cdktf-cdktf-provider-upcloud 11.0.3__py3-none-any.whl → 11.1.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@11.1.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +47 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +165 -165
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +175 -175
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +73 -73
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +292 -292
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +100 -100
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +73 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/network/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +141 -141
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +55 -55
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/METADATA +4 -4
- cdktf_cdktf_provider_upcloud-11.1.0.dist-info/RECORD +54 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@11.0.3.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-11.0.3.dist-info/RECORD +0 -54
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-11.0.3.dist-info → cdktf_cdktf_provider_upcloud-11.1.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registory for docs: [`upcloud_loadbalancer`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
4
|
+
Refer to the Terraform Registory for docs: [`upcloud_loadbalancer`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class Loadbalancer(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.loadbalancer.Loadbalancer",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer upcloud_loadbalancer}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -49,18 +49,18 @@ class Loadbalancer(
|
|
|
49
49
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
50
50
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
51
51
|
) -> None:
|
|
52
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
52
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer upcloud_loadbalancer} Resource.
|
|
53
53
|
|
|
54
54
|
:param scope: The scope in which to define this construct.
|
|
55
55
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
56
|
-
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
57
|
-
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
58
|
-
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
59
|
-
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
60
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
61
|
-
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
62
|
-
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
63
|
-
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
56
|
+
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
57
|
+
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#plan Loadbalancer#plan}
|
|
58
|
+
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#zone Loadbalancer#zone}
|
|
59
|
+
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#configured_status Loadbalancer#configured_status}
|
|
60
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#id Loadbalancer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
61
|
+
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#labels Loadbalancer#labels}
|
|
62
|
+
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
63
|
+
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#networks Loadbalancer#networks}
|
|
64
64
|
:param connection:
|
|
65
65
|
:param count:
|
|
66
66
|
:param depends_on:
|
|
@@ -106,7 +106,7 @@ class Loadbalancer(
|
|
|
106
106
|
|
|
107
107
|
:param scope: The scope in which to define this construct.
|
|
108
108
|
:param import_to_id: The construct id used in the generated config for the Loadbalancer to import.
|
|
109
|
-
:param import_from_id: The id of the existing Loadbalancer that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
109
|
+
:param import_from_id: The id of the existing Loadbalancer that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#import import section} in the documentation of this resource for the id to use
|
|
110
110
|
:param provider: ? Optional instance of the provider where the Loadbalancer to import is found.
|
|
111
111
|
'''
|
|
112
112
|
if __debug__:
|
|
@@ -372,14 +372,14 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
372
372
|
:param lifecycle:
|
|
373
373
|
:param provider:
|
|
374
374
|
:param provisioners:
|
|
375
|
-
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
376
|
-
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
377
|
-
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
378
|
-
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
379
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
380
|
-
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
381
|
-
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
382
|
-
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
375
|
+
:param name: The name of the service must be unique within customer account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
376
|
+
:param plan: Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#plan Loadbalancer#plan}
|
|
377
|
+
:param zone: Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#zone Loadbalancer#zone}
|
|
378
|
+
:param configured_status: The service configured status indicates the service's current intended status. Managed by the customer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#configured_status Loadbalancer#configured_status}
|
|
379
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#id Loadbalancer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
380
|
+
:param labels: Key-value pairs to classify the load balancer. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#labels Loadbalancer#labels}
|
|
381
|
+
:param network: Private network UUID where traffic will be routed. Must reside in load balancer zone. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
382
|
+
:param networks: networks block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#networks Loadbalancer#networks}
|
|
383
383
|
'''
|
|
384
384
|
if isinstance(lifecycle, dict):
|
|
385
385
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -498,7 +498,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
498
498
|
def name(self) -> builtins.str:
|
|
499
499
|
'''The name of the service must be unique within customer account.
|
|
500
500
|
|
|
501
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
501
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
502
502
|
'''
|
|
503
503
|
result = self._values.get("name")
|
|
504
504
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -508,7 +508,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
508
508
|
def plan(self) -> builtins.str:
|
|
509
509
|
'''Plan which the service will have. You can list available loadbalancer plans with ``upctl loadbalancer plans``.
|
|
510
510
|
|
|
511
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
511
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#plan Loadbalancer#plan}
|
|
512
512
|
'''
|
|
513
513
|
result = self._values.get("plan")
|
|
514
514
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -518,7 +518,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
518
518
|
def zone(self) -> builtins.str:
|
|
519
519
|
'''Zone in which the service will be hosted, e.g. ``fi-hel1``. You can list available zones with ``upctl zone list``.
|
|
520
520
|
|
|
521
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
521
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#zone Loadbalancer#zone}
|
|
522
522
|
'''
|
|
523
523
|
result = self._values.get("zone")
|
|
524
524
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -528,14 +528,14 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
528
528
|
def configured_status(self) -> typing.Optional[builtins.str]:
|
|
529
529
|
'''The service configured status indicates the service's current intended status. Managed by the customer.
|
|
530
530
|
|
|
531
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
531
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#configured_status Loadbalancer#configured_status}
|
|
532
532
|
'''
|
|
533
533
|
result = self._values.get("configured_status")
|
|
534
534
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
535
535
|
|
|
536
536
|
@builtins.property
|
|
537
537
|
def id(self) -> typing.Optional[builtins.str]:
|
|
538
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
538
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#id Loadbalancer#id}.
|
|
539
539
|
|
|
540
540
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
541
541
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -547,7 +547,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
547
547
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
548
548
|
'''Key-value pairs to classify the load balancer.
|
|
549
549
|
|
|
550
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
550
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#labels Loadbalancer#labels}
|
|
551
551
|
'''
|
|
552
552
|
result = self._values.get("labels")
|
|
553
553
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -556,7 +556,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
556
556
|
def network(self) -> typing.Optional[builtins.str]:
|
|
557
557
|
'''Private network UUID where traffic will be routed. Must reside in load balancer zone.
|
|
558
558
|
|
|
559
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
559
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
560
560
|
'''
|
|
561
561
|
result = self._values.get("network")
|
|
562
562
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -567,7 +567,7 @@ class LoadbalancerConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
567
567
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerNetworks"]]]:
|
|
568
568
|
'''networks block.
|
|
569
569
|
|
|
570
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
570
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#networks Loadbalancer#networks}
|
|
571
571
|
'''
|
|
572
572
|
result = self._values.get("networks")
|
|
573
573
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["LoadbalancerNetworks"]]], result)
|
|
@@ -604,10 +604,10 @@ class LoadbalancerNetworks:
|
|
|
604
604
|
network: typing.Optional[builtins.str] = None,
|
|
605
605
|
) -> None:
|
|
606
606
|
'''
|
|
607
|
-
:param family: Network family. Currently only ``IPv4`` is supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
608
|
-
:param name: The name of the network must be unique within the service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
609
|
-
:param type: The type of the network. Only one public network can be attached and at least one private network must be attached. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
610
|
-
:param network: Private network UUID. Required for private networks and must reside in loadbalancer zone. For public network the field should be omitted. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
607
|
+
:param family: Network family. Currently only ``IPv4`` is supported. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#family Loadbalancer#family}
|
|
608
|
+
:param name: The name of the network must be unique within the service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
609
|
+
:param type: The type of the network. Only one public network can be attached and at least one private network must be attached. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#type Loadbalancer#type}
|
|
610
|
+
:param network: Private network UUID. Required for private networks and must reside in loadbalancer zone. For public network the field should be omitted. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
611
611
|
'''
|
|
612
612
|
if __debug__:
|
|
613
613
|
type_hints = typing.get_type_hints(_typecheckingstub__f7bc3b31db01be8fcdb6dd15ccf511434856f0866752f9ec14fbf89082bb48ed)
|
|
@@ -627,7 +627,7 @@ class LoadbalancerNetworks:
|
|
|
627
627
|
def family(self) -> builtins.str:
|
|
628
628
|
'''Network family. Currently only ``IPv4`` is supported.
|
|
629
629
|
|
|
630
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
630
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#family Loadbalancer#family}
|
|
631
631
|
'''
|
|
632
632
|
result = self._values.get("family")
|
|
633
633
|
assert result is not None, "Required property 'family' is missing"
|
|
@@ -637,7 +637,7 @@ class LoadbalancerNetworks:
|
|
|
637
637
|
def name(self) -> builtins.str:
|
|
638
638
|
'''The name of the network must be unique within the service.
|
|
639
639
|
|
|
640
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
640
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#name Loadbalancer#name}
|
|
641
641
|
'''
|
|
642
642
|
result = self._values.get("name")
|
|
643
643
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -649,7 +649,7 @@ class LoadbalancerNetworks:
|
|
|
649
649
|
|
|
650
650
|
Only one public network can be attached and at least one private network must be attached.
|
|
651
651
|
|
|
652
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
652
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#type Loadbalancer#type}
|
|
653
653
|
'''
|
|
654
654
|
result = self._values.get("type")
|
|
655
655
|
assert result is not None, "Required property 'type' is missing"
|
|
@@ -661,7 +661,7 @@ class LoadbalancerNetworks:
|
|
|
661
661
|
|
|
662
662
|
Required for private networks and must reside in loadbalancer zone. For public network the field should be omitted.
|
|
663
663
|
|
|
664
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
664
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer#network Loadbalancer#network}
|
|
665
665
|
'''
|
|
666
666
|
result = self._values.get("network")
|
|
667
667
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_loadbalancer_backend`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registory for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
4
|
+
Refer to the Terraform Registory for docs: [`upcloud_loadbalancer_backend`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class LoadbalancerBackend(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.loadbalancerBackend.LoadbalancerBackend",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -46,15 +46,15 @@ class LoadbalancerBackend(
|
|
|
46
46
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
47
47
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
48
48
|
) -> None:
|
|
49
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
49
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend upcloud_loadbalancer_backend} Resource.
|
|
50
50
|
|
|
51
51
|
:param scope: The scope in which to define this construct.
|
|
52
52
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
53
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
54
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
55
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
56
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
57
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
53
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
54
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
55
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
56
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
57
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
58
58
|
:param connection:
|
|
59
59
|
:param count:
|
|
60
60
|
:param depends_on:
|
|
@@ -97,7 +97,7 @@ class LoadbalancerBackend(
|
|
|
97
97
|
|
|
98
98
|
:param scope: The scope in which to define this construct.
|
|
99
99
|
:param import_to_id: The construct id used in the generated config for the LoadbalancerBackend to import.
|
|
100
|
-
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
100
|
+
:param import_from_id: The id of the existing LoadbalancerBackend that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#import import section} in the documentation of this resource for the id to use
|
|
101
101
|
:param provider: ? Optional instance of the provider where the LoadbalancerBackend to import is found.
|
|
102
102
|
'''
|
|
103
103
|
if __debug__:
|
|
@@ -129,21 +129,21 @@ class LoadbalancerBackend(
|
|
|
129
129
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
130
130
|
) -> None:
|
|
131
131
|
'''
|
|
132
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
133
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
134
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
135
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
136
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
137
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
138
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
139
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
140
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
141
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
142
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
143
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
144
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
145
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
146
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
132
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
133
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
134
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
135
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
136
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
137
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
138
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
139
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
140
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
141
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
142
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
143
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
144
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
145
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
146
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
147
147
|
'''
|
|
148
148
|
value = LoadbalancerBackendProperties(
|
|
149
149
|
health_check_expected_status=health_check_expected_status,
|
|
@@ -318,11 +318,11 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
318
318
|
:param lifecycle:
|
|
319
319
|
:param provider:
|
|
320
320
|
:param provisioners:
|
|
321
|
-
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
322
|
-
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
323
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
324
|
-
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
325
|
-
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
321
|
+
:param loadbalancer: ID of the load balancer to which the backend is connected. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
322
|
+
:param name: The name of the backend must be unique within the load balancer service. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
323
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
324
|
+
:param properties: properties block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
325
|
+
:param resolver_name: Domain Name Resolver used with dynamic type members. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
326
326
|
'''
|
|
327
327
|
if isinstance(lifecycle, dict):
|
|
328
328
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -435,7 +435,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
435
435
|
def loadbalancer(self) -> builtins.str:
|
|
436
436
|
'''ID of the load balancer to which the backend is connected.
|
|
437
437
|
|
|
438
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
438
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#loadbalancer LoadbalancerBackend#loadbalancer}
|
|
439
439
|
'''
|
|
440
440
|
result = self._values.get("loadbalancer")
|
|
441
441
|
assert result is not None, "Required property 'loadbalancer' is missing"
|
|
@@ -445,7 +445,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
445
445
|
def name(self) -> builtins.str:
|
|
446
446
|
'''The name of the backend must be unique within the load balancer service.
|
|
447
447
|
|
|
448
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
448
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#name LoadbalancerBackend#name}
|
|
449
449
|
'''
|
|
450
450
|
result = self._values.get("name")
|
|
451
451
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -453,7 +453,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
453
453
|
|
|
454
454
|
@builtins.property
|
|
455
455
|
def id(self) -> typing.Optional[builtins.str]:
|
|
456
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
456
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#id LoadbalancerBackend#id}.
|
|
457
457
|
|
|
458
458
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
459
459
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -465,7 +465,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
465
465
|
def properties(self) -> typing.Optional["LoadbalancerBackendProperties"]:
|
|
466
466
|
'''properties block.
|
|
467
467
|
|
|
468
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
468
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#properties LoadbalancerBackend#properties}
|
|
469
469
|
'''
|
|
470
470
|
result = self._values.get("properties")
|
|
471
471
|
return typing.cast(typing.Optional["LoadbalancerBackendProperties"], result)
|
|
@@ -474,7 +474,7 @@ class LoadbalancerBackendConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
474
474
|
def resolver_name(self) -> typing.Optional[builtins.str]:
|
|
475
475
|
'''Domain Name Resolver used with dynamic type members.
|
|
476
476
|
|
|
477
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
477
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#resolver_name LoadbalancerBackend#resolver_name}
|
|
478
478
|
'''
|
|
479
479
|
result = self._values.get("resolver_name")
|
|
480
480
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -533,21 +533,21 @@ class LoadbalancerBackendProperties:
|
|
|
533
533
|
tls_verify: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
534
534
|
) -> None:
|
|
535
535
|
'''
|
|
536
|
-
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
537
|
-
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
538
|
-
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
539
|
-
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
540
|
-
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
541
|
-
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
542
|
-
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
543
|
-
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
544
|
-
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
545
|
-
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
546
|
-
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
547
|
-
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
548
|
-
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
549
|
-
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
550
|
-
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
536
|
+
:param health_check_expected_status: Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
537
|
+
:param health_check_fall: Sets how many failed health checks are allowed until the backend member is taken off from the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
538
|
+
:param health_check_interval: Interval between health checks. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
539
|
+
:param health_check_rise: Sets how many passing checks there must be before returning the backend member to the rotation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
540
|
+
:param health_check_tls_verify: Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
541
|
+
:param health_check_type: Health check type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
542
|
+
:param health_check_url: Target path for health check HTTP GET requests. Ignored for tcp type. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
543
|
+
:param http2_enabled: Allow HTTP/2 connections to backend members by utilizing ALPN extension of TLS protocol, therefore it can only be enabled when tls_enabled is set to true. Note: members should support HTTP/2 for this setting to work. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
544
|
+
:param outbound_proxy_protocol: Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
545
|
+
:param sticky_session_cookie_name: Sets sticky session cookie name. Empty string disables sticky session. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
546
|
+
:param timeout_server: Backend server timeout in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
547
|
+
:param timeout_tunnel: Maximum inactivity time on the client and server side for tunnels in seconds. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
548
|
+
:param tls_enabled: Enables TLS connection from the load balancer to backend servers. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
549
|
+
:param tls_use_system_ca: If enabled, then the system CA certificate bundle will be used for the certificate verification. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
550
|
+
:param tls_verify: Enables backend servers certificate verification. Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
551
551
|
'''
|
|
552
552
|
if __debug__:
|
|
553
553
|
type_hints = typing.get_type_hints(_typecheckingstub__eb5988403ea7b17ea78d8a97176e2db70e4258ead0d52fc7ab7102412ecccf40)
|
|
@@ -602,7 +602,7 @@ class LoadbalancerBackendProperties:
|
|
|
602
602
|
def health_check_expected_status(self) -> typing.Optional[jsii.Number]:
|
|
603
603
|
'''Expected HTTP status code returned by the customer application to mark server as healthy. Ignored for tcp type.
|
|
604
604
|
|
|
605
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
605
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_expected_status LoadbalancerBackend#health_check_expected_status}
|
|
606
606
|
'''
|
|
607
607
|
result = self._values.get("health_check_expected_status")
|
|
608
608
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -611,7 +611,7 @@ class LoadbalancerBackendProperties:
|
|
|
611
611
|
def health_check_fall(self) -> typing.Optional[jsii.Number]:
|
|
612
612
|
'''Sets how many failed health checks are allowed until the backend member is taken off from the rotation.
|
|
613
613
|
|
|
614
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
614
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_fall LoadbalancerBackend#health_check_fall}
|
|
615
615
|
'''
|
|
616
616
|
result = self._values.get("health_check_fall")
|
|
617
617
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -620,7 +620,7 @@ class LoadbalancerBackendProperties:
|
|
|
620
620
|
def health_check_interval(self) -> typing.Optional[jsii.Number]:
|
|
621
621
|
'''Interval between health checks.
|
|
622
622
|
|
|
623
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
623
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_interval LoadbalancerBackend#health_check_interval}
|
|
624
624
|
'''
|
|
625
625
|
result = self._values.get("health_check_interval")
|
|
626
626
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -629,7 +629,7 @@ class LoadbalancerBackendProperties:
|
|
|
629
629
|
def health_check_rise(self) -> typing.Optional[jsii.Number]:
|
|
630
630
|
'''Sets how many passing checks there must be before returning the backend member to the rotation.
|
|
631
631
|
|
|
632
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
632
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_rise LoadbalancerBackend#health_check_rise}
|
|
633
633
|
'''
|
|
634
634
|
result = self._values.get("health_check_rise")
|
|
635
635
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -640,7 +640,7 @@ class LoadbalancerBackendProperties:
|
|
|
640
640
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
641
641
|
'''Enables certificate verification with the system CA certificate bundle. Works with https scheme in health_check_url, otherwise ignored.
|
|
642
642
|
|
|
643
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
643
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_tls_verify LoadbalancerBackend#health_check_tls_verify}
|
|
644
644
|
'''
|
|
645
645
|
result = self._values.get("health_check_tls_verify")
|
|
646
646
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -649,7 +649,7 @@ class LoadbalancerBackendProperties:
|
|
|
649
649
|
def health_check_type(self) -> typing.Optional[builtins.str]:
|
|
650
650
|
'''Health check type.
|
|
651
651
|
|
|
652
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
652
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_type LoadbalancerBackend#health_check_type}
|
|
653
653
|
'''
|
|
654
654
|
result = self._values.get("health_check_type")
|
|
655
655
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -658,7 +658,7 @@ class LoadbalancerBackendProperties:
|
|
|
658
658
|
def health_check_url(self) -> typing.Optional[builtins.str]:
|
|
659
659
|
'''Target path for health check HTTP GET requests. Ignored for tcp type.
|
|
660
660
|
|
|
661
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
661
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#health_check_url LoadbalancerBackend#health_check_url}
|
|
662
662
|
'''
|
|
663
663
|
result = self._values.get("health_check_url")
|
|
664
664
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -671,7 +671,7 @@ class LoadbalancerBackendProperties:
|
|
|
671
671
|
|
|
672
672
|
Note: members should support HTTP/2 for this setting to work.
|
|
673
673
|
|
|
674
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
674
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#http2_enabled LoadbalancerBackend#http2_enabled}
|
|
675
675
|
'''
|
|
676
676
|
result = self._values.get("http2_enabled")
|
|
677
677
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -680,7 +680,7 @@ class LoadbalancerBackendProperties:
|
|
|
680
680
|
def outbound_proxy_protocol(self) -> typing.Optional[builtins.str]:
|
|
681
681
|
'''Enable outbound proxy protocol by setting the desired version. Empty string disables proxy protocol.
|
|
682
682
|
|
|
683
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
683
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#outbound_proxy_protocol LoadbalancerBackend#outbound_proxy_protocol}
|
|
684
684
|
'''
|
|
685
685
|
result = self._values.get("outbound_proxy_protocol")
|
|
686
686
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -689,7 +689,7 @@ class LoadbalancerBackendProperties:
|
|
|
689
689
|
def sticky_session_cookie_name(self) -> typing.Optional[builtins.str]:
|
|
690
690
|
'''Sets sticky session cookie name. Empty string disables sticky session.
|
|
691
691
|
|
|
692
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
692
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#sticky_session_cookie_name LoadbalancerBackend#sticky_session_cookie_name}
|
|
693
693
|
'''
|
|
694
694
|
result = self._values.get("sticky_session_cookie_name")
|
|
695
695
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -698,7 +698,7 @@ class LoadbalancerBackendProperties:
|
|
|
698
698
|
def timeout_server(self) -> typing.Optional[jsii.Number]:
|
|
699
699
|
'''Backend server timeout in seconds.
|
|
700
700
|
|
|
701
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
701
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_server LoadbalancerBackend#timeout_server}
|
|
702
702
|
'''
|
|
703
703
|
result = self._values.get("timeout_server")
|
|
704
704
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -707,7 +707,7 @@ class LoadbalancerBackendProperties:
|
|
|
707
707
|
def timeout_tunnel(self) -> typing.Optional[jsii.Number]:
|
|
708
708
|
'''Maximum inactivity time on the client and server side for tunnels in seconds.
|
|
709
709
|
|
|
710
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
710
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#timeout_tunnel LoadbalancerBackend#timeout_tunnel}
|
|
711
711
|
'''
|
|
712
712
|
result = self._values.get("timeout_tunnel")
|
|
713
713
|
return typing.cast(typing.Optional[jsii.Number], result)
|
|
@@ -718,7 +718,7 @@ class LoadbalancerBackendProperties:
|
|
|
718
718
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
719
719
|
'''Enables TLS connection from the load balancer to backend servers.
|
|
720
720
|
|
|
721
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
721
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_enabled LoadbalancerBackend#tls_enabled}
|
|
722
722
|
'''
|
|
723
723
|
result = self._values.get("tls_enabled")
|
|
724
724
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -729,7 +729,7 @@ class LoadbalancerBackendProperties:
|
|
|
729
729
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
730
730
|
'''If enabled, then the system CA certificate bundle will be used for the certificate verification.
|
|
731
731
|
|
|
732
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
732
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_use_system_ca LoadbalancerBackend#tls_use_system_ca}
|
|
733
733
|
'''
|
|
734
734
|
result = self._values.get("tls_use_system_ca")
|
|
735
735
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -742,7 +742,7 @@ class LoadbalancerBackendProperties:
|
|
|
742
742
|
|
|
743
743
|
Please make sure that TLS config with the certificate bundle of type authority attached to the backend or ``tls_use_system_ca`` enabled. Note: ``tls_verify`` has preference over ``health_check_tls_verify`` when ``tls_enabled`` in true.
|
|
744
744
|
|
|
745
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
745
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.3.0/docs/resources/loadbalancer_backend#tls_verify LoadbalancerBackend#tls_verify}
|
|
746
746
|
'''
|
|
747
747
|
result = self._values.get("tls_verify")
|
|
748
748
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|