Google Cloud (GCP) Classic

v6.38.0 published on Thursday, Sep 22, 2022 by Pulumi

ForwardingRule

A ForwardingRule resource. A ForwardingRule resource specifies which pool of target virtual machines to forward a packet to if it matches the given [IPAddress, IPProtocol, portRange] tuple.

To get more information about ForwardingRule, see:

Example Usage

Internal Http Lb With Mig Backend

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.Network;
import com.pulumi.gcp.compute.NetworkArgs;
import com.pulumi.gcp.compute.Subnetwork;
import com.pulumi.gcp.compute.SubnetworkArgs;
import com.pulumi.gcp.compute.RegionHealthCheck;
import com.pulumi.gcp.compute.RegionHealthCheckArgs;
import com.pulumi.gcp.compute.inputs.RegionHealthCheckHttpHealthCheckArgs;
import com.pulumi.gcp.compute.InstanceTemplate;
import com.pulumi.gcp.compute.InstanceTemplateArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateNetworkInterfaceArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateDiskArgs;
import com.pulumi.gcp.compute.RegionInstanceGroupManager;
import com.pulumi.gcp.compute.RegionInstanceGroupManagerArgs;
import com.pulumi.gcp.compute.inputs.RegionInstanceGroupManagerVersionArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.inputs.RegionBackendServiceBackendArgs;
import com.pulumi.gcp.compute.RegionUrlMap;
import com.pulumi.gcp.compute.RegionUrlMapArgs;
import com.pulumi.gcp.compute.RegionTargetHttpProxy;
import com.pulumi.gcp.compute.RegionTargetHttpProxyArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import com.pulumi.gcp.compute.Firewall;
import com.pulumi.gcp.compute.FirewallArgs;
import com.pulumi.gcp.compute.inputs.FirewallAllowArgs;
import com.pulumi.gcp.compute.Instance;
import com.pulumi.gcp.compute.InstanceArgs;
import com.pulumi.gcp.compute.inputs.InstanceNetworkInterfaceArgs;
import com.pulumi.gcp.compute.inputs.InstanceBootDiskArgs;
import com.pulumi.gcp.compute.inputs.InstanceBootDiskInitializeParamsArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var ilbNetwork = new Network("ilbNetwork", NetworkArgs.builder()        
            .autoCreateSubnetworks(false)
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var proxySubnet = new Subnetwork("proxySubnet", SubnetworkArgs.builder()        
            .ipCidrRange("10.0.0.0/24")
            .region("europe-west1")
            .purpose("INTERNAL_HTTPS_LOAD_BALANCER")
            .role("ACTIVE")
            .network(ilbNetwork.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var ilbSubnet = new Subnetwork("ilbSubnet", SubnetworkArgs.builder()        
            .ipCidrRange("10.0.1.0/24")
            .region("europe-west1")
            .network(ilbNetwork.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionHealthCheck = new RegionHealthCheck("defaultRegionHealthCheck", RegionHealthCheckArgs.builder()        
            .region("europe-west1")
            .httpHealthCheck(RegionHealthCheckHttpHealthCheckArgs.builder()
                .portSpecification("USE_SERVING_PORT")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var instanceTemplate = new InstanceTemplate("instanceTemplate", InstanceTemplateArgs.builder()        
            .machineType("e2-small")
            .tags("http-server")
            .networkInterfaces(InstanceTemplateNetworkInterfaceArgs.builder()
                .network(ilbNetwork.id())
                .subnetwork(ilbSubnet.id())
                .accessConfigs()
                .build())
            .disks(InstanceTemplateDiskArgs.builder()
                .sourceImage("debian-cloud/debian-10")
                .autoDelete(true)
                .boot(true)
                .build())
            .metadata(Map.of("startup-script", """
#! /bin/bash
set -euo pipefail

export DEBIAN_FRONTEND=noninteractive
apt-get update
apt-get install -y nginx-light jq

NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')

cat <<EOF > /var/www/html/index.html
<pre>
Name: $NAME
IP: $IP
Metadata: $METADATA
</pre>
EOF
            """))
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var mig = new RegionInstanceGroupManager("mig", RegionInstanceGroupManagerArgs.builder()        
            .region("europe-west1")
            .versions(RegionInstanceGroupManagerVersionArgs.builder()
                .instanceTemplate(instanceTemplate.id())
                .name("primary")
                .build())
            .baseInstanceName("vm")
            .targetSize(2)
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionBackendService = new RegionBackendService("defaultRegionBackendService", RegionBackendServiceArgs.builder()        
            .region("europe-west1")
            .protocol("HTTP")
            .loadBalancingScheme("INTERNAL_MANAGED")
            .timeoutSec(10)
            .healthChecks(defaultRegionHealthCheck.id())
            .backends(RegionBackendServiceBackendArgs.builder()
                .group(mig.instanceGroup())
                .balancingMode("UTILIZATION")
                .capacityScaler(1)
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionUrlMap = new RegionUrlMap("defaultRegionUrlMap", RegionUrlMapArgs.builder()        
            .region("europe-west1")
            .defaultService(defaultRegionBackendService.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionTargetHttpProxy = new RegionTargetHttpProxy("defaultRegionTargetHttpProxy", RegionTargetHttpProxyArgs.builder()        
            .region("europe-west1")
            .urlMap(defaultRegionUrlMap.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var googleComputeForwardingRule = new ForwardingRule("googleComputeForwardingRule", ForwardingRuleArgs.builder()        
            .region("europe-west1")
            .ipProtocol("TCP")
            .loadBalancingScheme("INTERNAL_MANAGED")
            .portRange("80")
            .target(defaultRegionTargetHttpProxy.id())
            .network(ilbNetwork.id())
            .subnetwork(ilbSubnet.id())
            .networkTier("PREMIUM")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(proxySubnet)
                .build());

        var fw_iap = new Firewall("fw-iap", FirewallArgs.builder()        
            .direction("INGRESS")
            .network(ilbNetwork.id())
            .sourceRanges(            
                "130.211.0.0/22",
                "35.191.0.0/16",
                "35.235.240.0/20")
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fw_ilb_to_backends = new Firewall("fw-ilb-to-backends", FirewallArgs.builder()        
            .direction("INGRESS")
            .network(ilbNetwork.id())
            .sourceRanges("10.0.0.0/24")
            .targetTags("http-server")
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .ports(                
                    "80",
                    "443",
                    "8080")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var vm_test = new Instance("vm-test", InstanceArgs.builder()        
            .zone("europe-west1-b")
            .machineType("e2-small")
            .networkInterfaces(InstanceNetworkInterfaceArgs.builder()
                .network(ilbNetwork.id())
                .subnetwork(ilbSubnet.id())
                .build())
            .bootDisk(InstanceBootDiskArgs.builder()
                .initializeParams(InstanceBootDiskInitializeParamsArgs.builder()
                    .image("debian-cloud/debian-10")
                    .build())
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

    }
}

Coming soon!

Coming soon!

resources:
  # Internal HTTP load balancer with a managed instance group backend

  # VPC network
  ilbNetwork:
    type: gcp:compute:Network
    properties:
      autoCreateSubnetworks: false
    options:
      provider: ${["google-beta"]}
  # proxy-only subnet
  proxySubnet:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.0.0.0/24
      region: europe-west1
      purpose: INTERNAL_HTTPS_LOAD_BALANCER
      role: ACTIVE
      network: ${ilbNetwork.id}
    options:
      provider: ${["google-beta"]}
  # backend subnet
  ilbSubnet:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.0.1.0/24
      region: europe-west1
      network: ${ilbNetwork.id}
    options:
      provider: ${["google-beta"]}
  # forwarding rule
  googleComputeForwardingRule:
    type: gcp:compute:ForwardingRule
    properties:
      region: europe-west1
      ipProtocol: TCP
      loadBalancingScheme: INTERNAL_MANAGED
      portRange: 80
      target: ${defaultRegionTargetHttpProxy.id}
      network: ${ilbNetwork.id}
      subnetwork: ${ilbSubnet.id}
      networkTier: PREMIUM
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${proxySubnet}
  # HTTP target proxy
  defaultRegionTargetHttpProxy:
    type: gcp:compute:RegionTargetHttpProxy
    properties:
      region: europe-west1
      urlMap: ${defaultRegionUrlMap.id}
    options:
      provider: ${["google-beta"]}
  # URL map
  defaultRegionUrlMap:
    type: gcp:compute:RegionUrlMap
    properties:
      region: europe-west1
      defaultService: ${defaultRegionBackendService.id}
    options:
      provider: ${["google-beta"]}
  # backend service
  defaultRegionBackendService:
    type: gcp:compute:RegionBackendService
    properties:
      region: europe-west1
      protocol: HTTP
      loadBalancingScheme: INTERNAL_MANAGED
      timeoutSec: 10
      healthChecks:
        - ${defaultRegionHealthCheck.id}
      backends:
        - group: ${mig.instanceGroup}
          balancingMode: UTILIZATION
          capacityScaler: 1
    options:
      provider: ${["google-beta"]}
  # instance template
  instanceTemplate:
    type: gcp:compute:InstanceTemplate
    properties:
      machineType: e2-small
      tags:
        - http-server
      networkInterfaces:
        - network: ${ilbNetwork.id}
          subnetwork: ${ilbSubnet.id}
          accessConfigs:
            - {}
      disks:
        - sourceImage: debian-cloud/debian-10
          autoDelete: true
          boot: true
      # install nginx and serve a simple web page
      metadata:
        startup-script: |
          #! /bin/bash
          set -euo pipefail

          export DEBIAN_FRONTEND=noninteractive
          apt-get update
          apt-get install -y nginx-light jq

          NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
          IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
          METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')

          cat <<EOF > /var/www/html/index.html
          <pre>
          Name: $NAME
          IP: $IP
          Metadata: $METADATA
          </pre>
          EOF          
    options:
      provider: ${["google-beta"]}
  # health check
  defaultRegionHealthCheck:
    type: gcp:compute:RegionHealthCheck
    properties:
      region: europe-west1
      httpHealthCheck:
        portSpecification: USE_SERVING_PORT
    options:
      provider: ${["google-beta"]}
  # MIG
  mig:
    type: gcp:compute:RegionInstanceGroupManager
    properties:
      region: europe-west1
      versions:
        - instanceTemplate: ${instanceTemplate.id}
          name: primary
      baseInstanceName: vm
      targetSize: 2
    options:
      provider: ${["google-beta"]}
  # allow all access from IAP and health check ranges
  fw-iap:
    type: gcp:compute:Firewall
    properties:
      direction: INGRESS
      network: ${ilbNetwork.id}
      sourceRanges:
        - 130.211.0.0/22
        - 35.191.0.0/16
        - 35.235.240.0/20
      allows:
        - protocol: tcp
    options:
      provider: ${["google-beta"]}
  # allow http from proxy subnet to backends
  fw-ilb-to-backends:
    type: gcp:compute:Firewall
    properties:
      direction: INGRESS
      network: ${ilbNetwork.id}
      sourceRanges:
        - 10.0.0.0/24
      targetTags:
        - http-server
      allows:
        - protocol: tcp
          ports:
            - 80
            - 443
            - 8080
    options:
      provider: ${["google-beta"]}
  # test instance
  vm-test:
    type: gcp:compute:Instance
    properties:
      zone: europe-west1-b
      machineType: e2-small
      networkInterfaces:
        - network: ${ilbNetwork.id}
          subnetwork: ${ilbSubnet.id}
      bootDisk:
        initializeParams:
          image: debian-cloud/debian-10
    options:
      provider: ${["google-beta"]}

Internal Tcp Udp Lb With Mig Backend

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.Network;
import com.pulumi.gcp.compute.NetworkArgs;
import com.pulumi.gcp.compute.Subnetwork;
import com.pulumi.gcp.compute.SubnetworkArgs;
import com.pulumi.gcp.compute.RegionHealthCheck;
import com.pulumi.gcp.compute.RegionHealthCheckArgs;
import com.pulumi.gcp.compute.inputs.RegionHealthCheckHttpHealthCheckArgs;
import com.pulumi.gcp.compute.InstanceTemplate;
import com.pulumi.gcp.compute.InstanceTemplateArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateNetworkInterfaceArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateDiskArgs;
import com.pulumi.gcp.compute.RegionInstanceGroupManager;
import com.pulumi.gcp.compute.RegionInstanceGroupManagerArgs;
import com.pulumi.gcp.compute.inputs.RegionInstanceGroupManagerVersionArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.inputs.RegionBackendServiceBackendArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import com.pulumi.gcp.compute.Firewall;
import com.pulumi.gcp.compute.FirewallArgs;
import com.pulumi.gcp.compute.inputs.FirewallAllowArgs;
import com.pulumi.gcp.compute.Instance;
import com.pulumi.gcp.compute.InstanceArgs;
import com.pulumi.gcp.compute.inputs.InstanceNetworkInterfaceArgs;
import com.pulumi.gcp.compute.inputs.InstanceBootDiskArgs;
import com.pulumi.gcp.compute.inputs.InstanceBootDiskInitializeParamsArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var ilbNetwork = new Network("ilbNetwork", NetworkArgs.builder()        
            .autoCreateSubnetworks(false)
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var ilbSubnet = new Subnetwork("ilbSubnet", SubnetworkArgs.builder()        
            .ipCidrRange("10.0.1.0/24")
            .region("europe-west1")
            .network(ilbNetwork.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionHealthCheck = new RegionHealthCheck("defaultRegionHealthCheck", RegionHealthCheckArgs.builder()        
            .region("europe-west1")
            .httpHealthCheck(RegionHealthCheckHttpHealthCheckArgs.builder()
                .port("80")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var instanceTemplate = new InstanceTemplate("instanceTemplate", InstanceTemplateArgs.builder()        
            .machineType("e2-small")
            .tags(            
                "allow-ssh",
                "allow-health-check")
            .networkInterfaces(InstanceTemplateNetworkInterfaceArgs.builder()
                .network(ilbNetwork.id())
                .subnetwork(ilbSubnet.id())
                .accessConfigs()
                .build())
            .disks(InstanceTemplateDiskArgs.builder()
                .sourceImage("debian-cloud/debian-10")
                .autoDelete(true)
                .boot(true)
                .build())
            .metadata(Map.of("startup-script", """
#! /bin/bash
set -euo pipefail

export DEBIAN_FRONTEND=noninteractive
apt-get update
apt-get install -y nginx-light jq

NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')

cat <<EOF > /var/www/html/index.html
<pre>
Name: $NAME
IP: $IP
Metadata: $METADATA
</pre>
EOF
            """))
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var mig = new RegionInstanceGroupManager("mig", RegionInstanceGroupManagerArgs.builder()        
            .region("europe-west1")
            .versions(RegionInstanceGroupManagerVersionArgs.builder()
                .instanceTemplate(instanceTemplate.id())
                .name("primary")
                .build())
            .baseInstanceName("vm")
            .targetSize(2)
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionBackendService = new RegionBackendService("defaultRegionBackendService", RegionBackendServiceArgs.builder()        
            .region("europe-west1")
            .protocol("TCP")
            .loadBalancingScheme("INTERNAL")
            .healthChecks(defaultRegionHealthCheck.id())
            .backends(RegionBackendServiceBackendArgs.builder()
                .group(mig.instanceGroup())
                .balancingMode("CONNECTION")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var googleComputeForwardingRule = new ForwardingRule("googleComputeForwardingRule", ForwardingRuleArgs.builder()        
            .backendService(defaultRegionBackendService.id())
            .region("europe-west1")
            .ipProtocol("TCP")
            .loadBalancingScheme("INTERNAL")
            .allPorts(true)
            .allowGlobalAccess(true)
            .network(ilbNetwork.id())
            .subnetwork(ilbSubnet.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fwHc = new Firewall("fwHc", FirewallArgs.builder()        
            .direction("INGRESS")
            .network(ilbNetwork.id())
            .sourceRanges(            
                "130.211.0.0/22",
                "35.191.0.0/16",
                "35.235.240.0/20")
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .build())
            .sourceTags("allow-health-check")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fwIlbToBackends = new Firewall("fwIlbToBackends", FirewallArgs.builder()        
            .direction("INGRESS")
            .network(ilbNetwork.id())
            .sourceRanges("10.0.1.0/24")
            .allows(            
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("udp")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("icmp")
                    .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fwIlbSsh = new Firewall("fwIlbSsh", FirewallArgs.builder()        
            .direction("INGRESS")
            .network(ilbNetwork.id())
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .ports("22")
                .build())
            .sourceTags("allow-ssh")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var vmTest = new Instance("vmTest", InstanceArgs.builder()        
            .zone("europe-west1-b")
            .machineType("e2-small")
            .networkInterfaces(InstanceNetworkInterfaceArgs.builder()
                .network(ilbNetwork.id())
                .subnetwork(ilbSubnet.id())
                .build())
            .bootDisk(InstanceBootDiskArgs.builder()
                .initializeParams(InstanceBootDiskInitializeParamsArgs.builder()
                    .image("debian-cloud/debian-10")
                    .build())
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

    }
}

Coming soon!

Coming soon!

resources:
  # Internal TCP/UDP load balancer with a managed instance group backend

  # VPC
  ilbNetwork:
    type: gcp:compute:Network
    properties:
      autoCreateSubnetworks: false
    options:
      provider: ${["google-beta"]}
  # backed subnet
  ilbSubnet:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.0.1.0/24
      region: europe-west1
      network: ${ilbNetwork.id}
    options:
      provider: ${["google-beta"]}
  # forwarding rule
  googleComputeForwardingRule:
    type: gcp:compute:ForwardingRule
    properties:
      backendService: ${defaultRegionBackendService.id}
      region: europe-west1
      ipProtocol: TCP
      loadBalancingScheme: INTERNAL
      allPorts: true
      allowGlobalAccess: true
      network: ${ilbNetwork.id}
      subnetwork: ${ilbSubnet.id}
    options:
      provider: ${["google-beta"]}
  # backend service
  defaultRegionBackendService:
    type: gcp:compute:RegionBackendService
    properties:
      region: europe-west1
      protocol: TCP
      loadBalancingScheme: INTERNAL
      healthChecks:
        - ${defaultRegionHealthCheck.id}
      backends:
        - group: ${mig.instanceGroup}
          balancingMode: CONNECTION
    options:
      provider: ${["google-beta"]}
  # instance template
  instanceTemplate:
    type: gcp:compute:InstanceTemplate
    properties:
      machineType: e2-small
      tags:
        - allow-ssh
        - allow-health-check
      networkInterfaces:
        - network: ${ilbNetwork.id}
          subnetwork: ${ilbSubnet.id}
          accessConfigs:
            - {}
      disks:
        - sourceImage: debian-cloud/debian-10
          autoDelete: true
          boot: true
      # install nginx and serve a simple web page
      metadata:
        startup-script: |
          #! /bin/bash
          set -euo pipefail

          export DEBIAN_FRONTEND=noninteractive
          apt-get update
          apt-get install -y nginx-light jq

          NAME=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/hostname")
          IP=$(curl -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/0/ip")
          METADATA=$(curl -f -H "Metadata-Flavor: Google" "http://metadata.google.internal/computeMetadata/v1/instance/attributes/?recursive=True" | jq 'del(.["startup-script"])')

          cat <<EOF > /var/www/html/index.html
          <pre>
          Name: $NAME
          IP: $IP
          Metadata: $METADATA
          </pre>
          EOF          
    options:
      provider: ${["google-beta"]}
  # health check
  defaultRegionHealthCheck:
    type: gcp:compute:RegionHealthCheck
    properties:
      region: europe-west1
      httpHealthCheck:
        port: 80
    options:
      provider: ${["google-beta"]}
  # MIG
  mig:
    type: gcp:compute:RegionInstanceGroupManager
    properties:
      region: europe-west1
      versions:
        - instanceTemplate: ${instanceTemplate.id}
          name: primary
      baseInstanceName: vm
      targetSize: 2
    options:
      provider: ${["google-beta"]}
  # allow all access from health check ranges
  fwHc:
    type: gcp:compute:Firewall
    properties:
      direction: INGRESS
      network: ${ilbNetwork.id}
      sourceRanges:
        - 130.211.0.0/22
        - 35.191.0.0/16
        - 35.235.240.0/20
      allows:
        - protocol: tcp
      sourceTags:
        - allow-health-check
    options:
      provider: ${["google-beta"]}
  # allow communication within the subnet
  fwIlbToBackends:
    type: gcp:compute:Firewall
    properties:
      direction: INGRESS
      network: ${ilbNetwork.id}
      sourceRanges:
        - 10.0.1.0/24
      allows:
        - protocol: tcp
        - protocol: udp
        - protocol: icmp
    options:
      provider: ${["google-beta"]}
  # allow SSH
  fwIlbSsh:
    type: gcp:compute:Firewall
    properties:
      direction: INGRESS
      network: ${ilbNetwork.id}
      allows:
        - protocol: tcp
          ports:
            - 22
      sourceTags:
        - allow-ssh
    options:
      provider: ${["google-beta"]}
  # test instance
  vmTest:
    type: gcp:compute:Instance
    properties:
      zone: europe-west1-b
      machineType: e2-small
      networkInterfaces:
        - network: ${ilbNetwork.id}
          subnetwork: ${ilbSubnet.id}
      bootDisk:
        initializeParams:
          image: debian-cloud/debian-10
    options:
      provider: ${["google-beta"]}

Forwarding Rule Externallb

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.RegionHealthCheck;
import com.pulumi.gcp.compute.RegionHealthCheckArgs;
import com.pulumi.gcp.compute.inputs.RegionHealthCheckTcpHealthCheckArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var hc = new RegionHealthCheck("hc", RegionHealthCheckArgs.builder()        
            .checkIntervalSec(1)
            .timeoutSec(1)
            .region("us-central1")
            .tcpHealthCheck(RegionHealthCheckTcpHealthCheckArgs.builder()
                .port("80")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var backend = new RegionBackendService("backend", RegionBackendServiceArgs.builder()        
            .region("us-central1")
            .loadBalancingScheme("EXTERNAL")
            .healthChecks(hc.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var default_ = new ForwardingRule("default", ForwardingRuleArgs.builder()        
            .region("us-central1")
            .portRange(80)
            .backendService(backend.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

    }
}

Coming soon!

Coming soon!

resources:
  # Forwarding rule for External Network Load Balancing using Backend Services
  default:
    type: gcp:compute:ForwardingRule
    properties:
      region: us-central1
      portRange: 80
      backendService: ${backend.id}
    options:
      provider: ${["google-beta"]}
  backend:
    type: gcp:compute:RegionBackendService
    properties:
      region: us-central1
      loadBalancingScheme: EXTERNAL
      healthChecks:
        - ${hc.id}
    options:
      provider: ${["google-beta"]}
  hc:
    type: gcp:compute:RegionHealthCheck
    properties:
      checkIntervalSec: 1
      timeoutSec: 1
      region: us-central1
      tcpHealthCheck:
        port: 80
    options:
      provider: ${["google-beta"]}

Forwarding Rule Global Internallb

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.HealthCheck;
import com.pulumi.gcp.compute.HealthCheckArgs;
import com.pulumi.gcp.compute.inputs.HealthCheckTcpHealthCheckArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.Network;
import com.pulumi.gcp.compute.NetworkArgs;
import com.pulumi.gcp.compute.Subnetwork;
import com.pulumi.gcp.compute.SubnetworkArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var hc = new HealthCheck("hc", HealthCheckArgs.builder()        
            .checkIntervalSec(1)
            .timeoutSec(1)
            .tcpHealthCheck(HealthCheckTcpHealthCheckArgs.builder()
                .port("80")
                .build())
            .build());

        var backend = new RegionBackendService("backend", RegionBackendServiceArgs.builder()        
            .region("us-central1")
            .healthChecks(hc.id())
            .build());

        var defaultNetwork = new Network("defaultNetwork", NetworkArgs.builder()        
            .autoCreateSubnetworks(false)
            .build());

        var defaultSubnetwork = new Subnetwork("defaultSubnetwork", SubnetworkArgs.builder()        
            .ipCidrRange("10.0.0.0/16")
            .region("us-central1")
            .network(defaultNetwork.id())
            .build());

        var defaultForwardingRule = new ForwardingRule("defaultForwardingRule", ForwardingRuleArgs.builder()        
            .region("us-central1")
            .loadBalancingScheme("INTERNAL")
            .backendService(backend.id())
            .allPorts(true)
            .allowGlobalAccess(true)
            .network(defaultNetwork.name())
            .subnetwork(defaultSubnetwork.name())
            .build());

    }
}

Coming soon!

Coming soon!

resources:
  # Forwarding rule for Internal Load Balancing
  defaultForwardingRule:
    type: gcp:compute:ForwardingRule
    properties:
      region: us-central1
      loadBalancingScheme: INTERNAL
      backendService: ${backend.id}
      allPorts: true
      allowGlobalAccess: true
      network: ${defaultNetwork.name}
      subnetwork: ${defaultSubnetwork.name}
  backend:
    type: gcp:compute:RegionBackendService
    properties:
      region: us-central1
      healthChecks:
        - ${hc.id}
  hc:
    type: gcp:compute:HealthCheck
    properties:
      checkIntervalSec: 1
      timeoutSec: 1
      tcpHealthCheck:
        port: 80
  defaultNetwork:
    type: gcp:compute:Network
    properties:
      autoCreateSubnetworks: false
  defaultSubnetwork:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.0.0.0/16
      region: us-central1
      network: ${defaultNetwork.id}

Forwarding Rule Basic

using System.Collections.Generic;
using Pulumi;
using Gcp = Pulumi.Gcp;

return await Deployment.RunAsync(() => 
{
    var defaultTargetPool = new Gcp.Compute.TargetPool("defaultTargetPool");

    var defaultForwardingRule = new Gcp.Compute.ForwardingRule("defaultForwardingRule", new()
    {
        Target = defaultTargetPool.Id,
        PortRange = "80",
    });

});
package main

import (
	"github.com/pulumi/pulumi-gcp/sdk/v6/go/gcp/compute"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		defaultTargetPool, err := compute.NewTargetPool(ctx, "defaultTargetPool", nil)
		if err != nil {
			return err
		}
		_, err = compute.NewForwardingRule(ctx, "defaultForwardingRule", &compute.ForwardingRuleArgs{
			Target:    defaultTargetPool.ID(),
			PortRange: pulumi.String("80"),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.TargetPool;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var defaultTargetPool = new TargetPool("defaultTargetPool");

        var defaultForwardingRule = new ForwardingRule("defaultForwardingRule", ForwardingRuleArgs.builder()        
            .target(defaultTargetPool.id())
            .portRange("80")
            .build());

    }
}
import pulumi
import pulumi_gcp as gcp

default_target_pool = gcp.compute.TargetPool("defaultTargetPool")
default_forwarding_rule = gcp.compute.ForwardingRule("defaultForwardingRule",
    target=default_target_pool.id,
    port_range="80")
import * as pulumi from "@pulumi/pulumi";
import * as gcp from "@pulumi/gcp";

const defaultTargetPool = new gcp.compute.TargetPool("defaultTargetPool", {});
const defaultForwardingRule = new gcp.compute.ForwardingRule("defaultForwardingRule", {
    target: defaultTargetPool.id,
    portRange: "80",
});
resources:
  defaultForwardingRule:
    type: gcp:compute:ForwardingRule
    properties:
      target: ${defaultTargetPool.id}
      portRange: 80
  defaultTargetPool:
    type: gcp:compute:TargetPool

Forwarding Rule L3 Default

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.RegionHealthCheck;
import com.pulumi.gcp.compute.RegionHealthCheckArgs;
import com.pulumi.gcp.compute.inputs.RegionHealthCheckTcpHealthCheckArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var healthCheck = new RegionHealthCheck("healthCheck", RegionHealthCheckArgs.builder()        
            .region("us-central1")
            .tcpHealthCheck(RegionHealthCheckTcpHealthCheckArgs.builder()
                .port(80)
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var service = new RegionBackendService("service", RegionBackendServiceArgs.builder()        
            .region("us-central1")
            .healthChecks(healthCheck.id())
            .protocol("UNSPECIFIED")
            .loadBalancingScheme("EXTERNAL")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fwdRule = new ForwardingRule("fwdRule", ForwardingRuleArgs.builder()        
            .backendService(service.id())
            .ipProtocol("L3_DEFAULT")
            .allPorts(true)
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

    }
}

Coming soon!

Coming soon!

resources:
  fwdRule:
    type: gcp:compute:ForwardingRule
    properties:
      backendService: ${service.id}
      ipProtocol: L3_DEFAULT
      allPorts: true
    options:
      provider: ${["google-beta"]}
  service:
    type: gcp:compute:RegionBackendService
    properties:
      region: us-central1
      healthChecks:
        - ${healthCheck.id}
      protocol: UNSPECIFIED
      loadBalancingScheme: EXTERNAL
    options:
      provider: ${["google-beta"]}
  healthCheck:
    type: gcp:compute:RegionHealthCheck
    properties:
      region: us-central1
      tcpHealthCheck:
        port: 80
    options:
      provider: ${["google-beta"]}

Forwarding Rule Internallb

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.HealthCheck;
import com.pulumi.gcp.compute.HealthCheckArgs;
import com.pulumi.gcp.compute.inputs.HealthCheckTcpHealthCheckArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.Network;
import com.pulumi.gcp.compute.NetworkArgs;
import com.pulumi.gcp.compute.Subnetwork;
import com.pulumi.gcp.compute.SubnetworkArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var hc = new HealthCheck("hc", HealthCheckArgs.builder()        
            .checkIntervalSec(1)
            .timeoutSec(1)
            .tcpHealthCheck(HealthCheckTcpHealthCheckArgs.builder()
                .port("80")
                .build())
            .build());

        var backend = new RegionBackendService("backend", RegionBackendServiceArgs.builder()        
            .region("us-central1")
            .healthChecks(hc.id())
            .build());

        var defaultNetwork = new Network("defaultNetwork", NetworkArgs.builder()        
            .autoCreateSubnetworks(false)
            .build());

        var defaultSubnetwork = new Subnetwork("defaultSubnetwork", SubnetworkArgs.builder()        
            .ipCidrRange("10.0.0.0/16")
            .region("us-central1")
            .network(defaultNetwork.id())
            .build());

        var defaultForwardingRule = new ForwardingRule("defaultForwardingRule", ForwardingRuleArgs.builder()        
            .region("us-central1")
            .loadBalancingScheme("INTERNAL")
            .backendService(backend.id())
            .allPorts(true)
            .network(defaultNetwork.name())
            .subnetwork(defaultSubnetwork.name())
            .build());

    }
}

Coming soon!

Coming soon!

resources:
  # Forwarding rule for Internal Load Balancing
  defaultForwardingRule:
    type: gcp:compute:ForwardingRule
    properties:
      region: us-central1
      loadBalancingScheme: INTERNAL
      backendService: ${backend.id}
      allPorts: true
      network: ${defaultNetwork.name}
      subnetwork: ${defaultSubnetwork.name}
  backend:
    type: gcp:compute:RegionBackendService
    properties:
      region: us-central1
      healthChecks:
        - ${hc.id}
  hc:
    type: gcp:compute:HealthCheck
    properties:
      checkIntervalSec: 1
      timeoutSec: 1
      tcpHealthCheck:
        port: 80
  defaultNetwork:
    type: gcp:compute:Network
    properties:
      autoCreateSubnetworks: false
  defaultSubnetwork:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.0.0.0/16
      region: us-central1
      network: ${defaultNetwork.id}

Forwarding Rule Http Lb

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.ComputeFunctions;
import com.pulumi.gcp.compute.inputs.GetImageArgs;
import com.pulumi.gcp.compute.Network;
import com.pulumi.gcp.compute.NetworkArgs;
import com.pulumi.gcp.compute.Subnetwork;
import com.pulumi.gcp.compute.SubnetworkArgs;
import com.pulumi.gcp.compute.InstanceTemplate;
import com.pulumi.gcp.compute.InstanceTemplateArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateNetworkInterfaceArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateDiskArgs;
import com.pulumi.gcp.compute.RegionInstanceGroupManager;
import com.pulumi.gcp.compute.RegionInstanceGroupManagerArgs;
import com.pulumi.gcp.compute.inputs.RegionInstanceGroupManagerVersionArgs;
import com.pulumi.gcp.compute.Firewall;
import com.pulumi.gcp.compute.FirewallArgs;
import com.pulumi.gcp.compute.inputs.FirewallAllowArgs;
import com.pulumi.gcp.compute.RegionHealthCheck;
import com.pulumi.gcp.compute.RegionHealthCheckArgs;
import com.pulumi.gcp.compute.inputs.RegionHealthCheckHttpHealthCheckArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.inputs.RegionBackendServiceBackendArgs;
import com.pulumi.gcp.compute.RegionUrlMap;
import com.pulumi.gcp.compute.RegionUrlMapArgs;
import com.pulumi.gcp.compute.RegionTargetHttpProxy;
import com.pulumi.gcp.compute.RegionTargetHttpProxyArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        final var debianImage = ComputeFunctions.getImage(GetImageArgs.builder()
            .family("debian-11")
            .project("debian-cloud")
            .build());

        var defaultNetwork = new Network("defaultNetwork", NetworkArgs.builder()        
            .autoCreateSubnetworks(false)
            .routingMode("REGIONAL")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultSubnetwork = new Subnetwork("defaultSubnetwork", SubnetworkArgs.builder()        
            .ipCidrRange("10.1.2.0/24")
            .region("us-central1")
            .network(defaultNetwork.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var instanceTemplate = new InstanceTemplate("instanceTemplate", InstanceTemplateArgs.builder()        
            .machineType("e2-medium")
            .networkInterfaces(InstanceTemplateNetworkInterfaceArgs.builder()
                .network(defaultNetwork.id())
                .subnetwork(defaultSubnetwork.id())
                .build())
            .disks(InstanceTemplateDiskArgs.builder()
                .sourceImage(debianImage.applyValue(getImageResult -> getImageResult.selfLink()))
                .autoDelete(true)
                .boot(true)
                .build())
            .tags(            
                "allow-ssh",
                "load-balanced-backend")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var rigm = new RegionInstanceGroupManager("rigm", RegionInstanceGroupManagerArgs.builder()        
            .region("us-central1")
            .versions(RegionInstanceGroupManagerVersionArgs.builder()
                .instanceTemplate(instanceTemplate.id())
                .name("primary")
                .build())
            .baseInstanceName("internal-glb")
            .targetSize(1)
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fw1 = new Firewall("fw1", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges("10.1.2.0/24")
            .allows(            
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("udp")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("icmp")
                    .build())
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fw2 = new Firewall("fw2", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges("0.0.0.0/0")
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .ports("22")
                .build())
            .targetTags("allow-ssh")
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw1)
                .build());

        var fw3 = new Firewall("fw3", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges(            
                "130.211.0.0/22",
                "35.191.0.0/16")
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .build())
            .targetTags("load-balanced-backend")
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw2)
                .build());

        var fw4 = new Firewall("fw4", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges("10.129.0.0/26")
            .targetTags("load-balanced-backend")
            .allows(            
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .ports("80")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .ports("443")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .ports("8000")
                    .build())
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw3)
                .build());

        var defaultRegionHealthCheck = new RegionHealthCheck("defaultRegionHealthCheck", RegionHealthCheckArgs.builder()        
            .region("us-central1")
            .httpHealthCheck(RegionHealthCheckHttpHealthCheckArgs.builder()
                .portSpecification("USE_SERVING_PORT")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw4)
                .build());

        var defaultRegionBackendService = new RegionBackendService("defaultRegionBackendService", RegionBackendServiceArgs.builder()        
            .loadBalancingScheme("INTERNAL_MANAGED")
            .backends(RegionBackendServiceBackendArgs.builder()
                .group(rigm.instanceGroup())
                .balancingMode("UTILIZATION")
                .capacityScaler(1)
                .build())
            .region("us-central1")
            .protocol("HTTP")
            .timeoutSec(10)
            .healthChecks(defaultRegionHealthCheck.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionUrlMap = new RegionUrlMap("defaultRegionUrlMap", RegionUrlMapArgs.builder()        
            .region("us-central1")
            .defaultService(defaultRegionBackendService.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionTargetHttpProxy = new RegionTargetHttpProxy("defaultRegionTargetHttpProxy", RegionTargetHttpProxyArgs.builder()        
            .region("us-central1")
            .urlMap(defaultRegionUrlMap.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var proxy = new Subnetwork("proxy", SubnetworkArgs.builder()        
            .ipCidrRange("10.129.0.0/26")
            .region("us-central1")
            .network(defaultNetwork.id())
            .purpose("INTERNAL_HTTPS_LOAD_BALANCER")
            .role("ACTIVE")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultForwardingRule = new ForwardingRule("defaultForwardingRule", ForwardingRuleArgs.builder()        
            .region("us-central1")
            .ipProtocol("TCP")
            .loadBalancingScheme("INTERNAL_MANAGED")
            .portRange("80")
            .target(defaultRegionTargetHttpProxy.id())
            .network(defaultNetwork.id())
            .subnetwork(defaultSubnetwork.id())
            .networkTier("PREMIUM")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(proxy)
                .build());

    }
}

Coming soon!

Coming soon!

resources:
  # Forwarding rule for Internal Load Balancing
  defaultForwardingRule:
    type: gcp:compute:ForwardingRule
    properties:
      region: us-central1
      ipProtocol: TCP
      loadBalancingScheme: INTERNAL_MANAGED
      portRange: 80
      target: ${defaultRegionTargetHttpProxy.id}
      network: ${defaultNetwork.id}
      subnetwork: ${defaultSubnetwork.id}
      networkTier: PREMIUM
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${proxy}
  defaultRegionTargetHttpProxy:
    type: gcp:compute:RegionTargetHttpProxy
    properties:
      region: us-central1
      urlMap: ${defaultRegionUrlMap.id}
    options:
      provider: ${["google-beta"]}
  defaultRegionUrlMap:
    type: gcp:compute:RegionUrlMap
    properties:
      region: us-central1
      defaultService: ${defaultRegionBackendService.id}
    options:
      provider: ${["google-beta"]}
  defaultRegionBackendService:
    type: gcp:compute:RegionBackendService
    properties:
      loadBalancingScheme: INTERNAL_MANAGED
      backends:
        - group: ${rigm.instanceGroup}
          balancingMode: UTILIZATION
          capacityScaler: 1
      region: us-central1
      protocol: HTTP
      timeoutSec: 10
      healthChecks:
        - ${defaultRegionHealthCheck.id}
    options:
      provider: ${["google-beta"]}
  rigm:
    type: gcp:compute:RegionInstanceGroupManager
    properties:
      region: us-central1
      versions:
        - instanceTemplate: ${instanceTemplate.id}
          name: primary
      baseInstanceName: internal-glb
      targetSize: 1
    options:
      provider: ${["google-beta"]}
  instanceTemplate:
    type: gcp:compute:InstanceTemplate
    properties:
      machineType: e2-medium
      networkInterfaces:
        - network: ${defaultNetwork.id}
          subnetwork: ${defaultSubnetwork.id}
      disks:
        - sourceImage: ${debianImage.selfLink}
          autoDelete: true
          boot: true
      tags:
        - allow-ssh
        - load-balanced-backend
    options:
      provider: ${["google-beta"]}
  defaultRegionHealthCheck:
    type: gcp:compute:RegionHealthCheck
    properties:
      region: us-central1
      httpHealthCheck:
        portSpecification: USE_SERVING_PORT
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw4}
  fw1:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 10.1.2.0/24
      allows:
        - protocol: tcp
        - protocol: udp
        - protocol: icmp
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
  fw2:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 0.0.0.0/0
      allows:
        - protocol: tcp
          ports:
            - 22
      targetTags:
        - allow-ssh
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw1}
  fw3:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 130.211.0.0/22
        - 35.191.0.0/16
      allows:
        - protocol: tcp
      targetTags:
        - load-balanced-backend
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw2}
  fw4:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 10.129.0.0/26
      targetTags:
        - load-balanced-backend
      allows:
        - protocol: tcp
          ports:
            - 80
        - protocol: tcp
          ports:
            - 443
        - protocol: tcp
          ports:
            - 8000
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw3}
  defaultNetwork:
    type: gcp:compute:Network
    properties:
      autoCreateSubnetworks: false
      routingMode: REGIONAL
    options:
      provider: ${["google-beta"]}
  defaultSubnetwork:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.1.2.0/24
      region: us-central1
      network: ${defaultNetwork.id}
    options:
      provider: ${["google-beta"]}
  proxy:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.129.0.0/26
      region: us-central1
      network: ${defaultNetwork.id}
      purpose: INTERNAL_HTTPS_LOAD_BALANCER
      role: ACTIVE
    options:
      provider: ${["google-beta"]}
variables:
  debianImage:
    Fn::Invoke:
      Function: gcp:compute:getImage
      Arguments:
        family: debian-11
        project: debian-cloud

Forwarding Rule Regional Http Xlb

Coming soon!

Coming soon!

package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.compute.ComputeFunctions;
import com.pulumi.gcp.compute.inputs.GetImageArgs;
import com.pulumi.gcp.compute.Network;
import com.pulumi.gcp.compute.NetworkArgs;
import com.pulumi.gcp.compute.Subnetwork;
import com.pulumi.gcp.compute.SubnetworkArgs;
import com.pulumi.gcp.compute.InstanceTemplate;
import com.pulumi.gcp.compute.InstanceTemplateArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateNetworkInterfaceArgs;
import com.pulumi.gcp.compute.inputs.InstanceTemplateDiskArgs;
import com.pulumi.gcp.compute.RegionInstanceGroupManager;
import com.pulumi.gcp.compute.RegionInstanceGroupManagerArgs;
import com.pulumi.gcp.compute.inputs.RegionInstanceGroupManagerVersionArgs;
import com.pulumi.gcp.compute.Firewall;
import com.pulumi.gcp.compute.FirewallArgs;
import com.pulumi.gcp.compute.inputs.FirewallAllowArgs;
import com.pulumi.gcp.compute.RegionHealthCheck;
import com.pulumi.gcp.compute.RegionHealthCheckArgs;
import com.pulumi.gcp.compute.inputs.RegionHealthCheckHttpHealthCheckArgs;
import com.pulumi.gcp.compute.RegionBackendService;
import com.pulumi.gcp.compute.RegionBackendServiceArgs;
import com.pulumi.gcp.compute.inputs.RegionBackendServiceBackendArgs;
import com.pulumi.gcp.compute.RegionUrlMap;
import com.pulumi.gcp.compute.RegionUrlMapArgs;
import com.pulumi.gcp.compute.RegionTargetHttpProxy;
import com.pulumi.gcp.compute.RegionTargetHttpProxyArgs;
import com.pulumi.gcp.compute.Address;
import com.pulumi.gcp.compute.AddressArgs;
import com.pulumi.gcp.compute.ForwardingRule;
import com.pulumi.gcp.compute.ForwardingRuleArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        final var debianImage = ComputeFunctions.getImage(GetImageArgs.builder()
            .family("debian-11")
            .project("debian-cloud")
            .build());

        var defaultNetwork = new Network("defaultNetwork", NetworkArgs.builder()        
            .autoCreateSubnetworks(false)
            .routingMode("REGIONAL")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultSubnetwork = new Subnetwork("defaultSubnetwork", SubnetworkArgs.builder()        
            .ipCidrRange("10.1.2.0/24")
            .region("us-central1")
            .network(defaultNetwork.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var instanceTemplate = new InstanceTemplate("instanceTemplate", InstanceTemplateArgs.builder()        
            .machineType("e2-medium")
            .networkInterfaces(InstanceTemplateNetworkInterfaceArgs.builder()
                .network(defaultNetwork.id())
                .subnetwork(defaultSubnetwork.id())
                .build())
            .disks(InstanceTemplateDiskArgs.builder()
                .sourceImage(debianImage.applyValue(getImageResult -> getImageResult.selfLink()))
                .autoDelete(true)
                .boot(true)
                .build())
            .tags(            
                "allow-ssh",
                "load-balanced-backend")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var rigm = new RegionInstanceGroupManager("rigm", RegionInstanceGroupManagerArgs.builder()        
            .region("us-central1")
            .versions(RegionInstanceGroupManagerVersionArgs.builder()
                .instanceTemplate(instanceTemplate.id())
                .name("primary")
                .build())
            .baseInstanceName("internal-glb")
            .targetSize(1)
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fw1 = new Firewall("fw1", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges("10.1.2.0/24")
            .allows(            
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("udp")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("icmp")
                    .build())
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var fw2 = new Firewall("fw2", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges("0.0.0.0/0")
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .ports("22")
                .build())
            .targetTags("allow-ssh")
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw1)
                .build());

        var fw3 = new Firewall("fw3", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges(            
                "130.211.0.0/22",
                "35.191.0.0/16")
            .allows(FirewallAllowArgs.builder()
                .protocol("tcp")
                .build())
            .targetTags("load-balanced-backend")
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw2)
                .build());

        var fw4 = new Firewall("fw4", FirewallArgs.builder()        
            .network(defaultNetwork.id())
            .sourceRanges("10.129.0.0/26")
            .targetTags("load-balanced-backend")
            .allows(            
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .ports("80")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .ports("443")
                    .build(),
                FirewallAllowArgs.builder()
                    .protocol("tcp")
                    .ports("8000")
                    .build())
            .direction("INGRESS")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw3)
                .build());

        var defaultRegionHealthCheck = new RegionHealthCheck("defaultRegionHealthCheck", RegionHealthCheckArgs.builder()        
            .region("us-central1")
            .httpHealthCheck(RegionHealthCheckHttpHealthCheckArgs.builder()
                .portSpecification("USE_SERVING_PORT")
                .build())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(fw4)
                .build());

        var defaultRegionBackendService = new RegionBackendService("defaultRegionBackendService", RegionBackendServiceArgs.builder()        
            .loadBalancingScheme("EXTERNAL_MANAGED")
            .backends(RegionBackendServiceBackendArgs.builder()
                .group(rigm.instanceGroup())
                .balancingMode("UTILIZATION")
                .capacityScaler(1)
                .build())
            .region("us-central1")
            .protocol("HTTP")
            .timeoutSec(10)
            .healthChecks(defaultRegionHealthCheck.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionUrlMap = new RegionUrlMap("defaultRegionUrlMap", RegionUrlMapArgs.builder()        
            .region("us-central1")
            .defaultService(defaultRegionBackendService.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultRegionTargetHttpProxy = new RegionTargetHttpProxy("defaultRegionTargetHttpProxy", RegionTargetHttpProxyArgs.builder()        
            .region("us-central1")
            .urlMap(defaultRegionUrlMap.id())
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultAddress = new Address("defaultAddress", AddressArgs.builder()        
            .region("us-central1")
            .networkTier("STANDARD")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var proxy = new Subnetwork("proxy", SubnetworkArgs.builder()        
            .ipCidrRange("10.129.0.0/26")
            .region("us-central1")
            .network(defaultNetwork.id())
            .purpose("REGIONAL_MANAGED_PROXY")
            .role("ACTIVE")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .build());

        var defaultForwardingRule = new ForwardingRule("defaultForwardingRule", ForwardingRuleArgs.builder()        
            .region("us-central1")
            .ipProtocol("TCP")
            .loadBalancingScheme("EXTERNAL_MANAGED")
            .portRange("80")
            .target(defaultRegionTargetHttpProxy.id())
            .network(defaultNetwork.id())
            .ipAddress(defaultAddress.id())
            .networkTier("STANDARD")
            .build(), CustomResourceOptions.builder()
                .provider(google_beta)
                .dependsOn(proxy)
                .build());

    }
}

Coming soon!

Coming soon!

resources:
  # Forwarding rule for Regional External Load Balancing
  defaultForwardingRule:
    type: gcp:compute:ForwardingRule
    properties:
      region: us-central1
      ipProtocol: TCP
      loadBalancingScheme: EXTERNAL_MANAGED
      portRange: 80
      target: ${defaultRegionTargetHttpProxy.id}
      network: ${defaultNetwork.id}
      ipAddress: ${defaultAddress.id}
      networkTier: STANDARD
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${proxy}
  defaultRegionTargetHttpProxy:
    type: gcp:compute:RegionTargetHttpProxy
    properties:
      region: us-central1
      urlMap: ${defaultRegionUrlMap.id}
    options:
      provider: ${["google-beta"]}
  defaultRegionUrlMap:
    type: gcp:compute:RegionUrlMap
    properties:
      region: us-central1
      defaultService: ${defaultRegionBackendService.id}
    options:
      provider: ${["google-beta"]}
  defaultRegionBackendService:
    type: gcp:compute:RegionBackendService
    properties:
      loadBalancingScheme: EXTERNAL_MANAGED
      backends:
        - group: ${rigm.instanceGroup}
          balancingMode: UTILIZATION
          capacityScaler: 1
      region: us-central1
      protocol: HTTP
      timeoutSec: 10
      healthChecks:
        - ${defaultRegionHealthCheck.id}
    options:
      provider: ${["google-beta"]}
  rigm:
    type: gcp:compute:RegionInstanceGroupManager
    properties:
      region: us-central1
      versions:
        - instanceTemplate: ${instanceTemplate.id}
          name: primary
      baseInstanceName: internal-glb
      targetSize: 1
    options:
      provider: ${["google-beta"]}
  instanceTemplate:
    type: gcp:compute:InstanceTemplate
    properties:
      machineType: e2-medium
      networkInterfaces:
        - network: ${defaultNetwork.id}
          subnetwork: ${defaultSubnetwork.id}
      disks:
        - sourceImage: ${debianImage.selfLink}
          autoDelete: true
          boot: true
      tags:
        - allow-ssh
        - load-balanced-backend
    options:
      provider: ${["google-beta"]}
  defaultRegionHealthCheck:
    type: gcp:compute:RegionHealthCheck
    properties:
      region: us-central1
      httpHealthCheck:
        portSpecification: USE_SERVING_PORT
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw4}
  defaultAddress:
    type: gcp:compute:Address
    properties:
      region: us-central1
      networkTier: STANDARD
    options:
      provider: ${["google-beta"]}
  fw1:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 10.1.2.0/24
      allows:
        - protocol: tcp
        - protocol: udp
        - protocol: icmp
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
  fw2:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 0.0.0.0/0
      allows:
        - protocol: tcp
          ports:
            - 22
      targetTags:
        - allow-ssh
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw1}
  fw3:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 130.211.0.0/22
        - 35.191.0.0/16
      allows:
        - protocol: tcp
      targetTags:
        - load-balanced-backend
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw2}
  fw4:
    type: gcp:compute:Firewall
    properties:
      network: ${defaultNetwork.id}
      sourceRanges:
        - 10.129.0.0/26
      targetTags:
        - load-balanced-backend
      allows:
        - protocol: tcp
          ports:
            - 80
        - protocol: tcp
          ports:
            - 443
        - protocol: tcp
          ports:
            - 8000
      direction: INGRESS
    options:
      provider: ${["google-beta"]}
      dependson:
        - ${fw3}
  defaultNetwork:
    type: gcp:compute:Network
    properties:
      autoCreateSubnetworks: false
      routingMode: REGIONAL
    options:
      provider: ${["google-beta"]}
  defaultSubnetwork:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.1.2.0/24
      region: us-central1
      network: ${defaultNetwork.id}
    options:
      provider: ${["google-beta"]}
  proxy:
    type: gcp:compute:Subnetwork
    properties:
      ipCidrRange: 10.129.0.0/26
      region: us-central1
      network: ${defaultNetwork.id}
      purpose: REGIONAL_MANAGED_PROXY
      role: ACTIVE
    options:
      provider: ${["google-beta"]}
variables:
  debianImage:
    Fn::Invoke:
      Function: gcp:compute:getImage
      Arguments:
        family: debian-11
        project: debian-cloud

Create a ForwardingRule Resource

new ForwardingRule(name: string, args?: ForwardingRuleArgs, opts?: CustomResourceOptions);
@overload
def ForwardingRule(resource_name: str,
                   opts: Optional[ResourceOptions] = None,
                   all_ports: Optional[bool] = None,
                   allow_global_access: Optional[bool] = None,
                   backend_service: Optional[str] = None,
                   description: Optional[str] = None,
                   ip_address: Optional[str] = None,
                   ip_protocol: Optional[str] = None,
                   is_mirroring_collector: Optional[bool] = None,
                   labels: Optional[Mapping[str, str]] = None,
                   load_balancing_scheme: Optional[str] = None,
                   name: Optional[str] = None,
                   network: Optional[str] = None,
                   network_tier: Optional[str] = None,
                   port_range: Optional[str] = None,
                   ports: Optional[Sequence[str]] = None,
                   project: Optional[str] = None,
                   region: Optional[str] = None,
                   service_directory_registrations: Optional[Sequence[ForwardingRuleServiceDirectoryRegistrationArgs]] = None,
                   service_label: Optional[str] = None,
                   subnetwork: Optional[str] = None,
                   target: Optional[str] = None)
@overload
def ForwardingRule(resource_name: str,
                   args: Optional[ForwardingRuleArgs] = None,
                   opts: Optional[ResourceOptions] = None)
func NewForwardingRule(ctx *Context, name string, args *ForwardingRuleArgs, opts ...ResourceOption) (*ForwardingRule, error)
public ForwardingRule(string name, ForwardingRuleArgs? args = null, CustomResourceOptions? opts = null)
public ForwardingRule(String name, ForwardingRuleArgs args)
public ForwardingRule(String name, ForwardingRuleArgs args, CustomResourceOptions options)
type: gcp:compute:ForwardingRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

name string
The unique name of the resource.
args ForwardingRuleArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args ForwardingRuleArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args ForwardingRuleArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args ForwardingRuleArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name String
The unique name of the resource.
args ForwardingRuleArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

ForwardingRule Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The ForwardingRule resource accepts the following input properties:

AllPorts bool

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

AllowGlobalAccess bool

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

BackendService string

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

Description string

An optional description of this resource. Provide this property when you create the resource.

IpAddress string

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

IpProtocol string

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

IsMirroringCollector bool

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

Labels Dictionary<string, string>

Labels to apply to this forwarding rule. A list of key->value pairs.

LoadBalancingScheme string

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

Name string

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

Network string

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

NetworkTier string

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

PortRange string

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
Ports List<string>

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

Project string

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

Region string

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

ServiceDirectoryRegistrations List<ForwardingRuleServiceDirectoryRegistrationArgs>

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

ServiceLabel string

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

Subnetwork string

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

Target string

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

AllPorts bool

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

AllowGlobalAccess bool

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

BackendService string

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

Description string

An optional description of this resource. Provide this property when you create the resource.

IpAddress string

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

IpProtocol string

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

IsMirroringCollector bool

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

Labels map[string]string

Labels to apply to this forwarding rule. A list of key->value pairs.

LoadBalancingScheme string

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

Name string

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

Network string

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

NetworkTier string

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

PortRange string

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
Ports []string

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

Project string

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

Region string

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

ServiceDirectoryRegistrations []ForwardingRuleServiceDirectoryRegistrationArgs

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

ServiceLabel string

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

Subnetwork string

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

Target string

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

allPorts Boolean

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allowGlobalAccess Boolean

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backendService String

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

description String

An optional description of this resource. Provide this property when you create the resource.

ipAddress String

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ipProtocol String

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

isMirroringCollector Boolean

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

labels Map<String,String>

Labels to apply to this forwarding rule. A list of key->value pairs.

loadBalancingScheme String

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name String

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network String

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

networkTier String

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

portRange String

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports List<String>

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project String

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

region String

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

serviceDirectoryRegistrations List<ForwardingRuleServiceDirectoryRegistrationArgs>

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

serviceLabel String

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

subnetwork String

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target String

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

allPorts boolean

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allowGlobalAccess boolean

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backendService string

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

description string

An optional description of this resource. Provide this property when you create the resource.

ipAddress string

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ipProtocol string

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

isMirroringCollector boolean

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

labels {[key: string]: string}

Labels to apply to this forwarding rule. A list of key->value pairs.

loadBalancingScheme string

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name string

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network string

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

networkTier string

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

portRange string

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports string[]

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project string

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

region string

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

serviceDirectoryRegistrations ForwardingRuleServiceDirectoryRegistrationArgs[]

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

serviceLabel string

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

subnetwork string

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target string

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

all_ports bool

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allow_global_access bool

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backend_service str

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

description str

An optional description of this resource. Provide this property when you create the resource.

ip_address str

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ip_protocol str

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

is_mirroring_collector bool

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

labels Mapping[str, str]

Labels to apply to this forwarding rule. A list of key->value pairs.

load_balancing_scheme str

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name str

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network str

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

network_tier str

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

port_range str

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports Sequence[str]

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project str

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

region str

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

service_directory_registrations Sequence[ForwardingRuleServiceDirectoryRegistrationArgs]

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

service_label str

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

subnetwork str

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target str

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

allPorts Boolean

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allowGlobalAccess Boolean

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backendService String

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

description String

An optional description of this resource. Provide this property when you create the resource.

ipAddress String

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ipProtocol String

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

isMirroringCollector Boolean

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

labels Map<String>

Labels to apply to this forwarding rule. A list of key->value pairs.

loadBalancingScheme String

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name String

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network String

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

networkTier String

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

portRange String

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports List<String>

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project String

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

region String

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

serviceDirectoryRegistrations List<Property Map>

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

serviceLabel String

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

subnetwork String

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target String

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

Outputs

All input properties are implicitly available as output properties. Additionally, the ForwardingRule resource produces the following output properties:

CreationTimestamp string

[Output Only] Creation timestamp in RFC3339 text format.

Id string

The provider-assigned unique ID for this managed resource.

LabelFingerprint string

Used internally during label updates.

PscConnectionId string

The PSC connection id of the PSC Forwarding Rule.

PscConnectionStatus string

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

SelfLink string

The URI of the created resource.

ServiceName string

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

CreationTimestamp string

[Output Only] Creation timestamp in RFC3339 text format.

Id string

The provider-assigned unique ID for this managed resource.

LabelFingerprint string

Used internally during label updates.

PscConnectionId string

The PSC connection id of the PSC Forwarding Rule.

PscConnectionStatus string

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

SelfLink string

The URI of the created resource.

ServiceName string

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

creationTimestamp String

[Output Only] Creation timestamp in RFC3339 text format.

id String

The provider-assigned unique ID for this managed resource.

labelFingerprint String

Used internally during label updates.

pscConnectionId String

The PSC connection id of the PSC Forwarding Rule.

pscConnectionStatus String

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

selfLink String

The URI of the created resource.

serviceName String

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

creationTimestamp string

[Output Only] Creation timestamp in RFC3339 text format.

id string

The provider-assigned unique ID for this managed resource.

labelFingerprint string

Used internally during label updates.

pscConnectionId string

The PSC connection id of the PSC Forwarding Rule.

pscConnectionStatus string

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

selfLink string

The URI of the created resource.

serviceName string

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

creation_timestamp str

[Output Only] Creation timestamp in RFC3339 text format.

id str

The provider-assigned unique ID for this managed resource.

label_fingerprint str

Used internally during label updates.

psc_connection_id str

The PSC connection id of the PSC Forwarding Rule.

psc_connection_status str

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

self_link str

The URI of the created resource.

service_name str

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

creationTimestamp String

[Output Only] Creation timestamp in RFC3339 text format.

id String

The provider-assigned unique ID for this managed resource.

labelFingerprint String

Used internally during label updates.

pscConnectionId String

The PSC connection id of the PSC Forwarding Rule.

pscConnectionStatus String

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

selfLink String

The URI of the created resource.

serviceName String

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

Look up an Existing ForwardingRule Resource

Get an existing ForwardingRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: ForwardingRuleState, opts?: CustomResourceOptions): ForwardingRule
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        all_ports: Optional[bool] = None,
        allow_global_access: Optional[bool] = None,
        backend_service: Optional[str] = None,
        creation_timestamp: Optional[str] = None,
        description: Optional[str] = None,
        ip_address: Optional[str] = None,
        ip_protocol: Optional[str] = None,
        is_mirroring_collector: Optional[bool] = None,
        label_fingerprint: Optional[str] = None,
        labels: Optional[Mapping[str, str]] = None,
        load_balancing_scheme: Optional[str] = None,
        name: Optional[str] = None,
        network: Optional[str] = None,
        network_tier: Optional[str] = None,
        port_range: Optional[str] = None,
        ports: Optional[Sequence[str]] = None,
        project: Optional[str] = None,
        psc_connection_id: Optional[str] = None,
        psc_connection_status: Optional[str] = None,
        region: Optional[str] = None,
        self_link: Optional[str] = None,
        service_directory_registrations: Optional[Sequence[ForwardingRuleServiceDirectoryRegistrationArgs]] = None,
        service_label: Optional[str] = None,
        service_name: Optional[str] = None,
        subnetwork: Optional[str] = None,
        target: Optional[str] = None) -> ForwardingRule
func GetForwardingRule(ctx *Context, name string, id IDInput, state *ForwardingRuleState, opts ...ResourceOption) (*ForwardingRule, error)
public static ForwardingRule Get(string name, Input<string> id, ForwardingRuleState? state, CustomResourceOptions? opts = null)
public static ForwardingRule get(String name, Output<String> id, ForwardingRuleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
AllPorts bool

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

AllowGlobalAccess bool

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

BackendService string

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

CreationTimestamp string

[Output Only] Creation timestamp in RFC3339 text format.

Description string

An optional description of this resource. Provide this property when you create the resource.

IpAddress string

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

IpProtocol string

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

IsMirroringCollector bool

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

LabelFingerprint string

Used internally during label updates.

Labels Dictionary<string, string>

Labels to apply to this forwarding rule. A list of key->value pairs.

LoadBalancingScheme string

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

Name string

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

Network string

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

NetworkTier string

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

PortRange string

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
Ports List<string>

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

Project string

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

PscConnectionId string

The PSC connection id of the PSC Forwarding Rule.

PscConnectionStatus string

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

Region string

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

SelfLink string

The URI of the created resource.

ServiceDirectoryRegistrations List<ForwardingRuleServiceDirectoryRegistrationArgs>

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

ServiceLabel string

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

ServiceName string

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

Subnetwork string

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

Target string

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

AllPorts bool

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

AllowGlobalAccess bool

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

BackendService string

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

CreationTimestamp string

[Output Only] Creation timestamp in RFC3339 text format.

Description string

An optional description of this resource. Provide this property when you create the resource.

IpAddress string

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

IpProtocol string

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

IsMirroringCollector bool

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

LabelFingerprint string

Used internally during label updates.

Labels map[string]string

Labels to apply to this forwarding rule. A list of key->value pairs.

LoadBalancingScheme string

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

Name string

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

Network string

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

NetworkTier string

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

PortRange string

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
Ports []string

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

Project string

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

PscConnectionId string

The PSC connection id of the PSC Forwarding Rule.

PscConnectionStatus string

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

Region string

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

SelfLink string

The URI of the created resource.

ServiceDirectoryRegistrations []ForwardingRuleServiceDirectoryRegistrationArgs

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

ServiceLabel string

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

ServiceName string

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

Subnetwork string

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

Target string

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

allPorts Boolean

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allowGlobalAccess Boolean

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backendService String

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

creationTimestamp String

[Output Only] Creation timestamp in RFC3339 text format.

description String

An optional description of this resource. Provide this property when you create the resource.

ipAddress String

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ipProtocol String

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

isMirroringCollector Boolean

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

labelFingerprint String

Used internally during label updates.

labels Map<String,String>

Labels to apply to this forwarding rule. A list of key->value pairs.

loadBalancingScheme String

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name String

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network String

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

networkTier String

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

portRange String

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports List<String>

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project String

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

pscConnectionId String

The PSC connection id of the PSC Forwarding Rule.

pscConnectionStatus String

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

region String

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

selfLink String

The URI of the created resource.

serviceDirectoryRegistrations List<ForwardingRuleServiceDirectoryRegistrationArgs>

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

serviceLabel String

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

serviceName String

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

subnetwork String

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target String

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

allPorts boolean

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allowGlobalAccess boolean

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backendService string

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

creationTimestamp string

[Output Only] Creation timestamp in RFC3339 text format.

description string

An optional description of this resource. Provide this property when you create the resource.

ipAddress string

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ipProtocol string

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

isMirroringCollector boolean

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

labelFingerprint string

Used internally during label updates.

labels {[key: string]: string}

Labels to apply to this forwarding rule. A list of key->value pairs.

loadBalancingScheme string

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name string

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network string

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

networkTier string

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

portRange string

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports string[]

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project string

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

pscConnectionId string

The PSC connection id of the PSC Forwarding Rule.

pscConnectionStatus string

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

region string

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

selfLink string

The URI of the created resource.

serviceDirectoryRegistrations ForwardingRuleServiceDirectoryRegistrationArgs[]

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

serviceLabel string

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

serviceName string

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

subnetwork string

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target string

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

all_ports bool

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allow_global_access bool

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backend_service str

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

creation_timestamp str

[Output Only] Creation timestamp in RFC3339 text format.

description str

An optional description of this resource. Provide this property when you create the resource.

ip_address str

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ip_protocol str

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

is_mirroring_collector bool

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

label_fingerprint str

Used internally during label updates.

labels Mapping[str, str]

Labels to apply to this forwarding rule. A list of key->value pairs.

load_balancing_scheme str

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name str

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network str

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

network_tier str

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

port_range str

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports Sequence[str]

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project str

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

psc_connection_id str

The PSC connection id of the PSC Forwarding Rule.

psc_connection_status str

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

region str

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

self_link str

The URI of the created resource.

service_directory_registrations Sequence[ForwardingRuleServiceDirectoryRegistrationArgs]

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

service_label str

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

service_name str

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

subnetwork str

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target str

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

allPorts Boolean

This field can be used with internal load balancer or network load balancer when the forwarding rule references a backend service, or with the target field when it references a TargetInstance. Set this to true to allow packets addressed to any ports to be forwarded to the backends configured with this forwarding rule. This can be used when the protocol is TCP/UDP, and it must be set to true when the protocol is set to L3_DEFAULT. Cannot be set if port or portRange are set.

allowGlobalAccess Boolean

If true, clients can access ILB from all regions. Otherwise only allows from the local region the ILB is located at.

backendService String

A BackendService to receive the matched traffic. This is used only for INTERNAL load balancing.

creationTimestamp String

[Output Only] Creation timestamp in RFC3339 text format.

description String

An optional description of this resource. Provide this property when you create the resource.

ipAddress String

The IP address that this forwarding rule serves. When a client sends traffic to this IP address, the forwarding rule directs the traffic to the target that you specify in the forwarding rule. The loadBalancingScheme and the forwarding rule's target determine the type of IP address that you can use. For detailed information, refer to IP address specifications. An address can be specified either by a literal IP address or a reference to an existing Address resource. If you don't specify a reserved IP address, an ephemeral IP address is assigned. The value must be set to 0.0.0.0 when the target is a targetGrpcProxy that has validateForProxyless field set to true. For Private Service Connect forwarding rules that forward traffic to Google APIs, IP address must be provided.

ipProtocol String

The IP protocol to which this rule applies. When the load balancing scheme is INTERNAL, only TCP and UDP are valid. Possible values are TCP, UDP, ESP, AH, SCTP, ICMP, and L3_DEFAULT.

isMirroringCollector Boolean

Indicates whether or not this load balancer can be used as a collector for packet mirroring. To prevent mirroring loops, instances behind this load balancer will not have their traffic mirrored even if a PacketMirroring rule applies to them. This can only be set to true for load balancers that have their loadBalancingScheme set to INTERNAL.

labelFingerprint String

Used internally during label updates.

labels Map<String>

Labels to apply to this forwarding rule. A list of key->value pairs.

loadBalancingScheme String

This signifies what the ForwardingRule will be used for and can be EXTERNAL, EXTERNAL_MANAGED, INTERNAL, or INTERNAL_MANAGED. EXTERNAL is used for Classic Cloud VPN gateways, protocol forwarding to VMs from an external IP address, and HTTP(S), SSL Proxy, TCP Proxy, and Network TCP/UDP load balancers. INTERNAL is used for protocol forwarding to VMs from an internal IP address, and internal TCP/UDP load balancers. EXTERNAL_MANAGED is used for regional external HTTP(S) load balancers. INTERNAL_MANAGED is used for internal HTTP(S) load balancers. Default value is EXTERNAL. Possible values are EXTERNAL, EXTERNAL_MANAGED, INTERNAL, and INTERNAL_MANAGED.

name String

Name of the resource; provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.

network String

For internal load balancing, this field identifies the network that the load balanced IP should belong to for this Forwarding Rule. If this field is not specified, the default network will be used. This field is only used for INTERNAL load balancing.

networkTier String

The networking tier used for configuring this address. If this field is not specified, it is assumed to be PREMIUM. Possible values are PREMIUM and STANDARD.

portRange String

This field is used along with the target field for TargetHttpProxy, TargetHttpsProxy, TargetSslProxy, TargetTcpProxy, TargetVpnGateway, TargetPool, TargetInstance. Applicable only when IPProtocol is TCP, UDP, or SCTP, only packets addressed to ports in the specified range will be forwarded to target. Forwarding rules with the same [IPAddress, IPProtocol] pair must have disjoint port ranges. Some types of forwarding target have constraints on the acceptable ports:

  • TargetHttpProxy: 80, 8080
  • TargetHttpsProxy: 443
  • TargetTcpProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetSslProxy: 25, 43, 110, 143, 195, 443, 465, 587, 700, 993, 995, 1883, 5222
  • TargetVpnGateway: 500, 4500
ports List<String>

This field is used along with internal load balancing and network load balancer when the forwarding rule references a backend service and when protocol is not L3_DEFAULT. A single port or a comma separated list of ports can be configured. Only packets addressed to these ports will be forwarded to the backends configured with this forwarding rule. You can only use one of ports and portRange, or allPorts. The three are mutually exclusive. You may specify a maximum of up to 5 ports, which can be non-contiguous.

project String

The ID of the project in which the resource belongs. If it is not provided, the provider project is used.

pscConnectionId String

The PSC connection id of the PSC Forwarding Rule.

pscConnectionStatus String

The PSC connection status of the PSC Forwarding Rule. Possible values: STATUS_UNSPECIFIED, PENDING, ACCEPTED, REJECTED, CLOSED

region String

A reference to the region where the regional forwarding rule resides. This field is not applicable to global forwarding rules.

selfLink String

The URI of the created resource.

serviceDirectoryRegistrations List<Property Map>

Service Directory resources to register this forwarding rule with. Currently, only supports a single Service Directory resource. Structure is documented below.

serviceLabel String

An optional prefix to the service name for this Forwarding Rule. If specified, will be the first label of the fully qualified service name. The label must be 1-63 characters long, and comply with RFC1035. Specifically, the label must be 1-63 characters long and match the regular expression a-z? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash. This field is only used for INTERNAL load balancing.

serviceName String

[Output Only] The internal fully qualified service name for this Forwarding Rule. This field is only used for internal load balancing.

subnetwork String

The subnetwork that the load balanced IP should belong to for this Forwarding Rule. This field is only used for INTERNAL load balancing. If the network specified is in auto subnet mode, this field is optional. However, if the network is in custom subnet mode, a subnetwork must be specified.

target String

The URL of the target resource to receive the matched traffic. The target must live in the same region as the forwarding rule. The forwarded traffic must be of a type appropriate to the target object.

Supporting Types

ForwardingRuleServiceDirectoryRegistration

Namespace string

Service Directory namespace to register the forwarding rule under.

Service string

Service Directory service to register the forwarding rule under.

Namespace string

Service Directory namespace to register the forwarding rule under.

Service string

Service Directory service to register the forwarding rule under.

namespace String

Service Directory namespace to register the forwarding rule under.

service String

Service Directory service to register the forwarding rule under.

namespace string

Service Directory namespace to register the forwarding rule under.

service string

Service Directory service to register the forwarding rule under.

namespace str

Service Directory namespace to register the forwarding rule under.

service str

Service Directory service to register the forwarding rule under.

namespace String

Service Directory namespace to register the forwarding rule under.

service String

Service Directory service to register the forwarding rule under.

Import

ForwardingRule can be imported using any of these accepted formats

 $ pulumi import gcp:compute/forwardingRule:ForwardingRule default projects/{{project}}/regions/{{region}}/forwardingRules/{{name}}
 $ pulumi import gcp:compute/forwardingRule:ForwardingRule default {{project}}/{{region}}/{{name}}
 $ pulumi import gcp:compute/forwardingRule:ForwardingRule default {{region}}/{{name}}
 $ pulumi import gcp:compute/forwardingRule:ForwardingRule default {{name}}

Package Details

Repository
https://github.com/pulumi/pulumi-gcp
License
Apache-2.0
Notes

This Pulumi package is based on the google-beta Terraform Provider.