<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: StorageGrid Traffic Classification - AND matching rules instead of OR in Object Storage</title>
    <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441616#M186</link>
    <description>&lt;P&gt;Have you tried? Is it not possible? Or not easy?&lt;/P&gt;</description>
    <pubDate>Tue, 14 Feb 2023 02:21:43 GMT</pubDate>
    <dc:creator>elementx</dc:creator>
    <dc:date>2023-02-14T02:21:43Z</dc:date>
    <item>
      <title>StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441610#M185</link>
      <description>&lt;P&gt;Is there an easy way to create a traffic classification policy that does AND instead of OR on the matching rules? I'd like to match if clients from a certain CIDR are hitting a sub-optimal endpoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 09:53:03 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441610#M185</guid>
      <dc:creator>benkorvemaker</dc:creator>
      <dc:date>2025-06-04T09:53:03Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441616#M186</link>
      <description>&lt;P&gt;Have you tried? Is it not possible? Or not easy?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 02:21:43 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441616#M186</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2023-02-14T02:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441634#M187</link>
      <description>&lt;P&gt;As documented, it's an OR of all conditions, and I've confirmed that.&amp;nbsp; (&lt;A href="https://docs.netapp.com/us-en/storagegrid-116/admin/creating-traffic-classification-policies.html" target="_blank"&gt;https://docs.netapp.com/us-en/storagegrid-116/admin/creating-traffic-classification-policies.html&lt;/A&gt; -- "Traffic that matches any rule is included in the policy.")&amp;nbsp; It also has inverse matches, and thinking back to a logic course many years ago, I was hoping I could leverage that, but it looks like I need more levels of NOT than available.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 14:19:52 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441634#M187</guid>
      <dc:creator>benkorvemaker</dc:creator>
      <dc:date>2023-02-14T14:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441637#M188</link>
      <description>&lt;P&gt;Right, so if your "allow" IPs are all over the place and there are many, then it may not be possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case I'd try to keep rules in a flat file and commit them with Ansible with SG modules?&lt;/P&gt;&lt;P&gt;I haven't looked if the module that can set the rules is available. If not, just write a shell script loop with curl and process manually crafted request template, perhaps?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:19:24 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441637#M188</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2023-02-14T15:19:24Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441638#M189</link>
      <description>&lt;P&gt;Right now, I'm trying with even just one and no success.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:20:12 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441638#M189</guid>
      <dc:creator>benkorvemaker</dc:creator>
      <dc:date>2023-02-14T15:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441641#M190</link>
      <description>&lt;P&gt;Just one rule or just one Ansible/curl script?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're in the mood to try Discord, there may be some folks online for available for real-time chat.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:35:15 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441641#M190</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2023-02-14T15:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441642#M191</link>
      <description>&lt;P&gt;Just one IP hitting one wrong endpoint.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:36:53 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441642#M191</guid>
      <dc:creator>benkorvemaker</dc:creator>
      <dc:date>2023-02-14T15:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441644#M192</link>
      <description>&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Maybe there's a bug? If you could share your rule, someone from the SG team could try on a real SG (or maybe even tell you if the rule's not correct).&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 16:31:49 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441644#M192</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2023-02-14T16:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441645#M193</link>
      <description>&lt;P&gt;It doesn't look like a bug -- it's operating as designed. Just not designed the way we want to use it.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 16:35:44 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441645#M193</guid>
      <dc:creator>benkorvemaker</dc:creator>
      <dc:date>2023-02-14T16:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441646#M194</link>
      <description>&lt;P&gt;I thought you used a NOT rule and tried to access from an allowed address.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 17:05:27 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441646#M194</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2023-02-14T17:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: StorageGrid Traffic Classification - AND matching rules instead of OR</title>
      <link>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441647#M195</link>
      <description>&lt;P&gt;It's not the access rules, but the traffic classification.&lt;/P&gt;&lt;P&gt;IP + Endpoint A,&amp;nbsp; with IP accessing Endpoint A, matches (and also matches anything else hitting Endpoint A)&lt;/P&gt;&lt;P&gt;NOT IP + Endpoint A,&amp;nbsp; with IP accessing Endpoint A, matches (ditto)&lt;/P&gt;&lt;P&gt;IP + NOT Endpoint A,&amp;nbsp; with IP accessing Endpoint A, matches (and also matches anything else hitting any other endpoint)&lt;/P&gt;&lt;P&gt;NOT IP + NOT Endpoint A,&amp;nbsp; with IP accessing Endpoint A, does not match (ditto)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 17:11:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Object-Storage/StorageGrid-Traffic-Classification-AND-matching-rules-instead-of-OR/m-p/441647#M195</guid>
      <dc:creator>benkorvemaker</dc:creator>
      <dc:date>2023-02-14T17:11:42Z</dc:date>
    </item>
  </channel>
</rss>

