': {
'string': 'string'
}
},
]
}
}
Response Structure
(dict) --
FirewallArn (string) --
The Amazon Resource Name (ARN) of the firewall.
FirewallName (string) --
The descriptive name of the firewall. You can't change the name of a firewall after you create it.
LoggingConfiguration (dict) --
Defines how Network Firewall performs logging for a Firewall.
LogDestinationConfigs (list) --
Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
(dict) --
Defines where Network Firewall sends logs for the firewall for one log type. This is used in LoggingConfiguration. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to DROP
or ALERT
.
LogType (string) --
The type of log to send. Alert logs report traffic that matches a StatefulRule with an action setting that sends an alert log message. Flow logs are standard network traffic flow logs.
LogDestinationType (string) --
The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
LogDestination (dict) --
The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type.
bucketName
, and optionally provide a prefix, with key prefix
. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET
and the prefix alerts
: "LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" }
logGroup
. The following example specifies a log group named alert-log-group
: "LogDestination": { "logGroup": "alert-log-group" }
deliveryStream
. The following example specifies a delivery stream named alert-delivery-stream
: "LogDestination": { "deliveryStream": "alert-delivery-stream" }
Exceptions
NetworkFirewall.Client.exceptions.InvalidRequestException
NetworkFirewall.Client.exceptions.InternalServerError
NetworkFirewall.Client.exceptions.ResourceNotFoundException
NetworkFirewall.Client.exceptions.ThrottlingException
NetworkFirewall.Client.exceptions.InvalidTokenException
NetworkFirewall.Client.exceptions.LogDestinationPermissionException