@robinmordasiewicz/f5xc-terraform-mcp 3.5.1 → 3.6.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +104 -283
- package/dist/docs/data-sources/bgp.md +2 -2
- package/dist/docs/data-sources/discovery.md +2 -2
- package/dist/docs/data-sources/fast_acl.md +2 -2
- package/dist/docs/data-sources/fast_acl_rule.md +2 -2
- package/dist/docs/data-sources/irule.md +2 -2
- package/dist/docs/data-sources/log_receiver.md +2 -2
- package/dist/docs/data-sources/network_policy.md +2 -2
- package/dist/docs/data-sources/route.md +2 -2
- package/dist/docs/data-sources/site.md +2 -2
- package/dist/docs/resources/address_allocator.md +7 -7
- package/dist/docs/resources/advertise_policy.md +57 -57
- package/dist/docs/resources/alert_policy.md +40 -40
- package/dist/docs/resources/alert_receiver.md +57 -57
- package/dist/docs/resources/api_crawler.md +13 -13
- package/dist/docs/resources/api_definition.md +11 -11
- package/dist/docs/resources/api_discovery.md +4 -4
- package/dist/docs/resources/api_testing.md +27 -27
- package/dist/docs/resources/apm.md +40 -40
- package/dist/docs/resources/app_api_group.md +20 -20
- package/dist/docs/resources/app_firewall.md +50 -50
- package/dist/docs/resources/app_setting.md +19 -19
- package/dist/docs/resources/app_type.md +7 -7
- package/dist/docs/resources/authentication.md +29 -29
- package/dist/docs/resources/aws_tgw_site.md +140 -140
- package/dist/docs/resources/aws_vpc_site.md +174 -174
- package/dist/docs/resources/azure_vnet_site.md +245 -245
- package/dist/docs/resources/bgp.md +37 -205
- package/dist/docs/resources/bgp_asn_set.md +1 -1
- package/dist/docs/resources/bgp_routing_policy.md +19 -19
- package/dist/docs/resources/bot_defense_app_infrastructure.md +12 -12
- package/dist/docs/resources/cdn_cache_rule.md +5 -5
- package/dist/docs/resources/cdn_loadbalancer.md +418 -418
- package/dist/docs/resources/certificate.md +1 -1
- package/dist/docs/resources/certificate_chain.md +1 -1
- package/dist/docs/resources/cloud_connect.md +28 -28
- package/dist/docs/resources/cloud_credentials.md +35 -35
- package/dist/docs/resources/cloud_elastic_ip.md +8 -8
- package/dist/docs/resources/cloud_link.md +36 -36
- package/dist/docs/resources/cluster.md +86 -86
- package/dist/docs/resources/cminstance.md +22 -22
- package/dist/docs/resources/code_base_integration.md +24 -24
- package/dist/docs/resources/container_registry.md +13 -13
- package/dist/docs/resources/crl.md +1 -1
- package/dist/docs/resources/data_type.md +16 -16
- package/dist/docs/resources/dc_cluster_group.md +4 -4
- package/dist/docs/resources/discovery.md +8 -259
- package/dist/docs/resources/dns_compliance_checks.md +1 -1
- package/dist/docs/resources/dns_domain.md +3 -3
- package/dist/docs/resources/endpoint.md +44 -44
- package/dist/docs/resources/enhanced_firewall_policy.md +51 -51
- package/dist/docs/resources/external_connector.md +42 -42
- package/dist/docs/resources/fast_acl.md +60 -166
- package/dist/docs/resources/fast_acl_rule.md +28 -28
- package/dist/docs/resources/filter_set.md +10 -10
- package/dist/docs/resources/fleet.md +160 -160
- package/dist/docs/resources/forward_proxy_policy.md +82 -82
- package/dist/docs/resources/forwarding_class.md +14 -14
- package/dist/docs/resources/gcp_vpc_site.md +152 -152
- package/dist/docs/resources/global_log_receiver.md +238 -238
- package/dist/docs/resources/healthcheck.md +17 -17
- package/dist/docs/resources/http_loadbalancer.md +1003 -1003
- package/dist/docs/resources/irule.md +5 -7
- package/dist/docs/resources/log_receiver.md +825 -44
- package/dist/docs/resources/malicious_user_mitigation.md +10 -10
- package/dist/docs/resources/nat_policy.md +86 -86
- package/dist/docs/resources/network_connector.md +31 -31
- package/dist/docs/resources/network_firewall.md +22 -22
- package/dist/docs/resources/network_interface.md +77 -77
- package/dist/docs/resources/network_policy.md +38 -217
- package/dist/docs/resources/network_policy_rule.md +21 -21
- package/dist/docs/resources/network_policy_view.md +65 -65
- package/dist/docs/resources/nfv_service.md +76 -76
- package/dist/docs/resources/nginx_service_discovery.md +10 -10
- package/dist/docs/resources/origin_pool.md +166 -166
- package/dist/docs/resources/policer.md +4 -4
- package/dist/docs/resources/policy_based_routing.md +28 -28
- package/dist/docs/resources/protocol_inspection.md +12 -12
- package/dist/docs/resources/protocol_policer.md +14 -14
- package/dist/docs/resources/proxy.md +111 -111
- package/dist/docs/resources/rate_limiter.md +15 -15
- package/dist/docs/resources/rate_limiter_policy.md +56 -56
- package/dist/docs/resources/route.md +183 -183
- package/dist/docs/resources/secret_management_access.md +68 -68
- package/dist/docs/resources/securemesh_site.md +1619 -258
- package/dist/docs/resources/segment.md +4 -4
- package/dist/docs/resources/sensitive_data_policy.md +9 -9
- package/dist/docs/resources/service_policy.md +175 -175
- package/dist/docs/resources/service_policy_rule.md +142 -142
- package/dist/docs/resources/site.md +381 -303
- package/dist/docs/resources/site_mesh_group.md +18 -18
- package/dist/docs/resources/subnet.md +17 -17
- package/dist/docs/resources/tcp_loadbalancer.md +130 -130
- package/dist/docs/resources/tenant_configuration.md +10 -10
- package/dist/docs/resources/trusted_ca_list.md +1 -1
- package/dist/docs/resources/tunnel.md +36 -36
- package/dist/docs/resources/udp_loadbalancer.md +59 -59
- package/dist/docs/resources/usb_policy.md +6 -6
- package/dist/docs/resources/user_identification.md +16 -16
- package/dist/docs/resources/virtual_host.md +225 -225
- package/dist/docs/resources/virtual_network.md +14 -14
- package/dist/docs/resources/virtual_site.md +3 -3
- package/dist/docs/resources/voltstack_site.md +141 -141
- package/dist/docs/resources/waf_exclusion_policy.md +17 -17
- package/dist/docs/resources/workload.md +327 -327
- package/dist/docs/resources/workload_flavor.md +3 -3
- package/dist/metadata/resource-metadata.json +1484 -942
- package/dist/types.d.ts +11 -0
- package/dist/types.d.ts.map +1 -1
- package/dist/types.js.map +1 -1
- package/package.json +1 -1
|
@@ -75,16 +75,16 @@ resource "f5xc_forward_proxy_policy" "example" {
|
|
|
75
75
|
### Spec Argument Reference
|
|
76
76
|
|
|
77
77
|
-> **One of the following:**
|
|
78
|
-
• <a id="allow-all"></a>[`allow_all`](#allow-all) - Optional Block<br>
|
|
79
|
-
<br><br>• <a id="allow-list"></a>[`allow_list`](#allow-list) - Optional Block<br>
|
|
80
|
-
<br><br>• <a id="deny-list"></a>[`deny_list`](#deny-list) - Optional Block<br>
|
|
78
|
+
• <a id="allow-all"></a>[`allow_all`](#allow-all) - Optional Block<br>Can be used for messages where no values are needed
|
|
79
|
+
<br><br>• <a id="allow-list"></a>[`allow_list`](#allow-list) - Optional Block<br>URL(s) and domains policy for forward proxy for a connection type (TLS or HTTP)<br>See [Allow List](#allow-list) below for details.
|
|
80
|
+
<br><br>• <a id="deny-list"></a>[`deny_list`](#deny-list) - Optional Block<br>URL(s) and domains policy for forward proxy for a connection type (TLS or HTTP)<br>See [Deny List](#deny-list) below for details.
|
|
81
81
|
<br><br>• <a id="rule-list"></a>[`rule_list`](#rule-list) - Optional Block<br>Custom Rule List. List of custom rules<br>See [Rule List](#rule-list) below for details.
|
|
82
82
|
|
|
83
83
|
-> **One of the following:**
|
|
84
|
-
• <a id="any-proxy"></a>[`any_proxy`](#any-proxy) - Optional Block<br>
|
|
85
|
-
<br><br>• <a id="drp-http-connect"></a>[`drp_http_connect`](#drp-http-connect) - Optional Block<br>
|
|
86
|
-
<br><br>• <a id="network-connector"></a>[`network_connector`](#network-connector) - Optional Block<br>
|
|
87
|
-
<br><br>• <a id="proxy-label-selector"></a>[`proxy_label_selector`](#proxy-label-selector) - Optional Block<br>
|
|
84
|
+
• <a id="any-proxy"></a>[`any_proxy`](#any-proxy) - Optional Block<br>Can be used for messages where no values are needed
|
|
85
|
+
<br><br>• <a id="drp-http-connect"></a>[`drp_http_connect`](#drp-http-connect) - Optional Block<br>Can be used for messages where no values are needed
|
|
86
|
+
<br><br>• <a id="network-connector"></a>[`network_connector`](#network-connector) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Network Connector](#network-connector) below for details.
|
|
87
|
+
<br><br>• <a id="proxy-label-selector"></a>[`proxy_label_selector`](#proxy-label-selector) - Optional Block<br>Type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects<br>See [Proxy Label Selector](#proxy-label-selector) below for details.
|
|
88
88
|
|
|
89
89
|
<a id="timeouts"></a>• [`timeouts`](#timeouts) - Optional Block<br>See [Timeouts](#timeouts) below for details.
|
|
90
90
|
|
|
@@ -100,13 +100,13 @@ In addition to all arguments above, the following attributes are exported:
|
|
|
100
100
|
|
|
101
101
|
An [`allow_list`](#allow-list) block supports the following:
|
|
102
102
|
|
|
103
|
-
<a id="allow-list-default-action-allow"></a>• [`default_action_allow`](#allow-list-default-action-allow) - Optional Block<br>
|
|
103
|
+
<a id="allow-list-default-action-allow"></a>• [`default_action_allow`](#allow-list-default-action-allow) - Optional Block<br>Can be used for messages where no values are needed
|
|
104
104
|
|
|
105
|
-
<a id="allow-list-default-action-deny"></a>• [`default_action_deny`](#allow-list-default-action-deny) - Optional Block<br>
|
|
105
|
+
<a id="allow-list-default-action-deny"></a>• [`default_action_deny`](#allow-list-default-action-deny) - Optional Block<br>Can be used for messages where no values are needed
|
|
106
106
|
|
|
107
|
-
<a id="allow-list-default-action-next-policy"></a>• [`default_action_next_policy`](#allow-list-default-action-next-policy) - Optional Block<br>
|
|
107
|
+
<a id="allow-list-default-action-next-policy"></a>• [`default_action_next_policy`](#allow-list-default-action-next-policy) - Optional Block<br>Can be used for messages where no values are needed
|
|
108
108
|
|
|
109
|
-
<a id="allow-list-dest-list"></a>• [`dest_list`](#allow-list-dest-list) - Optional Block<br>L4
|
|
109
|
+
<a id="allow-list-dest-list"></a>• [`dest_list`](#allow-list-dest-list) - Optional Block<br>L4 destinations for non-HTTP and non-TLS connections and TLS connections without SNI<br>See [Dest List](#allow-list-dest-list) below.
|
|
110
110
|
|
|
111
111
|
<a id="allow-list-http-list"></a>• [`http_list`](#allow-list-http-list) - Optional Block<br>HTTP URLs. URLs for HTTP connections<br>See [HTTP List](#allow-list-http-list) below.
|
|
112
112
|
|
|
@@ -118,7 +118,7 @@ A [`dest_list`](#allow-list-dest-list) block (within [`allow_list`](#allow-list)
|
|
|
118
118
|
|
|
119
119
|
<a id="allow-list-dest-list-ipv6-prefixes"></a>• [`ipv6_prefixes`](#allow-list-dest-list-ipv6-prefixes) - Optional List<br>IPv6 Prefixes. Destination IPv6 prefixes
|
|
120
120
|
|
|
121
|
-
<a id="allow-list-dest-list-port-ranges"></a>• [`port_ranges`](#allow-list-dest-list-port-ranges) - Optional String<br>
|
|
121
|
+
<a id="allow-list-dest-list-port-ranges"></a>• [`port_ranges`](#allow-list-dest-list-port-ranges) - Optional String<br>String containing a comma separated list of port ranges. Each port range consists of a single port or two ports separated by '-'
|
|
122
122
|
|
|
123
123
|
<a id="allow-list-dest-list-prefixes"></a>• [`prefixes`](#allow-list-dest-list-prefixes) - Optional List<br>IPv4 Prefixes. Destination IPv4 prefixes
|
|
124
124
|
|
|
@@ -126,41 +126,41 @@ A [`dest_list`](#allow-list-dest-list) block (within [`allow_list`](#allow-list)
|
|
|
126
126
|
|
|
127
127
|
A [`http_list`](#allow-list-http-list) block (within [`allow_list`](#allow-list)) supports the following:
|
|
128
128
|
|
|
129
|
-
<a id="allow-list-http-list-any-path"></a>• [`any_path`](#allow-list-http-list-any-path) - Optional Block<br>
|
|
129
|
+
<a id="allow-list-http-list-any-path"></a>• [`any_path`](#allow-list-http-list-any-path) - Optional Block<br>Can be used for messages where no values are needed
|
|
130
130
|
|
|
131
|
-
<a id="allow-list-http-list-exact-value"></a>• [`exact_value`](#allow-list-http-list-exact-value) - Optional String<br>Exact
|
|
131
|
+
<a id="allow-list-http-list-exact-value"></a>• [`exact_value`](#allow-list-http-list-exact-value) - Optional String<br>Exact domain name
|
|
132
132
|
|
|
133
|
-
<a id="allow-list-http-list-path-exact-value"></a>• [`path_exact_value`](#allow-list-http-list-path-exact-value) - Optional String<br>Exact Path
|
|
133
|
+
<a id="allow-list-http-list-path-exact-value"></a>• [`path_exact_value`](#allow-list-http-list-path-exact-value) - Optional String<br>Exact Path to match
|
|
134
134
|
|
|
135
|
-
<a id="allow-list-http-list-path-prefix-value"></a>• [`path_prefix_value`](#allow-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path
|
|
135
|
+
<a id="allow-list-http-list-path-prefix-value"></a>• [`path_prefix_value`](#allow-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
|
|
136
136
|
|
|
137
|
-
<a id="allow-list-http-list-path-regex-value"></a>• [`path_regex_value`](#allow-list-http-list-path-regex-value) - Optional String<br>
|
|
137
|
+
<a id="allow-list-http-list-path-regex-value"></a>• [`path_regex_value`](#allow-list-http-list-path-regex-value) - Optional String<br>Regular Expression value for the Path to match
|
|
138
138
|
|
|
139
|
-
<a id="allow-list-http-list-regex-value"></a>• [`regex_value`](#allow-list-http-list-regex-value) - Optional String<br>
|
|
139
|
+
<a id="allow-list-http-list-regex-value"></a>• [`regex_value`](#allow-list-http-list-regex-value) - Optional String<br>Regular Expression value for the domain name
|
|
140
140
|
|
|
141
|
-
<a id="allow-list-http-list-suffix-value"></a>• [`suffix_value`](#allow-list-http-list-suffix-value) - Optional String<br>Suffix
|
|
141
|
+
<a id="allow-list-http-list-suffix-value"></a>• [`suffix_value`](#allow-list-http-list-suffix-value) - Optional String<br>Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
|
|
142
142
|
|
|
143
143
|
#### Allow List TLS List
|
|
144
144
|
|
|
145
145
|
A [`tls_list`](#allow-list-tls-list) block (within [`allow_list`](#allow-list)) supports the following:
|
|
146
146
|
|
|
147
|
-
<a id="allow-list-tls-list-exact-value"></a>• [`exact_value`](#allow-list-tls-list-exact-value) - Optional String<br>Exact
|
|
147
|
+
<a id="allow-list-tls-list-exact-value"></a>• [`exact_value`](#allow-list-tls-list-exact-value) - Optional String<br>Exact domain name
|
|
148
148
|
|
|
149
|
-
<a id="allow-list-tls-list-regex-value"></a>• [`regex_value`](#allow-list-tls-list-regex-value) - Optional String<br>
|
|
149
|
+
<a id="allow-list-tls-list-regex-value"></a>• [`regex_value`](#allow-list-tls-list-regex-value) - Optional String<br>Regular Expression value for the domain name
|
|
150
150
|
|
|
151
|
-
<a id="allow-list-tls-list-suffix-value"></a>• [`suffix_value`](#allow-list-tls-list-suffix-value) - Optional String<br>Suffix
|
|
151
|
+
<a id="allow-list-tls-list-suffix-value"></a>• [`suffix_value`](#allow-list-tls-list-suffix-value) - Optional String<br>Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
|
|
152
152
|
|
|
153
153
|
#### Deny List
|
|
154
154
|
|
|
155
155
|
A [`deny_list`](#deny-list) block supports the following:
|
|
156
156
|
|
|
157
|
-
<a id="deny-list-default-action-allow"></a>• [`default_action_allow`](#deny-list-default-action-allow) - Optional Block<br>
|
|
157
|
+
<a id="deny-list-default-action-allow"></a>• [`default_action_allow`](#deny-list-default-action-allow) - Optional Block<br>Can be used for messages where no values are needed
|
|
158
158
|
|
|
159
|
-
<a id="deny-list-default-action-deny"></a>• [`default_action_deny`](#deny-list-default-action-deny) - Optional Block<br>
|
|
159
|
+
<a id="deny-list-default-action-deny"></a>• [`default_action_deny`](#deny-list-default-action-deny) - Optional Block<br>Can be used for messages where no values are needed
|
|
160
160
|
|
|
161
|
-
<a id="deny-list-default-action-next-policy"></a>• [`default_action_next_policy`](#deny-list-default-action-next-policy) - Optional Block<br>
|
|
161
|
+
<a id="deny-list-default-action-next-policy"></a>• [`default_action_next_policy`](#deny-list-default-action-next-policy) - Optional Block<br>Can be used for messages where no values are needed
|
|
162
162
|
|
|
163
|
-
<a id="deny-list-dest-list"></a>• [`dest_list`](#deny-list-dest-list) - Optional Block<br>L4
|
|
163
|
+
<a id="deny-list-dest-list"></a>• [`dest_list`](#deny-list-dest-list) - Optional Block<br>L4 destinations for non-HTTP and non-TLS connections and TLS connections without SNI<br>See [Dest List](#deny-list-dest-list) below.
|
|
164
164
|
|
|
165
165
|
<a id="deny-list-http-list"></a>• [`http_list`](#deny-list-http-list) - Optional Block<br>HTTP URLs. URLs for HTTP connections<br>See [HTTP List](#deny-list-http-list) below.
|
|
166
166
|
|
|
@@ -172,7 +172,7 @@ A [`dest_list`](#deny-list-dest-list) block (within [`deny_list`](#deny-list)) s
|
|
|
172
172
|
|
|
173
173
|
<a id="deny-list-dest-list-ipv6-prefixes"></a>• [`ipv6_prefixes`](#deny-list-dest-list-ipv6-prefixes) - Optional List<br>IPv6 Prefixes. Destination IPv6 prefixes
|
|
174
174
|
|
|
175
|
-
<a id="deny-list-dest-list-port-ranges"></a>• [`port_ranges`](#deny-list-dest-list-port-ranges) - Optional String<br>
|
|
175
|
+
<a id="deny-list-dest-list-port-ranges"></a>• [`port_ranges`](#deny-list-dest-list-port-ranges) - Optional String<br>String containing a comma separated list of port ranges. Each port range consists of a single port or two ports separated by '-'
|
|
176
176
|
|
|
177
177
|
<a id="deny-list-dest-list-prefixes"></a>• [`prefixes`](#deny-list-dest-list-prefixes) - Optional List<br>IPv4 Prefixes. Destination IPv4 prefixes
|
|
178
178
|
|
|
@@ -180,45 +180,45 @@ A [`dest_list`](#deny-list-dest-list) block (within [`deny_list`](#deny-list)) s
|
|
|
180
180
|
|
|
181
181
|
A [`http_list`](#deny-list-http-list) block (within [`deny_list`](#deny-list)) supports the following:
|
|
182
182
|
|
|
183
|
-
<a id="deny-list-http-list-any-path"></a>• [`any_path`](#deny-list-http-list-any-path) - Optional Block<br>
|
|
183
|
+
<a id="deny-list-http-list-any-path"></a>• [`any_path`](#deny-list-http-list-any-path) - Optional Block<br>Can be used for messages where no values are needed
|
|
184
184
|
|
|
185
|
-
<a id="deny-list-http-list-exact-value"></a>• [`exact_value`](#deny-list-http-list-exact-value) - Optional String<br>Exact
|
|
185
|
+
<a id="deny-list-http-list-exact-value"></a>• [`exact_value`](#deny-list-http-list-exact-value) - Optional String<br>Exact domain name
|
|
186
186
|
|
|
187
|
-
<a id="deny-list-http-list-path-exact-value"></a>• [`path_exact_value`](#deny-list-http-list-path-exact-value) - Optional String<br>Exact Path
|
|
187
|
+
<a id="deny-list-http-list-path-exact-value"></a>• [`path_exact_value`](#deny-list-http-list-path-exact-value) - Optional String<br>Exact Path to match
|
|
188
188
|
|
|
189
|
-
<a id="deny-list-http-list-path-prefix-value"></a>• [`path_prefix_value`](#deny-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path
|
|
189
|
+
<a id="deny-list-http-list-path-prefix-value"></a>• [`path_prefix_value`](#deny-list-http-list-path-prefix-value) - Optional String<br>Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
|
|
190
190
|
|
|
191
|
-
<a id="deny-list-http-list-path-regex-value"></a>• [`path_regex_value`](#deny-list-http-list-path-regex-value) - Optional String<br>
|
|
191
|
+
<a id="deny-list-http-list-path-regex-value"></a>• [`path_regex_value`](#deny-list-http-list-path-regex-value) - Optional String<br>Regular Expression value for the Path to match
|
|
192
192
|
|
|
193
|
-
<a id="deny-list-http-list-regex-value"></a>• [`regex_value`](#deny-list-http-list-regex-value) - Optional String<br>
|
|
193
|
+
<a id="deny-list-http-list-regex-value"></a>• [`regex_value`](#deny-list-http-list-regex-value) - Optional String<br>Regular Expression value for the domain name
|
|
194
194
|
|
|
195
|
-
<a id="deny-list-http-list-suffix-value"></a>• [`suffix_value`](#deny-list-http-list-suffix-value) - Optional String<br>Suffix
|
|
195
|
+
<a id="deny-list-http-list-suffix-value"></a>• [`suffix_value`](#deny-list-http-list-suffix-value) - Optional String<br>Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
|
|
196
196
|
|
|
197
197
|
#### Deny List TLS List
|
|
198
198
|
|
|
199
199
|
A [`tls_list`](#deny-list-tls-list) block (within [`deny_list`](#deny-list)) supports the following:
|
|
200
200
|
|
|
201
|
-
<a id="deny-list-tls-list-exact-value"></a>• [`exact_value`](#deny-list-tls-list-exact-value) - Optional String<br>Exact
|
|
201
|
+
<a id="deny-list-tls-list-exact-value"></a>• [`exact_value`](#deny-list-tls-list-exact-value) - Optional String<br>Exact domain name
|
|
202
202
|
|
|
203
|
-
<a id="deny-list-tls-list-regex-value"></a>• [`regex_value`](#deny-list-tls-list-regex-value) - Optional String<br>
|
|
203
|
+
<a id="deny-list-tls-list-regex-value"></a>• [`regex_value`](#deny-list-tls-list-regex-value) - Optional String<br>Regular Expression value for the domain name
|
|
204
204
|
|
|
205
|
-
<a id="deny-list-tls-list-suffix-value"></a>• [`suffix_value`](#deny-list-tls-list-suffix-value) - Optional String<br>Suffix
|
|
205
|
+
<a id="deny-list-tls-list-suffix-value"></a>• [`suffix_value`](#deny-list-tls-list-suffix-value) - Optional String<br>Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
|
|
206
206
|
|
|
207
207
|
#### Network Connector
|
|
208
208
|
|
|
209
209
|
A [`network_connector`](#network-connector) block supports the following:
|
|
210
210
|
|
|
211
|
-
<a id="network-connector-name"></a>• [`name`](#network-connector-name) - Optional String<br>
|
|
211
|
+
<a id="network-connector-name"></a>• [`name`](#network-connector-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
|
|
212
212
|
|
|
213
|
-
<a id="network-connector-namespace"></a>• [`namespace`](#network-connector-namespace) - Optional String<br>
|
|
213
|
+
<a id="network-connector-namespace"></a>• [`namespace`](#network-connector-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
|
|
214
214
|
|
|
215
|
-
<a id="network-connector-tenant"></a>• [`tenant`](#network-connector-tenant) - Optional String<br>
|
|
215
|
+
<a id="network-connector-tenant"></a>• [`tenant`](#network-connector-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
|
|
216
216
|
|
|
217
217
|
#### Proxy Label Selector
|
|
218
218
|
|
|
219
219
|
A [`proxy_label_selector`](#proxy-label-selector) block supports the following:
|
|
220
220
|
|
|
221
|
-
<a id="proxy-label-selector-expressions"></a>• [`expressions`](#proxy-label-selector-expressions) - Optional List<br>
|
|
221
|
+
<a id="proxy-label-selector-expressions"></a>• [`expressions`](#proxy-label-selector-expressions) - Optional List<br>Expressions contains the Kubernetes style label expression for selections
|
|
222
222
|
|
|
223
223
|
#### Rule List
|
|
224
224
|
|
|
@@ -230,35 +230,35 @@ A [`rule_list`](#rule-list) block supports the following:
|
|
|
230
230
|
|
|
231
231
|
A [`rules`](#rule-list-rules) block (within [`rule_list`](#rule-list)) supports the following:
|
|
232
232
|
|
|
233
|
-
<a id="rule-list-rules-action"></a>• [`action`](#rule-list-rules-action) - Optional String Defaults to `DENY`<br>Possible values are `DENY`, `ALLOW`, `NEXT_POLICY`<br>[Enum: DENY|ALLOW|NEXT_POLICY]
|
|
233
|
+
<a id="rule-list-rules-action"></a>• [`action`](#rule-list-rules-action) - Optional String Defaults to `DENY`<br>Possible values are `DENY`, `ALLOW`, `NEXT_POLICY`<br>[Enum: DENY|ALLOW|NEXT_POLICY] The rule action determines the disposition of the input request API. If a policy matches a rule with an ALLOW action, the processing of the request proceeds forward. If it matches a rule with a DENY action, the processing of the request is terminated and an appropriate message/code returned to
|
|
234
234
|
|
|
235
|
-
<a id="rule-list-rules-all-destinations"></a>• [`all_destinations`](#rule-list-rules-all-destinations) - Optional Block<br>
|
|
235
|
+
<a id="rule-list-rules-all-destinations"></a>• [`all_destinations`](#rule-list-rules-all-destinations) - Optional Block<br>Can be used for messages where no values are needed
|
|
236
236
|
|
|
237
|
-
<a id="rule-list-rules-all-sources"></a>• [`all_sources`](#rule-list-rules-all-sources) - Optional Block<br>
|
|
237
|
+
<a id="rule-list-rules-all-sources"></a>• [`all_sources`](#rule-list-rules-all-sources) - Optional Block<br>Can be used for messages where no values are needed
|
|
238
238
|
|
|
239
|
-
<a id="rule-list-rules-dst-asn-list"></a>• [`dst_asn_list`](#rule-list-rules-dst-asn-list) - Optional Block<br>
|
|
239
|
+
<a id="rule-list-rules-dst-asn-list"></a>• [`dst_asn_list`](#rule-list-rules-dst-asn-list) - Optional Block<br>Unordered set of RFC 6793 defined 4-byte AS numbers that can be used to create allow or deny lists for use in network policy or service policy. It can be used to create the allow list only for DNS Load Balancer<br>See [Dst Asn List](#rule-list-rules-dst-asn-list) below.
|
|
240
240
|
|
|
241
|
-
<a id="rule-list-rules-dst-asn-set"></a>• [`dst_asn_set`](#rule-list-rules-dst-asn-set) - Optional Block<br>
|
|
241
|
+
<a id="rule-list-rules-dst-asn-set"></a>• [`dst_asn_set`](#rule-list-rules-dst-asn-set) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Dst Asn Set](#rule-list-rules-dst-asn-set) below.
|
|
242
242
|
|
|
243
|
-
<a id="rule-list-rules-dst-ip-prefix-set"></a>• [`dst_ip_prefix_set`](#rule-list-rules-dst-ip-prefix-set) - Optional Block<br>
|
|
243
|
+
<a id="rule-list-rules-dst-ip-prefix-set"></a>• [`dst_ip_prefix_set`](#rule-list-rules-dst-ip-prefix-set) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Dst IP Prefix Set](#rule-list-rules-dst-ip-prefix-set) below.
|
|
244
244
|
|
|
245
|
-
<a id="rule-list-rules-dst-label-selector"></a>• [`dst_label_selector`](#rule-list-rules-dst-label-selector) - Optional Block<br>
|
|
245
|
+
<a id="rule-list-rules-dst-label-selector"></a>• [`dst_label_selector`](#rule-list-rules-dst-label-selector) - Optional Block<br>Type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects<br>See [Dst Label Selector](#rule-list-rules-dst-label-selector) below.
|
|
246
246
|
|
|
247
|
-
<a id="rule-list-rules-dst-prefix-list"></a>• [`dst_prefix_list`](#rule-list-rules-dst-prefix-list) - Optional Block<br>
|
|
247
|
+
<a id="rule-list-rules-dst-prefix-list"></a>• [`dst_prefix_list`](#rule-list-rules-dst-prefix-list) - Optional Block<br>List of IPv4 prefixes that represent an endpoint<br>See [Dst Prefix List](#rule-list-rules-dst-prefix-list) below.
|
|
248
248
|
|
|
249
249
|
<a id="rule-list-rules-http-list"></a>• [`http_list`](#rule-list-rules-http-list) - Optional Block<br>URLListType<br>See [HTTP List](#rule-list-rules-http-list) below.
|
|
250
250
|
|
|
251
|
-
<a id="rule-list-rules-ip-prefix-set"></a>• [`ip_prefix_set`](#rule-list-rules-ip-prefix-set) - Optional Block<br>
|
|
251
|
+
<a id="rule-list-rules-ip-prefix-set"></a>• [`ip_prefix_set`](#rule-list-rules-ip-prefix-set) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [IP Prefix Set](#rule-list-rules-ip-prefix-set) below.
|
|
252
252
|
|
|
253
|
-
<a id="rule-list-rules-label-selector"></a>• [`label_selector`](#rule-list-rules-label-selector) - Optional Block<br>
|
|
253
|
+
<a id="rule-list-rules-label-selector"></a>• [`label_selector`](#rule-list-rules-label-selector) - Optional Block<br>Type can be used to establish a 'selector reference' from one object(called selector) to a set of other objects(called selectees) based on the value of expresssions. A label selector is a label query over a set of resources. An empty label selector matches all objects<br>See [Label Selector](#rule-list-rules-label-selector) below.
|
|
254
254
|
|
|
255
|
-
<a id="rule-list-rules-metadata"></a>• [`metadata`](#rule-list-rules-metadata) - Optional Block<br>
|
|
255
|
+
<a id="rule-list-rules-metadata"></a>• [`metadata`](#rule-list-rules-metadata) - Optional Block<br>MessageMetaType is metadata (common attributes) of a message that only certain messages have. This information is propagated to the metadata of a child object that gets created from the containing message during view processing. The information in this type can be specified by user during create<br>See [Metadata](#rule-list-rules-metadata) below.
|
|
256
256
|
|
|
257
|
-
<a id="rule-list-rules-no-http-connect-port"></a>• [`no_http_connect_port`](#rule-list-rules-no-http-connect-port) - Optional Block<br>
|
|
257
|
+
<a id="rule-list-rules-no-http-connect-port"></a>• [`no_http_connect_port`](#rule-list-rules-no-http-connect-port) - Optional Block<br>Can be used for messages where no values are needed
|
|
258
258
|
|
|
259
|
-
<a id="rule-list-rules-port-matcher"></a>• [`port_matcher`](#rule-list-rules-port-matcher) - Optional Block<br>Port
|
|
259
|
+
<a id="rule-list-rules-port-matcher"></a>• [`port_matcher`](#rule-list-rules-port-matcher) - Optional Block<br>Port matcher specifies a list of port ranges as match criteria. The match is considered successful if the input port falls within any of the port ranges. The result of the match is inverted if invert_matcher is true<br>See [Port Matcher](#rule-list-rules-port-matcher) below.
|
|
260
260
|
|
|
261
|
-
<a id="rule-list-rules-prefix-list"></a>• [`prefix_list`](#rule-list-rules-prefix-list) - Optional Block<br>
|
|
261
|
+
<a id="rule-list-rules-prefix-list"></a>• [`prefix_list`](#rule-list-rules-prefix-list) - Optional Block<br>List of IPv4 prefixes that represent an endpoint<br>See [Prefix List](#rule-list-rules-prefix-list) below.
|
|
262
262
|
|
|
263
263
|
<a id="rule-list-rules-tls-list"></a>• [`tls_list`](#rule-list-rules-tls-list) - Optional Block<br>DomainListType<br>See [TLS List](#rule-list-rules-tls-list) below.
|
|
264
264
|
|
|
@@ -268,39 +268,39 @@ A [`rules`](#rule-list-rules) block (within [`rule_list`](#rule-list)) supports
|
|
|
268
268
|
|
|
269
269
|
A [`dst_asn_list`](#rule-list-rules-dst-asn-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
270
270
|
|
|
271
|
-
<a id="rule-list-rules-dst-asn-list-as-numbers"></a>• [`as_numbers`](#rule-list-rules-dst-asn-list-as-numbers) - Optional List<br>
|
|
271
|
+
<a id="rule-list-rules-dst-asn-list-as-numbers"></a>• [`as_numbers`](#rule-list-rules-dst-asn-list-as-numbers) - Optional List<br>Unordered set of RFC 6793 defined 4-byte AS numbers that can be used to create allow or deny lists for use in network policy or service policy. It can be used to create the allow list only for DNS Load Balancer
|
|
272
272
|
|
|
273
273
|
#### Rule List Rules Dst Asn Set
|
|
274
274
|
|
|
275
275
|
A [`dst_asn_set`](#rule-list-rules-dst-asn-set) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
276
276
|
|
|
277
|
-
<a id="rule-list-rules-dst-asn-set-name"></a>• [`name`](#rule-list-rules-dst-asn-set-name) - Optional String<br>
|
|
277
|
+
<a id="rule-list-rules-dst-asn-set-name"></a>• [`name`](#rule-list-rules-dst-asn-set-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
|
|
278
278
|
|
|
279
|
-
<a id="rule-list-rules-dst-asn-set-namespace"></a>• [`namespace`](#rule-list-rules-dst-asn-set-namespace) - Optional String<br>
|
|
279
|
+
<a id="rule-list-rules-dst-asn-set-namespace"></a>• [`namespace`](#rule-list-rules-dst-asn-set-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
|
|
280
280
|
|
|
281
|
-
<a id="rule-list-rules-dst-asn-set-tenant"></a>• [`tenant`](#rule-list-rules-dst-asn-set-tenant) - Optional String<br>
|
|
281
|
+
<a id="rule-list-rules-dst-asn-set-tenant"></a>• [`tenant`](#rule-list-rules-dst-asn-set-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
|
|
282
282
|
|
|
283
283
|
#### Rule List Rules Dst IP Prefix Set
|
|
284
284
|
|
|
285
285
|
A [`dst_ip_prefix_set`](#rule-list-rules-dst-ip-prefix-set) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
286
286
|
|
|
287
|
-
<a id="rule-list-rules-dst-ip-prefix-set-name"></a>• [`name`](#rule-list-rules-dst-ip-prefix-set-name) - Optional String<br>
|
|
287
|
+
<a id="rule-list-rules-dst-ip-prefix-set-name"></a>• [`name`](#rule-list-rules-dst-ip-prefix-set-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
|
|
288
288
|
|
|
289
|
-
<a id="namespace-098663"></a>• [`namespace`](#namespace-098663) - Optional String<br>
|
|
289
|
+
<a id="namespace-098663"></a>• [`namespace`](#namespace-098663) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
|
|
290
290
|
|
|
291
|
-
<a id="tenant-047089"></a>• [`tenant`](#tenant-047089) - Optional String<br>
|
|
291
|
+
<a id="tenant-047089"></a>• [`tenant`](#tenant-047089) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
|
|
292
292
|
|
|
293
293
|
#### Rule List Rules Dst Label Selector
|
|
294
294
|
|
|
295
295
|
A [`dst_label_selector`](#rule-list-rules-dst-label-selector) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
296
296
|
|
|
297
|
-
<a id="expressions-229662"></a>• [`expressions`](#expressions-229662) - Optional List<br>
|
|
297
|
+
<a id="expressions-229662"></a>• [`expressions`](#expressions-229662) - Optional List<br>Expressions contains the Kubernetes style label expression for selections
|
|
298
298
|
|
|
299
299
|
#### Rule List Rules Dst Prefix List
|
|
300
300
|
|
|
301
301
|
A [`dst_prefix_list`](#rule-list-rules-dst-prefix-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
302
302
|
|
|
303
|
-
<a id="prefixes-d0d633"></a>• [`prefixes`](#prefixes-d0d633) - Optional List<br>
|
|
303
|
+
<a id="prefixes-d0d633"></a>• [`prefixes`](#prefixes-d0d633) - Optional List<br>List of IPv4 prefixes that represent an endpoint
|
|
304
304
|
|
|
305
305
|
#### Rule List Rules HTTP List
|
|
306
306
|
|
|
@@ -312,35 +312,35 @@ A [`http_list`](#rule-list-rules-http-list) block (within [`rule_list.rules`](#r
|
|
|
312
312
|
|
|
313
313
|
A [`http_list`](#rule-list-rules-http-list-http-list) block (within [`rule_list.rules.http_list`](#rule-list-rules-http-list)) supports the following:
|
|
314
314
|
|
|
315
|
-
<a id="path-5eabfe"></a>• [`any_path`](#path-5eabfe) - Optional Block<br>
|
|
315
|
+
<a id="path-5eabfe"></a>• [`any_path`](#path-5eabfe) - Optional Block<br>Can be used for messages where no values are needed
|
|
316
316
|
|
|
317
|
-
<a id="value-d667cb"></a>• [`exact_value`](#value-d667cb) - Optional String<br>Exact
|
|
317
|
+
<a id="value-d667cb"></a>• [`exact_value`](#value-d667cb) - Optional String<br>Exact domain name
|
|
318
318
|
|
|
319
|
-
<a id="value-511ae9"></a>• [`path_exact_value`](#value-511ae9) - Optional String<br>Exact Path
|
|
319
|
+
<a id="value-511ae9"></a>• [`path_exact_value`](#value-511ae9) - Optional String<br>Exact Path to match
|
|
320
320
|
|
|
321
|
-
<a id="value-cd7319"></a>• [`path_prefix_value`](#value-cd7319) - Optional String<br>Prefix of Path
|
|
321
|
+
<a id="value-cd7319"></a>• [`path_prefix_value`](#value-cd7319) - Optional String<br>Prefix of Path e.g '/abc/xyz' will match '/abc/xyz/.*'
|
|
322
322
|
|
|
323
|
-
<a id="value-931da3"></a>• [`path_regex_value`](#value-931da3) - Optional String<br>
|
|
323
|
+
<a id="value-931da3"></a>• [`path_regex_value`](#value-931da3) - Optional String<br>Regular Expression value for the Path to match
|
|
324
324
|
|
|
325
|
-
<a id="value-663d1f"></a>• [`regex_value`](#value-663d1f) - Optional String<br>
|
|
325
|
+
<a id="value-663d1f"></a>• [`regex_value`](#value-663d1f) - Optional String<br>Regular Expression value for the domain name
|
|
326
326
|
|
|
327
|
-
<a id="value-acf087"></a>• [`suffix_value`](#value-acf087) - Optional String<br>Suffix
|
|
327
|
+
<a id="value-acf087"></a>• [`suffix_value`](#value-acf087) - Optional String<br>Suffix of domain names e.g 'xyz.com' will match '*.xyz.com'
|
|
328
328
|
|
|
329
329
|
#### Rule List Rules IP Prefix Set
|
|
330
330
|
|
|
331
331
|
An [`ip_prefix_set`](#rule-list-rules-ip-prefix-set) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
332
332
|
|
|
333
|
-
<a id="rule-list-rules-ip-prefix-set-name"></a>• [`name`](#rule-list-rules-ip-prefix-set-name) - Optional String<br>
|
|
333
|
+
<a id="rule-list-rules-ip-prefix-set-name"></a>• [`name`](#rule-list-rules-ip-prefix-set-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
|
|
334
334
|
|
|
335
|
-
<a id="rule-list-rules-ip-prefix-set-namespace"></a>• [`namespace`](#rule-list-rules-ip-prefix-set-namespace) - Optional String<br>
|
|
335
|
+
<a id="rule-list-rules-ip-prefix-set-namespace"></a>• [`namespace`](#rule-list-rules-ip-prefix-set-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
|
|
336
336
|
|
|
337
|
-
<a id="rule-list-rules-ip-prefix-set-tenant"></a>• [`tenant`](#rule-list-rules-ip-prefix-set-tenant) - Optional String<br>
|
|
337
|
+
<a id="rule-list-rules-ip-prefix-set-tenant"></a>• [`tenant`](#rule-list-rules-ip-prefix-set-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
|
|
338
338
|
|
|
339
339
|
#### Rule List Rules Label Selector
|
|
340
340
|
|
|
341
341
|
A [`label_selector`](#rule-list-rules-label-selector) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
342
342
|
|
|
343
|
-
<a id="expressions-8dfad5"></a>• [`expressions`](#expressions-8dfad5) - Optional List<br>
|
|
343
|
+
<a id="expressions-8dfad5"></a>• [`expressions`](#expressions-8dfad5) - Optional List<br>Expressions contains the Kubernetes style label expression for selections
|
|
344
344
|
|
|
345
345
|
#### Rule List Rules Metadata
|
|
346
346
|
|
|
@@ -348,7 +348,7 @@ A [`metadata`](#rule-list-rules-metadata) block (within [`rule_list.rules`](#rul
|
|
|
348
348
|
|
|
349
349
|
<a id="spec-118a99"></a>• [`description_spec`](#spec-118a99) - Optional String<br>Description. Human readable description
|
|
350
350
|
|
|
351
|
-
<a id="rule-list-rules-metadata-name"></a>• [`name`](#rule-list-rules-metadata-name) - Optional String<br>Name
|
|
351
|
+
<a id="rule-list-rules-metadata-name"></a>• [`name`](#rule-list-rules-metadata-name) - Optional String<br>Name of the message. The value of name has to follow DNS-1035 format
|
|
352
352
|
|
|
353
353
|
#### Rule List Rules Port Matcher
|
|
354
354
|
|
|
@@ -356,13 +356,13 @@ A [`port_matcher`](#rule-list-rules-port-matcher) block (within [`rule_list.rule
|
|
|
356
356
|
|
|
357
357
|
<a id="matcher-754775"></a>• [`invert_matcher`](#matcher-754775) - Optional Bool<br>Invert Port Matcher. Invert the match result
|
|
358
358
|
|
|
359
|
-
<a id="rule-list-rules-port-matcher-ports"></a>• [`ports`](#rule-list-rules-port-matcher-ports) - Optional List<br>
|
|
359
|
+
<a id="rule-list-rules-port-matcher-ports"></a>• [`ports`](#rule-list-rules-port-matcher-ports) - Optional List<br>List of strings, each of which is a single port value or a tuple of start and end port values separated by '-'. The start and end values are considered to be part of the range
|
|
360
360
|
|
|
361
361
|
#### Rule List Rules Prefix List
|
|
362
362
|
|
|
363
363
|
A [`prefix_list`](#rule-list-rules-prefix-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
364
364
|
|
|
365
|
-
<a id="rule-list-rules-prefix-list-prefixes"></a>• [`prefixes`](#rule-list-rules-prefix-list-prefixes) - Optional List<br>
|
|
365
|
+
<a id="rule-list-rules-prefix-list-prefixes"></a>• [`prefixes`](#rule-list-rules-prefix-list-prefixes) - Optional List<br>List of IPv4 prefixes that represent an endpoint
|
|
366
366
|
|
|
367
367
|
#### Rule List Rules TLS List
|
|
368
368
|
|
|
@@ -374,17 +374,17 @@ A [`tls_list`](#rule-list-rules-tls-list) block (within [`rule_list.rules`](#rul
|
|
|
374
374
|
|
|
375
375
|
A [`tls_list`](#rule-list-rules-tls-list-tls-list) block (within [`rule_list.rules.tls_list`](#rule-list-rules-tls-list)) supports the following:
|
|
376
376
|
|
|
377
|
-
<a id="value-e81ff3"></a>• [`exact_value`](#value-e81ff3) - Optional String<br>Exact
|
|
377
|
+
<a id="value-e81ff3"></a>• [`exact_value`](#value-e81ff3) - Optional String<br>Exact domain name
|
|
378
378
|
|
|
379
|
-
<a id="value-d11673"></a>• [`regex_value`](#value-d11673) - Optional String<br>
|
|
379
|
+
<a id="value-d11673"></a>• [`regex_value`](#value-d11673) - Optional String<br>Regular Expression value for the domain name
|
|
380
380
|
|
|
381
|
-
<a id="value-4d4de2"></a>• [`suffix_value`](#value-4d4de2) - Optional String<br>Suffix
|
|
381
|
+
<a id="value-4d4de2"></a>• [`suffix_value`](#value-4d4de2) - Optional String<br>Suffix of domain name e.g 'xyz.com' will match '*.xyz.com' and 'xyz.com'
|
|
382
382
|
|
|
383
383
|
#### Rule List Rules URL Category List
|
|
384
384
|
|
|
385
385
|
An [`url_category_list`](#rule-list-rules-url-category-list) block (within [`rule_list.rules`](#rule-list-rules)) supports the following:
|
|
386
386
|
|
|
387
|
-
<a id="categories-b6723b"></a>• [`url_categories`](#categories-b6723b) - Optional List Defaults to `UNCATEGORIZED`<br>Possible values are `UNCATEGORIZED`, `REAL_ESTATE`, `COMPUTER_AND_INTERNET_SECURITY`, `FINANCIAL_SERVICES`, `BUSINESS_AND_ECONOMY`, `COMPUTER_AND_INTERNET_INFO`, `AUCTIONS`, `SHOPPING`, `CULT_AND_OCCULT`, `TRAVEL`, `ABUSED_DRUGS`, `ADULT_AND_PORNOGRAPHY`, `HOME_AND_GARDEN`, `MILITARY`, `SOCIAL_NETWORKING`, `DEAD_SITES`, `INDIVIDUAL_STOCK_ADVICE_AND_TOOLS`, `TRAINING_AND_TOOLS`, `DATING`, `SEX_EDUCATION`, `RELIGION`, `ENTERTAINMENT_AND_ARTS`, `PERSONAL_SITES_AND_BLOGS`, `LEGAL`, `LOCAL_INFORMATION`, `STREAMING_MEDIA`, `JOB_SEARCH`, `GAMBLING`, `TRANSLATION`, `REFERENCE_AND_RESEARCH`, `SHAREWARE_AND_FREEWARE`, `PEER_TO_PEER`, `MARIJUANA`, `HACKING`, `GAMES`, `PHILOSOPHY_AND_POLITICAL_ADVOCACY`, `WEAPONS`, `PAY_TO_SURF`, `HUNTING_AND_FISHING`, `SOCIETY`, `EDUCATIONAL_INSTITUTIONS`, `ONLINE_GREETING_CARDS`, `SPORTS`, `SWIMSUITS_AND_INTIMATE_APPAREL`, `QUESTIONABLE`, `KIDS`, `HATE_AND_RACISM`, `PERSONAL_STORAGE`, `VIOLENCE`, `KEYLOGGERS_AND_MONITORING`, `SEARCH_ENGINES`, `INTERNET_PORTALS`, `WEB_ADVERTISEMENTS`, `CHEATING`, `GROSS`, `WEB_BASED_EMAIL`, `MALWARE_SITES`, `PHISHING_AND_OTHER_FRAUDS`, `PROXY_AVOIDANCE_AND_ANONYMIZERS`, `SPYWARE_AND_ADWARE`, `MUSIC`, `GOVERNMENT`, `NUDITY`, `NEWS_AND_MEDIA`, `ILLEGAL`, `CONTENT_DELIVERY_NETWORKS`, `INTERNET_COMMUNICATIONS`, `BOT_NETS`, `ABORTION`, `HEALTH_AND_MEDICINE`, `CONFIRMED_SPAM_SOURCES`, `SPAM_URLS`, `UNCONFIRMED_SPAM_SOURCES`, `OPEN_HTTP_PROXIES`, `DYNAMICALLY_GENERATED_CONTENT`, `PARKED_DOMAINS`, `ALCOHOL_AND_TOBACCO`, `PRIVATE_IP_ADDRESSES`, `IMAGE_AND_VIDEO_SEARCH`, `FASHION_AND_BEAUTY`, `RECREATION_AND_HOBBIES`, `MOTOR_VEHICLES`, `WEB_HOSTING`<br>[Enum: UNCATEGORIZED|REAL_ESTATE|COMPUTER_AND_INTERNET_SECURITY|FINANCIAL_SERVICES|BUSINESS_AND_ECONOMY|COMPUTER_AND_INTERNET_INFO|AUCTIONS|SHOPPING|CULT_AND_OCCULT|TRAVEL|ABUSED_DRUGS|ADULT_AND_PORNOGRAPHY|HOME_AND_GARDEN|MILITARY|SOCIAL_NETWORKING|DEAD_SITES|INDIVIDUAL_STOCK_ADVICE_AND_TOOLS|TRAINING_AND_TOOLS|DATING|SEX_EDUCATION|RELIGION|ENTERTAINMENT_AND_ARTS|PERSONAL_SITES_AND_BLOGS|LEGAL|LOCAL_INFORMATION|STREAMING_MEDIA|JOB_SEARCH|GAMBLING|TRANSLATION|REFERENCE_AND_RESEARCH|SHAREWARE_AND_FREEWARE|PEER_TO_PEER|MARIJUANA|HACKING|GAMES|PHILOSOPHY_AND_POLITICAL_ADVOCACY|WEAPONS|PAY_TO_SURF|HUNTING_AND_FISHING|SOCIETY|EDUCATIONAL_INSTITUTIONS|ONLINE_GREETING_CARDS|SPORTS|SWIMSUITS_AND_INTIMATE_APPAREL|QUESTIONABLE|KIDS|HATE_AND_RACISM|PERSONAL_STORAGE|VIOLENCE|KEYLOGGERS_AND_MONITORING|SEARCH_ENGINES|INTERNET_PORTALS|WEB_ADVERTISEMENTS|CHEATING|GROSS|WEB_BASED_EMAIL|MALWARE_SITES|PHISHING_AND_OTHER_FRAUDS|PROXY_AVOIDANCE_AND_ANONYMIZERS|SPYWARE_AND_ADWARE|MUSIC|GOVERNMENT|NUDITY|NEWS_AND_MEDIA|ILLEGAL|CONTENT_DELIVERY_NETWORKS|INTERNET_COMMUNICATIONS|BOT_NETS|ABORTION|HEALTH_AND_MEDICINE|CONFIRMED_SPAM_SOURCES|SPAM_URLS|UNCONFIRMED_SPAM_SOURCES|OPEN_HTTP_PROXIES|DYNAMICALLY_GENERATED_CONTENT|PARKED_DOMAINS|ALCOHOL_AND_TOBACCO|PRIVATE_IP_ADDRESSES|IMAGE_AND_VIDEO_SEARCH|FASHION_AND_BEAUTY|RECREATION_AND_HOBBIES|MOTOR_VEHICLES|WEB_HOSTING]
|
|
387
|
+
<a id="categories-b6723b"></a>• [`url_categories`](#categories-b6723b) - Optional List Defaults to `UNCATEGORIZED`<br>Possible values are `UNCATEGORIZED`, `REAL_ESTATE`, `COMPUTER_AND_INTERNET_SECURITY`, `FINANCIAL_SERVICES`, `BUSINESS_AND_ECONOMY`, `COMPUTER_AND_INTERNET_INFO`, `AUCTIONS`, `SHOPPING`, `CULT_AND_OCCULT`, `TRAVEL`, `ABUSED_DRUGS`, `ADULT_AND_PORNOGRAPHY`, `HOME_AND_GARDEN`, `MILITARY`, `SOCIAL_NETWORKING`, `DEAD_SITES`, `INDIVIDUAL_STOCK_ADVICE_AND_TOOLS`, `TRAINING_AND_TOOLS`, `DATING`, `SEX_EDUCATION`, `RELIGION`, `ENTERTAINMENT_AND_ARTS`, `PERSONAL_SITES_AND_BLOGS`, `LEGAL`, `LOCAL_INFORMATION`, `STREAMING_MEDIA`, `JOB_SEARCH`, `GAMBLING`, `TRANSLATION`, `REFERENCE_AND_RESEARCH`, `SHAREWARE_AND_FREEWARE`, `PEER_TO_PEER`, `MARIJUANA`, `HACKING`, `GAMES`, `PHILOSOPHY_AND_POLITICAL_ADVOCACY`, `WEAPONS`, `PAY_TO_SURF`, `HUNTING_AND_FISHING`, `SOCIETY`, `EDUCATIONAL_INSTITUTIONS`, `ONLINE_GREETING_CARDS`, `SPORTS`, `SWIMSUITS_AND_INTIMATE_APPAREL`, `QUESTIONABLE`, `KIDS`, `HATE_AND_RACISM`, `PERSONAL_STORAGE`, `VIOLENCE`, `KEYLOGGERS_AND_MONITORING`, `SEARCH_ENGINES`, `INTERNET_PORTALS`, `WEB_ADVERTISEMENTS`, `CHEATING`, `GROSS`, `WEB_BASED_EMAIL`, `MALWARE_SITES`, `PHISHING_AND_OTHER_FRAUDS`, `PROXY_AVOIDANCE_AND_ANONYMIZERS`, `SPYWARE_AND_ADWARE`, `MUSIC`, `GOVERNMENT`, `NUDITY`, `NEWS_AND_MEDIA`, `ILLEGAL`, `CONTENT_DELIVERY_NETWORKS`, `INTERNET_COMMUNICATIONS`, `BOT_NETS`, `ABORTION`, `HEALTH_AND_MEDICINE`, `CONFIRMED_SPAM_SOURCES`, `SPAM_URLS`, `UNCONFIRMED_SPAM_SOURCES`, `OPEN_HTTP_PROXIES`, `DYNAMICALLY_GENERATED_CONTENT`, `PARKED_DOMAINS`, `ALCOHOL_AND_TOBACCO`, `PRIVATE_IP_ADDRESSES`, `IMAGE_AND_VIDEO_SEARCH`, `FASHION_AND_BEAUTY`, `RECREATION_AND_HOBBIES`, `MOTOR_VEHICLES`, `WEB_HOSTING`<br>[Enum: UNCATEGORIZED|REAL_ESTATE|COMPUTER_AND_INTERNET_SECURITY|FINANCIAL_SERVICES|BUSINESS_AND_ECONOMY|COMPUTER_AND_INTERNET_INFO|AUCTIONS|SHOPPING|CULT_AND_OCCULT|TRAVEL|ABUSED_DRUGS|ADULT_AND_PORNOGRAPHY|HOME_AND_GARDEN|MILITARY|SOCIAL_NETWORKING|DEAD_SITES|INDIVIDUAL_STOCK_ADVICE_AND_TOOLS|TRAINING_AND_TOOLS|DATING|SEX_EDUCATION|RELIGION|ENTERTAINMENT_AND_ARTS|PERSONAL_SITES_AND_BLOGS|LEGAL|LOCAL_INFORMATION|STREAMING_MEDIA|JOB_SEARCH|GAMBLING|TRANSLATION|REFERENCE_AND_RESEARCH|SHAREWARE_AND_FREEWARE|PEER_TO_PEER|MARIJUANA|HACKING|GAMES|PHILOSOPHY_AND_POLITICAL_ADVOCACY|WEAPONS|PAY_TO_SURF|HUNTING_AND_FISHING|SOCIETY|EDUCATIONAL_INSTITUTIONS|ONLINE_GREETING_CARDS|SPORTS|SWIMSUITS_AND_INTIMATE_APPAREL|QUESTIONABLE|KIDS|HATE_AND_RACISM|PERSONAL_STORAGE|VIOLENCE|KEYLOGGERS_AND_MONITORING|SEARCH_ENGINES|INTERNET_PORTALS|WEB_ADVERTISEMENTS|CHEATING|GROSS|WEB_BASED_EMAIL|MALWARE_SITES|PHISHING_AND_OTHER_FRAUDS|PROXY_AVOIDANCE_AND_ANONYMIZERS|SPYWARE_AND_ADWARE|MUSIC|GOVERNMENT|NUDITY|NEWS_AND_MEDIA|ILLEGAL|CONTENT_DELIVERY_NETWORKS|INTERNET_COMMUNICATIONS|BOT_NETS|ABORTION|HEALTH_AND_MEDICINE|CONFIRMED_SPAM_SOURCES|SPAM_URLS|UNCONFIRMED_SPAM_SOURCES|OPEN_HTTP_PROXIES|DYNAMICALLY_GENERATED_CONTENT|PARKED_DOMAINS|ALCOHOL_AND_TOBACCO|PRIVATE_IP_ADDRESSES|IMAGE_AND_VIDEO_SEARCH|FASHION_AND_BEAUTY|RECREATION_AND_HOBBIES|MOTOR_VEHICLES|WEB_HOSTING] List of URL categories to be selected
|
|
388
388
|
|
|
389
389
|
#### Timeouts
|
|
390
390
|
|
|
@@ -36,11 +36,11 @@ resource "f5xc_forwarding_class" "example" {
|
|
|
36
36
|
dscp {
|
|
37
37
|
# Configure dscp settings
|
|
38
38
|
}
|
|
39
|
-
# [OneOf: dscp_based_queue, queue_id_to_use]
|
|
39
|
+
# [OneOf: dscp_based_queue, queue_id_to_use] Can be used fo...
|
|
40
40
|
dscp_based_queue {
|
|
41
41
|
# Configure dscp_based_queue settings
|
|
42
42
|
}
|
|
43
|
-
#
|
|
43
|
+
# Can be used for messages where no values are needed.
|
|
44
44
|
no_marking {
|
|
45
45
|
# Configure no_marking settings
|
|
46
46
|
}
|
|
@@ -68,22 +68,22 @@ resource "f5xc_forwarding_class" "example" {
|
|
|
68
68
|
|
|
69
69
|
-> **One of the following:**
|
|
70
70
|
• <a id="dscp"></a>[`dscp`](#dscp) - Optional Block<br>DSCP Marking setting. DSCP marking setting as per RFC 2475<br>See [Dscp](#dscp) below for details.
|
|
71
|
-
<br><br>• <a id="no-marking"></a>[`no_marking`](#no-marking) - Optional Block<br>
|
|
71
|
+
<br><br>• <a id="no-marking"></a>[`no_marking`](#no-marking) - Optional Block<br>Can be used for messages where no values are needed
|
|
72
72
|
|
|
73
73
|
-> **One of the following:**
|
|
74
|
-
• <a id="dscp-based-queue"></a>[`dscp_based_queue`](#dscp-based-queue) - Optional Block<br>
|
|
75
|
-
<br><br>• <a id="queue-id-to-use"></a>[`queue_id_to_use`](#queue-id-to-use) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2]
|
|
74
|
+
• <a id="dscp-based-queue"></a>[`dscp_based_queue`](#dscp-based-queue) - Optional Block<br>Can be used for messages where no values are needed
|
|
75
|
+
<br><br>• <a id="queue-id-to-use"></a>[`queue_id_to_use`](#queue-id-to-use) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2] DSCP Precedence Level Values Best Effort service will GET any available bandwidth DSCP Class 1 service DSCP Class 2 service DSCP Class 3 service DSCP Class 4 service Express Forwarding is used for low latency traffic Control is used for routing traffic, not recommended Link Layer traffic like
|
|
76
76
|
|
|
77
|
-
<a id="interface-group"></a>• [`interface_group`](#interface-group) - Optional String Defaults to `ANY_AVAILABLE_INTERFACE`<br>Possible values are `ANY_AVAILABLE_INTERFACE`, `INTERFACE_GROUP1`, `INTERFACE_GROUP2`, `INTERFACE_GROUP3`<br>[Enum: ANY_AVAILABLE_INTERFACE|INTERFACE_GROUP1|INTERFACE_GROUP2|INTERFACE_GROUP3] Interface
|
|
77
|
+
<a id="interface-group"></a>• [`interface_group`](#interface-group) - Optional String Defaults to `ANY_AVAILABLE_INTERFACE`<br>Possible values are `ANY_AVAILABLE_INTERFACE`, `INTERFACE_GROUP1`, `INTERFACE_GROUP2`, `INTERFACE_GROUP3`<br>[Enum: ANY_AVAILABLE_INTERFACE|INTERFACE_GROUP1|INTERFACE_GROUP2|INTERFACE_GROUP3] Interface group, group membership by adding group label to interface Choose any of the available interfaces Choose all interfaces with label group1 Choose all interfaces with label group2 Choose all interfaces with label group3
|
|
78
78
|
|
|
79
79
|
-> **One of the following:**
|
|
80
|
-
• <a id="no-policer"></a>[`no_policer`](#no-policer) - Optional Block<br>
|
|
80
|
+
• <a id="no-policer"></a>[`no_policer`](#no-policer) - Optional Block<br>Can be used for messages where no values are needed
|
|
81
81
|
|
|
82
|
-
<a id="policer"></a>• [`policer`](#policer) - Optional Block<br>
|
|
82
|
+
<a id="policer"></a>• [`policer`](#policer) - Optional Block<br>Type establishes a direct reference from one object(the referrer) to another(the referred). Such a reference is in form of tenant/namespace/name<br>See [Policer](#policer) below for details.
|
|
83
83
|
|
|
84
84
|
<a id="timeouts"></a>• [`timeouts`](#timeouts) - Optional Block<br>See [Timeouts](#timeouts) below for details.
|
|
85
85
|
|
|
86
|
-
<a id="tos-value"></a>• [`tos_value`](#tos-value) - Optional Number<br>
|
|
86
|
+
<a id="tos-value"></a>• [`tos_value`](#tos-value) - Optional Number<br>Decimal value of raw 8 bit TOS. In above example DSCP 10 = Precedence Class 1 and drop precedence low
|
|
87
87
|
|
|
88
88
|
### Attributes Reference
|
|
89
89
|
|
|
@@ -97,19 +97,19 @@ In addition to all arguments above, the following attributes are exported:
|
|
|
97
97
|
|
|
98
98
|
A [`dscp`](#dscp) block supports the following:
|
|
99
99
|
|
|
100
|
-
<a id="dscp-drop-precedence"></a>• [`drop_precedence`](#dscp-drop-precedence) - Optional String Defaults to `DSCP_AF_FAKE`<br>Possible values are `DSCP_AF_LOW`, `DSCP_AF_MEDIUM`, `DSCP_AF_HIGH`, `DSCP_AF_POLICER`<br>[Enum: DSCP_AF_LOW|DSCP_AF_MEDIUM|DSCP_AF_HIGH|DSCP_AF_POLICER] DSCP
|
|
100
|
+
<a id="dscp-drop-precedence"></a>• [`drop_precedence`](#dscp-drop-precedence) - Optional String Defaults to `DSCP_AF_FAKE`<br>Possible values are `DSCP_AF_LOW`, `DSCP_AF_MEDIUM`, `DSCP_AF_HIGH`, `DSCP_AF_POLICER`<br>[Enum: DSCP_AF_LOW|DSCP_AF_MEDIUM|DSCP_AF_HIGH|DSCP_AF_POLICER] DSCP Assured forwarding drop precedence DSCP Low drop precedence DSCP Low drop precedence DSCP Low drop precedence DSCP drop precedence value is taken from output of policer
|
|
101
101
|
|
|
102
|
-
<a id="dscp-dscp-class"></a>• [`dscp_class`](#dscp-dscp-class) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2]
|
|
102
|
+
<a id="dscp-dscp-class"></a>• [`dscp_class`](#dscp-dscp-class) - Optional String Defaults to `DSCP_BEST_EFFORT`<br>Possible values are `DSCP_BEST_EFFORT`, `DSCP_CLASS1`, `DSCP_CLASS2`, `DSCP_CLASS3`, `DSCP_CLASS4`, `DSCP_EXPRESS_FORWARDING`, `DSCP_CONTROL_L3`, `DSCP_CONTROL_L2`<br>[Enum: DSCP_BEST_EFFORT|DSCP_CLASS1|DSCP_CLASS2|DSCP_CLASS3|DSCP_CLASS4|DSCP_EXPRESS_FORWARDING|DSCP_CONTROL_L3|DSCP_CONTROL_L2] DSCP Precedence Level Values Best Effort service will GET any available bandwidth DSCP Class 1 service DSCP Class 2 service DSCP Class 3 service DSCP Class 4 service Express Forwarding is used for low latency traffic Control is used for routing traffic, not recommended Link Layer traffic like
|
|
103
103
|
|
|
104
104
|
#### Policer
|
|
105
105
|
|
|
106
106
|
A [`policer`](#policer) block supports the following:
|
|
107
107
|
|
|
108
|
-
<a id="policer-name"></a>• [`name`](#policer-name) - Optional String<br>
|
|
108
|
+
<a id="policer-name"></a>• [`name`](#policer-name) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. Route's) name
|
|
109
109
|
|
|
110
|
-
<a id="policer-namespace"></a>• [`namespace`](#policer-namespace) - Optional String<br>
|
|
110
|
+
<a id="policer-namespace"></a>• [`namespace`](#policer-namespace) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. Route's) namespace
|
|
111
111
|
|
|
112
|
-
<a id="policer-tenant"></a>• [`tenant`](#policer-tenant) - Optional String<br>
|
|
112
|
+
<a id="policer-tenant"></a>• [`tenant`](#policer-tenant) - Optional String<br>When a configuration object(e.g. Virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. Route's) tenant
|
|
113
113
|
|
|
114
114
|
#### Timeouts
|
|
115
115
|
|