Reference documentation and code samples for the Compute Engine v1 API enum SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig.Types.EnforceOnKeyType.
Determines the key to enforce the rate_limit_threshold on. Possible values are: - ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKeyConfigs" is not configured. - IP: The source IP address of the request is the key. Each IP has this limit enforced separately. - HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL. - XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP. - HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL. - HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes. - SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session. - REGION_CODE: The country/region from which the request originates. - TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL. - USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-08 UTC."],[[["\u003cp\u003eThe latest version of the \u003ccode\u003eSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig.Types.EnforceOnKeyType\u003c/code\u003e is 3.6.0, while the current document is for version 2.17.0, with many other versions available.\u003c/p\u003e\n"],["\u003cp\u003eThis documentation details the \u003ccode\u003eEnforceOnKeyType\u003c/code\u003e enum within the Compute Engine v1 API, used to specify how rate limits are enforced.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eEnforceOnKeyType\u003c/code\u003e enum supports various key types for rate limiting, including \u003ccode\u003eALL\u003c/code\u003e, \u003ccode\u003eIP\u003c/code\u003e, \u003ccode\u003eHTTP_HEADER\u003c/code\u003e, \u003ccode\u003eXFF_IP\u003c/code\u003e, \u003ccode\u003eHTTP_COOKIE\u003c/code\u003e, \u003ccode\u003eHTTP_PATH\u003c/code\u003e, \u003ccode\u003eSNI\u003c/code\u003e, \u003ccode\u003eREGION_CODE\u003c/code\u003e, \u003ccode\u003eTLS_JA3_FINGERPRINT\u003c/code\u003e, and \u003ccode\u003eUSER_IP\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eEach key type determines what request data is used to enforce rate limits, for example, \u003ccode\u003eIP\u003c/code\u003e uses the source IP address and \u003ccode\u003eHTTP_HEADER\u003c/code\u003e uses the value of a specified HTTP header.\u003c/p\u003e\n"],["\u003cp\u003eThere is a \u003ccode\u003eUndefinedEnforceOnKeyType\u003c/code\u003e field, that is used to signify that the field is unset.\u003c/p\u003e\n"]]],[],null,[]]