@robinmordasiewicz/f5xc-terraform-mcp 3.5.0 → 3.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. package/README.md +283 -104
  2. package/dist/docs/data-sources/bgp.md +2 -2
  3. package/dist/docs/data-sources/discovery.md +2 -2
  4. package/dist/docs/data-sources/fast_acl.md +2 -2
  5. package/dist/docs/data-sources/fast_acl_rule.md +2 -2
  6. package/dist/docs/data-sources/irule.md +2 -2
  7. package/dist/docs/data-sources/log_receiver.md +2 -2
  8. package/dist/docs/data-sources/network_policy.md +2 -2
  9. package/dist/docs/data-sources/route.md +2 -2
  10. package/dist/docs/data-sources/site.md +2 -2
  11. package/dist/docs/resources/address_allocator.md +7 -7
  12. package/dist/docs/resources/advertise_policy.md +57 -57
  13. package/dist/docs/resources/alert_policy.md +40 -40
  14. package/dist/docs/resources/alert_receiver.md +57 -57
  15. package/dist/docs/resources/api_crawler.md +13 -13
  16. package/dist/docs/resources/api_definition.md +11 -11
  17. package/dist/docs/resources/api_discovery.md +4 -4
  18. package/dist/docs/resources/api_testing.md +27 -27
  19. package/dist/docs/resources/apm.md +40 -40
  20. package/dist/docs/resources/app_api_group.md +20 -20
  21. package/dist/docs/resources/app_firewall.md +50 -50
  22. package/dist/docs/resources/app_setting.md +19 -19
  23. package/dist/docs/resources/app_type.md +7 -7
  24. package/dist/docs/resources/authentication.md +29 -29
  25. package/dist/docs/resources/aws_tgw_site.md +140 -140
  26. package/dist/docs/resources/aws_vpc_site.md +174 -174
  27. package/dist/docs/resources/azure_vnet_site.md +245 -245
  28. package/dist/docs/resources/bgp.md +37 -205
  29. package/dist/docs/resources/bgp_asn_set.md +1 -1
  30. package/dist/docs/resources/bgp_routing_policy.md +19 -19
  31. package/dist/docs/resources/bot_defense_app_infrastructure.md +12 -12
  32. package/dist/docs/resources/cdn_cache_rule.md +5 -5
  33. package/dist/docs/resources/cdn_loadbalancer.md +418 -418
  34. package/dist/docs/resources/certificate.md +1 -1
  35. package/dist/docs/resources/certificate_chain.md +1 -1
  36. package/dist/docs/resources/cloud_connect.md +28 -28
  37. package/dist/docs/resources/cloud_credentials.md +35 -35
  38. package/dist/docs/resources/cloud_elastic_ip.md +8 -8
  39. package/dist/docs/resources/cloud_link.md +36 -36
  40. package/dist/docs/resources/cluster.md +86 -86
  41. package/dist/docs/resources/cminstance.md +22 -22
  42. package/dist/docs/resources/code_base_integration.md +24 -24
  43. package/dist/docs/resources/container_registry.md +13 -13
  44. package/dist/docs/resources/crl.md +1 -1
  45. package/dist/docs/resources/data_type.md +16 -16
  46. package/dist/docs/resources/dc_cluster_group.md +4 -4
  47. package/dist/docs/resources/discovery.md +8 -259
  48. package/dist/docs/resources/dns_compliance_checks.md +1 -1
  49. package/dist/docs/resources/dns_domain.md +3 -3
  50. package/dist/docs/resources/endpoint.md +44 -44
  51. package/dist/docs/resources/enhanced_firewall_policy.md +51 -51
  52. package/dist/docs/resources/external_connector.md +42 -42
  53. package/dist/docs/resources/fast_acl.md +60 -166
  54. package/dist/docs/resources/fast_acl_rule.md +28 -28
  55. package/dist/docs/resources/filter_set.md +10 -10
  56. package/dist/docs/resources/fleet.md +160 -160
  57. package/dist/docs/resources/forward_proxy_policy.md +82 -82
  58. package/dist/docs/resources/forwarding_class.md +14 -14
  59. package/dist/docs/resources/gcp_vpc_site.md +152 -152
  60. package/dist/docs/resources/global_log_receiver.md +238 -238
  61. package/dist/docs/resources/healthcheck.md +17 -17
  62. package/dist/docs/resources/http_loadbalancer.md +1003 -1003
  63. package/dist/docs/resources/irule.md +5 -7
  64. package/dist/docs/resources/log_receiver.md +825 -44
  65. package/dist/docs/resources/malicious_user_mitigation.md +10 -10
  66. package/dist/docs/resources/nat_policy.md +86 -86
  67. package/dist/docs/resources/network_connector.md +31 -31
  68. package/dist/docs/resources/network_firewall.md +22 -22
  69. package/dist/docs/resources/network_interface.md +77 -77
  70. package/dist/docs/resources/network_policy.md +38 -217
  71. package/dist/docs/resources/network_policy_rule.md +21 -21
  72. package/dist/docs/resources/network_policy_view.md +65 -65
  73. package/dist/docs/resources/nfv_service.md +76 -76
  74. package/dist/docs/resources/nginx_service_discovery.md +10 -10
  75. package/dist/docs/resources/origin_pool.md +166 -166
  76. package/dist/docs/resources/policer.md +4 -4
  77. package/dist/docs/resources/policy_based_routing.md +28 -28
  78. package/dist/docs/resources/protocol_inspection.md +12 -12
  79. package/dist/docs/resources/protocol_policer.md +14 -14
  80. package/dist/docs/resources/proxy.md +111 -111
  81. package/dist/docs/resources/rate_limiter.md +15 -15
  82. package/dist/docs/resources/rate_limiter_policy.md +56 -56
  83. package/dist/docs/resources/route.md +183 -183
  84. package/dist/docs/resources/secret_management_access.md +68 -68
  85. package/dist/docs/resources/securemesh_site.md +1619 -258
  86. package/dist/docs/resources/segment.md +4 -4
  87. package/dist/docs/resources/sensitive_data_policy.md +9 -9
  88. package/dist/docs/resources/service_policy.md +175 -175
  89. package/dist/docs/resources/service_policy_rule.md +142 -142
  90. package/dist/docs/resources/site.md +381 -303
  91. package/dist/docs/resources/site_mesh_group.md +18 -18
  92. package/dist/docs/resources/subnet.md +17 -17
  93. package/dist/docs/resources/tcp_loadbalancer.md +130 -130
  94. package/dist/docs/resources/tenant_configuration.md +10 -10
  95. package/dist/docs/resources/trusted_ca_list.md +1 -1
  96. package/dist/docs/resources/tunnel.md +36 -36
  97. package/dist/docs/resources/udp_loadbalancer.md +59 -59
  98. package/dist/docs/resources/usb_policy.md +6 -6
  99. package/dist/docs/resources/user_identification.md +16 -16
  100. package/dist/docs/resources/virtual_host.md +225 -225
  101. package/dist/docs/resources/virtual_network.md +14 -14
  102. package/dist/docs/resources/virtual_site.md +3 -3
  103. package/dist/docs/resources/voltstack_site.md +141 -141
  104. package/dist/docs/resources/waf_exclusion_policy.md +17 -17
  105. package/dist/docs/resources/workload.md +327 -327
  106. package/dist/docs/resources/workload_flavor.md +3 -3
  107. package/dist/metadata/resource-metadata.json +1484 -942
  108. package/dist/types.d.ts +11 -0
  109. package/dist/types.d.ts.map +1 -1
  110. package/dist/types.js.map +1 -1
  111. package/package.json +1 -1
@@ -75,16 +75,16 @@ resource "f5xc_forward_proxy_policy" "example" {
75
75
  ### Spec Argument Reference
76
76
 
77
77
  -> **One of the following:**
78
- &#x2022; <a id="allow-all"></a>[`allow_all`](#allow-all) - Optional Block<br>Enable this option
79
- <br><br>&#x2022; <a id="allow-list"></a>[`allow_list`](#allow-list) - Optional Block<br>Forward Proxy Rule. URL(s) and domains policy for forward proxy for a connection type (TLS or HTTP)<br>See [Allow List](#allow-list) below for details.
80
- <br><br>&#x2022; <a id="deny-list"></a>[`deny_list`](#deny-list) - Optional Block<br>Forward Proxy Rule. URL(s) and domains policy for forward proxy for a connection type (TLS or HTTP)<br>See [Deny List](#deny-list) below for details.
78
+ &#x2022; <a id="allow-all"></a>[`allow_all`](#allow-all) - Optional Block<br>Can be used for messages where no values are needed
79
+ <br><br>&#x2022; <a id="allow-list"></a>[`allow_list`](#allow-list) - Optional Block<br>URL(s) and domains policy for forward proxy for a connection type (TLS or HTTP)<br>See [Allow List](#allow-list) below for details.
80
+ <br><br>&#x2022; <a id="deny-list"></a>[`deny_list`](#deny-list) - Optional Block<br>URL(s) and domains policy for forward proxy for a connection type (TLS or HTTP)<br>See [Deny List](#deny-list) below for details.
81
81
  <br><br>&#x2022; <a id="rule-list"></a>[`rule_list`](#rule-list) - Optional Block<br>Custom Rule List. List of custom rules<br>See [Rule List](#rule-list) below for details.
82
82
 
83
83
  -> **One of the following:**
84
- &#x2022; <a id="any-proxy"></a>[`any_proxy`](#any-proxy) - Optional Block<br>Enable this option
85
- <br><br>&#x2022; <a id="drp-http-connect"></a>[`drp_http_connect`](#drp-http-connect) - Optional Block<br>Enable this option
86
- <br><br>&#x2022; <a id="network-connector"></a>[`network_connector`](#network-connector) - Optional Block<br>Object reference. This type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Network Connector](#network-connector) below for details.
87
- <br><br>&#x2022; <a id="proxy-label-selector"></a>[`proxy_label_selector`](#proxy-label-selector) - Optional Block<br>Label Selector. This type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects. A null label selector matches no objects. Label selector is immutable. Expressions is a list of strings of label selection expression. Each string has ',' separated values which are 'AND' and all strings are logically 'OR'. BNF for expression string `<selector-syntax>` ::= `<requirement>` | `<requirement>` ',' `<selector-syntax>` `<requirement>` ::= [!] KEY [ `<set-based-restriction>` | `<exact-match-restriction>` ] `<set-based-restriction>` ::= '' | `<inclusion-exclusion>` `<value-set>` `<inclusion-exclusion>` ::= `<inclusion>` | `<exclusion>` `<exclusion>` ::= 'notin' `<inclusion>` ::= 'in' `<value-set>` ::= '(' `<values>` ')' `<values>` ::= VALUE | VALUE ',' `<values>` `<exact-match-restriction>` ::= ['='|'=='|'!='] VALUE<br>See [Proxy Label Selector](#proxy-label-selector) below for details.
84
+ &#x2022; <a id="any-proxy"></a>[`any_proxy`](#any-proxy) - Optional Block<br>Can be used for messages where no values are needed
85
+ <br><br>&#x2022; <a id="drp-http-connect"></a>[`drp_http_connect`](#drp-http-connect) - Optional Block<br>Can be used for messages where no values are needed
86
+ <br><br>&#x2022; <a id="network-connector"></a>[`network_connector`](#network-connector) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Network Connector](#network-connector) below for details.
87
+ <br><br>&#x2022; <a id="proxy-label-selector"></a>[`proxy_label_selector`](#proxy-label-selector) - Optional Block<br>Type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects<br>See [Proxy Label Selector](#proxy-label-selector) below for details.
88
88
 
89
89
  <a id="timeouts"></a>&#x2022; [`timeouts`](#timeouts) - Optional Block<br>See [Timeouts](#timeouts) below for details.
90
90
 
@@ -100,13 +100,13 @@ In addition to all arguments above, the following attributes are exported:
100
100
 
101
101
  An [`allow_list`](#allow-list) block supports the following:
102
102
 
103
- <a id="allow-list-default-action-allow"></a>&#x2022; [`default_action_allow`](#allow-list-default-action-allow) - Optional Block<br>Enable this option
103
+ <a id="allow-list-default-action-allow"></a>&#x2022; [`default_action_allow`](#allow-list-default-action-allow) - Optional Block<br>Can be used for messages where no values are needed
104
104
 
105
- <a id="allow-list-default-action-deny"></a>&#x2022; [`default_action_deny`](#allow-list-default-action-deny) - Optional Block<br>Enable this option
105
+ <a id="allow-list-default-action-deny"></a>&#x2022; [`default_action_deny`](#allow-list-default-action-deny) - Optional Block<br>Can be used for messages where no values are needed
106
106
 
107
- <a id="allow-list-default-action-next-policy"></a>&#x2022; [`default_action_next_policy`](#allow-list-default-action-next-policy) - Optional Block<br>Enable this option
107
+ <a id="allow-list-default-action-next-policy"></a>&#x2022; [`default_action_next_policy`](#allow-list-default-action-next-policy) - Optional Block<br>Can be used for messages where no values are needed
108
108
 
109
- <a id="allow-list-dest-list"></a>&#x2022; [`dest_list`](#allow-list-dest-list) - Optional Block<br>L4 Destination List. L4 destinations for non-HTTP and non-TLS connections and TLS connections without SNI<br>See [Dest List](#allow-list-dest-list) below.
109
+ <a id="allow-list-dest-list"></a>&#x2022; [`dest_list`](#allow-list-dest-list) - Optional Block<br>L4 destinations for non-HTTP and non-TLS connections and TLS connections without SNI<br>See [Dest List](#allow-list-dest-list) below.
110
110
 
111
111
  <a id="allow-list-http-list"></a>&#x2022; [`http_list`](#allow-list-http-list) - Optional Block<br>HTTP URLs. URLs for HTTP connections<br>See [HTTP List](#allow-list-http-list) below.
112
112
 
@@ -118,7 +118,7 @@ A [`dest_list`](#allow-list-dest-list) block (within [`allow_list`](#allow-list)
118
118
 
119
119
  <a id="allow-list-dest-list-ipv6-prefixes"></a>&#x2022; [`ipv6_prefixes`](#allow-list-dest-list-ipv6-prefixes) - Optional List<br>IPv6 Prefixes. Destination IPv6 prefixes
120
120
 
121
- <a id="allow-list-dest-list-port-ranges"></a>&#x2022; [`port_ranges`](#allow-list-dest-list-port-ranges) - Optional String<br>Port Ranges. A string containing a comma separated list of port ranges. Each port range consists of a single port or two ports separated by '-'
121
+ <a id="allow-list-dest-list-port-ranges"></a>&#x2022; [`port_ranges`](#allow-list-dest-list-port-ranges) - Optional String<br>String containing a comma separated list of port ranges. Each port range consists of a single port or two ports separated by '-'
122
122
 
123
123
  <a id="allow-list-dest-list-prefixes"></a>&#x2022; [`prefixes`](#allow-list-dest-list-prefixes) - Optional List<br>IPv4 Prefixes. Destination IPv4 prefixes
124
124
 
@@ -126,41 +126,41 @@ A [`dest_list`](#allow-list-dest-list) block (within [`allow_list`](#allow-list)
126
126
 
127
127
  A [`http_list`](#allow-list-http-list) block (within [`allow_list`](#allow-list)) supports the following:
128
128
 
129
- <a id="allow-list-http-list-any-path"></a>&#x2022; [`any_path`](#allow-list-http-list-any-path) - Optional Block<br>Enable this option
129
+ <a id="allow-list-http-list-any-path"></a>&#x2022; [`any_path`](#allow-list-http-list-any-path) - Optional Block<br>Can be used for messages where no values are needed
130
130
 
131
- <a id="allow-list-http-list-exact-value"></a>&#x2022; [`exact_value`](#allow-list-http-list-exact-value) - Optional String<br>Exact Values. Exact domain name
131
+ <a id="allow-list-http-list-exact-value"></a>&#x2022; [`exact_value`](#allow-list-http-list-exact-value) - Optional String<br>Exact domain name
132
132
 
133
- <a id="allow-list-http-list-path-exact-value"></a>&#x2022; [`path_exact_value`](#allow-list-http-list-path-exact-value) - Optional String<br>Exact Path. Exact Path to match
133
+ <a id="allow-list-http-list-path-exact-value"></a>&#x2022; [`path_exact_value`](#allow-list-http-list-path-exact-value) - Optional String<br>Exact Path to match
134
134
 
135
- <a id="allow-list-http-list-path-prefix-value"></a>&#x2022; [`path_prefix_value`](#allow-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path. Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
135
+ <a id="allow-list-http-list-path-prefix-value"></a>&#x2022; [`path_prefix_value`](#allow-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
136
136
 
137
- <a id="allow-list-http-list-path-regex-value"></a>&#x2022; [`path_regex_value`](#allow-list-http-list-path-regex-value) - Optional String<br>Regex of Path. Regular Expression value for the Path to match
137
+ <a id="allow-list-http-list-path-regex-value"></a>&#x2022; [`path_regex_value`](#allow-list-http-list-path-regex-value) - Optional String<br>Regular Expression value for the Path to match
138
138
 
139
- <a id="allow-list-http-list-regex-value"></a>&#x2022; [`regex_value`](#allow-list-http-list-regex-value) - Optional String<br>Regex Values of Domains. Regular Expression value for the domain name
139
+ <a id="allow-list-http-list-regex-value"></a>&#x2022; [`regex_value`](#allow-list-http-list-regex-value) - Optional String<br>Regular Expression value for the domain name
140
140
 
141
- <a id="allow-list-http-list-suffix-value"></a>&#x2022; [`suffix_value`](#allow-list-http-list-suffix-value) - Optional String<br>Suffix Values. Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
141
+ <a id="allow-list-http-list-suffix-value"></a>&#x2022; [`suffix_value`](#allow-list-http-list-suffix-value) - Optional String<br>Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
142
142
 
143
143
  #### Allow List TLS List
144
144
 
145
145
  A [`tls_list`](#allow-list-tls-list) block (within [`allow_list`](#allow-list)) supports the following:
146
146
 
147
- <a id="allow-list-tls-list-exact-value"></a>&#x2022; [`exact_value`](#allow-list-tls-list-exact-value) - Optional String<br>Exact Value. Exact domain name
147
+ <a id="allow-list-tls-list-exact-value"></a>&#x2022; [`exact_value`](#allow-list-tls-list-exact-value) - Optional String<br>Exact domain name
148
148
 
149
- <a id="allow-list-tls-list-regex-value"></a>&#x2022; [`regex_value`](#allow-list-tls-list-regex-value) - Optional String<br>Regex Values of Domains. Regular Expression value for the domain name
149
+ <a id="allow-list-tls-list-regex-value"></a>&#x2022; [`regex_value`](#allow-list-tls-list-regex-value) - Optional String<br>Regular Expression value for the domain name
150
150
 
151
- <a id="allow-list-tls-list-suffix-value"></a>&#x2022; [`suffix_value`](#allow-list-tls-list-suffix-value) - Optional String<br>Suffix Value. Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
151
+ <a id="allow-list-tls-list-suffix-value"></a>&#x2022; [`suffix_value`](#allow-list-tls-list-suffix-value) - Optional String<br>Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
152
152
 
153
153
  #### Deny List
154
154
 
155
155
  A [`deny_list`](#deny-list) block supports the following:
156
156
 
157
- <a id="deny-list-default-action-allow"></a>&#x2022; [`default_action_allow`](#deny-list-default-action-allow) - Optional Block<br>Enable this option
157
+ <a id="deny-list-default-action-allow"></a>&#x2022; [`default_action_allow`](#deny-list-default-action-allow) - Optional Block<br>Can be used for messages where no values are needed
158
158
 
159
- <a id="deny-list-default-action-deny"></a>&#x2022; [`default_action_deny`](#deny-list-default-action-deny) - Optional Block<br>Enable this option
159
+ <a id="deny-list-default-action-deny"></a>&#x2022; [`default_action_deny`](#deny-list-default-action-deny) - Optional Block<br>Can be used for messages where no values are needed
160
160
 
161
- <a id="deny-list-default-action-next-policy"></a>&#x2022; [`default_action_next_policy`](#deny-list-default-action-next-policy) - Optional Block<br>Enable this option
161
+ <a id="deny-list-default-action-next-policy"></a>&#x2022; [`default_action_next_policy`](#deny-list-default-action-next-policy) - Optional Block<br>Can be used for messages where no values are needed
162
162
 
163
- <a id="deny-list-dest-list"></a>&#x2022; [`dest_list`](#deny-list-dest-list) - Optional Block<br>L4 Destination List. L4 destinations for non-HTTP and non-TLS connections and TLS connections without SNI<br>See [Dest List](#deny-list-dest-list) below.
163
+ <a id="deny-list-dest-list"></a>&#x2022; [`dest_list`](#deny-list-dest-list) - Optional Block<br>L4 destinations for non-HTTP and non-TLS connections and TLS connections without SNI<br>See [Dest List](#deny-list-dest-list) below.
164
164
 
165
165
  <a id="deny-list-http-list"></a>&#x2022; [`http_list`](#deny-list-http-list) - Optional Block<br>HTTP URLs. URLs for HTTP connections<br>See [HTTP List](#deny-list-http-list) below.
166
166
 
@@ -172,7 +172,7 @@ A [`dest_list`](#deny-list-dest-list) block (within [`deny_list`](#deny-list)) s
172
172
 
173
173
  <a id="deny-list-dest-list-ipv6-prefixes"></a>&#x2022; [`ipv6_prefixes`](#deny-list-dest-list-ipv6-prefixes) - Optional List<br>IPv6 Prefixes. Destination IPv6 prefixes
174
174
 
175
- <a id="deny-list-dest-list-port-ranges"></a>&#x2022; [`port_ranges`](#deny-list-dest-list-port-ranges) - Optional String<br>Port Ranges. A string containing a comma separated list of port ranges. Each port range consists of a single port or two ports separated by '-'
175
+ <a id="deny-list-dest-list-port-ranges"></a>&#x2022; [`port_ranges`](#deny-list-dest-list-port-ranges) - Optional String<br>String containing a comma separated list of port ranges. Each port range consists of a single port or two ports separated by '-'
176
176
 
177
177
  <a id="deny-list-dest-list-prefixes"></a>&#x2022; [`prefixes`](#deny-list-dest-list-prefixes) - Optional List<br>IPv4 Prefixes. Destination IPv4 prefixes
178
178
 
@@ -180,45 +180,45 @@ A [`dest_list`](#deny-list-dest-list) block (within [`deny_list`](#deny-list)) s
180
180
 
181
181
  A [`http_list`](#deny-list-http-list) block (within [`deny_list`](#deny-list)) supports the following:
182
182
 
183
- <a id="deny-list-http-list-any-path"></a>&#x2022; [`any_path`](#deny-list-http-list-any-path) - Optional Block<br>Enable this option
183
+ <a id="deny-list-http-list-any-path"></a>&#x2022; [`any_path`](#deny-list-http-list-any-path) - Optional Block<br>Can be used for messages where no values are needed
184
184
 
185
- <a id="deny-list-http-list-exact-value"></a>&#x2022; [`exact_value`](#deny-list-http-list-exact-value) - Optional String<br>Exact Values. Exact domain name
185
+ <a id="deny-list-http-list-exact-value"></a>&#x2022; [`exact_value`](#deny-list-http-list-exact-value) - Optional String<br>Exact domain name
186
186
 
187
- <a id="deny-list-http-list-path-exact-value"></a>&#x2022; [`path_exact_value`](#deny-list-http-list-path-exact-value) - Optional String<br>Exact Path. Exact Path to match
187
+ <a id="deny-list-http-list-path-exact-value"></a>&#x2022; [`path_exact_value`](#deny-list-http-list-path-exact-value) - Optional String<br>Exact Path to match
188
188
 
189
- <a id="deny-list-http-list-path-prefix-value"></a>&#x2022; [`path_prefix_value`](#deny-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path. Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
189
+ <a id="deny-list-http-list-path-prefix-value"></a>&#x2022; [`path_prefix_value`](#deny-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
190
190
 
191
- <a id="deny-list-http-list-path-regex-value"></a>&#x2022; [`path_regex_value`](#deny-list-http-list-path-regex-value) - Optional String<br>Regex of Path. Regular Expression value for the Path to match
191
+ <a id="deny-list-http-list-path-regex-value"></a>&#x2022; [`path_regex_value`](#deny-list-http-list-path-regex-value) - Optional String<br>Regular Expression value for the Path to match
192
192
 
193
- <a id="deny-list-http-list-regex-value"></a>&#x2022; [`regex_value`](#deny-list-http-list-regex-value) - Optional String<br>Regex Values of Domains. Regular Expression value for the domain name
193
+ <a id="deny-list-http-list-regex-value"></a>&#x2022; [`regex_value`](#deny-list-http-list-regex-value) - Optional String<br>Regular Expression value for the domain name
194
194
 
195
- <a id="deny-list-http-list-suffix-value"></a>&#x2022; [`suffix_value`](#deny-list-http-list-suffix-value) - Optional String<br>Suffix Values. Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
195
+ <a id="deny-list-http-list-suffix-value"></a>&#x2022; [`suffix_value`](#deny-list-http-list-suffix-value) - Optional String<br>Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
196
196
 
197
197
  #### Deny List TLS List
198
198
 
199
199
  A [`tls_list`](#deny-list-tls-list) block (within [`deny_list`](#deny-list)) supports the following:
200
200
 
201
- <a id="deny-list-tls-list-exact-value"></a>&#x2022; [`exact_value`](#deny-list-tls-list-exact-value) - Optional String<br>Exact Value. Exact domain name
201
+ <a id="deny-list-tls-list-exact-value"></a>&#x2022; [`exact_value`](#deny-list-tls-list-exact-value) - Optional String<br>Exact domain name
202
202
 
203
- <a id="deny-list-tls-list-regex-value"></a>&#x2022; [`regex_value`](#deny-list-tls-list-regex-value) - Optional String<br>Regex Values of Domains. Regular Expression value for the domain name
203
+ <a id="deny-list-tls-list-regex-value"></a>&#x2022; [`regex_value`](#deny-list-tls-list-regex-value) - Optional String<br>Regular Expression value for the domain name
204
204
 
205
- <a id="deny-list-tls-list-suffix-value"></a>&#x2022; [`suffix_value`](#deny-list-tls-list-suffix-value) - Optional String<br>Suffix Value. Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
205
+ <a id="deny-list-tls-list-suffix-value"></a>&#x2022; [`suffix_value`](#deny-list-tls-list-suffix-value) - Optional String<br>Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
206
206
 
207
207
  #### Network Connector
208
208
 
209
209
  A [`network_connector`](#network-connector) block supports the following:
210
210
 
211
- <a id="network-connector-name"></a>&#x2022; [`name`](#network-connector-name) - Optional String<br>Name. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
211
+ <a id="network-connector-name"></a>&#x2022; [`name`](#network-connector-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
212
212
 
213
- <a id="network-connector-namespace"></a>&#x2022; [`namespace`](#network-connector-namespace) - Optional String<br>Namespace. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
213
+ <a id="network-connector-namespace"></a>&#x2022; [`namespace`](#network-connector-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
214
214
 
215
- <a id="network-connector-tenant"></a>&#x2022; [`tenant`](#network-connector-tenant) - Optional String<br>Tenant. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
215
+ <a id="network-connector-tenant"></a>&#x2022; [`tenant`](#network-connector-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
216
216
 
217
217
  #### Proxy Label Selector
218
218
 
219
219
  A [`proxy_label_selector`](#proxy-label-selector) block supports the following:
220
220
 
221
- <a id="proxy-label-selector-expressions"></a>&#x2022; [`expressions`](#proxy-label-selector-expressions) - Optional List<br>Selector Expression. Expressions contains the Kubernetes style label expression for selections
221
+ <a id="proxy-label-selector-expressions"></a>&#x2022; [`expressions`](#proxy-label-selector-expressions) - Optional List<br>Expressions contains the Kubernetes style label expression for selections
222
222
 
223
223
  #### Rule List
224
224
 
@@ -230,35 +230,35 @@ A [`rule_list`](#rule-list) block supports the following:
230
230
 
231
231
  A [`rules`](#rule-list-rules) block (within [`rule_list`](#rule-list)) supports the following:
232
232
 
233
- <a id="rule-list-rules-action"></a>&#x2022; [`action`](#rule-list-rules-action) - Optional String Defaults to `DENY`<br>Possible values are `DENY`, `ALLOW`, `NEXT_POLICY`<br>[Enum: DENY|ALLOW|NEXT_POLICY] Rule Action. The rule action determines the disposition of the input request API. If a policy matches a rule with an ALLOW action, the processing of the request proceeds forward. If it matches a rule with a DENY action, the processing of the request is terminated and an appropriate message/code returned to the originator. If it matches a rule with a NEXT_POLICY_SET action, evaluation of the current policy set terminates and evaluation of the next policy set in the chain begins. - DENY: DENY Deny the request. - ALLOW: ALLOW Allow the request to proceed. - NEXT_POLICY_SET: NEXT_POLICY_SET Terminate evaluation of the current policy set and begin evaluating the next policy set in the chain. Note that the evaluation of any remaining policies in the current policy set is skipped. - NEXT_POLICY: NEXT_POLICY Terminate evaluation of the current policy and begin evaluating the next policy in the policy set. Note that the evaluation of any remaining rules in the current policy is skipped. - LAST_POLICY: LAST_POLICY Terminate evaluation of the current policy and begin evaluating the last policy in the policy set. Note that the evaluation of any remaining rules in the current policy is skipped. - GOTO_POLICY: GOTO_POLICY Terminate evaluation of the current policy and begin evaluating a specific policy in the policy set. The policy is specified using the goto_policy field in the rule and must be after the current policy in the policy set
233
+ <a id="rule-list-rules-action"></a>&#x2022; [`action`](#rule-list-rules-action) - Optional String Defaults to `DENY`<br>Possible values are `DENY`, `ALLOW`, `NEXT_POLICY`<br>[Enum: DENY|ALLOW|NEXT_POLICY] The rule action determines the disposition of the input request API. If a policy matches a rule with an ALLOW action, the processing of the request proceeds forward. If it matches a rule with a DENY action, the processing of the request is terminated and an appropriate message/code returned to
234
234
 
235
- <a id="rule-list-rules-all-destinations"></a>&#x2022; [`all_destinations`](#rule-list-rules-all-destinations) - Optional Block<br>Enable this option
235
+ <a id="rule-list-rules-all-destinations"></a>&#x2022; [`all_destinations`](#rule-list-rules-all-destinations) - Optional Block<br>Can be used for messages where no values are needed
236
236
 
237
- <a id="rule-list-rules-all-sources"></a>&#x2022; [`all_sources`](#rule-list-rules-all-sources) - Optional Block<br>Enable this option
237
+ <a id="rule-list-rules-all-sources"></a>&#x2022; [`all_sources`](#rule-list-rules-all-sources) - Optional Block<br>Can be used for messages where no values are needed
238
238
 
239
- <a id="rule-list-rules-dst-asn-list"></a>&#x2022; [`dst_asn_list`](#rule-list-rules-dst-asn-list) - Optional Block<br>ASN Match List. An unordered set of RFC 6793 defined 4-byte AS numbers that can be used to create allow or deny lists for use in network policy or service policy. It can be used to create the allow list only for DNS Load Balancer<br>See [Dst Asn List](#rule-list-rules-dst-asn-list) below.
239
+ <a id="rule-list-rules-dst-asn-list"></a>&#x2022; [`dst_asn_list`](#rule-list-rules-dst-asn-list) - Optional Block<br>Unordered set of RFC 6793 defined 4-byte AS numbers that can be used to create allow or deny lists for use in network policy or service policy. It can be used to create the allow list only for DNS Load Balancer<br>See [Dst Asn List](#rule-list-rules-dst-asn-list) below.
240
240
 
241
- <a id="rule-list-rules-dst-asn-set"></a>&#x2022; [`dst_asn_set`](#rule-list-rules-dst-asn-set) - Optional Block<br>Object reference. This type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Dst Asn Set](#rule-list-rules-dst-asn-set) below.
241
+ <a id="rule-list-rules-dst-asn-set"></a>&#x2022; [`dst_asn_set`](#rule-list-rules-dst-asn-set) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Dst Asn Set](#rule-list-rules-dst-asn-set) below.
242
242
 
243
- <a id="rule-list-rules-dst-ip-prefix-set"></a>&#x2022; [`dst_ip_prefix_set`](#rule-list-rules-dst-ip-prefix-set) - Optional Block<br>Object reference. This type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Dst IP Prefix Set](#rule-list-rules-dst-ip-prefix-set) below.
243
+ <a id="rule-list-rules-dst-ip-prefix-set"></a>&#x2022; [`dst_ip_prefix_set`](#rule-list-rules-dst-ip-prefix-set) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Dst IP Prefix Set](#rule-list-rules-dst-ip-prefix-set) below.
244
244
 
245
- <a id="rule-list-rules-dst-label-selector"></a>&#x2022; [`dst_label_selector`](#rule-list-rules-dst-label-selector) - Optional Block<br>Label Selector. This type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects. A null label selector matches no objects. Label selector is immutable. Expressions is a list of strings of label selection expression. Each string has ',' separated values which are 'AND' and all strings are logically 'OR'. BNF for expression string `<selector-syntax>` ::= `<requirement>` | `<requirement>` ',' `<selector-syntax>` `<requirement>` ::= [!] KEY [ `<set-based-restriction>` | `<exact-match-restriction>` ] `<set-based-restriction>` ::= '' | `<inclusion-exclusion>` `<value-set>` `<inclusion-exclusion>` ::= `<inclusion>` | `<exclusion>` `<exclusion>` ::= 'notin' `<inclusion>` ::= 'in' `<value-set>` ::= '(' `<values>` ')' `<values>` ::= VALUE | VALUE ',' `<values>` `<exact-match-restriction>` ::= ['='|'=='|'!='] VALUE<br>See [Dst Label Selector](#rule-list-rules-dst-label-selector) below.
245
+ <a id="rule-list-rules-dst-label-selector"></a>&#x2022; [`dst_label_selector`](#rule-list-rules-dst-label-selector) - Optional Block<br>Type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects<br>See [Dst Label Selector](#rule-list-rules-dst-label-selector) below.
246
246
 
247
- <a id="rule-list-rules-dst-prefix-list"></a>&#x2022; [`dst_prefix_list`](#rule-list-rules-dst-prefix-list) - Optional Block<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint<br>See [Dst Prefix List](#rule-list-rules-dst-prefix-list) below.
247
+ <a id="rule-list-rules-dst-prefix-list"></a>&#x2022; [`dst_prefix_list`](#rule-list-rules-dst-prefix-list) - Optional Block<br>List of IPv4 prefixes that represent an endpoint<br>See [Dst Prefix List](#rule-list-rules-dst-prefix-list) below.
248
248
 
249
249
  <a id="rule-list-rules-http-list"></a>&#x2022; [`http_list`](#rule-list-rules-http-list) - Optional Block<br>URLListType<br>See [HTTP List](#rule-list-rules-http-list) below.
250
250
 
251
- <a id="rule-list-rules-ip-prefix-set"></a>&#x2022; [`ip_prefix_set`](#rule-list-rules-ip-prefix-set) - Optional Block<br>Object reference. This type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [IP Prefix Set](#rule-list-rules-ip-prefix-set) below.
251
+ <a id="rule-list-rules-ip-prefix-set"></a>&#x2022; [`ip_prefix_set`](#rule-list-rules-ip-prefix-set) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [IP Prefix Set](#rule-list-rules-ip-prefix-set) below.
252
252
 
253
- <a id="rule-list-rules-label-selector"></a>&#x2022; [`label_selector`](#rule-list-rules-label-selector) - Optional Block<br>Label Selector. This type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects. A null label selector matches no objects. Label selector is immutable. Expressions is a list of strings of label selection expression. Each string has ',' separated values which are 'AND' and all strings are logically 'OR'. BNF for expression string `<selector-syntax>` ::= `<requirement>` | `<requirement>` ',' `<selector-syntax>` `<requirement>` ::= [!] KEY [ `<set-based-restriction>` | `<exact-match-restriction>` ] `<set-based-restriction>` ::= '' | `<inclusion-exclusion>` `<value-set>` `<inclusion-exclusion>` ::= `<inclusion>` | `<exclusion>` `<exclusion>` ::= 'notin' `<inclusion>` ::= 'in' `<value-set>` ::= '(' `<values>` ')' `<values>` ::= VALUE | VALUE ',' `<values>` `<exact-match-restriction>` ::= ['='|'=='|'!='] VALUE<br>See [Label Selector](#rule-list-rules-label-selector) below.
253
+ <a id="rule-list-rules-label-selector"></a>&#x2022; [`label_selector`](#rule-list-rules-label-selector) - Optional Block<br>Type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects<br>See [Label Selector](#rule-list-rules-label-selector) below.
254
254
 
255
- <a id="rule-list-rules-metadata"></a>&#x2022; [`metadata`](#rule-list-rules-metadata) - Optional Block<br>Message Metadata. MessageMetaType is metadata (common attributes) of a message that only certain messages have. This information is propagated to the metadata of a child object that gets created from the containing message during view processing. The information in this type can be specified by user during create and replace APIs<br>See [Metadata](#rule-list-rules-metadata) below.
255
+ <a id="rule-list-rules-metadata"></a>&#x2022; [`metadata`](#rule-list-rules-metadata) - Optional Block<br>MessageMetaType is metadata (common attributes) of a message that only certain messages have. This information is propagated to the metadata of a child object that gets created from the containing message during view processing. The information in this type can be specified by user during create<br>See [Metadata](#rule-list-rules-metadata) below.
256
256
 
257
- <a id="rule-list-rules-no-http-connect-port"></a>&#x2022; [`no_http_connect_port`](#rule-list-rules-no-http-connect-port) - Optional Block<br>Enable this option
257
+ <a id="rule-list-rules-no-http-connect-port"></a>&#x2022; [`no_http_connect_port`](#rule-list-rules-no-http-connect-port) - Optional Block<br>Can be used for messages where no values are needed
258
258
 
259
- <a id="rule-list-rules-port-matcher"></a>&#x2022; [`port_matcher`](#rule-list-rules-port-matcher) - Optional Block<br>Port Matcher. A port matcher specifies a list of port ranges as match criteria. The match is considered successful if the input port falls within any of the port ranges. The result of the match is inverted if invert_matcher is true<br>See [Port Matcher](#rule-list-rules-port-matcher) below.
259
+ <a id="rule-list-rules-port-matcher"></a>&#x2022; [`port_matcher`](#rule-list-rules-port-matcher) - Optional Block<br>Port matcher specifies a list of port ranges as match criteria. The match is considered successful if the input port falls within any of the port ranges. The result of the match is inverted if invert_matcher is true<br>See [Port Matcher](#rule-list-rules-port-matcher) below.
260
260
 
261
- <a id="rule-list-rules-prefix-list"></a>&#x2022; [`prefix_list`](#rule-list-rules-prefix-list) - Optional Block<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint<br>See [Prefix List](#rule-list-rules-prefix-list) below.
261
+ <a id="rule-list-rules-prefix-list"></a>&#x2022; [`prefix_list`](#rule-list-rules-prefix-list) - Optional Block<br>List of IPv4 prefixes that represent an endpoint<br>See [Prefix List](#rule-list-rules-prefix-list) below.
262
262
 
263
263
  <a id="rule-list-rules-tls-list"></a>&#x2022; [`tls_list`](#rule-list-rules-tls-list) - Optional Block<br>DomainListType<br>See [TLS List](#rule-list-rules-tls-list) below.
264
264
 
@@ -268,39 +268,39 @@ A [`rules`](#rule-list-rules) block (within [`rule_list`](#rule-list)) supports
268
268
 
269
269
  A [`dst_asn_list`](#rule-list-rules-dst-asn-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
270
270
 
271
- <a id="rule-list-rules-dst-asn-list-as-numbers"></a>&#x2022; [`as_numbers`](#rule-list-rules-dst-asn-list-as-numbers) - Optional List<br>AS Numbers. An unordered set of RFC 6793 defined 4-byte AS numbers that can be used to create allow or deny lists for use in network policy or service policy. It can be used to create the allow list only for DNS Load Balancer
271
+ <a id="rule-list-rules-dst-asn-list-as-numbers"></a>&#x2022; [`as_numbers`](#rule-list-rules-dst-asn-list-as-numbers) - Optional List<br>Unordered set of RFC 6793 defined 4-byte AS numbers that can be used to create allow or deny lists for use in network policy or service policy. It can be used to create the allow list only for DNS Load Balancer
272
272
 
273
273
  #### Rule List Rules Dst Asn Set
274
274
 
275
275
  A [`dst_asn_set`](#rule-list-rules-dst-asn-set) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
276
276
 
277
- <a id="rule-list-rules-dst-asn-set-name"></a>&#x2022; [`name`](#rule-list-rules-dst-asn-set-name) - Optional String<br>Name. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
277
+ <a id="rule-list-rules-dst-asn-set-name"></a>&#x2022; [`name`](#rule-list-rules-dst-asn-set-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
278
278
 
279
- <a id="rule-list-rules-dst-asn-set-namespace"></a>&#x2022; [`namespace`](#rule-list-rules-dst-asn-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
279
+ <a id="rule-list-rules-dst-asn-set-namespace"></a>&#x2022; [`namespace`](#rule-list-rules-dst-asn-set-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
280
280
 
281
- <a id="rule-list-rules-dst-asn-set-tenant"></a>&#x2022; [`tenant`](#rule-list-rules-dst-asn-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
281
+ <a id="rule-list-rules-dst-asn-set-tenant"></a>&#x2022; [`tenant`](#rule-list-rules-dst-asn-set-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
282
282
 
283
283
  #### Rule List Rules Dst IP Prefix Set
284
284
 
285
285
  A [`dst_ip_prefix_set`](#rule-list-rules-dst-ip-prefix-set) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
286
286
 
287
- <a id="rule-list-rules-dst-ip-prefix-set-name"></a>&#x2022; [`name`](#rule-list-rules-dst-ip-prefix-set-name) - Optional String<br>Name. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
287
+ <a id="rule-list-rules-dst-ip-prefix-set-name"></a>&#x2022; [`name`](#rule-list-rules-dst-ip-prefix-set-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
288
288
 
289
- <a id="namespace-098663"></a>&#x2022; [`namespace`](#namespace-098663) - Optional String<br>Namespace. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
289
+ <a id="namespace-098663"></a>&#x2022; [`namespace`](#namespace-098663) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
290
290
 
291
- <a id="tenant-047089"></a>&#x2022; [`tenant`](#tenant-047089) - Optional String<br>Tenant. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
291
+ <a id="tenant-047089"></a>&#x2022; [`tenant`](#tenant-047089) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
292
292
 
293
293
  #### Rule List Rules Dst Label Selector
294
294
 
295
295
  A [`dst_label_selector`](#rule-list-rules-dst-label-selector) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
296
296
 
297
- <a id="expressions-229662"></a>&#x2022; [`expressions`](#expressions-229662) - Optional List<br>Selector Expression. Expressions contains the Kubernetes style label expression for selections
297
+ <a id="expressions-229662"></a>&#x2022; [`expressions`](#expressions-229662) - Optional List<br>Expressions contains the Kubernetes style label expression for selections
298
298
 
299
299
  #### Rule List Rules Dst Prefix List
300
300
 
301
301
  A [`dst_prefix_list`](#rule-list-rules-dst-prefix-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
302
302
 
303
- <a id="prefixes-d0d633"></a>&#x2022; [`prefixes`](#prefixes-d0d633) - Optional List<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint
303
+ <a id="prefixes-d0d633"></a>&#x2022; [`prefixes`](#prefixes-d0d633) - Optional List<br>List of IPv4 prefixes that represent an endpoint
304
304
 
305
305
  #### Rule List Rules HTTP List
306
306
 
@@ -312,35 +312,35 @@ A [`http_list`](#rule-list-rules-http-list) block (within [`rule_list.rules`](#r
312
312
 
313
313
  A [`http_list`](#rule-list-rules-http-list-http-list) block (within [`rule_list.rules.http_list`](#rule-list-rules-http-list)) supports the following:
314
314
 
315
- <a id="path-5eabfe"></a>&#x2022; [`any_path`](#path-5eabfe) - Optional Block<br>Enable this option
315
+ <a id="path-5eabfe"></a>&#x2022; [`any_path`](#path-5eabfe) - Optional Block<br>Can be used for messages where no values are needed
316
316
 
317
- <a id="value-d667cb"></a>&#x2022; [`exact_value`](#value-d667cb) - Optional String<br>Exact Values. Exact domain name
317
+ <a id="value-d667cb"></a>&#x2022; [`exact_value`](#value-d667cb) - Optional String<br>Exact domain name
318
318
 
319
- <a id="value-511ae9"></a>&#x2022; [`path_exact_value`](#value-511ae9) - Optional String<br>Exact Path. Exact Path to match
319
+ <a id="value-511ae9"></a>&#x2022; [`path_exact_value`](#value-511ae9) - Optional String<br>Exact Path to match
320
320
 
321
- <a id="value-cd7319"></a>&#x2022; [`path_prefix_value`](#value-cd7319) - Optional String<br>Prefix of Path. Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
321
+ <a id="value-cd7319"></a>&#x2022; [`path_prefix_value`](#value-cd7319) - Optional String<br>Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
322
322
 
323
- <a id="value-931da3"></a>&#x2022; [`path_regex_value`](#value-931da3) - Optional String<br>Regex of Path. Regular Expression value for the Path to match
323
+ <a id="value-931da3"></a>&#x2022; [`path_regex_value`](#value-931da3) - Optional String<br>Regular Expression value for the Path to match
324
324
 
325
- <a id="value-663d1f"></a>&#x2022; [`regex_value`](#value-663d1f) - Optional String<br>Regex Values of Domains. Regular Expression value for the domain name
325
+ <a id="value-663d1f"></a>&#x2022; [`regex_value`](#value-663d1f) - Optional String<br>Regular Expression value for the domain name
326
326
 
327
- <a id="value-acf087"></a>&#x2022; [`suffix_value`](#value-acf087) - Optional String<br>Suffix Values. Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
327
+ <a id="value-acf087"></a>&#x2022; [`suffix_value`](#value-acf087) - Optional String<br>Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
328
328
 
329
329
  #### Rule List Rules IP Prefix Set
330
330
 
331
331
  An [`ip_prefix_set`](#rule-list-rules-ip-prefix-set) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
332
332
 
333
- <a id="rule-list-rules-ip-prefix-set-name"></a>&#x2022; [`name`](#rule-list-rules-ip-prefix-set-name) - Optional String<br>Name. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
333
+ <a id="rule-list-rules-ip-prefix-set-name"></a>&#x2022; [`name`](#rule-list-rules-ip-prefix-set-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
334
334
 
335
- <a id="rule-list-rules-ip-prefix-set-namespace"></a>&#x2022; [`namespace`](#rule-list-rules-ip-prefix-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
335
+ <a id="rule-list-rules-ip-prefix-set-namespace"></a>&#x2022; [`namespace`](#rule-list-rules-ip-prefix-set-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
336
336
 
337
- <a id="rule-list-rules-ip-prefix-set-tenant"></a>&#x2022; [`tenant`](#rule-list-rules-ip-prefix-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
337
+ <a id="rule-list-rules-ip-prefix-set-tenant"></a>&#x2022; [`tenant`](#rule-list-rules-ip-prefix-set-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
338
338
 
339
339
  #### Rule List Rules Label Selector
340
340
 
341
341
  A [`label_selector`](#rule-list-rules-label-selector) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
342
342
 
343
- <a id="expressions-8dfad5"></a>&#x2022; [`expressions`](#expressions-8dfad5) - Optional List<br>Selector Expression. Expressions contains the Kubernetes style label expression for selections
343
+ <a id="expressions-8dfad5"></a>&#x2022; [`expressions`](#expressions-8dfad5) - Optional List<br>Expressions contains the Kubernetes style label expression for selections
344
344
 
345
345
  #### Rule List Rules Metadata
346
346
 
@@ -348,7 +348,7 @@ A [`metadata`](#rule-list-rules-metadata) block (within [`rule_list.rules`](#rul
348
348
 
349
349
  <a id="spec-118a99"></a>&#x2022; [`description_spec`](#spec-118a99) - Optional String<br>Description. Human readable description
350
350
 
351
- <a id="rule-list-rules-metadata-name"></a>&#x2022; [`name`](#rule-list-rules-metadata-name) - Optional String<br>Name. This is the name of the message. The value of name has to follow DNS-1035 format
351
+ <a id="rule-list-rules-metadata-name"></a>&#x2022; [`name`](#rule-list-rules-metadata-name) - Optional String<br>Name of the message. The value of name has to follow DNS-1035 format
352
352
 
353
353
  #### Rule List Rules Port Matcher
354
354
 
@@ -356,13 +356,13 @@ A [`port_matcher`](#rule-list-rules-port-matcher) block (within [`rule_list.rule
356
356
 
357
357
  <a id="matcher-754775"></a>&#x2022; [`invert_matcher`](#matcher-754775) - Optional Bool<br>Invert Port Matcher. Invert the match result
358
358
 
359
- <a id="rule-list-rules-port-matcher-ports"></a>&#x2022; [`ports`](#rule-list-rules-port-matcher-ports) - Optional List<br>Port Ranges. A list of strings, each of which is a single port value or a tuple of start and end port values separated by '-'. The start and end values are considered to be part of the range
359
+ <a id="rule-list-rules-port-matcher-ports"></a>&#x2022; [`ports`](#rule-list-rules-port-matcher-ports) - Optional List<br>List of strings, each of which is a single port value or a tuple of start and end port values separated by '-'. The start and end values are considered to be part of the range
360
360
 
361
361
  #### Rule List Rules Prefix List
362
362
 
363
363
  A [`prefix_list`](#rule-list-rules-prefix-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
364
364
 
365
- <a id="rule-list-rules-prefix-list-prefixes"></a>&#x2022; [`prefixes`](#rule-list-rules-prefix-list-prefixes) - Optional List<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint
365
+ <a id="rule-list-rules-prefix-list-prefixes"></a>&#x2022; [`prefixes`](#rule-list-rules-prefix-list-prefixes) - Optional List<br>List of IPv4 prefixes that represent an endpoint
366
366
 
367
367
  #### Rule List Rules TLS List
368
368
 
@@ -374,17 +374,17 @@ A [`tls_list`](#rule-list-rules-tls-list) block (within [`rule_list.rules`](#rul
374
374
 
375
375
  A [`tls_list`](#rule-list-rules-tls-list-tls-list) block (within [`rule_list.rules.tls_list`](#rule-list-rules-tls-list)) supports the following:
376
376
 
377
- <a id="value-e81ff3"></a>&#x2022; [`exact_value`](#value-e81ff3) - Optional String<br>Exact Value. Exact domain name
377
+ <a id="value-e81ff3"></a>&#x2022; [`exact_value`](#value-e81ff3) - Optional String<br>Exact domain name
378
378
 
379
- <a id="value-d11673"></a>&#x2022; [`regex_value`](#value-d11673) - Optional String<br>Regex Values of Domains. Regular Expression value for the domain name
379
+ <a id="value-d11673"></a>&#x2022; [`regex_value`](#value-d11673) - Optional String<br>Regular Expression value for the domain name
380
380
 
381
- <a id="value-4d4de2"></a>&#x2022; [`suffix_value`](#value-4d4de2) - Optional String<br>Suffix Value. Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
381
+ <a id="value-4d4de2"></a>&#x2022; [`suffix_value`](#value-4d4de2) - Optional String<br>Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
382
382
 
383
383
  #### Rule List Rules URL Category List
384
384
 
385
385
  An [`url_category_list`](#rule-list-rules-url-category-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
386
386
 
387
- <a id="categories-b6723b"></a>&#x2022; [`url_categories`](#categories-b6723b) - Optional List Defaults to `UNCATEGORIZED`<br>Possible values are `UNCATEGORIZED`, `REAL_ESTATE`, `COMPUTER_AND_INTERNET_SECURITY`, `FINANCIAL_SERVICES`, `BUSINESS_AND_ECONOMY`, `COMPUTER_AND_INTERNET_INFO`, `AUCTIONS`, `SHOPPING`, `CULT_AND_OCCULT`, `TRAVEL`, `ABUSED_DRUGS`, `ADULT_AND_PORNOGRAPHY`, `HOME_AND_GARDEN`, `MILITARY`, `SOCIAL_NETWORKING`, `DEAD_SITES`, `INDIVIDUAL_STOCK_ADVICE_AND_TOOLS`, `TRAINING_AND_TOOLS`, `DATING`, `SEX_EDUCATION`, `RELIGION`, `ENTERTAINMENT_AND_ARTS`, `PERSONAL_SITES_AND_BLOGS`, `LEGAL`, `LOCAL_INFORMATION`, `STREAMING_MEDIA`, `JOB_SEARCH`, `GAMBLING`, `TRANSLATION`, `REFERENCE_AND_RESEARCH`, `SHAREWARE_AND_FREEWARE`, `PEER_TO_PEER`, `MARIJUANA`, `HACKING`, `GAMES`, `PHILOSOPHY_AND_POLITICAL_ADVOCACY`, `WEAPONS`, `PAY_TO_SURF`, `HUNTING_AND_FISHING`, `SOCIETY`, `EDUCATIONAL_INSTITUTIONS`, `ONLINE_GREETING_CARDS`, `SPORTS`, `SWIMSUITS_AND_INTIMATE_APPAREL`, `QUESTIONABLE`, `KIDS`, `HATE_AND_RACISM`, `PERSONAL_STORAGE`, `VIOLENCE`, `KEYLOGGERS_AND_MONITORING`, `SEARCH_ENGINES`, `INTERNET_PORTALS`, `WEB_ADVERTISEMENTS`, `CHEATING`, `GROSS`, `WEB_BASED_EMAIL`, `MALWARE_SITES`, `PHISHING_AND_OTHER_FRAUDS`, `PROXY_AVOIDANCE_AND_ANONYMIZERS`, `SPYWARE_AND_ADWARE`, `MUSIC`, `GOVERNMENT`, `NUDITY`, `NEWS_AND_MEDIA`, `ILLEGAL`, `CONTENT_DELIVERY_NETWORKS`, `INTERNET_COMMUNICATIONS`, `BOT_NETS`, `ABORTION`, `HEALTH_AND_MEDICINE`, `CONFIRMED_SPAM_SOURCES`, `SPAM_URLS`, `UNCONFIRMED_SPAM_SOURCES`, `OPEN_HTTP_PROXIES`, `DYNAMICALLY_GENERATED_CONTENT`, `PARKED_DOMAINS`, `ALCOHOL_AND_TOBACCO`, `PRIVATE_IP_ADDRESSES`, `IMAGE_AND_VIDEO_SEARCH`, `FASHION_AND_BEAUTY`, `RECREATION_AND_HOBBIES`, `MOTOR_VEHICLES`, `WEB_HOSTING`<br>[Enum: UNCATEGORIZED|REAL_ESTATE|COMPUTER_AND_INTERNET_SECURITY|FINANCIAL_SERVICES|BUSINESS_AND_ECONOMY|COMPUTER_AND_INTERNET_INFO|AUCTIONS|SHOPPING|CULT_AND_OCCULT|TRAVEL|ABUSED_DRUGS|ADULT_AND_PORNOGRAPHY|HOME_AND_GARDEN|MILITARY|SOCIAL_NETWORKING|DEAD_SITES|INDIVIDUAL_STOCK_ADVICE_AND_TOOLS|TRAINING_AND_TOOLS|DATING|SEX_EDUCATION|RELIGION|ENTERTAINMENT_AND_ARTS|PERSONAL_SITES_AND_BLOGS|LEGAL|LOCAL_INFORMATION|STREAMING_MEDIA|JOB_SEARCH|GAMBLING|TRANSLATION|REFERENCE_AND_RESEARCH|SHAREWARE_AND_FREEWARE|PEER_TO_PEER|MARIJUANA|HACKING|GAMES|PHILOSOPHY_AND_POLITICAL_ADVOCACY|WEAPONS|PAY_TO_SURF|HUNTING_AND_FISHING|SOCIETY|EDUCATIONAL_INSTITUTIONS|ONLINE_GREETING_CARDS|SPORTS|SWIMSUITS_AND_INTIMATE_APPAREL|QUESTIONABLE|KIDS|HATE_AND_RACISM|PERSONAL_STORAGE|VIOLENCE|KEYLOGGERS_AND_MONITORING|SEARCH_ENGINES|INTERNET_PORTALS|WEB_ADVERTISEMENTS|CHEATING|GROSS|WEB_BASED_EMAIL|MALWARE_SITES|PHISHING_AND_OTHER_FRAUDS|PROXY_AVOIDANCE_AND_ANONYMIZERS|SPYWARE_AND_ADWARE|MUSIC|GOVERNMENT|NUDITY|NEWS_AND_MEDIA|ILLEGAL|CONTENT_DELIVERY_NETWORKS|INTERNET_COMMUNICATIONS|BOT_NETS|ABORTION|HEALTH_AND_MEDICINE|CONFIRMED_SPAM_SOURCES|SPAM_URLS|UNCONFIRMED_SPAM_SOURCES|OPEN_HTTP_PROXIES|DYNAMICALLY_GENERATED_CONTENT|PARKED_DOMAINS|ALCOHOL_AND_TOBACCO|PRIVATE_IP_ADDRESSES|IMAGE_AND_VIDEO_SEARCH|FASHION_AND_BEAUTY|RECREATION_AND_HOBBIES|MOTOR_VEHICLES|WEB_HOSTING] URL Categories. List of URL categories to be selected
387
+ <a id="categories-b6723b"></a>&#x2022; [`url_categories`](#categories-b6723b) - Optional List Defaults to `UNCATEGORIZED`<br>Possible values are `UNCATEGORIZED`, `REAL_ESTATE`, `COMPUTER_AND_INTERNET_SECURITY`, `FINANCIAL_SERVICES`, `BUSINESS_AND_ECONOMY`, `COMPUTER_AND_INTERNET_INFO`, `AUCTIONS`, `SHOPPING`, `CULT_AND_OCCULT`, `TRAVEL`, `ABUSED_DRUGS`, `ADULT_AND_PORNOGRAPHY`, `HOME_AND_GARDEN`, `MILITARY`, `SOCIAL_NETWORKING`, `DEAD_SITES`, `INDIVIDUAL_STOCK_ADVICE_AND_TOOLS`, `TRAINING_AND_TOOLS`, `DATING`, `SEX_EDUCATION`, `RELIGION`, `ENTERTAINMENT_AND_ARTS`, `PERSONAL_SITES_AND_BLOGS`, `LEGAL`, `LOCAL_INFORMATION`, `STREAMING_MEDIA`, `JOB_SEARCH`, `GAMBLING`, `TRANSLATION`, `REFERENCE_AND_RESEARCH`, `SHAREWARE_AND_FREEWARE`, `PEER_TO_PEER`, `MARIJUANA`, `HACKING`, `GAMES`, `PHILOSOPHY_AND_POLITICAL_ADVOCACY`, `WEAPONS`, `PAY_TO_SURF`, `HUNTING_AND_FISHING`, `SOCIETY`, `EDUCATIONAL_INSTITUTIONS`, `ONLINE_GREETING_CARDS`, `SPORTS`, `SWIMSUITS_AND_INTIMATE_APPAREL`, `QUESTIONABLE`, `KIDS`, `HATE_AND_RACISM`, `PERSONAL_STORAGE`, `VIOLENCE`, `KEYLOGGERS_AND_MONITORING`, `SEARCH_ENGINES`, `INTERNET_PORTALS`, `WEB_ADVERTISEMENTS`, `CHEATING`, `GROSS`, `WEB_BASED_EMAIL`, `MALWARE_SITES`, `PHISHING_AND_OTHER_FRAUDS`, `PROXY_AVOIDANCE_AND_ANONYMIZERS`, `SPYWARE_AND_ADWARE`, `MUSIC`, `GOVERNMENT`, `NUDITY`, `NEWS_AND_MEDIA`, `ILLEGAL`, `CONTENT_DELIVERY_NETWORKS`, `INTERNET_COMMUNICATIONS`, `BOT_NETS`, `ABORTION`, `HEALTH_AND_MEDICINE`, `CONFIRMED_SPAM_SOURCES`, `SPAM_URLS`, `UNCONFIRMED_SPAM_SOURCES`, `OPEN_HTTP_PROXIES`, `DYNAMICALLY_GENERATED_CONTENT`, `PARKED_DOMAINS`, `ALCOHOL_AND_TOBACCO`, `PRIVATE_IP_ADDRESSES`, `IMAGE_AND_VIDEO_SEARCH`, `FASHION_AND_BEAUTY`, `RECREATION_AND_HOBBIES`, `MOTOR_VEHICLES`, `WEB_HOSTING`<br>[Enum: UNCATEGORIZED|REAL_ESTATE|COMPUTER_AND_INTERNET_SECURITY|FINANCIAL_SERVICES|BUSINESS_AND_ECONOMY|COMPUTER_AND_INTERNET_INFO|AUCTIONS|SHOPPING|CULT_AND_OCCULT|TRAVEL|ABUSED_DRUGS|ADULT_AND_PORNOGRAPHY|HOME_AND_GARDEN|MILITARY|SOCIAL_NETWORKING|DEAD_SITES|INDIVIDUAL_STOCK_ADVICE_AND_TOOLS|TRAINING_AND_TOOLS|DATING|SEX_EDUCATION|RELIGION|ENTERTAINMENT_AND_ARTS|PERSONAL_SITES_AND_BLOGS|LEGAL|LOCAL_INFORMATION|STREAMING_MEDIA|JOB_SEARCH|GAMBLING|TRANSLATION|REFERENCE_AND_RESEARCH|SHAREWARE_AND_FREEWARE|PEER_TO_PEER|MARIJUANA|HACKING|GAMES|PHILOSOPHY_AND_POLITICAL_ADVOCACY|WEAPONS|PAY_TO_SURF|HUNTING_AND_FISHING|SOCIETY|EDUCATIONAL_INSTITUTIONS|ONLINE_GREETING_CARDS|SPORTS|SWIMSUITS_AND_INTIMATE_APPAREL|QUESTIONABLE|KIDS|HATE_AND_RACISM|PERSONAL_STORAGE|VIOLENCE|KEYLOGGERS_AND_MONITORING|SEARCH_ENGINES|INTERNET_PORTALS|WEB_ADVERTISEMENTS|CHEATING|GROSS|WEB_BASED_EMAIL|MALWARE_SITES|PHISHING_AND_OTHER_FRAUDS|PROXY_AVOIDANCE_AND_ANONYMIZERS|SPYWARE_AND_ADWARE|MUSIC|GOVERNMENT|NUDITY|NEWS_AND_MEDIA|ILLEGAL|CONTENT_DELIVERY_NETWORKS|INTERNET_COMMUNICATIONS|BOT_NETS|ABORTION|HEALTH_AND_MEDICINE|CONFIRMED_SPAM_SOURCES|SPAM_URLS|UNCONFIRMED_SPAM_SOURCES|OPEN_HTTP_PROXIES|DYNAMICALLY_GENERATED_CONTENT|PARKED_DOMAINS|ALCOHOL_AND_TOBACCO|PRIVATE_IP_ADDRESSES|IMAGE_AND_VIDEO_SEARCH|FASHION_AND_BEAUTY|RECREATION_AND_HOBBIES|MOTOR_VEHICLES|WEB_HOSTING] List of URL categories to be selected
388
388
 
389
389
  #### Timeouts
390
390
 
@@ -36,11 +36,11 @@ resource "f5xc_forwarding_class" "example" {
36
36
  dscp {
37
37
  # Configure dscp settings
38
38
  }
39
- # [OneOf: dscp_based_queue, queue_id_to_use] Enable this op...
39
+ # [OneOf: dscp_based_queue, queue_id_to_use] Can be used fo...
40
40
  dscp_based_queue {
41
41
  # Configure dscp_based_queue settings
42
42
  }
43
- # Enable this option
43
+ # Can be used for messages where no values are needed.
44
44
  no_marking {
45
45
  # Configure no_marking settings
46
46
  }
@@ -68,22 +68,22 @@ resource "f5xc_forwarding_class" "example" {
68
68
 
69
69
  -> **One of the following:**
70
70
  &#x2022; <a id="dscp"></a>[`dscp`](#dscp) - Optional Block<br>DSCP Marking setting. DSCP marking setting as per RFC 2475<br>See [Dscp](#dscp) below for details.
71
- <br><br>&#x2022; <a id="no-marking"></a>[`no_marking`](#no-marking) - Optional Block<br>Enable this option
71
+ <br><br>&#x2022; <a id="no-marking"></a>[`no_marking`](#no-marking) - Optional Block<br>Can be used for messages where no values are needed
72
72
 
73
73
  -> **One of the following:**
74
- &#x2022; <a id="dscp-based-queue"></a>[`dscp_based_queue`](#dscp-based-queue) - Optional Block<br>Enable this option
75
- <br><br>&#x2022; <a id="queue-id-to-use"></a>[`queue_id_to_use`](#queue-id-to-use) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2] Precedence Level Values. DSCP Precedence Level Values Best Effort service will GET any available bandwidth DSCP Class 1 service DSCP Class 2 service DSCP Class 3 service DSCP Class 4 service Express Forwarding is used for low latency traffic Control is used for routing traffic, not recommended Link Layer traffic like LACP or keepalive, not recommended
74
+ &#x2022; <a id="dscp-based-queue"></a>[`dscp_based_queue`](#dscp-based-queue) - Optional Block<br>Can be used for messages where no values are needed
75
+ <br><br>&#x2022; <a id="queue-id-to-use"></a>[`queue_id_to_use`](#queue-id-to-use) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2] DSCP Precedence Level Values Best Effort service will GET any available bandwidth DSCP Class 1 service DSCP Class 2 service DSCP Class 3 service DSCP Class 4 service Express Forwarding is used for low latency traffic Control is used for routing traffic, not recommended Link Layer traffic like
76
76
 
77
- <a id="interface-group"></a>&#x2022; [`interface_group`](#interface-group) - Optional String Defaults to `ANY_AVAILABLE_INTERFACE`<br>Possible values are `ANY_AVAILABLE_INTERFACE`, `INTERFACE_GROUP1`, `INTERFACE_GROUP2`, `INTERFACE_GROUP3`<br>[Enum: ANY_AVAILABLE_INTERFACE|INTERFACE_GROUP1|INTERFACE_GROUP2|INTERFACE_GROUP3] Interface Group. Interface group, group membership by adding group label to interface Choose any of the available interfaces Choose all interfaces with label group1 Choose all interfaces with label group2 Choose all interfaces with label group3
77
+ <a id="interface-group"></a>&#x2022; [`interface_group`](#interface-group) - Optional String Defaults to `ANY_AVAILABLE_INTERFACE`<br>Possible values are `ANY_AVAILABLE_INTERFACE`, `INTERFACE_GROUP1`, `INTERFACE_GROUP2`, `INTERFACE_GROUP3`<br>[Enum: ANY_AVAILABLE_INTERFACE|INTERFACE_GROUP1|INTERFACE_GROUP2|INTERFACE_GROUP3] Interface group, group membership by adding group label to interface Choose any of the available interfaces Choose all interfaces with label group1 Choose all interfaces with label group2 Choose all interfaces with label group3
78
78
 
79
79
  -> **One of the following:**
80
- &#x2022; <a id="no-policer"></a>[`no_policer`](#no-policer) - Optional Block<br>Enable this option
80
+ &#x2022; <a id="no-policer"></a>[`no_policer`](#no-policer) - Optional Block<br>Can be used for messages where no values are needed
81
81
 
82
- <a id="policer"></a>&#x2022; [`policer`](#policer) - Optional Block<br>Object reference. This type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Policer](#policer) below for details.
82
+ <a id="policer"></a>&#x2022; [`policer`](#policer) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Policer](#policer) below for details.
83
83
 
84
84
  <a id="timeouts"></a>&#x2022; [`timeouts`](#timeouts) - Optional Block<br>See [Timeouts](#timeouts) below for details.
85
85
 
86
- <a id="tos-value"></a>&#x2022; [`tos_value`](#tos-value) - Optional Number<br>TOS value. Decimal value of raw 8 bit TOS. In above example DSCP 10 = Precedence Class 1 and drop precedence low
86
+ <a id="tos-value"></a>&#x2022; [`tos_value`](#tos-value) - Optional Number<br>Decimal value of raw 8 bit TOS. In above example DSCP 10 = Precedence Class 1 and drop precedence low
87
87
 
88
88
  ### Attributes Reference
89
89
 
@@ -97,19 +97,19 @@ In addition to all arguments above, the following attributes are exported:
97
97
 
98
98
  A [`dscp`](#dscp) block supports the following:
99
99
 
100
- <a id="dscp-drop-precedence"></a>&#x2022; [`drop_precedence`](#dscp-drop-precedence) - Optional String Defaults to `DSCP_AF_FAKE`<br>Possible values are `DSCP_AF_LOW`, `DSCP_AF_MEDIUM`, `DSCP_AF_HIGH`, `DSCP_AF_POLICER`<br>[Enum: DSCP_AF_LOW|DSCP_AF_MEDIUM|DSCP_AF_HIGH|DSCP_AF_POLICER] DSCP AF Drop Precedence. DSCP Assured forwarding drop precedence DSCP Low drop precedence DSCP Low drop precedence DSCP Low drop precedence DSCP drop precedence value is taken from output of policer
100
+ <a id="dscp-drop-precedence"></a>&#x2022; [`drop_precedence`](#dscp-drop-precedence) - Optional String Defaults to `DSCP_AF_FAKE`<br>Possible values are `DSCP_AF_LOW`, `DSCP_AF_MEDIUM`, `DSCP_AF_HIGH`, `DSCP_AF_POLICER`<br>[Enum: DSCP_AF_LOW|DSCP_AF_MEDIUM|DSCP_AF_HIGH|DSCP_AF_POLICER] DSCP Assured forwarding drop precedence DSCP Low drop precedence DSCP Low drop precedence DSCP Low drop precedence DSCP drop precedence value is taken from output of policer
101
101
 
102
- <a id="dscp-dscp-class"></a>&#x2022; [`dscp_class`](#dscp-dscp-class) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2] Precedence Level Values. DSCP Precedence Level Values Best Effort service will GET any available bandwidth DSCP Class 1 service DSCP Class 2 service DSCP Class 3 service DSCP Class 4 service Express Forwarding is used for low latency traffic Control is used for routing traffic, not recommended Link Layer traffic like LACP or keepalive, not recommended
102
+ <a id="dscp-dscp-class"></a>&#x2022; [`dscp_class`](#dscp-dscp-class) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2] DSCP Precedence Level Values Best Effort service will GET any available bandwidth DSCP Class 1 service DSCP Class 2 service DSCP Class 3 service DSCP Class 4 service Express Forwarding is used for low latency traffic Control is used for routing traffic, not recommended Link Layer traffic like
103
103
 
104
104
  #### Policer
105
105
 
106
106
  A [`policer`](#policer) block supports the following:
107
107
 
108
- <a id="policer-name"></a>&#x2022; [`name`](#policer-name) - Optional String<br>Name. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
108
+ <a id="policer-name"></a>&#x2022; [`name`](#policer-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
109
109
 
110
- <a id="policer-namespace"></a>&#x2022; [`namespace`](#policer-namespace) - Optional String<br>Namespace. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
110
+ <a id="policer-namespace"></a>&#x2022; [`namespace`](#policer-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
111
111
 
112
- <a id="policer-tenant"></a>&#x2022; [`tenant`](#policer-tenant) - Optional String<br>Tenant. When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
112
+ <a id="policer-tenant"></a>&#x2022; [`tenant`](#policer-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
113
113
 
114
114
  #### Timeouts
115
115