1. Packages
  2. Cloudflare Provider
  3. API Docs
  4. TunnelConfig
Cloudflare v5.44.0 published on Wednesday, Nov 27, 2024 by Pulumi

cloudflare.TunnelConfig

Explore with Pulumi AI

cloudflare logo
Cloudflare v5.44.0 published on Wednesday, Nov 27, 2024 by Pulumi

    Provides a Cloudflare Tunnel configuration resource.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as cloudflare from "@pulumi/cloudflare";
    
    const exampleTunnel = new cloudflare.ZeroTrustTunnelCloudflared("example_tunnel", {
        accountId: "f037e56e89293a057740de681ac9abbe",
        name: "example_tunnel",
        secret: "<32 character secret>",
    });
    const exampleConfig = new cloudflare.TunnelConfig("example_config", {
        accountId: "f037e56e89293a057740de681ac9abbe",
        tunnelId: exampleTunnel.id,
        config: {
            warpRouting: {
                enabled: true,
            },
            originRequest: {
                connectTimeout: "1m0s",
                tlsTimeout: "1m0s",
                tcpKeepAlive: "1m0s",
                noHappyEyeballs: false,
                keepAliveConnections: 1024,
                keepAliveTimeout: "1m0s",
                httpHostHeader: "baz",
                originServerName: "foobar",
                caPool: "/path/to/unsigned/ca/pool",
                noTlsVerify: false,
                disableChunkedEncoding: false,
                bastionMode: false,
                proxyAddress: "10.0.0.1",
                proxyPort: 8123,
                proxyType: "socks",
                ipRules: [{
                    prefix: "/web",
                    ports: [
                        80,
                        443,
                    ],
                    allow: false,
                }],
            },
            ingressRules: [
                {
                    hostname: "foo",
                    path: "/bar",
                    service: "http://10.0.0.2:8080",
                    originRequest: {
                        connectTimeout: "2m0s",
                        access: {
                            required: true,
                            teamName: "terraform",
                            audTags: ["AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"],
                        },
                    },
                },
                {
                    service: "https://10.0.0.3:8081",
                },
            ],
        },
    });
    
    import pulumi
    import pulumi_cloudflare as cloudflare
    
    example_tunnel = cloudflare.ZeroTrustTunnelCloudflared("example_tunnel",
        account_id="f037e56e89293a057740de681ac9abbe",
        name="example_tunnel",
        secret="<32 character secret>")
    example_config = cloudflare.TunnelConfig("example_config",
        account_id="f037e56e89293a057740de681ac9abbe",
        tunnel_id=example_tunnel.id,
        config={
            "warp_routing": {
                "enabled": True,
            },
            "origin_request": {
                "connect_timeout": "1m0s",
                "tls_timeout": "1m0s",
                "tcp_keep_alive": "1m0s",
                "no_happy_eyeballs": False,
                "keep_alive_connections": 1024,
                "keep_alive_timeout": "1m0s",
                "http_host_header": "baz",
                "origin_server_name": "foobar",
                "ca_pool": "/path/to/unsigned/ca/pool",
                "no_tls_verify": False,
                "disable_chunked_encoding": False,
                "bastion_mode": False,
                "proxy_address": "10.0.0.1",
                "proxy_port": 8123,
                "proxy_type": "socks",
                "ip_rules": [{
                    "prefix": "/web",
                    "ports": [
                        80,
                        443,
                    ],
                    "allow": False,
                }],
            },
            "ingress_rules": [
                {
                    "hostname": "foo",
                    "path": "/bar",
                    "service": "http://10.0.0.2:8080",
                    "origin_request": {
                        "connect_timeout": "2m0s",
                        "access": {
                            "required": True,
                            "team_name": "terraform",
                            "aud_tags": ["AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"],
                        },
                    },
                },
                {
                    "service": "https://10.0.0.3:8081",
                },
            ],
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-cloudflare/sdk/v5/go/cloudflare"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		exampleTunnel, err := cloudflare.NewZeroTrustTunnelCloudflared(ctx, "example_tunnel", &cloudflare.ZeroTrustTunnelCloudflaredArgs{
    			AccountId: pulumi.String("f037e56e89293a057740de681ac9abbe"),
    			Name:      pulumi.String("example_tunnel"),
    			Secret:    pulumi.String("<32 character secret>"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = cloudflare.NewTunnelConfig(ctx, "example_config", &cloudflare.TunnelConfigArgs{
    			AccountId: pulumi.String("f037e56e89293a057740de681ac9abbe"),
    			TunnelId:  exampleTunnel.ID(),
    			Config: &cloudflare.TunnelConfigConfigArgs{
    				WarpRouting: &cloudflare.TunnelConfigConfigWarpRoutingArgs{
    					Enabled: pulumi.Bool(true),
    				},
    				OriginRequest: &cloudflare.TunnelConfigConfigOriginRequestArgs{
    					ConnectTimeout:         pulumi.String("1m0s"),
    					TlsTimeout:             pulumi.String("1m0s"),
    					TcpKeepAlive:           pulumi.String("1m0s"),
    					NoHappyEyeballs:        pulumi.Bool(false),
    					KeepAliveConnections:   pulumi.Int(1024),
    					KeepAliveTimeout:       pulumi.String("1m0s"),
    					HttpHostHeader:         pulumi.String("baz"),
    					OriginServerName:       pulumi.String("foobar"),
    					CaPool:                 pulumi.String("/path/to/unsigned/ca/pool"),
    					NoTlsVerify:            pulumi.Bool(false),
    					DisableChunkedEncoding: pulumi.Bool(false),
    					BastionMode:            pulumi.Bool(false),
    					ProxyAddress:           pulumi.String("10.0.0.1"),
    					ProxyPort:              pulumi.Int(8123),
    					ProxyType:              pulumi.String("socks"),
    					IpRules: cloudflare.TunnelConfigConfigOriginRequestIpRuleArray{
    						&cloudflare.TunnelConfigConfigOriginRequestIpRuleArgs{
    							Prefix: pulumi.String("/web"),
    							Ports: pulumi.IntArray{
    								pulumi.Int(80),
    								pulumi.Int(443),
    							},
    							Allow: pulumi.Bool(false),
    						},
    					},
    				},
    				IngressRules: cloudflare.TunnelConfigConfigIngressRuleArray{
    					&cloudflare.TunnelConfigConfigIngressRuleArgs{
    						Hostname: pulumi.String("foo"),
    						Path:     pulumi.String("/bar"),
    						Service:  pulumi.String("http://10.0.0.2:8080"),
    						OriginRequest: &cloudflare.TunnelConfigConfigIngressRuleOriginRequestArgs{
    							ConnectTimeout: pulumi.String("2m0s"),
    							Access: &cloudflare.TunnelConfigConfigIngressRuleOriginRequestAccessArgs{
    								Required: pulumi.Bool(true),
    								TeamName: pulumi.String("terraform"),
    								AudTags: pulumi.StringArray{
    									pulumi.String("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"),
    								},
    							},
    						},
    					},
    					&cloudflare.TunnelConfigConfigIngressRuleArgs{
    						Service: pulumi.String("https://10.0.0.3:8081"),
    					},
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Cloudflare = Pulumi.Cloudflare;
    
    return await Deployment.RunAsync(() => 
    {
        var exampleTunnel = new Cloudflare.ZeroTrustTunnelCloudflared("example_tunnel", new()
        {
            AccountId = "f037e56e89293a057740de681ac9abbe",
            Name = "example_tunnel",
            Secret = "<32 character secret>",
        });
    
        var exampleConfig = new Cloudflare.TunnelConfig("example_config", new()
        {
            AccountId = "f037e56e89293a057740de681ac9abbe",
            TunnelId = exampleTunnel.Id,
            Config = new Cloudflare.Inputs.TunnelConfigConfigArgs
            {
                WarpRouting = new Cloudflare.Inputs.TunnelConfigConfigWarpRoutingArgs
                {
                    Enabled = true,
                },
                OriginRequest = new Cloudflare.Inputs.TunnelConfigConfigOriginRequestArgs
                {
                    ConnectTimeout = "1m0s",
                    TlsTimeout = "1m0s",
                    TcpKeepAlive = "1m0s",
                    NoHappyEyeballs = false,
                    KeepAliveConnections = 1024,
                    KeepAliveTimeout = "1m0s",
                    HttpHostHeader = "baz",
                    OriginServerName = "foobar",
                    CaPool = "/path/to/unsigned/ca/pool",
                    NoTlsVerify = false,
                    DisableChunkedEncoding = false,
                    BastionMode = false,
                    ProxyAddress = "10.0.0.1",
                    ProxyPort = 8123,
                    ProxyType = "socks",
                    IpRules = new[]
                    {
                        new Cloudflare.Inputs.TunnelConfigConfigOriginRequestIpRuleArgs
                        {
                            Prefix = "/web",
                            Ports = new[]
                            {
                                80,
                                443,
                            },
                            Allow = false,
                        },
                    },
                },
                IngressRules = new[]
                {
                    new Cloudflare.Inputs.TunnelConfigConfigIngressRuleArgs
                    {
                        Hostname = "foo",
                        Path = "/bar",
                        Service = "http://10.0.0.2:8080",
                        OriginRequest = new Cloudflare.Inputs.TunnelConfigConfigIngressRuleOriginRequestArgs
                        {
                            ConnectTimeout = "2m0s",
                            Access = new Cloudflare.Inputs.TunnelConfigConfigIngressRuleOriginRequestAccessArgs
                            {
                                Required = true,
                                TeamName = "terraform",
                                AudTags = new[]
                                {
                                    "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA",
                                },
                            },
                        },
                    },
                    new Cloudflare.Inputs.TunnelConfigConfigIngressRuleArgs
                    {
                        Service = "https://10.0.0.3:8081",
                    },
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.cloudflare.ZeroTrustTunnelCloudflared;
    import com.pulumi.cloudflare.ZeroTrustTunnelCloudflaredArgs;
    import com.pulumi.cloudflare.TunnelConfig;
    import com.pulumi.cloudflare.TunnelConfigArgs;
    import com.pulumi.cloudflare.inputs.TunnelConfigConfigArgs;
    import com.pulumi.cloudflare.inputs.TunnelConfigConfigWarpRoutingArgs;
    import com.pulumi.cloudflare.inputs.TunnelConfigConfigOriginRequestArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var exampleTunnel = new ZeroTrustTunnelCloudflared("exampleTunnel", ZeroTrustTunnelCloudflaredArgs.builder()
                .accountId("f037e56e89293a057740de681ac9abbe")
                .name("example_tunnel")
                .secret("<32 character secret>")
                .build());
    
            var exampleConfig = new TunnelConfig("exampleConfig", TunnelConfigArgs.builder()
                .accountId("f037e56e89293a057740de681ac9abbe")
                .tunnelId(exampleTunnel.id())
                .config(TunnelConfigConfigArgs.builder()
                    .warpRouting(TunnelConfigConfigWarpRoutingArgs.builder()
                        .enabled(true)
                        .build())
                    .originRequest(TunnelConfigConfigOriginRequestArgs.builder()
                        .connectTimeout("1m0s")
                        .tlsTimeout("1m0s")
                        .tcpKeepAlive("1m0s")
                        .noHappyEyeballs(false)
                        .keepAliveConnections(1024)
                        .keepAliveTimeout("1m0s")
                        .httpHostHeader("baz")
                        .originServerName("foobar")
                        .caPool("/path/to/unsigned/ca/pool")
                        .noTlsVerify(false)
                        .disableChunkedEncoding(false)
                        .bastionMode(false)
                        .proxyAddress("10.0.0.1")
                        .proxyPort("8123")
                        .proxyType("socks")
                        .ipRules(TunnelConfigConfigOriginRequestIpRuleArgs.builder()
                            .prefix("/web")
                            .ports(                        
                                80,
                                443)
                            .allow(false)
                            .build())
                        .build())
                    .ingressRules(                
                        TunnelConfigConfigIngressRuleArgs.builder()
                            .hostname("foo")
                            .path("/bar")
                            .service("http://10.0.0.2:8080")
                            .originRequest(TunnelConfigConfigIngressRuleOriginRequestArgs.builder()
                                .connectTimeout("2m0s")
                                .access(TunnelConfigConfigIngressRuleOriginRequestAccessArgs.builder()
                                    .required(true)
                                    .teamName("terraform")
                                    .audTags("AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA")
                                    .build())
                                .build())
                            .build(),
                        TunnelConfigConfigIngressRuleArgs.builder()
                            .service("https://10.0.0.3:8081")
                            .build())
                    .build())
                .build());
    
        }
    }
    
    resources:
      exampleTunnel:
        type: cloudflare:ZeroTrustTunnelCloudflared
        name: example_tunnel
        properties:
          accountId: f037e56e89293a057740de681ac9abbe
          name: example_tunnel
          secret: <32 character secret>
      exampleConfig:
        type: cloudflare:TunnelConfig
        name: example_config
        properties:
          accountId: f037e56e89293a057740de681ac9abbe
          tunnelId: ${exampleTunnel.id}
          config:
            warpRouting:
              enabled: true
            originRequest:
              connectTimeout: 1m0s
              tlsTimeout: 1m0s
              tcpKeepAlive: 1m0s
              noHappyEyeballs: false
              keepAliveConnections: 1024
              keepAliveTimeout: 1m0s
              httpHostHeader: baz
              originServerName: foobar
              caPool: /path/to/unsigned/ca/pool
              noTlsVerify: false
              disableChunkedEncoding: false
              bastionMode: false
              proxyAddress: 10.0.0.1
              proxyPort: '8123'
              proxyType: socks
              ipRules:
                - prefix: /web
                  ports:
                    - 80
                    - 443
                  allow: false
            ingressRules:
              - hostname: foo
                path: /bar
                service: http://10.0.0.2:8080
                originRequest:
                  connectTimeout: 2m0s
                  access:
                    required: true
                    teamName: terraform
                    audTags:
                      - AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
              - service: https://10.0.0.3:8081
    

    Create TunnelConfig Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new TunnelConfig(name: string, args: TunnelConfigArgs, opts?: CustomResourceOptions);
    @overload
    def TunnelConfig(resource_name: str,
                     args: TunnelConfigArgs,
                     opts: Optional[ResourceOptions] = None)
    
    @overload
    def TunnelConfig(resource_name: str,
                     opts: Optional[ResourceOptions] = None,
                     account_id: Optional[str] = None,
                     config: Optional[TunnelConfigConfigArgs] = None,
                     tunnel_id: Optional[str] = None)
    func NewTunnelConfig(ctx *Context, name string, args TunnelConfigArgs, opts ...ResourceOption) (*TunnelConfig, error)
    public TunnelConfig(string name, TunnelConfigArgs args, CustomResourceOptions? opts = null)
    public TunnelConfig(String name, TunnelConfigArgs args)
    public TunnelConfig(String name, TunnelConfigArgs args, CustomResourceOptions options)
    
    type: cloudflare:TunnelConfig
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args TunnelConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args TunnelConfigArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args TunnelConfigArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args TunnelConfigArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args TunnelConfigArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var tunnelConfigResource = new Cloudflare.TunnelConfig("tunnelConfigResource", new()
    {
        AccountId = "string",
        Config = new Cloudflare.Inputs.TunnelConfigConfigArgs
        {
            IngressRules = new[]
            {
                new Cloudflare.Inputs.TunnelConfigConfigIngressRuleArgs
                {
                    Service = "string",
                    Hostname = "string",
                    OriginRequest = new Cloudflare.Inputs.TunnelConfigConfigIngressRuleOriginRequestArgs
                    {
                        Access = new Cloudflare.Inputs.TunnelConfigConfigIngressRuleOriginRequestAccessArgs
                        {
                            AudTags = new[]
                            {
                                "string",
                            },
                            Required = false,
                            TeamName = "string",
                        },
                        BastionMode = false,
                        CaPool = "string",
                        ConnectTimeout = "string",
                        DisableChunkedEncoding = false,
                        Http2Origin = false,
                        HttpHostHeader = "string",
                        IpRules = new[]
                        {
                            new Cloudflare.Inputs.TunnelConfigConfigIngressRuleOriginRequestIpRuleArgs
                            {
                                Allow = false,
                                Ports = new[]
                                {
                                    0,
                                },
                                Prefix = "string",
                            },
                        },
                        KeepAliveConnections = 0,
                        KeepAliveTimeout = "string",
                        NoHappyEyeballs = false,
                        NoTlsVerify = false,
                        OriginServerName = "string",
                        ProxyAddress = "string",
                        ProxyPort = 0,
                        ProxyType = "string",
                        TcpKeepAlive = "string",
                        TlsTimeout = "string",
                    },
                    Path = "string",
                },
            },
            OriginRequest = new Cloudflare.Inputs.TunnelConfigConfigOriginRequestArgs
            {
                Access = new Cloudflare.Inputs.TunnelConfigConfigOriginRequestAccessArgs
                {
                    AudTags = new[]
                    {
                        "string",
                    },
                    Required = false,
                    TeamName = "string",
                },
                BastionMode = false,
                CaPool = "string",
                ConnectTimeout = "string",
                DisableChunkedEncoding = false,
                Http2Origin = false,
                HttpHostHeader = "string",
                IpRules = new[]
                {
                    new Cloudflare.Inputs.TunnelConfigConfigOriginRequestIpRuleArgs
                    {
                        Allow = false,
                        Ports = new[]
                        {
                            0,
                        },
                        Prefix = "string",
                    },
                },
                KeepAliveConnections = 0,
                KeepAliveTimeout = "string",
                NoHappyEyeballs = false,
                NoTlsVerify = false,
                OriginServerName = "string",
                ProxyAddress = "string",
                ProxyPort = 0,
                ProxyType = "string",
                TcpKeepAlive = "string",
                TlsTimeout = "string",
            },
            WarpRouting = new Cloudflare.Inputs.TunnelConfigConfigWarpRoutingArgs
            {
                Enabled = false,
            },
        },
        TunnelId = "string",
    });
    
    example, err := cloudflare.NewTunnelConfig(ctx, "tunnelConfigResource", &cloudflare.TunnelConfigArgs{
    	AccountId: pulumi.String("string"),
    	Config: &cloudflare.TunnelConfigConfigArgs{
    		IngressRules: cloudflare.TunnelConfigConfigIngressRuleArray{
    			&cloudflare.TunnelConfigConfigIngressRuleArgs{
    				Service:  pulumi.String("string"),
    				Hostname: pulumi.String("string"),
    				OriginRequest: &cloudflare.TunnelConfigConfigIngressRuleOriginRequestArgs{
    					Access: &cloudflare.TunnelConfigConfigIngressRuleOriginRequestAccessArgs{
    						AudTags: pulumi.StringArray{
    							pulumi.String("string"),
    						},
    						Required: pulumi.Bool(false),
    						TeamName: pulumi.String("string"),
    					},
    					BastionMode:            pulumi.Bool(false),
    					CaPool:                 pulumi.String("string"),
    					ConnectTimeout:         pulumi.String("string"),
    					DisableChunkedEncoding: pulumi.Bool(false),
    					Http2Origin:            pulumi.Bool(false),
    					HttpHostHeader:         pulumi.String("string"),
    					IpRules: cloudflare.TunnelConfigConfigIngressRuleOriginRequestIpRuleArray{
    						&cloudflare.TunnelConfigConfigIngressRuleOriginRequestIpRuleArgs{
    							Allow: pulumi.Bool(false),
    							Ports: pulumi.IntArray{
    								pulumi.Int(0),
    							},
    							Prefix: pulumi.String("string"),
    						},
    					},
    					KeepAliveConnections: pulumi.Int(0),
    					KeepAliveTimeout:     pulumi.String("string"),
    					NoHappyEyeballs:      pulumi.Bool(false),
    					NoTlsVerify:          pulumi.Bool(false),
    					OriginServerName:     pulumi.String("string"),
    					ProxyAddress:         pulumi.String("string"),
    					ProxyPort:            pulumi.Int(0),
    					ProxyType:            pulumi.String("string"),
    					TcpKeepAlive:         pulumi.String("string"),
    					TlsTimeout:           pulumi.String("string"),
    				},
    				Path: pulumi.String("string"),
    			},
    		},
    		OriginRequest: &cloudflare.TunnelConfigConfigOriginRequestArgs{
    			Access: &cloudflare.TunnelConfigConfigOriginRequestAccessArgs{
    				AudTags: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				Required: pulumi.Bool(false),
    				TeamName: pulumi.String("string"),
    			},
    			BastionMode:            pulumi.Bool(false),
    			CaPool:                 pulumi.String("string"),
    			ConnectTimeout:         pulumi.String("string"),
    			DisableChunkedEncoding: pulumi.Bool(false),
    			Http2Origin:            pulumi.Bool(false),
    			HttpHostHeader:         pulumi.String("string"),
    			IpRules: cloudflare.TunnelConfigConfigOriginRequestIpRuleArray{
    				&cloudflare.TunnelConfigConfigOriginRequestIpRuleArgs{
    					Allow: pulumi.Bool(false),
    					Ports: pulumi.IntArray{
    						pulumi.Int(0),
    					},
    					Prefix: pulumi.String("string"),
    				},
    			},
    			KeepAliveConnections: pulumi.Int(0),
    			KeepAliveTimeout:     pulumi.String("string"),
    			NoHappyEyeballs:      pulumi.Bool(false),
    			NoTlsVerify:          pulumi.Bool(false),
    			OriginServerName:     pulumi.String("string"),
    			ProxyAddress:         pulumi.String("string"),
    			ProxyPort:            pulumi.Int(0),
    			ProxyType:            pulumi.String("string"),
    			TcpKeepAlive:         pulumi.String("string"),
    			TlsTimeout:           pulumi.String("string"),
    		},
    		WarpRouting: &cloudflare.TunnelConfigConfigWarpRoutingArgs{
    			Enabled: pulumi.Bool(false),
    		},
    	},
    	TunnelId: pulumi.String("string"),
    })
    
    var tunnelConfigResource = new TunnelConfig("tunnelConfigResource", TunnelConfigArgs.builder()
        .accountId("string")
        .config(TunnelConfigConfigArgs.builder()
            .ingressRules(TunnelConfigConfigIngressRuleArgs.builder()
                .service("string")
                .hostname("string")
                .originRequest(TunnelConfigConfigIngressRuleOriginRequestArgs.builder()
                    .access(TunnelConfigConfigIngressRuleOriginRequestAccessArgs.builder()
                        .audTags("string")
                        .required(false)
                        .teamName("string")
                        .build())
                    .bastionMode(false)
                    .caPool("string")
                    .connectTimeout("string")
                    .disableChunkedEncoding(false)
                    .http2Origin(false)
                    .httpHostHeader("string")
                    .ipRules(TunnelConfigConfigIngressRuleOriginRequestIpRuleArgs.builder()
                        .allow(false)
                        .ports(0)
                        .prefix("string")
                        .build())
                    .keepAliveConnections(0)
                    .keepAliveTimeout("string")
                    .noHappyEyeballs(false)
                    .noTlsVerify(false)
                    .originServerName("string")
                    .proxyAddress("string")
                    .proxyPort(0)
                    .proxyType("string")
                    .tcpKeepAlive("string")
                    .tlsTimeout("string")
                    .build())
                .path("string")
                .build())
            .originRequest(TunnelConfigConfigOriginRequestArgs.builder()
                .access(TunnelConfigConfigOriginRequestAccessArgs.builder()
                    .audTags("string")
                    .required(false)
                    .teamName("string")
                    .build())
                .bastionMode(false)
                .caPool("string")
                .connectTimeout("string")
                .disableChunkedEncoding(false)
                .http2Origin(false)
                .httpHostHeader("string")
                .ipRules(TunnelConfigConfigOriginRequestIpRuleArgs.builder()
                    .allow(false)
                    .ports(0)
                    .prefix("string")
                    .build())
                .keepAliveConnections(0)
                .keepAliveTimeout("string")
                .noHappyEyeballs(false)
                .noTlsVerify(false)
                .originServerName("string")
                .proxyAddress("string")
                .proxyPort(0)
                .proxyType("string")
                .tcpKeepAlive("string")
                .tlsTimeout("string")
                .build())
            .warpRouting(TunnelConfigConfigWarpRoutingArgs.builder()
                .enabled(false)
                .build())
            .build())
        .tunnelId("string")
        .build());
    
    tunnel_config_resource = cloudflare.TunnelConfig("tunnelConfigResource",
        account_id="string",
        config={
            "ingress_rules": [{
                "service": "string",
                "hostname": "string",
                "origin_request": {
                    "access": {
                        "aud_tags": ["string"],
                        "required": False,
                        "team_name": "string",
                    },
                    "bastion_mode": False,
                    "ca_pool": "string",
                    "connect_timeout": "string",
                    "disable_chunked_encoding": False,
                    "http2_origin": False,
                    "http_host_header": "string",
                    "ip_rules": [{
                        "allow": False,
                        "ports": [0],
                        "prefix": "string",
                    }],
                    "keep_alive_connections": 0,
                    "keep_alive_timeout": "string",
                    "no_happy_eyeballs": False,
                    "no_tls_verify": False,
                    "origin_server_name": "string",
                    "proxy_address": "string",
                    "proxy_port": 0,
                    "proxy_type": "string",
                    "tcp_keep_alive": "string",
                    "tls_timeout": "string",
                },
                "path": "string",
            }],
            "origin_request": {
                "access": {
                    "aud_tags": ["string"],
                    "required": False,
                    "team_name": "string",
                },
                "bastion_mode": False,
                "ca_pool": "string",
                "connect_timeout": "string",
                "disable_chunked_encoding": False,
                "http2_origin": False,
                "http_host_header": "string",
                "ip_rules": [{
                    "allow": False,
                    "ports": [0],
                    "prefix": "string",
                }],
                "keep_alive_connections": 0,
                "keep_alive_timeout": "string",
                "no_happy_eyeballs": False,
                "no_tls_verify": False,
                "origin_server_name": "string",
                "proxy_address": "string",
                "proxy_port": 0,
                "proxy_type": "string",
                "tcp_keep_alive": "string",
                "tls_timeout": "string",
            },
            "warp_routing": {
                "enabled": False,
            },
        },
        tunnel_id="string")
    
    const tunnelConfigResource = new cloudflare.TunnelConfig("tunnelConfigResource", {
        accountId: "string",
        config: {
            ingressRules: [{
                service: "string",
                hostname: "string",
                originRequest: {
                    access: {
                        audTags: ["string"],
                        required: false,
                        teamName: "string",
                    },
                    bastionMode: false,
                    caPool: "string",
                    connectTimeout: "string",
                    disableChunkedEncoding: false,
                    http2Origin: false,
                    httpHostHeader: "string",
                    ipRules: [{
                        allow: false,
                        ports: [0],
                        prefix: "string",
                    }],
                    keepAliveConnections: 0,
                    keepAliveTimeout: "string",
                    noHappyEyeballs: false,
                    noTlsVerify: false,
                    originServerName: "string",
                    proxyAddress: "string",
                    proxyPort: 0,
                    proxyType: "string",
                    tcpKeepAlive: "string",
                    tlsTimeout: "string",
                },
                path: "string",
            }],
            originRequest: {
                access: {
                    audTags: ["string"],
                    required: false,
                    teamName: "string",
                },
                bastionMode: false,
                caPool: "string",
                connectTimeout: "string",
                disableChunkedEncoding: false,
                http2Origin: false,
                httpHostHeader: "string",
                ipRules: [{
                    allow: false,
                    ports: [0],
                    prefix: "string",
                }],
                keepAliveConnections: 0,
                keepAliveTimeout: "string",
                noHappyEyeballs: false,
                noTlsVerify: false,
                originServerName: "string",
                proxyAddress: "string",
                proxyPort: 0,
                proxyType: "string",
                tcpKeepAlive: "string",
                tlsTimeout: "string",
            },
            warpRouting: {
                enabled: false,
            },
        },
        tunnelId: "string",
    });
    
    type: cloudflare:TunnelConfig
    properties:
        accountId: string
        config:
            ingressRules:
                - hostname: string
                  originRequest:
                    access:
                        audTags:
                            - string
                        required: false
                        teamName: string
                    bastionMode: false
                    caPool: string
                    connectTimeout: string
                    disableChunkedEncoding: false
                    http2Origin: false
                    httpHostHeader: string
                    ipRules:
                        - allow: false
                          ports:
                            - 0
                          prefix: string
                    keepAliveConnections: 0
                    keepAliveTimeout: string
                    noHappyEyeballs: false
                    noTlsVerify: false
                    originServerName: string
                    proxyAddress: string
                    proxyPort: 0
                    proxyType: string
                    tcpKeepAlive: string
                    tlsTimeout: string
                  path: string
                  service: string
            originRequest:
                access:
                    audTags:
                        - string
                    required: false
                    teamName: string
                bastionMode: false
                caPool: string
                connectTimeout: string
                disableChunkedEncoding: false
                http2Origin: false
                httpHostHeader: string
                ipRules:
                    - allow: false
                      ports:
                        - 0
                      prefix: string
                keepAliveConnections: 0
                keepAliveTimeout: string
                noHappyEyeballs: false
                noTlsVerify: false
                originServerName: string
                proxyAddress: string
                proxyPort: 0
                proxyType: string
                tcpKeepAlive: string
                tlsTimeout: string
            warpRouting:
                enabled: false
        tunnelId: string
    

    TunnelConfig Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The TunnelConfig resource accepts the following input properties:

    AccountId string
    The account identifier to target for the resource.
    Config TunnelConfigConfig
    Configuration block for Tunnel Configuration.
    TunnelId string
    Identifier of the Tunnel to target for this configuration.
    AccountId string
    The account identifier to target for the resource.
    Config TunnelConfigConfigArgs
    Configuration block for Tunnel Configuration.
    TunnelId string
    Identifier of the Tunnel to target for this configuration.
    accountId String
    The account identifier to target for the resource.
    config TunnelConfigConfig
    Configuration block for Tunnel Configuration.
    tunnelId String
    Identifier of the Tunnel to target for this configuration.
    accountId string
    The account identifier to target for the resource.
    config TunnelConfigConfig
    Configuration block for Tunnel Configuration.
    tunnelId string
    Identifier of the Tunnel to target for this configuration.
    account_id str
    The account identifier to target for the resource.
    config TunnelConfigConfigArgs
    Configuration block for Tunnel Configuration.
    tunnel_id str
    Identifier of the Tunnel to target for this configuration.
    accountId String
    The account identifier to target for the resource.
    config Property Map
    Configuration block for Tunnel Configuration.
    tunnelId String
    Identifier of the Tunnel to target for this configuration.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the TunnelConfig resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing TunnelConfig Resource

    Get an existing TunnelConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: TunnelConfigState, opts?: CustomResourceOptions): TunnelConfig
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            account_id: Optional[str] = None,
            config: Optional[TunnelConfigConfigArgs] = None,
            tunnel_id: Optional[str] = None) -> TunnelConfig
    func GetTunnelConfig(ctx *Context, name string, id IDInput, state *TunnelConfigState, opts ...ResourceOption) (*TunnelConfig, error)
    public static TunnelConfig Get(string name, Input<string> id, TunnelConfigState? state, CustomResourceOptions? opts = null)
    public static TunnelConfig get(String name, Output<String> id, TunnelConfigState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccountId string
    The account identifier to target for the resource.
    Config TunnelConfigConfig
    Configuration block for Tunnel Configuration.
    TunnelId string
    Identifier of the Tunnel to target for this configuration.
    AccountId string
    The account identifier to target for the resource.
    Config TunnelConfigConfigArgs
    Configuration block for Tunnel Configuration.
    TunnelId string
    Identifier of the Tunnel to target for this configuration.
    accountId String
    The account identifier to target for the resource.
    config TunnelConfigConfig
    Configuration block for Tunnel Configuration.
    tunnelId String
    Identifier of the Tunnel to target for this configuration.
    accountId string
    The account identifier to target for the resource.
    config TunnelConfigConfig
    Configuration block for Tunnel Configuration.
    tunnelId string
    Identifier of the Tunnel to target for this configuration.
    account_id str
    The account identifier to target for the resource.
    config TunnelConfigConfigArgs
    Configuration block for Tunnel Configuration.
    tunnel_id str
    Identifier of the Tunnel to target for this configuration.
    accountId String
    The account identifier to target for the resource.
    config Property Map
    Configuration block for Tunnel Configuration.
    tunnelId String
    Identifier of the Tunnel to target for this configuration.

    Supporting Types

    TunnelConfigConfig, TunnelConfigConfigArgs

    IngressRules List<TunnelConfigConfigIngressRule>
    Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. Last rule must match all requests, e.g service = "http_status:503". Read more.
    OriginRequest TunnelConfigConfigOriginRequest
    WarpRouting TunnelConfigConfigWarpRouting
    If you're exposing a private network, you need to add the warp-routing key and set it to true.
    IngressRules []TunnelConfigConfigIngressRule
    Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. Last rule must match all requests, e.g service = "http_status:503". Read more.
    OriginRequest TunnelConfigConfigOriginRequest
    WarpRouting TunnelConfigConfigWarpRouting
    If you're exposing a private network, you need to add the warp-routing key and set it to true.
    ingressRules List<TunnelConfigConfigIngressRule>
    Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. Last rule must match all requests, e.g service = "http_status:503". Read more.
    originRequest TunnelConfigConfigOriginRequest
    warpRouting TunnelConfigConfigWarpRouting
    If you're exposing a private network, you need to add the warp-routing key and set it to true.
    ingressRules TunnelConfigConfigIngressRule[]
    Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. Last rule must match all requests, e.g service = "http_status:503". Read more.
    originRequest TunnelConfigConfigOriginRequest
    warpRouting TunnelConfigConfigWarpRouting
    If you're exposing a private network, you need to add the warp-routing key and set it to true.
    ingress_rules Sequence[TunnelConfigConfigIngressRule]
    Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. Last rule must match all requests, e.g service = "http_status:503". Read more.
    origin_request TunnelConfigConfigOriginRequest
    warp_routing TunnelConfigConfigWarpRouting
    If you're exposing a private network, you need to add the warp-routing key and set it to true.
    ingressRules List<Property Map>
    Each incoming request received by cloudflared causes cloudflared to send a request to a local service. This section configures the rules that determine which requests are sent to which local services. Last rule must match all requests, e.g service = "http_status:503". Read more.
    originRequest Property Map
    warpRouting Property Map
    If you're exposing a private network, you need to add the warp-routing key and set it to true.

    TunnelConfigConfigIngressRule, TunnelConfigConfigIngressRuleArgs

    Service string
    Name of the service to which the request will be sent.
    Hostname string
    Hostname to match the incoming request with. If the hostname matches, the request will be sent to the service.
    OriginRequest TunnelConfigConfigIngressRuleOriginRequest
    Path string
    Path of the incoming request. If the path matches, the request will be sent to the local service.
    Service string
    Name of the service to which the request will be sent.
    Hostname string
    Hostname to match the incoming request with. If the hostname matches, the request will be sent to the service.
    OriginRequest TunnelConfigConfigIngressRuleOriginRequest
    Path string
    Path of the incoming request. If the path matches, the request will be sent to the local service.
    service String
    Name of the service to which the request will be sent.
    hostname String
    Hostname to match the incoming request with. If the hostname matches, the request will be sent to the service.
    originRequest TunnelConfigConfigIngressRuleOriginRequest
    path String
    Path of the incoming request. If the path matches, the request will be sent to the local service.
    service string
    Name of the service to which the request will be sent.
    hostname string
    Hostname to match the incoming request with. If the hostname matches, the request will be sent to the service.
    originRequest TunnelConfigConfigIngressRuleOriginRequest
    path string
    Path of the incoming request. If the path matches, the request will be sent to the local service.
    service str
    Name of the service to which the request will be sent.
    hostname str
    Hostname to match the incoming request with. If the hostname matches, the request will be sent to the service.
    origin_request TunnelConfigConfigIngressRuleOriginRequest
    path str
    Path of the incoming request. If the path matches, the request will be sent to the local service.
    service String
    Name of the service to which the request will be sent.
    hostname String
    Hostname to match the incoming request with. If the hostname matches, the request will be sent to the service.
    originRequest Property Map
    path String
    Path of the incoming request. If the path matches, the request will be sent to the local service.

    TunnelConfigConfigIngressRuleOriginRequest, TunnelConfigConfigIngressRuleOriginRequestArgs

    Access TunnelConfigConfigIngressRuleOriginRequestAccess
    Access rules for the ingress service.
    BastionMode bool
    Runs as jump host.
    CaPool string
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    ConnectTimeout string
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    DisableChunkedEncoding bool
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    Http2Origin bool
    Enables HTTP/2 support for the origin connection. Defaults to false.
    HttpHostHeader string
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    IpRules List<TunnelConfigConfigIngressRuleOriginRequestIpRule>
    IP rules for the proxy service.
    KeepAliveConnections int
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    KeepAliveTimeout string
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    NoHappyEyeballs bool
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    NoTlsVerify bool
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    OriginServerName string
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    ProxyAddress string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    ProxyPort int
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    ProxyType string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    TcpKeepAlive string
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    TlsTimeout string
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    Access TunnelConfigConfigIngressRuleOriginRequestAccess
    Access rules for the ingress service.
    BastionMode bool
    Runs as jump host.
    CaPool string
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    ConnectTimeout string
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    DisableChunkedEncoding bool
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    Http2Origin bool
    Enables HTTP/2 support for the origin connection. Defaults to false.
    HttpHostHeader string
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    IpRules []TunnelConfigConfigIngressRuleOriginRequestIpRule
    IP rules for the proxy service.
    KeepAliveConnections int
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    KeepAliveTimeout string
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    NoHappyEyeballs bool
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    NoTlsVerify bool
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    OriginServerName string
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    ProxyAddress string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    ProxyPort int
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    ProxyType string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    TcpKeepAlive string
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    TlsTimeout string
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access TunnelConfigConfigIngressRuleOriginRequestAccess
    Access rules for the ingress service.
    bastionMode Boolean
    Runs as jump host.
    caPool String
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connectTimeout String
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disableChunkedEncoding Boolean
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2Origin Boolean
    Enables HTTP/2 support for the origin connection. Defaults to false.
    httpHostHeader String
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ipRules List<TunnelConfigConfigIngressRuleOriginRequestIpRule>
    IP rules for the proxy service.
    keepAliveConnections Integer
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keepAliveTimeout String
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    noHappyEyeballs Boolean
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    noTlsVerify Boolean
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    originServerName String
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxyAddress String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxyPort Integer
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxyType String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcpKeepAlive String
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tlsTimeout String
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access TunnelConfigConfigIngressRuleOriginRequestAccess
    Access rules for the ingress service.
    bastionMode boolean
    Runs as jump host.
    caPool string
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connectTimeout string
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disableChunkedEncoding boolean
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2Origin boolean
    Enables HTTP/2 support for the origin connection. Defaults to false.
    httpHostHeader string
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ipRules TunnelConfigConfigIngressRuleOriginRequestIpRule[]
    IP rules for the proxy service.
    keepAliveConnections number
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keepAliveTimeout string
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    noHappyEyeballs boolean
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    noTlsVerify boolean
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    originServerName string
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxyAddress string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxyPort number
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxyType string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcpKeepAlive string
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tlsTimeout string
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access TunnelConfigConfigIngressRuleOriginRequestAccess
    Access rules for the ingress service.
    bastion_mode bool
    Runs as jump host.
    ca_pool str
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connect_timeout str
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disable_chunked_encoding bool
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2_origin bool
    Enables HTTP/2 support for the origin connection. Defaults to false.
    http_host_header str
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ip_rules Sequence[TunnelConfigConfigIngressRuleOriginRequestIpRule]
    IP rules for the proxy service.
    keep_alive_connections int
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keep_alive_timeout str
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    no_happy_eyeballs bool
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    no_tls_verify bool
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    origin_server_name str
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxy_address str
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxy_port int
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxy_type str
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcp_keep_alive str
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tls_timeout str
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access Property Map
    Access rules for the ingress service.
    bastionMode Boolean
    Runs as jump host.
    caPool String
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connectTimeout String
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disableChunkedEncoding Boolean
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2Origin Boolean
    Enables HTTP/2 support for the origin connection. Defaults to false.
    httpHostHeader String
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ipRules List<Property Map>
    IP rules for the proxy service.
    keepAliveConnections Number
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keepAliveTimeout String
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    noHappyEyeballs Boolean
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    noTlsVerify Boolean
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    originServerName String
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxyAddress String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxyPort Number
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxyType String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcpKeepAlive String
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tlsTimeout String
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.

    TunnelConfigConfigIngressRuleOriginRequestAccess, TunnelConfigConfigIngressRuleOriginRequestAccessArgs

    AudTags List<string>
    Audience tags of the access rule.
    Required bool
    Whether the access rule is required.
    TeamName string
    Name of the team to which the access rule applies.
    AudTags []string
    Audience tags of the access rule.
    Required bool
    Whether the access rule is required.
    TeamName string
    Name of the team to which the access rule applies.
    audTags List<String>
    Audience tags of the access rule.
    required Boolean
    Whether the access rule is required.
    teamName String
    Name of the team to which the access rule applies.
    audTags string[]
    Audience tags of the access rule.
    required boolean
    Whether the access rule is required.
    teamName string
    Name of the team to which the access rule applies.
    aud_tags Sequence[str]
    Audience tags of the access rule.
    required bool
    Whether the access rule is required.
    team_name str
    Name of the team to which the access rule applies.
    audTags List<String>
    Audience tags of the access rule.
    required Boolean
    Whether the access rule is required.
    teamName String
    Name of the team to which the access rule applies.

    TunnelConfigConfigIngressRuleOriginRequestIpRule, TunnelConfigConfigIngressRuleOriginRequestIpRuleArgs

    Allow bool
    Whether to allow the IP prefix.
    Ports List<int>
    Ports to use within the IP rule.
    Prefix string
    IP rule prefix.
    Allow bool
    Whether to allow the IP prefix.
    Ports []int
    Ports to use within the IP rule.
    Prefix string
    IP rule prefix.
    allow Boolean
    Whether to allow the IP prefix.
    ports List<Integer>
    Ports to use within the IP rule.
    prefix String
    IP rule prefix.
    allow boolean
    Whether to allow the IP prefix.
    ports number[]
    Ports to use within the IP rule.
    prefix string
    IP rule prefix.
    allow bool
    Whether to allow the IP prefix.
    ports Sequence[int]
    Ports to use within the IP rule.
    prefix str
    IP rule prefix.
    allow Boolean
    Whether to allow the IP prefix.
    ports List<Number>
    Ports to use within the IP rule.
    prefix String
    IP rule prefix.

    TunnelConfigConfigOriginRequest, TunnelConfigConfigOriginRequestArgs

    Access TunnelConfigConfigOriginRequestAccess
    Access rules for the ingress service.
    BastionMode bool
    Runs as jump host.
    CaPool string
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    ConnectTimeout string
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    DisableChunkedEncoding bool
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    Http2Origin bool
    Enables HTTP/2 support for the origin connection. Defaults to false.
    HttpHostHeader string
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    IpRules List<TunnelConfigConfigOriginRequestIpRule>
    IP rules for the proxy service.
    KeepAliveConnections int
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    KeepAliveTimeout string
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    NoHappyEyeballs bool
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    NoTlsVerify bool
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    OriginServerName string
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    ProxyAddress string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    ProxyPort int
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    ProxyType string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    TcpKeepAlive string
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    TlsTimeout string
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    Access TunnelConfigConfigOriginRequestAccess
    Access rules for the ingress service.
    BastionMode bool
    Runs as jump host.
    CaPool string
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    ConnectTimeout string
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    DisableChunkedEncoding bool
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    Http2Origin bool
    Enables HTTP/2 support for the origin connection. Defaults to false.
    HttpHostHeader string
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    IpRules []TunnelConfigConfigOriginRequestIpRule
    IP rules for the proxy service.
    KeepAliveConnections int
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    KeepAliveTimeout string
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    NoHappyEyeballs bool
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    NoTlsVerify bool
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    OriginServerName string
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    ProxyAddress string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    ProxyPort int
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    ProxyType string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    TcpKeepAlive string
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    TlsTimeout string
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access TunnelConfigConfigOriginRequestAccess
    Access rules for the ingress service.
    bastionMode Boolean
    Runs as jump host.
    caPool String
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connectTimeout String
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disableChunkedEncoding Boolean
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2Origin Boolean
    Enables HTTP/2 support for the origin connection. Defaults to false.
    httpHostHeader String
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ipRules List<TunnelConfigConfigOriginRequestIpRule>
    IP rules for the proxy service.
    keepAliveConnections Integer
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keepAliveTimeout String
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    noHappyEyeballs Boolean
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    noTlsVerify Boolean
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    originServerName String
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxyAddress String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxyPort Integer
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxyType String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcpKeepAlive String
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tlsTimeout String
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access TunnelConfigConfigOriginRequestAccess
    Access rules for the ingress service.
    bastionMode boolean
    Runs as jump host.
    caPool string
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connectTimeout string
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disableChunkedEncoding boolean
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2Origin boolean
    Enables HTTP/2 support for the origin connection. Defaults to false.
    httpHostHeader string
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ipRules TunnelConfigConfigOriginRequestIpRule[]
    IP rules for the proxy service.
    keepAliveConnections number
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keepAliveTimeout string
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    noHappyEyeballs boolean
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    noTlsVerify boolean
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    originServerName string
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxyAddress string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxyPort number
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxyType string
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcpKeepAlive string
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tlsTimeout string
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access TunnelConfigConfigOriginRequestAccess
    Access rules for the ingress service.
    bastion_mode bool
    Runs as jump host.
    ca_pool str
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connect_timeout str
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disable_chunked_encoding bool
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2_origin bool
    Enables HTTP/2 support for the origin connection. Defaults to false.
    http_host_header str
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ip_rules Sequence[TunnelConfigConfigOriginRequestIpRule]
    IP rules for the proxy service.
    keep_alive_connections int
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keep_alive_timeout str
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    no_happy_eyeballs bool
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    no_tls_verify bool
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    origin_server_name str
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxy_address str
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxy_port int
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxy_type str
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcp_keep_alive str
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tls_timeout str
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.
    access Property Map
    Access rules for the ingress service.
    bastionMode Boolean
    Runs as jump host.
    caPool String
    Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare. Defaults to "".
    connectTimeout String
    Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by tlsTimeout. Defaults to 30s.
    disableChunkedEncoding Boolean
    Disables chunked transfer encoding. Useful if you are running a Web Server Gateway Interface (WSGI) server. Defaults to false.
    http2Origin Boolean
    Enables HTTP/2 support for the origin connection. Defaults to false.
    httpHostHeader String
    Sets the HTTP Host header on requests sent to the local service. Defaults to "".
    ipRules List<Property Map>
    IP rules for the proxy service.
    keepAliveConnections Number
    Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections. Defaults to 100.
    keepAliveTimeout String
    Timeout after which an idle keepalive connection can be discarded. Defaults to 1m30s.
    noHappyEyeballs Boolean
    Disable the “happy eyeballs” algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols. Defaults to false.
    noTlsVerify Boolean
    Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted. Defaults to false.
    originServerName String
    Hostname that cloudflared should expect from your origin server certificate. Defaults to "".
    proxyAddress String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy. Defaults to 127.0.0.1.
    proxyPort Number
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen. Defaults to 0.
    proxyType String
    cloudflared starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Available values: "", socks. Defaults to "".
    tcpKeepAlive String
    The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server. Defaults to 30s.
    tlsTimeout String
    Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server. Defaults to 10s.

    TunnelConfigConfigOriginRequestAccess, TunnelConfigConfigOriginRequestAccessArgs

    AudTags List<string>
    Audience tags of the access rule.
    Required bool
    Whether the access rule is required.
    TeamName string
    Name of the team to which the access rule applies.
    AudTags []string
    Audience tags of the access rule.
    Required bool
    Whether the access rule is required.
    TeamName string
    Name of the team to which the access rule applies.
    audTags List<String>
    Audience tags of the access rule.
    required Boolean
    Whether the access rule is required.
    teamName String
    Name of the team to which the access rule applies.
    audTags string[]
    Audience tags of the access rule.
    required boolean
    Whether the access rule is required.
    teamName string
    Name of the team to which the access rule applies.
    aud_tags Sequence[str]
    Audience tags of the access rule.
    required bool
    Whether the access rule is required.
    team_name str
    Name of the team to which the access rule applies.
    audTags List<String>
    Audience tags of the access rule.
    required Boolean
    Whether the access rule is required.
    teamName String
    Name of the team to which the access rule applies.

    TunnelConfigConfigOriginRequestIpRule, TunnelConfigConfigOriginRequestIpRuleArgs

    Allow bool
    Whether to allow the IP prefix.
    Ports List<int>
    Ports to use within the IP rule.
    Prefix string
    IP rule prefix.
    Allow bool
    Whether to allow the IP prefix.
    Ports []int
    Ports to use within the IP rule.
    Prefix string
    IP rule prefix.
    allow Boolean
    Whether to allow the IP prefix.
    ports List<Integer>
    Ports to use within the IP rule.
    prefix String
    IP rule prefix.
    allow boolean
    Whether to allow the IP prefix.
    ports number[]
    Ports to use within the IP rule.
    prefix string
    IP rule prefix.
    allow bool
    Whether to allow the IP prefix.
    ports Sequence[int]
    Ports to use within the IP rule.
    prefix str
    IP rule prefix.
    allow Boolean
    Whether to allow the IP prefix.
    ports List<Number>
    Ports to use within the IP rule.
    prefix String
    IP rule prefix.

    TunnelConfigConfigWarpRouting, TunnelConfigConfigWarpRoutingArgs

    Enabled bool
    Whether WARP routing is enabled.
    Enabled bool
    Whether WARP routing is enabled.
    enabled Boolean
    Whether WARP routing is enabled.
    enabled boolean
    Whether WARP routing is enabled.
    enabled bool
    Whether WARP routing is enabled.
    enabled Boolean
    Whether WARP routing is enabled.

    Import

    $ pulumi import cloudflare:index/tunnelConfig:TunnelConfig example <account_id>/<tunnel_id>
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Cloudflare pulumi/pulumi-cloudflare
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the cloudflare Terraform Provider.
    cloudflare logo
    Cloudflare v5.44.0 published on Wednesday, Nov 27, 2024 by Pulumi