1. Packages
  2. Google Cloud Native
  3. API Docs
  4. compute
  5. compute/alpha
  6. RegionBackendService

Google Cloud Native is in preview. Google Cloud Classic is fully supported.

Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi

google-native.compute/alpha.RegionBackendService

Explore with Pulumi AI

google-native logo

Google Cloud Native is in preview. Google Cloud Classic is fully supported.

Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi

    Creates a regional BackendService resource in the specified project using the data included in the request. For more information, see Backend services overview.

    Create RegionBackendService Resource

    new RegionBackendService(name: string, args: RegionBackendServiceArgs, opts?: CustomResourceOptions);
    @overload
    def RegionBackendService(resource_name: str,
                             opts: Optional[ResourceOptions] = None,
                             affinity_cookie_ttl_sec: Optional[int] = None,
                             backends: Optional[Sequence[BackendArgs]] = None,
                             cdn_policy: Optional[BackendServiceCdnPolicyArgs] = None,
                             circuit_breakers: Optional[CircuitBreakersArgs] = None,
                             compression_mode: Optional[RegionBackendServiceCompressionMode] = None,
                             connection_draining: Optional[ConnectionDrainingArgs] = None,
                             connection_tracking_policy: Optional[BackendServiceConnectionTrackingPolicyArgs] = None,
                             consistent_hash: Optional[ConsistentHashLoadBalancerSettingsArgs] = None,
                             custom_request_headers: Optional[Sequence[str]] = None,
                             custom_response_headers: Optional[Sequence[str]] = None,
                             description: Optional[str] = None,
                             enable_cdn: Optional[bool] = None,
                             failover_policy: Optional[BackendServiceFailoverPolicyArgs] = None,
                             health_checks: Optional[Sequence[str]] = None,
                             iap: Optional[BackendServiceIAPArgs] = None,
                             ip_address_selection_policy: Optional[RegionBackendServiceIpAddressSelectionPolicy] = None,
                             load_balancing_scheme: Optional[RegionBackendServiceLoadBalancingScheme] = None,
                             locality_lb_policies: Optional[Sequence[BackendServiceLocalityLoadBalancingPolicyConfigArgs]] = None,
                             locality_lb_policy: Optional[RegionBackendServiceLocalityLbPolicy] = None,
                             log_config: Optional[BackendServiceLogConfigArgs] = None,
                             max_stream_duration: Optional[DurationArgs] = None,
                             metadatas: Optional[Mapping[str, str]] = None,
                             name: Optional[str] = None,
                             network: Optional[str] = None,
                             outlier_detection: Optional[OutlierDetectionArgs] = None,
                             port: Optional[int] = None,
                             port_name: Optional[str] = None,
                             project: Optional[str] = None,
                             protocol: Optional[RegionBackendServiceProtocol] = None,
                             region: Optional[str] = None,
                             request_id: Optional[str] = None,
                             security_settings: Optional[SecuritySettingsArgs] = None,
                             service_bindings: Optional[Sequence[str]] = None,
                             service_lb_policy: Optional[str] = None,
                             session_affinity: Optional[RegionBackendServiceSessionAffinity] = None,
                             subsetting: Optional[SubsettingArgs] = None,
                             timeout_sec: Optional[int] = None,
                             used_by: Optional[Sequence[BackendServiceUsedByArgs]] = None,
                             vpc_network_scope: Optional[RegionBackendServiceVpcNetworkScope] = None)
    @overload
    def RegionBackendService(resource_name: str,
                             args: RegionBackendServiceArgs,
                             opts: Optional[ResourceOptions] = None)
    func NewRegionBackendService(ctx *Context, name string, args RegionBackendServiceArgs, opts ...ResourceOption) (*RegionBackendService, error)
    public RegionBackendService(string name, RegionBackendServiceArgs args, CustomResourceOptions? opts = null)
    public RegionBackendService(String name, RegionBackendServiceArgs args)
    public RegionBackendService(String name, RegionBackendServiceArgs args, CustomResourceOptions options)
    
    type: google-native:compute/alpha:RegionBackendService
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    name string
    The unique name of the resource.
    args RegionBackendServiceArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args RegionBackendServiceArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args RegionBackendServiceArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args RegionBackendServiceArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args RegionBackendServiceArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    RegionBackendService Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The RegionBackendService resource accepts the following input properties:

    Region string
    AffinityCookieTtlSec int
    Lifetime of cookies in seconds. This setting is applicable to external and internal HTTP(S) load balancers and Traffic Director and requires GENERATED_COOKIE or HTTP_COOKIE session affinity. If set to 0, the cookie is non-persistent and lasts only until the end of the browser session (or equivalent). The maximum allowed value is two weeks (1,209,600). Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    Backends List<Pulumi.GoogleNative.Compute.Alpha.Inputs.Backend>
    The list of backends that serve this BackendService.
    CdnPolicy Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceCdnPolicy
    Cloud CDN configuration for this BackendService. Only available for specified load balancer types.
    CircuitBreakers Pulumi.GoogleNative.Compute.Alpha.Inputs.CircuitBreakers
    CompressionMode Pulumi.GoogleNative.Compute.Alpha.RegionBackendServiceCompressionMode
    Compress text responses using Brotli or gzip compression, based on the client's Accept-Encoding header.
    ConnectionDraining Pulumi.GoogleNative.Compute.Alpha.Inputs.ConnectionDraining
    ConnectionTrackingPolicy Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceConnectionTrackingPolicy
    Connection Tracking configuration for this BackendService. Connection tracking policy settings are only available for Network Load Balancing and Internal TCP/UDP Load Balancing.
    ConsistentHash Pulumi.GoogleNative.Compute.Alpha.Inputs.ConsistentHashLoadBalancerSettings
    Consistent Hash-based load balancing can be used to provide soft session affinity based on HTTP headers, cookies or other properties. This load balancing policy is applicable only for HTTP connections. The affinity to a particular destination host will be lost when one or more hosts are added/removed from the destination service. This field specifies parameters that control consistent hashing. This field is only applicable when localityLbPolicy is set to MAGLEV or RING_HASH. This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    CustomRequestHeaders List<string>
    Headers that the load balancer adds to proxied requests. See Creating custom headers.
    CustomResponseHeaders List<string>
    Headers that the load balancer adds to proxied responses. See Creating custom headers.
    Description string
    An optional description of this resource. Provide this property when you create the resource.
    EnableCDN bool
    If true, enables Cloud CDN for the backend service of an external HTTP(S) load balancer.
    FailoverPolicy Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceFailoverPolicy
    Requires at least one backend instance group to be defined as a backup (failover) backend. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    HealthChecks List<string>
    The list of URLs to the healthChecks, httpHealthChecks (legacy), or httpsHealthChecks (legacy) resource for health checking this backend service. Not all backend services support legacy health checks. See Load balancer guide. Currently, at most one health check can be specified for each backend service. Backend services with instance group or zonal NEG backends must have a health check. Backend services with internet or serverless NEG backends must not have a health check.
    Iap Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceIAP
    The configurations for Identity-Aware Proxy on this resource. Not available for Internal TCP/UDP Load Balancing and Network Load Balancing.
    IpAddressSelectionPolicy Pulumi.GoogleNative.Compute.Alpha.RegionBackendServiceIpAddressSelectionPolicy
    Specifies a preference for traffic sent from the proxy to the backend (or from the client to the backend for proxyless gRPC). The possible values are: - IPV4_ONLY: Only send IPv4 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv4 health checks are used to check the health of the backends. This is the default setting. - PREFER_IPV6: Prioritize the connection to the endpoint's IPv6 address over its IPv4 address (provided there is a healthy IPv6 address). - IPV6_ONLY: Only send IPv6 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv6 health checks are used to check the health of the backends. This field is applicable to either: - Advanced Global External HTTPS Load Balancing (load balancing scheme EXTERNAL_MANAGED), - Regional External HTTPS Load Balancing, - Internal TCP Proxy (load balancing scheme INTERNAL_MANAGED), - Regional Internal HTTPS Load Balancing (load balancing scheme INTERNAL_MANAGED), - Traffic Director with Envoy proxies and proxyless gRPC (load balancing scheme INTERNAL_SELF_MANAGED).
    LoadBalancingScheme Pulumi.GoogleNative.Compute.Alpha.RegionBackendServiceLoadBalancingScheme
    Specifies the load balancer type. A backend service created for one type of load balancer cannot be used with another. For more information, refer to Choosing a load balancer.
    LocalityLbPolicies List<Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceLocalityLoadBalancingPolicyConfig>
    A list of locality load-balancing policies to be used in order of preference. When you use localityLbPolicies, you must set at least one value for either the localityLbPolicies[].policy or the localityLbPolicies[].customPolicy field. localityLbPolicies overrides any value set in the localityLbPolicy field. For an example of how to use this field, see Define a list of preferred policies. Caution: This field and its children are intended for use in a service mesh that includes gRPC clients only. Envoy proxies can't use backend services that have this configuration.
    LocalityLbPolicy Pulumi.GoogleNative.Compute.Alpha.RegionBackendServiceLocalityLbPolicy
    The load balancing algorithm used within the scope of the locality. The possible values are: - ROUND_ROBIN: This is a simple policy in which each healthy backend is selected in round robin order. This is the default. - LEAST_REQUEST: An O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests. - RING_HASH: The ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests. - RANDOM: The load balancer selects a random healthy host. - ORIGINAL_DESTINATION: Backend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer. - MAGLEV: used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824 This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED, INTERNAL_MANAGED, or EXTERNAL_MANAGED. If sessionAffinity is not NONE, and this field is not set to MAGLEV or RING_HASH, session affinity settings will not take effect. Only ROUND_ROBIN and RING_HASH are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    LogConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceLogConfig
    This field denotes the logging options for the load balancer traffic served by this backend service. If logging is enabled, logs will be exported to Stackdriver.
    MaxStreamDuration Pulumi.GoogleNative.Compute.Alpha.Inputs.Duration
    Specifies the default maximum duration (timeout) for streams to this service. Duration is computed from the beginning of the stream until the response has been completely processed, including all retries. A stream that does not complete in this duration is closed. If not specified, there will be no timeout limit, i.e. the maximum duration is infinite. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. This field is only allowed when the loadBalancingScheme of the backend service is INTERNAL_SELF_MANAGED.
    Metadatas Dictionary<string, string>
    Deployment metadata associated with the resource to be set by a GKE hub controller and read by the backend RCTH
    Name string
    Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
    Network string
    The URL of the network to which this backend service belongs. This field can only be specified when the load balancing scheme is set to INTERNAL.
    OutlierDetection Pulumi.GoogleNative.Compute.Alpha.Inputs.OutlierDetection
    Settings controlling the ejection of unhealthy backend endpoints from the load balancing pool of each individual proxy instance that processes the traffic for the given backend service. If not set, this feature is considered disabled. Results of the outlier detection algorithm (ejection of endpoints from the load balancing pool and returning them back to the pool) are executed independently by each proxy instance of the load balancer. In most cases, more than one proxy instance handles the traffic received by a backend service. Thus, it is possible that an unhealthy endpoint is detected and ejected by only some of the proxies, and while this happens, other proxies may continue to send requests to the same unhealthy endpoint until they detect and eject the unhealthy endpoint. Applicable backend endpoints can be: - VM instances in an Instance Group - Endpoints in a Zonal NEG (GCE_VM_IP, GCE_VM_IP_PORT) - Endpoints in a Hybrid Connectivity NEG (NON_GCP_PRIVATE_IP_PORT) - Serverless NEGs, that resolve to Cloud Run, App Engine, or Cloud Functions Services - Private Service Connect NEGs, that resolve to Google-managed regional API endpoints or managed services published using Private Service Connect Applicable backend service types can be: - A global backend service with the loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED. - A regional backend service with the serviceProtocol set to HTTP, HTTPS, or HTTP2, and loadBalancingScheme set to INTERNAL_MANAGED or EXTERNAL_MANAGED. Not supported for Serverless NEGs. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    Port int
    Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    Deprecated:Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    PortName string
    A named port on a backend instance group representing the port for communication to the backend VMs in that group. The named port must be defined on each backend instance group. This parameter has no meaning if the backends are NEGs. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port_name.
    Project string
    Protocol Pulumi.GoogleNative.Compute.Alpha.RegionBackendServiceProtocol
    The protocol this BackendService uses to communicate with backends. Possible values are HTTP, HTTPS, HTTP2, TCP, SSL, UDP or GRPC. depending on the chosen load balancer or Traffic Director configuration. Refer to the documentation for the load balancers or for Traffic Director for more information. Must be set to GRPC when the backend service is referenced by a URL map that is bound to target gRPC proxy.
    RequestId string
    An optional request ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported ( 00000000-0000-0000-0000-000000000000).
    SecuritySettings Pulumi.GoogleNative.Compute.Alpha.Inputs.SecuritySettings
    This field specifies the security settings that apply to this backend service. This field is applicable to a global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    ServiceBindings List<string>
    URLs of networkservices.ServiceBinding resources. Can only be set if load balancing scheme is INTERNAL_SELF_MANAGED. If set, lists of backends and health checks must be both empty.
    ServiceLbPolicy string
    URL to networkservices.ServiceLbPolicy resource. Can only be set if load balancing scheme is EXTERNAL, EXTERNAL_MANAGED, INTERNAL_MANAGED or INTERNAL_SELF_MANAGED and the scope is global.
    SessionAffinity Pulumi.GoogleNative.Compute.Alpha.RegionBackendServiceSessionAffinity
    Type of session affinity to use. The default is NONE. Only NONE and HEADER_FIELD are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. For more details, see: Session Affinity.
    Subsetting Pulumi.GoogleNative.Compute.Alpha.Inputs.Subsetting
    TimeoutSec int
    The backend service timeout has a different meaning depending on the type of load balancer. For more information see, Backend service settings. The default is 30 seconds. The full range of timeout values allowed goes from 1 through 2,147,483,647 seconds. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. Instead, use maxStreamDuration.
    UsedBy List<Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceUsedBy>
    VpcNetworkScope Pulumi.GoogleNative.Compute.Alpha.RegionBackendServiceVpcNetworkScope
    The network scope of the backends that can be added to the backend service. This field can be either GLOBAL_VPC_NETWORK or REGIONAL_VPC_NETWORK. A backend service with the VPC scope set to GLOBAL_VPC_NETWORK is only allowed to have backends in global VPC networks. When the VPC scope is set to REGIONAL_VPC_NETWORK the backend service is only allowed to have backends in regional networks in the same scope as the backend service. Note: if not specified then GLOBAL_VPC_NETWORK will be used.
    Region string
    AffinityCookieTtlSec int
    Lifetime of cookies in seconds. This setting is applicable to external and internal HTTP(S) load balancers and Traffic Director and requires GENERATED_COOKIE or HTTP_COOKIE session affinity. If set to 0, the cookie is non-persistent and lasts only until the end of the browser session (or equivalent). The maximum allowed value is two weeks (1,209,600). Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    Backends []BackendArgs
    The list of backends that serve this BackendService.
    CdnPolicy BackendServiceCdnPolicyArgs
    Cloud CDN configuration for this BackendService. Only available for specified load balancer types.
    CircuitBreakers CircuitBreakersArgs
    CompressionMode RegionBackendServiceCompressionMode
    Compress text responses using Brotli or gzip compression, based on the client's Accept-Encoding header.
    ConnectionDraining ConnectionDrainingArgs
    ConnectionTrackingPolicy BackendServiceConnectionTrackingPolicyArgs
    Connection Tracking configuration for this BackendService. Connection tracking policy settings are only available for Network Load Balancing and Internal TCP/UDP Load Balancing.
    ConsistentHash ConsistentHashLoadBalancerSettingsArgs
    Consistent Hash-based load balancing can be used to provide soft session affinity based on HTTP headers, cookies or other properties. This load balancing policy is applicable only for HTTP connections. The affinity to a particular destination host will be lost when one or more hosts are added/removed from the destination service. This field specifies parameters that control consistent hashing. This field is only applicable when localityLbPolicy is set to MAGLEV or RING_HASH. This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    CustomRequestHeaders []string
    Headers that the load balancer adds to proxied requests. See Creating custom headers.
    CustomResponseHeaders []string
    Headers that the load balancer adds to proxied responses. See Creating custom headers.
    Description string
    An optional description of this resource. Provide this property when you create the resource.
    EnableCDN bool
    If true, enables Cloud CDN for the backend service of an external HTTP(S) load balancer.
    FailoverPolicy BackendServiceFailoverPolicyArgs
    Requires at least one backend instance group to be defined as a backup (failover) backend. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    HealthChecks []string
    The list of URLs to the healthChecks, httpHealthChecks (legacy), or httpsHealthChecks (legacy) resource for health checking this backend service. Not all backend services support legacy health checks. See Load balancer guide. Currently, at most one health check can be specified for each backend service. Backend services with instance group or zonal NEG backends must have a health check. Backend services with internet or serverless NEG backends must not have a health check.
    Iap BackendServiceIAPArgs
    The configurations for Identity-Aware Proxy on this resource. Not available for Internal TCP/UDP Load Balancing and Network Load Balancing.
    IpAddressSelectionPolicy RegionBackendServiceIpAddressSelectionPolicy
    Specifies a preference for traffic sent from the proxy to the backend (or from the client to the backend for proxyless gRPC). The possible values are: - IPV4_ONLY: Only send IPv4 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv4 health checks are used to check the health of the backends. This is the default setting. - PREFER_IPV6: Prioritize the connection to the endpoint's IPv6 address over its IPv4 address (provided there is a healthy IPv6 address). - IPV6_ONLY: Only send IPv6 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv6 health checks are used to check the health of the backends. This field is applicable to either: - Advanced Global External HTTPS Load Balancing (load balancing scheme EXTERNAL_MANAGED), - Regional External HTTPS Load Balancing, - Internal TCP Proxy (load balancing scheme INTERNAL_MANAGED), - Regional Internal HTTPS Load Balancing (load balancing scheme INTERNAL_MANAGED), - Traffic Director with Envoy proxies and proxyless gRPC (load balancing scheme INTERNAL_SELF_MANAGED).
    LoadBalancingScheme RegionBackendServiceLoadBalancingScheme
    Specifies the load balancer type. A backend service created for one type of load balancer cannot be used with another. For more information, refer to Choosing a load balancer.
    LocalityLbPolicies []BackendServiceLocalityLoadBalancingPolicyConfigArgs
    A list of locality load-balancing policies to be used in order of preference. When you use localityLbPolicies, you must set at least one value for either the localityLbPolicies[].policy or the localityLbPolicies[].customPolicy field. localityLbPolicies overrides any value set in the localityLbPolicy field. For an example of how to use this field, see Define a list of preferred policies. Caution: This field and its children are intended for use in a service mesh that includes gRPC clients only. Envoy proxies can't use backend services that have this configuration.
    LocalityLbPolicy RegionBackendServiceLocalityLbPolicy
    The load balancing algorithm used within the scope of the locality. The possible values are: - ROUND_ROBIN: This is a simple policy in which each healthy backend is selected in round robin order. This is the default. - LEAST_REQUEST: An O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests. - RING_HASH: The ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests. - RANDOM: The load balancer selects a random healthy host. - ORIGINAL_DESTINATION: Backend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer. - MAGLEV: used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824 This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED, INTERNAL_MANAGED, or EXTERNAL_MANAGED. If sessionAffinity is not NONE, and this field is not set to MAGLEV or RING_HASH, session affinity settings will not take effect. Only ROUND_ROBIN and RING_HASH are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    LogConfig BackendServiceLogConfigArgs
    This field denotes the logging options for the load balancer traffic served by this backend service. If logging is enabled, logs will be exported to Stackdriver.
    MaxStreamDuration DurationArgs
    Specifies the default maximum duration (timeout) for streams to this service. Duration is computed from the beginning of the stream until the response has been completely processed, including all retries. A stream that does not complete in this duration is closed. If not specified, there will be no timeout limit, i.e. the maximum duration is infinite. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. This field is only allowed when the loadBalancingScheme of the backend service is INTERNAL_SELF_MANAGED.
    Metadatas map[string]string
    Deployment metadata associated with the resource to be set by a GKE hub controller and read by the backend RCTH
    Name string
    Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
    Network string
    The URL of the network to which this backend service belongs. This field can only be specified when the load balancing scheme is set to INTERNAL.
    OutlierDetection OutlierDetectionArgs
    Settings controlling the ejection of unhealthy backend endpoints from the load balancing pool of each individual proxy instance that processes the traffic for the given backend service. If not set, this feature is considered disabled. Results of the outlier detection algorithm (ejection of endpoints from the load balancing pool and returning them back to the pool) are executed independently by each proxy instance of the load balancer. In most cases, more than one proxy instance handles the traffic received by a backend service. Thus, it is possible that an unhealthy endpoint is detected and ejected by only some of the proxies, and while this happens, other proxies may continue to send requests to the same unhealthy endpoint until they detect and eject the unhealthy endpoint. Applicable backend endpoints can be: - VM instances in an Instance Group - Endpoints in a Zonal NEG (GCE_VM_IP, GCE_VM_IP_PORT) - Endpoints in a Hybrid Connectivity NEG (NON_GCP_PRIVATE_IP_PORT) - Serverless NEGs, that resolve to Cloud Run, App Engine, or Cloud Functions Services - Private Service Connect NEGs, that resolve to Google-managed regional API endpoints or managed services published using Private Service Connect Applicable backend service types can be: - A global backend service with the loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED. - A regional backend service with the serviceProtocol set to HTTP, HTTPS, or HTTP2, and loadBalancingScheme set to INTERNAL_MANAGED or EXTERNAL_MANAGED. Not supported for Serverless NEGs. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    Port int
    Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    Deprecated:Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    PortName string
    A named port on a backend instance group representing the port for communication to the backend VMs in that group. The named port must be defined on each backend instance group. This parameter has no meaning if the backends are NEGs. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port_name.
    Project string
    Protocol RegionBackendServiceProtocol
    The protocol this BackendService uses to communicate with backends. Possible values are HTTP, HTTPS, HTTP2, TCP, SSL, UDP or GRPC. depending on the chosen load balancer or Traffic Director configuration. Refer to the documentation for the load balancers or for Traffic Director for more information. Must be set to GRPC when the backend service is referenced by a URL map that is bound to target gRPC proxy.
    RequestId string
    An optional request ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported ( 00000000-0000-0000-0000-000000000000).
    SecuritySettings SecuritySettingsArgs
    This field specifies the security settings that apply to this backend service. This field is applicable to a global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    ServiceBindings []string
    URLs of networkservices.ServiceBinding resources. Can only be set if load balancing scheme is INTERNAL_SELF_MANAGED. If set, lists of backends and health checks must be both empty.
    ServiceLbPolicy string
    URL to networkservices.ServiceLbPolicy resource. Can only be set if load balancing scheme is EXTERNAL, EXTERNAL_MANAGED, INTERNAL_MANAGED or INTERNAL_SELF_MANAGED and the scope is global.
    SessionAffinity RegionBackendServiceSessionAffinity
    Type of session affinity to use. The default is NONE. Only NONE and HEADER_FIELD are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. For more details, see: Session Affinity.
    Subsetting SubsettingArgs
    TimeoutSec int
    The backend service timeout has a different meaning depending on the type of load balancer. For more information see, Backend service settings. The default is 30 seconds. The full range of timeout values allowed goes from 1 through 2,147,483,647 seconds. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. Instead, use maxStreamDuration.
    UsedBy []BackendServiceUsedByArgs
    VpcNetworkScope RegionBackendServiceVpcNetworkScope
    The network scope of the backends that can be added to the backend service. This field can be either GLOBAL_VPC_NETWORK or REGIONAL_VPC_NETWORK. A backend service with the VPC scope set to GLOBAL_VPC_NETWORK is only allowed to have backends in global VPC networks. When the VPC scope is set to REGIONAL_VPC_NETWORK the backend service is only allowed to have backends in regional networks in the same scope as the backend service. Note: if not specified then GLOBAL_VPC_NETWORK will be used.
    region String
    affinityCookieTtlSec Integer
    Lifetime of cookies in seconds. This setting is applicable to external and internal HTTP(S) load balancers and Traffic Director and requires GENERATED_COOKIE or HTTP_COOKIE session affinity. If set to 0, the cookie is non-persistent and lasts only until the end of the browser session (or equivalent). The maximum allowed value is two weeks (1,209,600). Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    backends List<Backend>
    The list of backends that serve this BackendService.
    cdnPolicy BackendServiceCdnPolicy
    Cloud CDN configuration for this BackendService. Only available for specified load balancer types.
    circuitBreakers CircuitBreakers
    compressionMode RegionBackendServiceCompressionMode
    Compress text responses using Brotli or gzip compression, based on the client's Accept-Encoding header.
    connectionDraining ConnectionDraining
    connectionTrackingPolicy BackendServiceConnectionTrackingPolicy
    Connection Tracking configuration for this BackendService. Connection tracking policy settings are only available for Network Load Balancing and Internal TCP/UDP Load Balancing.
    consistentHash ConsistentHashLoadBalancerSettings
    Consistent Hash-based load balancing can be used to provide soft session affinity based on HTTP headers, cookies or other properties. This load balancing policy is applicable only for HTTP connections. The affinity to a particular destination host will be lost when one or more hosts are added/removed from the destination service. This field specifies parameters that control consistent hashing. This field is only applicable when localityLbPolicy is set to MAGLEV or RING_HASH. This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    customRequestHeaders List<String>
    Headers that the load balancer adds to proxied requests. See Creating custom headers.
    customResponseHeaders List<String>
    Headers that the load balancer adds to proxied responses. See Creating custom headers.
    description String
    An optional description of this resource. Provide this property when you create the resource.
    enableCDN Boolean
    If true, enables Cloud CDN for the backend service of an external HTTP(S) load balancer.
    failoverPolicy BackendServiceFailoverPolicy
    Requires at least one backend instance group to be defined as a backup (failover) backend. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    healthChecks List<String>
    The list of URLs to the healthChecks, httpHealthChecks (legacy), or httpsHealthChecks (legacy) resource for health checking this backend service. Not all backend services support legacy health checks. See Load balancer guide. Currently, at most one health check can be specified for each backend service. Backend services with instance group or zonal NEG backends must have a health check. Backend services with internet or serverless NEG backends must not have a health check.
    iap BackendServiceIAP
    The configurations for Identity-Aware Proxy on this resource. Not available for Internal TCP/UDP Load Balancing and Network Load Balancing.
    ipAddressSelectionPolicy RegionBackendServiceIpAddressSelectionPolicy
    Specifies a preference for traffic sent from the proxy to the backend (or from the client to the backend for proxyless gRPC). The possible values are: - IPV4_ONLY: Only send IPv4 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv4 health checks are used to check the health of the backends. This is the default setting. - PREFER_IPV6: Prioritize the connection to the endpoint's IPv6 address over its IPv4 address (provided there is a healthy IPv6 address). - IPV6_ONLY: Only send IPv6 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv6 health checks are used to check the health of the backends. This field is applicable to either: - Advanced Global External HTTPS Load Balancing (load balancing scheme EXTERNAL_MANAGED), - Regional External HTTPS Load Balancing, - Internal TCP Proxy (load balancing scheme INTERNAL_MANAGED), - Regional Internal HTTPS Load Balancing (load balancing scheme INTERNAL_MANAGED), - Traffic Director with Envoy proxies and proxyless gRPC (load balancing scheme INTERNAL_SELF_MANAGED).
    loadBalancingScheme RegionBackendServiceLoadBalancingScheme
    Specifies the load balancer type. A backend service created for one type of load balancer cannot be used with another. For more information, refer to Choosing a load balancer.
    localityLbPolicies List<BackendServiceLocalityLoadBalancingPolicyConfig>
    A list of locality load-balancing policies to be used in order of preference. When you use localityLbPolicies, you must set at least one value for either the localityLbPolicies[].policy or the localityLbPolicies[].customPolicy field. localityLbPolicies overrides any value set in the localityLbPolicy field. For an example of how to use this field, see Define a list of preferred policies. Caution: This field and its children are intended for use in a service mesh that includes gRPC clients only. Envoy proxies can't use backend services that have this configuration.
    localityLbPolicy RegionBackendServiceLocalityLbPolicy
    The load balancing algorithm used within the scope of the locality. The possible values are: - ROUND_ROBIN: This is a simple policy in which each healthy backend is selected in round robin order. This is the default. - LEAST_REQUEST: An O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests. - RING_HASH: The ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests. - RANDOM: The load balancer selects a random healthy host. - ORIGINAL_DESTINATION: Backend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer. - MAGLEV: used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824 This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED, INTERNAL_MANAGED, or EXTERNAL_MANAGED. If sessionAffinity is not NONE, and this field is not set to MAGLEV or RING_HASH, session affinity settings will not take effect. Only ROUND_ROBIN and RING_HASH are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    logConfig BackendServiceLogConfig
    This field denotes the logging options for the load balancer traffic served by this backend service. If logging is enabled, logs will be exported to Stackdriver.
    maxStreamDuration Duration
    Specifies the default maximum duration (timeout) for streams to this service. Duration is computed from the beginning of the stream until the response has been completely processed, including all retries. A stream that does not complete in this duration is closed. If not specified, there will be no timeout limit, i.e. the maximum duration is infinite. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. This field is only allowed when the loadBalancingScheme of the backend service is INTERNAL_SELF_MANAGED.
    metadatas Map<String,String>
    Deployment metadata associated with the resource to be set by a GKE hub controller and read by the backend RCTH
    name String
    Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
    network String
    The URL of the network to which this backend service belongs. This field can only be specified when the load balancing scheme is set to INTERNAL.
    outlierDetection OutlierDetection
    Settings controlling the ejection of unhealthy backend endpoints from the load balancing pool of each individual proxy instance that processes the traffic for the given backend service. If not set, this feature is considered disabled. Results of the outlier detection algorithm (ejection of endpoints from the load balancing pool and returning them back to the pool) are executed independently by each proxy instance of the load balancer. In most cases, more than one proxy instance handles the traffic received by a backend service. Thus, it is possible that an unhealthy endpoint is detected and ejected by only some of the proxies, and while this happens, other proxies may continue to send requests to the same unhealthy endpoint until they detect and eject the unhealthy endpoint. Applicable backend endpoints can be: - VM instances in an Instance Group - Endpoints in a Zonal NEG (GCE_VM_IP, GCE_VM_IP_PORT) - Endpoints in a Hybrid Connectivity NEG (NON_GCP_PRIVATE_IP_PORT) - Serverless NEGs, that resolve to Cloud Run, App Engine, or Cloud Functions Services - Private Service Connect NEGs, that resolve to Google-managed regional API endpoints or managed services published using Private Service Connect Applicable backend service types can be: - A global backend service with the loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED. - A regional backend service with the serviceProtocol set to HTTP, HTTPS, or HTTP2, and loadBalancingScheme set to INTERNAL_MANAGED or EXTERNAL_MANAGED. Not supported for Serverless NEGs. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    port Integer
    Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    Deprecated:Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    portName String
    A named port on a backend instance group representing the port for communication to the backend VMs in that group. The named port must be defined on each backend instance group. This parameter has no meaning if the backends are NEGs. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port_name.
    project String
    protocol RegionBackendServiceProtocol
    The protocol this BackendService uses to communicate with backends. Possible values are HTTP, HTTPS, HTTP2, TCP, SSL, UDP or GRPC. depending on the chosen load balancer or Traffic Director configuration. Refer to the documentation for the load balancers or for Traffic Director for more information. Must be set to GRPC when the backend service is referenced by a URL map that is bound to target gRPC proxy.
    requestId String
    An optional request ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported ( 00000000-0000-0000-0000-000000000000).
    securitySettings SecuritySettings
    This field specifies the security settings that apply to this backend service. This field is applicable to a global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    serviceBindings List<String>
    URLs of networkservices.ServiceBinding resources. Can only be set if load balancing scheme is INTERNAL_SELF_MANAGED. If set, lists of backends and health checks must be both empty.
    serviceLbPolicy String
    URL to networkservices.ServiceLbPolicy resource. Can only be set if load balancing scheme is EXTERNAL, EXTERNAL_MANAGED, INTERNAL_MANAGED or INTERNAL_SELF_MANAGED and the scope is global.
    sessionAffinity RegionBackendServiceSessionAffinity
    Type of session affinity to use. The default is NONE. Only NONE and HEADER_FIELD are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. For more details, see: Session Affinity.
    subsetting Subsetting
    timeoutSec Integer
    The backend service timeout has a different meaning depending on the type of load balancer. For more information see, Backend service settings. The default is 30 seconds. The full range of timeout values allowed goes from 1 through 2,147,483,647 seconds. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. Instead, use maxStreamDuration.
    usedBy List<BackendServiceUsedBy>
    vpcNetworkScope RegionBackendServiceVpcNetworkScope
    The network scope of the backends that can be added to the backend service. This field can be either GLOBAL_VPC_NETWORK or REGIONAL_VPC_NETWORK. A backend service with the VPC scope set to GLOBAL_VPC_NETWORK is only allowed to have backends in global VPC networks. When the VPC scope is set to REGIONAL_VPC_NETWORK the backend service is only allowed to have backends in regional networks in the same scope as the backend service. Note: if not specified then GLOBAL_VPC_NETWORK will be used.
    region string
    affinityCookieTtlSec number
    Lifetime of cookies in seconds. This setting is applicable to external and internal HTTP(S) load balancers and Traffic Director and requires GENERATED_COOKIE or HTTP_COOKIE session affinity. If set to 0, the cookie is non-persistent and lasts only until the end of the browser session (or equivalent). The maximum allowed value is two weeks (1,209,600). Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    backends Backend[]
    The list of backends that serve this BackendService.
    cdnPolicy BackendServiceCdnPolicy
    Cloud CDN configuration for this BackendService. Only available for specified load balancer types.
    circuitBreakers CircuitBreakers
    compressionMode RegionBackendServiceCompressionMode
    Compress text responses using Brotli or gzip compression, based on the client's Accept-Encoding header.
    connectionDraining ConnectionDraining
    connectionTrackingPolicy BackendServiceConnectionTrackingPolicy
    Connection Tracking configuration for this BackendService. Connection tracking policy settings are only available for Network Load Balancing and Internal TCP/UDP Load Balancing.
    consistentHash ConsistentHashLoadBalancerSettings
    Consistent Hash-based load balancing can be used to provide soft session affinity based on HTTP headers, cookies or other properties. This load balancing policy is applicable only for HTTP connections. The affinity to a particular destination host will be lost when one or more hosts are added/removed from the destination service. This field specifies parameters that control consistent hashing. This field is only applicable when localityLbPolicy is set to MAGLEV or RING_HASH. This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    customRequestHeaders string[]
    Headers that the load balancer adds to proxied requests. See Creating custom headers.
    customResponseHeaders string[]
    Headers that the load balancer adds to proxied responses. See Creating custom headers.
    description string
    An optional description of this resource. Provide this property when you create the resource.
    enableCDN boolean
    If true, enables Cloud CDN for the backend service of an external HTTP(S) load balancer.
    failoverPolicy BackendServiceFailoverPolicy
    Requires at least one backend instance group to be defined as a backup (failover) backend. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    healthChecks string[]
    The list of URLs to the healthChecks, httpHealthChecks (legacy), or httpsHealthChecks (legacy) resource for health checking this backend service. Not all backend services support legacy health checks. See Load balancer guide. Currently, at most one health check can be specified for each backend service. Backend services with instance group or zonal NEG backends must have a health check. Backend services with internet or serverless NEG backends must not have a health check.
    iap BackendServiceIAP
    The configurations for Identity-Aware Proxy on this resource. Not available for Internal TCP/UDP Load Balancing and Network Load Balancing.
    ipAddressSelectionPolicy RegionBackendServiceIpAddressSelectionPolicy
    Specifies a preference for traffic sent from the proxy to the backend (or from the client to the backend for proxyless gRPC). The possible values are: - IPV4_ONLY: Only send IPv4 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv4 health checks are used to check the health of the backends. This is the default setting. - PREFER_IPV6: Prioritize the connection to the endpoint's IPv6 address over its IPv4 address (provided there is a healthy IPv6 address). - IPV6_ONLY: Only send IPv6 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv6 health checks are used to check the health of the backends. This field is applicable to either: - Advanced Global External HTTPS Load Balancing (load balancing scheme EXTERNAL_MANAGED), - Regional External HTTPS Load Balancing, - Internal TCP Proxy (load balancing scheme INTERNAL_MANAGED), - Regional Internal HTTPS Load Balancing (load balancing scheme INTERNAL_MANAGED), - Traffic Director with Envoy proxies and proxyless gRPC (load balancing scheme INTERNAL_SELF_MANAGED).
    loadBalancingScheme RegionBackendServiceLoadBalancingScheme
    Specifies the load balancer type. A backend service created for one type of load balancer cannot be used with another. For more information, refer to Choosing a load balancer.
    localityLbPolicies BackendServiceLocalityLoadBalancingPolicyConfig[]
    A list of locality load-balancing policies to be used in order of preference. When you use localityLbPolicies, you must set at least one value for either the localityLbPolicies[].policy or the localityLbPolicies[].customPolicy field. localityLbPolicies overrides any value set in the localityLbPolicy field. For an example of how to use this field, see Define a list of preferred policies. Caution: This field and its children are intended for use in a service mesh that includes gRPC clients only. Envoy proxies can't use backend services that have this configuration.
    localityLbPolicy RegionBackendServiceLocalityLbPolicy
    The load balancing algorithm used within the scope of the locality. The possible values are: - ROUND_ROBIN: This is a simple policy in which each healthy backend is selected in round robin order. This is the default. - LEAST_REQUEST: An O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests. - RING_HASH: The ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests. - RANDOM: The load balancer selects a random healthy host. - ORIGINAL_DESTINATION: Backend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer. - MAGLEV: used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824 This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED, INTERNAL_MANAGED, or EXTERNAL_MANAGED. If sessionAffinity is not NONE, and this field is not set to MAGLEV or RING_HASH, session affinity settings will not take effect. Only ROUND_ROBIN and RING_HASH are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    logConfig BackendServiceLogConfig
    This field denotes the logging options for the load balancer traffic served by this backend service. If logging is enabled, logs will be exported to Stackdriver.
    maxStreamDuration Duration
    Specifies the default maximum duration (timeout) for streams to this service. Duration is computed from the beginning of the stream until the response has been completely processed, including all retries. A stream that does not complete in this duration is closed. If not specified, there will be no timeout limit, i.e. the maximum duration is infinite. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. This field is only allowed when the loadBalancingScheme of the backend service is INTERNAL_SELF_MANAGED.
    metadatas {[key: string]: string}
    Deployment metadata associated with the resource to be set by a GKE hub controller and read by the backend RCTH
    name string
    Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
    network string
    The URL of the network to which this backend service belongs. This field can only be specified when the load balancing scheme is set to INTERNAL.
    outlierDetection OutlierDetection
    Settings controlling the ejection of unhealthy backend endpoints from the load balancing pool of each individual proxy instance that processes the traffic for the given backend service. If not set, this feature is considered disabled. Results of the outlier detection algorithm (ejection of endpoints from the load balancing pool and returning them back to the pool) are executed independently by each proxy instance of the load balancer. In most cases, more than one proxy instance handles the traffic received by a backend service. Thus, it is possible that an unhealthy endpoint is detected and ejected by only some of the proxies, and while this happens, other proxies may continue to send requests to the same unhealthy endpoint until they detect and eject the unhealthy endpoint. Applicable backend endpoints can be: - VM instances in an Instance Group - Endpoints in a Zonal NEG (GCE_VM_IP, GCE_VM_IP_PORT) - Endpoints in a Hybrid Connectivity NEG (NON_GCP_PRIVATE_IP_PORT) - Serverless NEGs, that resolve to Cloud Run, App Engine, or Cloud Functions Services - Private Service Connect NEGs, that resolve to Google-managed regional API endpoints or managed services published using Private Service Connect Applicable backend service types can be: - A global backend service with the loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED. - A regional backend service with the serviceProtocol set to HTTP, HTTPS, or HTTP2, and loadBalancingScheme set to INTERNAL_MANAGED or EXTERNAL_MANAGED. Not supported for Serverless NEGs. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    port number
    Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    Deprecated:Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    portName string
    A named port on a backend instance group representing the port for communication to the backend VMs in that group. The named port must be defined on each backend instance group. This parameter has no meaning if the backends are NEGs. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port_name.
    project string
    protocol RegionBackendServiceProtocol
    The protocol this BackendService uses to communicate with backends. Possible values are HTTP, HTTPS, HTTP2, TCP, SSL, UDP or GRPC. depending on the chosen load balancer or Traffic Director configuration. Refer to the documentation for the load balancers or for Traffic Director for more information. Must be set to GRPC when the backend service is referenced by a URL map that is bound to target gRPC proxy.
    requestId string
    An optional request ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported ( 00000000-0000-0000-0000-000000000000).
    securitySettings SecuritySettings
    This field specifies the security settings that apply to this backend service. This field is applicable to a global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    serviceBindings string[]
    URLs of networkservices.ServiceBinding resources. Can only be set if load balancing scheme is INTERNAL_SELF_MANAGED. If set, lists of backends and health checks must be both empty.
    serviceLbPolicy string
    URL to networkservices.ServiceLbPolicy resource. Can only be set if load balancing scheme is EXTERNAL, EXTERNAL_MANAGED, INTERNAL_MANAGED or INTERNAL_SELF_MANAGED and the scope is global.
    sessionAffinity RegionBackendServiceSessionAffinity
    Type of session affinity to use. The default is NONE. Only NONE and HEADER_FIELD are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. For more details, see: Session Affinity.
    subsetting Subsetting
    timeoutSec number
    The backend service timeout has a different meaning depending on the type of load balancer. For more information see, Backend service settings. The default is 30 seconds. The full range of timeout values allowed goes from 1 through 2,147,483,647 seconds. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. Instead, use maxStreamDuration.
    usedBy BackendServiceUsedBy[]
    vpcNetworkScope RegionBackendServiceVpcNetworkScope
    The network scope of the backends that can be added to the backend service. This field can be either GLOBAL_VPC_NETWORK or REGIONAL_VPC_NETWORK. A backend service with the VPC scope set to GLOBAL_VPC_NETWORK is only allowed to have backends in global VPC networks. When the VPC scope is set to REGIONAL_VPC_NETWORK the backend service is only allowed to have backends in regional networks in the same scope as the backend service. Note: if not specified then GLOBAL_VPC_NETWORK will be used.
    region str
    affinity_cookie_ttl_sec int
    Lifetime of cookies in seconds. This setting is applicable to external and internal HTTP(S) load balancers and Traffic Director and requires GENERATED_COOKIE or HTTP_COOKIE session affinity. If set to 0, the cookie is non-persistent and lasts only until the end of the browser session (or equivalent). The maximum allowed value is two weeks (1,209,600). Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    backends Sequence[BackendArgs]
    The list of backends that serve this BackendService.
    cdn_policy BackendServiceCdnPolicyArgs
    Cloud CDN configuration for this BackendService. Only available for specified load balancer types.
    circuit_breakers CircuitBreakersArgs
    compression_mode RegionBackendServiceCompressionMode
    Compress text responses using Brotli or gzip compression, based on the client's Accept-Encoding header.
    connection_draining ConnectionDrainingArgs
    connection_tracking_policy BackendServiceConnectionTrackingPolicyArgs
    Connection Tracking configuration for this BackendService. Connection tracking policy settings are only available for Network Load Balancing and Internal TCP/UDP Load Balancing.
    consistent_hash ConsistentHashLoadBalancerSettingsArgs
    Consistent Hash-based load balancing can be used to provide soft session affinity based on HTTP headers, cookies or other properties. This load balancing policy is applicable only for HTTP connections. The affinity to a particular destination host will be lost when one or more hosts are added/removed from the destination service. This field specifies parameters that control consistent hashing. This field is only applicable when localityLbPolicy is set to MAGLEV or RING_HASH. This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    custom_request_headers Sequence[str]
    Headers that the load balancer adds to proxied requests. See Creating custom headers.
    custom_response_headers Sequence[str]
    Headers that the load balancer adds to proxied responses. See Creating custom headers.
    description str
    An optional description of this resource. Provide this property when you create the resource.
    enable_cdn bool
    If true, enables Cloud CDN for the backend service of an external HTTP(S) load balancer.
    failover_policy BackendServiceFailoverPolicyArgs
    Requires at least one backend instance group to be defined as a backup (failover) backend. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    health_checks Sequence[str]
    The list of URLs to the healthChecks, httpHealthChecks (legacy), or httpsHealthChecks (legacy) resource for health checking this backend service. Not all backend services support legacy health checks. See Load balancer guide. Currently, at most one health check can be specified for each backend service. Backend services with instance group or zonal NEG backends must have a health check. Backend services with internet or serverless NEG backends must not have a health check.
    iap BackendServiceIAPArgs
    The configurations for Identity-Aware Proxy on this resource. Not available for Internal TCP/UDP Load Balancing and Network Load Balancing.
    ip_address_selection_policy RegionBackendServiceIpAddressSelectionPolicy
    Specifies a preference for traffic sent from the proxy to the backend (or from the client to the backend for proxyless gRPC). The possible values are: - IPV4_ONLY: Only send IPv4 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv4 health checks are used to check the health of the backends. This is the default setting. - PREFER_IPV6: Prioritize the connection to the endpoint's IPv6 address over its IPv4 address (provided there is a healthy IPv6 address). - IPV6_ONLY: Only send IPv6 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv6 health checks are used to check the health of the backends. This field is applicable to either: - Advanced Global External HTTPS Load Balancing (load balancing scheme EXTERNAL_MANAGED), - Regional External HTTPS Load Balancing, - Internal TCP Proxy (load balancing scheme INTERNAL_MANAGED), - Regional Internal HTTPS Load Balancing (load balancing scheme INTERNAL_MANAGED), - Traffic Director with Envoy proxies and proxyless gRPC (load balancing scheme INTERNAL_SELF_MANAGED).
    load_balancing_scheme RegionBackendServiceLoadBalancingScheme
    Specifies the load balancer type. A backend service created for one type of load balancer cannot be used with another. For more information, refer to Choosing a load balancer.
    locality_lb_policies Sequence[BackendServiceLocalityLoadBalancingPolicyConfigArgs]
    A list of locality load-balancing policies to be used in order of preference. When you use localityLbPolicies, you must set at least one value for either the localityLbPolicies[].policy or the localityLbPolicies[].customPolicy field. localityLbPolicies overrides any value set in the localityLbPolicy field. For an example of how to use this field, see Define a list of preferred policies. Caution: This field and its children are intended for use in a service mesh that includes gRPC clients only. Envoy proxies can't use backend services that have this configuration.
    locality_lb_policy RegionBackendServiceLocalityLbPolicy
    The load balancing algorithm used within the scope of the locality. The possible values are: - ROUND_ROBIN: This is a simple policy in which each healthy backend is selected in round robin order. This is the default. - LEAST_REQUEST: An O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests. - RING_HASH: The ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests. - RANDOM: The load balancer selects a random healthy host. - ORIGINAL_DESTINATION: Backend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer. - MAGLEV: used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824 This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED, INTERNAL_MANAGED, or EXTERNAL_MANAGED. If sessionAffinity is not NONE, and this field is not set to MAGLEV or RING_HASH, session affinity settings will not take effect. Only ROUND_ROBIN and RING_HASH are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    log_config BackendServiceLogConfigArgs
    This field denotes the logging options for the load balancer traffic served by this backend service. If logging is enabled, logs will be exported to Stackdriver.
    max_stream_duration DurationArgs
    Specifies the default maximum duration (timeout) for streams to this service. Duration is computed from the beginning of the stream until the response has been completely processed, including all retries. A stream that does not complete in this duration is closed. If not specified, there will be no timeout limit, i.e. the maximum duration is infinite. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. This field is only allowed when the loadBalancingScheme of the backend service is INTERNAL_SELF_MANAGED.
    metadatas Mapping[str, str]
    Deployment metadata associated with the resource to be set by a GKE hub controller and read by the backend RCTH
    name str
    Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
    network str
    The URL of the network to which this backend service belongs. This field can only be specified when the load balancing scheme is set to INTERNAL.
    outlier_detection OutlierDetectionArgs
    Settings controlling the ejection of unhealthy backend endpoints from the load balancing pool of each individual proxy instance that processes the traffic for the given backend service. If not set, this feature is considered disabled. Results of the outlier detection algorithm (ejection of endpoints from the load balancing pool and returning them back to the pool) are executed independently by each proxy instance of the load balancer. In most cases, more than one proxy instance handles the traffic received by a backend service. Thus, it is possible that an unhealthy endpoint is detected and ejected by only some of the proxies, and while this happens, other proxies may continue to send requests to the same unhealthy endpoint until they detect and eject the unhealthy endpoint. Applicable backend endpoints can be: - VM instances in an Instance Group - Endpoints in a Zonal NEG (GCE_VM_IP, GCE_VM_IP_PORT) - Endpoints in a Hybrid Connectivity NEG (NON_GCP_PRIVATE_IP_PORT) - Serverless NEGs, that resolve to Cloud Run, App Engine, or Cloud Functions Services - Private Service Connect NEGs, that resolve to Google-managed regional API endpoints or managed services published using Private Service Connect Applicable backend service types can be: - A global backend service with the loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED. - A regional backend service with the serviceProtocol set to HTTP, HTTPS, or HTTP2, and loadBalancingScheme set to INTERNAL_MANAGED or EXTERNAL_MANAGED. Not supported for Serverless NEGs. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    port int
    Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    Deprecated:Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    port_name str
    A named port on a backend instance group representing the port for communication to the backend VMs in that group. The named port must be defined on each backend instance group. This parameter has no meaning if the backends are NEGs. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port_name.
    project str
    protocol RegionBackendServiceProtocol
    The protocol this BackendService uses to communicate with backends. Possible values are HTTP, HTTPS, HTTP2, TCP, SSL, UDP or GRPC. depending on the chosen load balancer or Traffic Director configuration. Refer to the documentation for the load balancers or for Traffic Director for more information. Must be set to GRPC when the backend service is referenced by a URL map that is bound to target gRPC proxy.
    request_id str
    An optional request ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported ( 00000000-0000-0000-0000-000000000000).
    security_settings SecuritySettingsArgs
    This field specifies the security settings that apply to this backend service. This field is applicable to a global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    service_bindings Sequence[str]
    URLs of networkservices.ServiceBinding resources. Can only be set if load balancing scheme is INTERNAL_SELF_MANAGED. If set, lists of backends and health checks must be both empty.
    service_lb_policy str
    URL to networkservices.ServiceLbPolicy resource. Can only be set if load balancing scheme is EXTERNAL, EXTERNAL_MANAGED, INTERNAL_MANAGED or INTERNAL_SELF_MANAGED and the scope is global.
    session_affinity RegionBackendServiceSessionAffinity
    Type of session affinity to use. The default is NONE. Only NONE and HEADER_FIELD are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. For more details, see: Session Affinity.
    subsetting SubsettingArgs
    timeout_sec int
    The backend service timeout has a different meaning depending on the type of load balancer. For more information see, Backend service settings. The default is 30 seconds. The full range of timeout values allowed goes from 1 through 2,147,483,647 seconds. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. Instead, use maxStreamDuration.
    used_by Sequence[BackendServiceUsedByArgs]
    vpc_network_scope RegionBackendServiceVpcNetworkScope
    The network scope of the backends that can be added to the backend service. This field can be either GLOBAL_VPC_NETWORK or REGIONAL_VPC_NETWORK. A backend service with the VPC scope set to GLOBAL_VPC_NETWORK is only allowed to have backends in global VPC networks. When the VPC scope is set to REGIONAL_VPC_NETWORK the backend service is only allowed to have backends in regional networks in the same scope as the backend service. Note: if not specified then GLOBAL_VPC_NETWORK will be used.
    region String
    affinityCookieTtlSec Number
    Lifetime of cookies in seconds. This setting is applicable to external and internal HTTP(S) load balancers and Traffic Director and requires GENERATED_COOKIE or HTTP_COOKIE session affinity. If set to 0, the cookie is non-persistent and lasts only until the end of the browser session (or equivalent). The maximum allowed value is two weeks (1,209,600). Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    backends List<Property Map>
    The list of backends that serve this BackendService.
    cdnPolicy Property Map
    Cloud CDN configuration for this BackendService. Only available for specified load balancer types.
    circuitBreakers Property Map
    compressionMode "AUTOMATIC" | "DISABLED"
    Compress text responses using Brotli or gzip compression, based on the client's Accept-Encoding header.
    connectionDraining Property Map
    connectionTrackingPolicy Property Map
    Connection Tracking configuration for this BackendService. Connection tracking policy settings are only available for Network Load Balancing and Internal TCP/UDP Load Balancing.
    consistentHash Property Map
    Consistent Hash-based load balancing can be used to provide soft session affinity based on HTTP headers, cookies or other properties. This load balancing policy is applicable only for HTTP connections. The affinity to a particular destination host will be lost when one or more hosts are added/removed from the destination service. This field specifies parameters that control consistent hashing. This field is only applicable when localityLbPolicy is set to MAGLEV or RING_HASH. This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    customRequestHeaders List<String>
    Headers that the load balancer adds to proxied requests. See Creating custom headers.
    customResponseHeaders List<String>
    Headers that the load balancer adds to proxied responses. See Creating custom headers.
    description String
    An optional description of this resource. Provide this property when you create the resource.
    enableCDN Boolean
    If true, enables Cloud CDN for the backend service of an external HTTP(S) load balancer.
    failoverPolicy Property Map
    Requires at least one backend instance group to be defined as a backup (failover) backend. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    healthChecks List<String>
    The list of URLs to the healthChecks, httpHealthChecks (legacy), or httpsHealthChecks (legacy) resource for health checking this backend service. Not all backend services support legacy health checks. See Load balancer guide. Currently, at most one health check can be specified for each backend service. Backend services with instance group or zonal NEG backends must have a health check. Backend services with internet or serverless NEG backends must not have a health check.
    iap Property Map
    The configurations for Identity-Aware Proxy on this resource. Not available for Internal TCP/UDP Load Balancing and Network Load Balancing.
    ipAddressSelectionPolicy "IPV4_ONLY" | "IPV6_ONLY" | "IP_ADDRESS_SELECTION_POLICY_UNSPECIFIED" | "PREFER_IPV6"
    Specifies a preference for traffic sent from the proxy to the backend (or from the client to the backend for proxyless gRPC). The possible values are: - IPV4_ONLY: Only send IPv4 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv4 health checks are used to check the health of the backends. This is the default setting. - PREFER_IPV6: Prioritize the connection to the endpoint's IPv6 address over its IPv4 address (provided there is a healthy IPv6 address). - IPV6_ONLY: Only send IPv6 traffic to the backends of the backend service (Instance Group, Managed Instance Group, Network Endpoint Group), regardless of traffic from the client to the proxy. Only IPv6 health checks are used to check the health of the backends. This field is applicable to either: - Advanced Global External HTTPS Load Balancing (load balancing scheme EXTERNAL_MANAGED), - Regional External HTTPS Load Balancing, - Internal TCP Proxy (load balancing scheme INTERNAL_MANAGED), - Regional Internal HTTPS Load Balancing (load balancing scheme INTERNAL_MANAGED), - Traffic Director with Envoy proxies and proxyless gRPC (load balancing scheme INTERNAL_SELF_MANAGED).
    loadBalancingScheme "EXTERNAL" | "EXTERNAL_MANAGED" | "INTERNAL" | "INTERNAL_MANAGED" | "INTERNAL_SELF_MANAGED" | "INVALID_LOAD_BALANCING_SCHEME"
    Specifies the load balancer type. A backend service created for one type of load balancer cannot be used with another. For more information, refer to Choosing a load balancer.
    localityLbPolicies List<Property Map>
    A list of locality load-balancing policies to be used in order of preference. When you use localityLbPolicies, you must set at least one value for either the localityLbPolicies[].policy or the localityLbPolicies[].customPolicy field. localityLbPolicies overrides any value set in the localityLbPolicy field. For an example of how to use this field, see Define a list of preferred policies. Caution: This field and its children are intended for use in a service mesh that includes gRPC clients only. Envoy proxies can't use backend services that have this configuration.
    localityLbPolicy "INVALID_LB_POLICY" | "LEAST_REQUEST" | "MAGLEV" | "ORIGINAL_DESTINATION" | "RANDOM" | "RING_HASH" | "ROUND_ROBIN" | "WEIGHTED_MAGLEV"
    The load balancing algorithm used within the scope of the locality. The possible values are: - ROUND_ROBIN: This is a simple policy in which each healthy backend is selected in round robin order. This is the default. - LEAST_REQUEST: An O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests. - RING_HASH: The ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests. - RANDOM: The load balancer selects a random healthy host. - ORIGINAL_DESTINATION: Backend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer. - MAGLEV: used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824 This field is applicable to either: - A regional backend service with the service_protocol set to HTTP, HTTPS, or HTTP2, and load_balancing_scheme set to INTERNAL_MANAGED. - A global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED, INTERNAL_MANAGED, or EXTERNAL_MANAGED. If sessionAffinity is not NONE, and this field is not set to MAGLEV or RING_HASH, session affinity settings will not take effect. Only ROUND_ROBIN and RING_HASH are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    logConfig Property Map
    This field denotes the logging options for the load balancer traffic served by this backend service. If logging is enabled, logs will be exported to Stackdriver.
    maxStreamDuration Property Map
    Specifies the default maximum duration (timeout) for streams to this service. Duration is computed from the beginning of the stream until the response has been completely processed, including all retries. A stream that does not complete in this duration is closed. If not specified, there will be no timeout limit, i.e. the maximum duration is infinite. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. This field is only allowed when the loadBalancingScheme of the backend service is INTERNAL_SELF_MANAGED.
    metadatas Map<String>
    Deployment metadata associated with the resource to be set by a GKE hub controller and read by the backend RCTH
    name String
    Name of the resource. Provided by the client when the resource is created. The name must be 1-63 characters long, and comply with RFC1035. Specifically, the name must be 1-63 characters long and match the regular expression [a-z]([-a-z0-9]*[a-z0-9])? which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
    network String
    The URL of the network to which this backend service belongs. This field can only be specified when the load balancing scheme is set to INTERNAL.
    outlierDetection Property Map
    Settings controlling the ejection of unhealthy backend endpoints from the load balancing pool of each individual proxy instance that processes the traffic for the given backend service. If not set, this feature is considered disabled. Results of the outlier detection algorithm (ejection of endpoints from the load balancing pool and returning them back to the pool) are executed independently by each proxy instance of the load balancer. In most cases, more than one proxy instance handles the traffic received by a backend service. Thus, it is possible that an unhealthy endpoint is detected and ejected by only some of the proxies, and while this happens, other proxies may continue to send requests to the same unhealthy endpoint until they detect and eject the unhealthy endpoint. Applicable backend endpoints can be: - VM instances in an Instance Group - Endpoints in a Zonal NEG (GCE_VM_IP, GCE_VM_IP_PORT) - Endpoints in a Hybrid Connectivity NEG (NON_GCP_PRIVATE_IP_PORT) - Serverless NEGs, that resolve to Cloud Run, App Engine, or Cloud Functions Services - Private Service Connect NEGs, that resolve to Google-managed regional API endpoints or managed services published using Private Service Connect Applicable backend service types can be: - A global backend service with the loadBalancingScheme set to INTERNAL_SELF_MANAGED or EXTERNAL_MANAGED. - A regional backend service with the serviceProtocol set to HTTP, HTTPS, or HTTP2, and loadBalancingScheme set to INTERNAL_MANAGED or EXTERNAL_MANAGED. Not supported for Serverless NEGs. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    port Number
    Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    Deprecated:Deprecated in favor of portName. The TCP port to connect on the backend. The default value is 80. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port.

    portName String
    A named port on a backend instance group representing the port for communication to the backend VMs in that group. The named port must be defined on each backend instance group. This parameter has no meaning if the backends are NEGs. For Internal TCP/UDP Load Balancing and Network Load Balancing, omit port_name.
    project String
    protocol "ALL" | "GRPC" | "HTTP" | "HTTP2" | "HTTPS" | "SSL" | "TCP" | "UDP" | "UNSPECIFIED"
    The protocol this BackendService uses to communicate with backends. Possible values are HTTP, HTTPS, HTTP2, TCP, SSL, UDP or GRPC. depending on the chosen load balancer or Traffic Director configuration. Refer to the documentation for the load balancers or for Traffic Director for more information. Must be set to GRPC when the backend service is referenced by a URL map that is bound to target gRPC proxy.
    requestId String
    An optional request ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported ( 00000000-0000-0000-0000-000000000000).
    securitySettings Property Map
    This field specifies the security settings that apply to this backend service. This field is applicable to a global backend service with the load_balancing_scheme set to INTERNAL_SELF_MANAGED.
    serviceBindings List<String>
    URLs of networkservices.ServiceBinding resources. Can only be set if load balancing scheme is INTERNAL_SELF_MANAGED. If set, lists of backends and health checks must be both empty.
    serviceLbPolicy String
    URL to networkservices.ServiceLbPolicy resource. Can only be set if load balancing scheme is EXTERNAL, EXTERNAL_MANAGED, INTERNAL_MANAGED or INTERNAL_SELF_MANAGED and the scope is global.
    sessionAffinity "CLIENT_IP" | "CLIENT_IP_NO_DESTINATION" | "CLIENT_IP_PORT_PROTO" | "CLIENT_IP_PROTO" | "GENERATED_COOKIE" | "HEADER_FIELD" | "HTTP_COOKIE" | "NONE"
    Type of session affinity to use. The default is NONE. Only NONE and HEADER_FIELD are supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. For more details, see: Session Affinity.
    subsetting Property Map
    timeoutSec Number
    The backend service timeout has a different meaning depending on the type of load balancer. For more information see, Backend service settings. The default is 30 seconds. The full range of timeout values allowed goes from 1 through 2,147,483,647 seconds. This value can be overridden in the PathMatcher configuration of the UrlMap that references this backend service. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true. Instead, use maxStreamDuration.
    usedBy List<Property Map>
    vpcNetworkScope "GLOBAL_VPC_NETWORK" | "REGIONAL_VPC_NETWORK"
    The network scope of the backends that can be added to the backend service. This field can be either GLOBAL_VPC_NETWORK or REGIONAL_VPC_NETWORK. A backend service with the VPC scope set to GLOBAL_VPC_NETWORK is only allowed to have backends in global VPC networks. When the VPC scope is set to REGIONAL_VPC_NETWORK the backend service is only allowed to have backends in regional networks in the same scope as the backend service. Note: if not specified then GLOBAL_VPC_NETWORK will be used.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the RegionBackendService resource produces the following output properties:

    CreationTimestamp string
    Creation timestamp in RFC3339 text format.
    EdgeSecurityPolicy string
    The resource URL for the edge security policy associated with this backend service.
    Fingerprint string
    Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a BackendService. An up-to-date fingerprint must be provided in order to update the BackendService, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve a BackendService.
    Id string
    The provider-assigned unique ID for this managed resource.
    Kind string
    Type of resource. Always compute#backendService for backend services.
    SecurityPolicy string
    The resource URL for the security policy associated with this backend service.
    SelfLink string
    Server-defined URL for the resource.
    SelfLinkWithId string
    Server-defined URL for this resource with the resource id.
    CreationTimestamp string
    Creation timestamp in RFC3339 text format.
    EdgeSecurityPolicy string
    The resource URL for the edge security policy associated with this backend service.
    Fingerprint string
    Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a BackendService. An up-to-date fingerprint must be provided in order to update the BackendService, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve a BackendService.
    Id string
    The provider-assigned unique ID for this managed resource.
    Kind string
    Type of resource. Always compute#backendService for backend services.
    SecurityPolicy string
    The resource URL for the security policy associated with this backend service.
    SelfLink string
    Server-defined URL for the resource.
    SelfLinkWithId string
    Server-defined URL for this resource with the resource id.
    creationTimestamp String
    Creation timestamp in RFC3339 text format.
    edgeSecurityPolicy String
    The resource URL for the edge security policy associated with this backend service.
    fingerprint String
    Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a BackendService. An up-to-date fingerprint must be provided in order to update the BackendService, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve a BackendService.
    id String
    The provider-assigned unique ID for this managed resource.
    kind String
    Type of resource. Always compute#backendService for backend services.
    securityPolicy String
    The resource URL for the security policy associated with this backend service.
    selfLink String
    Server-defined URL for the resource.
    selfLinkWithId String
    Server-defined URL for this resource with the resource id.
    creationTimestamp string
    Creation timestamp in RFC3339 text format.
    edgeSecurityPolicy string
    The resource URL for the edge security policy associated with this backend service.
    fingerprint string
    Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a BackendService. An up-to-date fingerprint must be provided in order to update the BackendService, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve a BackendService.
    id string
    The provider-assigned unique ID for this managed resource.
    kind string
    Type of resource. Always compute#backendService for backend services.
    securityPolicy string
    The resource URL for the security policy associated with this backend service.
    selfLink string
    Server-defined URL for the resource.
    selfLinkWithId string
    Server-defined URL for this resource with the resource id.
    creation_timestamp str
    Creation timestamp in RFC3339 text format.
    edge_security_policy str
    The resource URL for the edge security policy associated with this backend service.
    fingerprint str
    Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a BackendService. An up-to-date fingerprint must be provided in order to update the BackendService, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve a BackendService.
    id str
    The provider-assigned unique ID for this managed resource.
    kind str
    Type of resource. Always compute#backendService for backend services.
    security_policy str
    The resource URL for the security policy associated with this backend service.
    self_link str
    Server-defined URL for the resource.
    self_link_with_id str
    Server-defined URL for this resource with the resource id.
    creationTimestamp String
    Creation timestamp in RFC3339 text format.
    edgeSecurityPolicy String
    The resource URL for the edge security policy associated with this backend service.
    fingerprint String
    Fingerprint of this resource. A hash of the contents stored in this object. This field is used in optimistic locking. This field will be ignored when inserting a BackendService. An up-to-date fingerprint must be provided in order to update the BackendService, otherwise the request will fail with error 412 conditionNotMet. To see the latest fingerprint, make a get() request to retrieve a BackendService.
    id String
    The provider-assigned unique ID for this managed resource.
    kind String
    Type of resource. Always compute#backendService for backend services.
    securityPolicy String
    The resource URL for the security policy associated with this backend service.
    selfLink String
    Server-defined URL for the resource.
    selfLinkWithId String
    Server-defined URL for this resource with the resource id.

    Supporting Types

    AWSV4Signature, AWSV4SignatureArgs

    AccessKey string
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    AccessKeyId string
    The identifier of an access key used for s3 bucket authentication.
    AccessKeyVersion string
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    OriginRegion string
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    AccessKey string
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    AccessKeyId string
    The identifier of an access key used for s3 bucket authentication.
    AccessKeyVersion string
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    OriginRegion string
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    accessKey String
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    accessKeyId String
    The identifier of an access key used for s3 bucket authentication.
    accessKeyVersion String
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    originRegion String
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    accessKey string
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    accessKeyId string
    The identifier of an access key used for s3 bucket authentication.
    accessKeyVersion string
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    originRegion string
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    access_key str
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    access_key_id str
    The identifier of an access key used for s3 bucket authentication.
    access_key_version str
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    origin_region str
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    accessKey String
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    accessKeyId String
    The identifier of an access key used for s3 bucket authentication.
    accessKeyVersion String
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    originRegion String
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.

    AWSV4SignatureResponse, AWSV4SignatureResponseArgs

    AccessKey string
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    AccessKeyId string
    The identifier of an access key used for s3 bucket authentication.
    AccessKeyVersion string
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    OriginRegion string
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    AccessKey string
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    AccessKeyId string
    The identifier of an access key used for s3 bucket authentication.
    AccessKeyVersion string
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    OriginRegion string
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    accessKey String
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    accessKeyId String
    The identifier of an access key used for s3 bucket authentication.
    accessKeyVersion String
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    originRegion String
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    accessKey string
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    accessKeyId string
    The identifier of an access key used for s3 bucket authentication.
    accessKeyVersion string
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    originRegion string
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    access_key str
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    access_key_id str
    The identifier of an access key used for s3 bucket authentication.
    access_key_version str
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    origin_region str
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.
    accessKey String
    The access key used for s3 bucket authentication. Required for updating or creating a backend that uses AWS v4 signature authentication, but will not be returned as part of the configuration when queried with a REST API GET request. @InputOnly
    accessKeyId String
    The identifier of an access key used for s3 bucket authentication.
    accessKeyVersion String
    The optional version identifier for the access key. You can use this to keep track of different iterations of your access key.
    originRegion String
    The name of the cloud region of your origin. This is a free-form field with the name of the region your cloud uses to host your origin. For example, "us-east-1" for AWS or "us-ashburn-1" for OCI.

    AuthenticationPolicy, AuthenticationPolicyArgs

    Origins List<Pulumi.GoogleNative.Compute.Alpha.Inputs.OriginAuthenticationMethod>
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    Peers List<Pulumi.GoogleNative.Compute.Alpha.Inputs.PeerAuthenticationMethod>
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    PrincipalBinding Pulumi.GoogleNative.Compute.Alpha.AuthenticationPolicyPrincipalBinding
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    ServerTlsContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsContext
    Configures the mechanism to obtain server-side security certificates and identity information.
    Origins []OriginAuthenticationMethod
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    Peers []PeerAuthenticationMethod
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    PrincipalBinding AuthenticationPolicyPrincipalBinding
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    ServerTlsContext TlsContext
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins List<OriginAuthenticationMethod>
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers List<PeerAuthenticationMethod>
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principalBinding AuthenticationPolicyPrincipalBinding
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    serverTlsContext TlsContext
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins OriginAuthenticationMethod[]
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers PeerAuthenticationMethod[]
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principalBinding AuthenticationPolicyPrincipalBinding
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    serverTlsContext TlsContext
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins Sequence[OriginAuthenticationMethod]
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers Sequence[PeerAuthenticationMethod]
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principal_binding AuthenticationPolicyPrincipalBinding
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    server_tls_context TlsContext
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins List<Property Map>
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers List<Property Map>
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principalBinding "INVALID" | "USE_ORIGIN" | "USE_PEER"
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    serverTlsContext Property Map
    Configures the mechanism to obtain server-side security certificates and identity information.

    AuthenticationPolicyPrincipalBinding, AuthenticationPolicyPrincipalBindingArgs

    Invalid
    INVALID
    UseOrigin
    USE_ORIGINPrincipal will be set to the identity from origin authentication.
    UsePeer
    USE_PEERPrincipal will be set to the identity from peer authentication.
    AuthenticationPolicyPrincipalBindingInvalid
    INVALID
    AuthenticationPolicyPrincipalBindingUseOrigin
    USE_ORIGINPrincipal will be set to the identity from origin authentication.
    AuthenticationPolicyPrincipalBindingUsePeer
    USE_PEERPrincipal will be set to the identity from peer authentication.
    Invalid
    INVALID
    UseOrigin
    USE_ORIGINPrincipal will be set to the identity from origin authentication.
    UsePeer
    USE_PEERPrincipal will be set to the identity from peer authentication.
    Invalid
    INVALID
    UseOrigin
    USE_ORIGINPrincipal will be set to the identity from origin authentication.
    UsePeer
    USE_PEERPrincipal will be set to the identity from peer authentication.
    INVALID
    INVALID
    USE_ORIGIN
    USE_ORIGINPrincipal will be set to the identity from origin authentication.
    USE_PEER
    USE_PEERPrincipal will be set to the identity from peer authentication.
    "INVALID"
    INVALID
    "USE_ORIGIN"
    USE_ORIGINPrincipal will be set to the identity from origin authentication.
    "USE_PEER"
    USE_PEERPrincipal will be set to the identity from peer authentication.

    AuthenticationPolicyResponse, AuthenticationPolicyResponseArgs

    Origins List<Pulumi.GoogleNative.Compute.Alpha.Inputs.OriginAuthenticationMethodResponse>
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    Peers List<Pulumi.GoogleNative.Compute.Alpha.Inputs.PeerAuthenticationMethodResponse>
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    PrincipalBinding string
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    ServerTlsContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsContextResponse
    Configures the mechanism to obtain server-side security certificates and identity information.
    Origins []OriginAuthenticationMethodResponse
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    Peers []PeerAuthenticationMethodResponse
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    PrincipalBinding string
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    ServerTlsContext TlsContextResponse
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins List<OriginAuthenticationMethodResponse>
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers List<PeerAuthenticationMethodResponse>
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principalBinding String
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    serverTlsContext TlsContextResponse
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins OriginAuthenticationMethodResponse[]
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers PeerAuthenticationMethodResponse[]
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principalBinding string
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    serverTlsContext TlsContextResponse
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins Sequence[OriginAuthenticationMethodResponse]
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers Sequence[PeerAuthenticationMethodResponse]
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principal_binding str
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    server_tls_context TlsContextResponse
    Configures the mechanism to obtain server-side security certificates and identity information.
    origins List<Property Map>
    List of authentication methods that can be used for origin authentication. Similar to peers, these will be evaluated in order the first valid one will be used to set origin identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if origin authentication is not required.
    peers List<Property Map>
    List of authentication methods that can be used for peer authentication. They will be evaluated in order the first valid one will be used to set peer identity. If none of these methods pass, the request will be rejected with authentication failed error (401). Leave the list empty if peer authentication is not required.
    principalBinding String
    Define whether peer or origin identity should be used for principal. Default value is USE_PEER. If peer (or origin) identity is not available, either because peer/origin authentication is not defined, or failed, principal will be left unset. In other words, binding rule does not affect the decision to accept or reject request. This field can be set to one of the following: USE_PEER: Principal will be set to the identity from peer authentication. USE_ORIGIN: Principal will be set to the identity from origin authentication.
    serverTlsContext Property Map
    Configures the mechanism to obtain server-side security certificates and identity information.

    AuthorizationConfig, AuthorizationConfigArgs

    Policies []RbacPolicy
    List of RbacPolicies.
    policies List<RbacPolicy>
    List of RbacPolicies.
    policies RbacPolicy[]
    List of RbacPolicies.
    policies Sequence[RbacPolicy]
    List of RbacPolicies.
    policies List<Property Map>
    List of RbacPolicies.

    AuthorizationConfigResponse, AuthorizationConfigResponseArgs

    Policies []RbacPolicyResponse
    List of RbacPolicies.
    policies List<RbacPolicyResponse>
    List of RbacPolicies.
    policies RbacPolicyResponse[]
    List of RbacPolicies.
    policies List<Property Map>
    List of RbacPolicies.

    Backend, BackendArgs

    BalancingMode Pulumi.GoogleNative.Compute.Alpha.BackendBalancingMode
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    CapacityScaler double
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    Description string
    An optional description of this resource. Provide this property when you create the resource.
    Failover bool
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    Group string
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    MaxConnections int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerEndpoint int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerInstance int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxRate int
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerEndpoint double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerInstance double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxUtilization double
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    Preference Pulumi.GoogleNative.Compute.Alpha.BackendPreference
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    BalancingMode BackendBalancingMode
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    CapacityScaler float64
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    Description string
    An optional description of this resource. Provide this property when you create the resource.
    Failover bool
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    Group string
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    MaxConnections int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerEndpoint int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerInstance int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxRate int
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerEndpoint float64
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerInstance float64
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxUtilization float64
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    Preference BackendPreference
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancingMode BackendBalancingMode
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacityScaler Double
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description String
    An optional description of this resource. Provide this property when you create the resource.
    failover Boolean
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group String
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    maxConnections Integer
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerEndpoint Integer
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerInstance Integer
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxRate Integer
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerEndpoint Double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerInstance Double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxUtilization Double
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference BackendPreference
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancingMode BackendBalancingMode
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacityScaler number
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description string
    An optional description of this resource. Provide this property when you create the resource.
    failover boolean
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group string
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    maxConnections number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerEndpoint number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerInstance number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxRate number
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerEndpoint number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerInstance number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxUtilization number
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference BackendPreference
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancing_mode BackendBalancingMode
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacity_scaler float
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description str
    An optional description of this resource. Provide this property when you create the resource.
    failover bool
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group str
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    max_connections int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    max_connections_per_endpoint int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    max_connections_per_instance int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    max_rate int
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    max_rate_per_endpoint float
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    max_rate_per_instance float
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    max_utilization float
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference BackendPreference
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancingMode "CONNECTION" | "RATE" | "UTILIZATION"
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacityScaler Number
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description String
    An optional description of this resource. Provide this property when you create the resource.
    failover Boolean
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group String
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    maxConnections Number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerEndpoint Number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerInstance Number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxRate Number
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerEndpoint Number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerInstance Number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxUtilization Number
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference "DEFAULT" | "PREFERENCE_UNSPECIFIED" | "PREFERRED"
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default

    BackendBalancingMode, BackendBalancingModeArgs

    Connection
    CONNECTIONBalance based on the number of simultaneous connections.
    Rate
    RATEBalance based on requests per second (RPS).
    Utilization
    UTILIZATIONBalance based on the backend utilization.
    BackendBalancingModeConnection
    CONNECTIONBalance based on the number of simultaneous connections.
    BackendBalancingModeRate
    RATEBalance based on requests per second (RPS).
    BackendBalancingModeUtilization
    UTILIZATIONBalance based on the backend utilization.
    Connection
    CONNECTIONBalance based on the number of simultaneous connections.
    Rate
    RATEBalance based on requests per second (RPS).
    Utilization
    UTILIZATIONBalance based on the backend utilization.
    Connection
    CONNECTIONBalance based on the number of simultaneous connections.
    Rate
    RATEBalance based on requests per second (RPS).
    Utilization
    UTILIZATIONBalance based on the backend utilization.
    CONNECTION
    CONNECTIONBalance based on the number of simultaneous connections.
    RATE
    RATEBalance based on requests per second (RPS).
    UTILIZATION
    UTILIZATIONBalance based on the backend utilization.
    "CONNECTION"
    CONNECTIONBalance based on the number of simultaneous connections.
    "RATE"
    RATEBalance based on requests per second (RPS).
    "UTILIZATION"
    UTILIZATIONBalance based on the backend utilization.

    BackendPreference, BackendPreferenceArgs

    Default
    DEFAULTNo preference.
    PreferenceUnspecified
    PREFERENCE_UNSPECIFIEDIf preference is unspecified, we set it to the DEFAULT value
    Preferred
    PREFERREDTraffic will be sent to this backend first.
    BackendPreferenceDefault
    DEFAULTNo preference.
    BackendPreferencePreferenceUnspecified
    PREFERENCE_UNSPECIFIEDIf preference is unspecified, we set it to the DEFAULT value
    BackendPreferencePreferred
    PREFERREDTraffic will be sent to this backend first.
    Default
    DEFAULTNo preference.
    PreferenceUnspecified
    PREFERENCE_UNSPECIFIEDIf preference is unspecified, we set it to the DEFAULT value
    Preferred
    PREFERREDTraffic will be sent to this backend first.
    Default
    DEFAULTNo preference.
    PreferenceUnspecified
    PREFERENCE_UNSPECIFIEDIf preference is unspecified, we set it to the DEFAULT value
    Preferred
    PREFERREDTraffic will be sent to this backend first.
    DEFAULT
    DEFAULTNo preference.
    PREFERENCE_UNSPECIFIED
    PREFERENCE_UNSPECIFIEDIf preference is unspecified, we set it to the DEFAULT value
    PREFERRED
    PREFERREDTraffic will be sent to this backend first.
    "DEFAULT"
    DEFAULTNo preference.
    "PREFERENCE_UNSPECIFIED"
    PREFERENCE_UNSPECIFIEDIf preference is unspecified, we set it to the DEFAULT value
    "PREFERRED"
    PREFERREDTraffic will be sent to this backend first.

    BackendResponse, BackendResponseArgs

    BalancingMode string
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    CapacityScaler double
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    Description string
    An optional description of this resource. Provide this property when you create the resource.
    Failover bool
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    Group string
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    MaxConnections int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerEndpoint int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerInstance int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxRate int
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerEndpoint double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerInstance double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxUtilization double
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    Preference string
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    BalancingMode string
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    CapacityScaler float64
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    Description string
    An optional description of this resource. Provide this property when you create the resource.
    Failover bool
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    Group string
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    MaxConnections int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerEndpoint int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxConnectionsPerInstance int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    MaxRate int
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerEndpoint float64
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxRatePerInstance float64
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    MaxUtilization float64
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    Preference string
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancingMode String
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacityScaler Double
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description String
    An optional description of this resource. Provide this property when you create the resource.
    failover Boolean
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group String
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    maxConnections Integer
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerEndpoint Integer
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerInstance Integer
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxRate Integer
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerEndpoint Double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerInstance Double
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxUtilization Double
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference String
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancingMode string
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacityScaler number
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description string
    An optional description of this resource. Provide this property when you create the resource.
    failover boolean
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group string
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    maxConnections number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerEndpoint number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerInstance number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxRate number
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerEndpoint number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerInstance number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxUtilization number
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference string
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancing_mode str
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacity_scaler float
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description str
    An optional description of this resource. Provide this property when you create the resource.
    failover bool
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group str
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    max_connections int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    max_connections_per_endpoint int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    max_connections_per_instance int
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    max_rate int
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    max_rate_per_endpoint float
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    max_rate_per_instance float
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    max_utilization float
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference str
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default
    balancingMode String
    Specifies how to determine whether the backend of a load balancer can handle additional traffic or is fully loaded. For usage guidelines, see Connection balancing mode. Backends must use compatible balancing modes. For more information, see Supported balancing modes and target capacity settings and Restrictions and guidance for instance groups. Note: Currently, if you use the API to configure incompatible balancing modes, the configuration might be accepted even though it has no impact and is ignored. Specifically, Backend.maxUtilization is ignored when Backend.balancingMode is RATE. In the future, this incompatible combination will be rejected.
    capacityScaler Number
    A multiplier applied to the backend's target capacity of its balancing mode. The default value is 1, which means the group serves up to 100% of its configured capacity (depending on balancingMode). A setting of 0 means the group is completely drained, offering 0% of its available capacity. The valid ranges are 0.0 and [0.1,1.0]. You cannot configure a setting larger than 0 and smaller than 0.1. You cannot configure a setting of 0 when there is only one backend attached to the backend service. Not available with backends that don't support using a balancingMode. This includes backends such as global internet NEGs, regional serverless NEGs, and PSC NEGs.
    description String
    An optional description of this resource. Provide this property when you create the resource.
    failover Boolean
    This field designates whether this is a failover backend. More than one failover backend can be configured for a given BackendService.
    group String
    The fully-qualified URL of an instance group or network endpoint group (NEG) resource. To determine what types of backends a load balancer supports, see the Backend services overview. You must use the fully-qualified URL (starting with https://www.googleapis.com/) to specify the instance group or NEG. Partial URLs are not supported.
    maxConnections Number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerEndpoint Number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxConnectionsPerInstance Number
    Defines a target maximum number of simultaneous connections. For usage guidelines, see Connection balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is RATE.
    maxRate Number
    Defines a maximum number of HTTP requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerEndpoint Number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxRatePerInstance Number
    Defines a maximum target for requests per second (RPS). For usage guidelines, see Rate balancing mode and Utilization balancing mode. Not available if the backend's balancingMode is CONNECTION.
    maxUtilization Number
    Optional parameter to define a target capacity for the UTILIZATION balancing mode. The valid range is [0.0, 1.0]. For usage guidelines, see Utilization balancing mode.
    preference String
    This field indicates whether this backend should be fully utilized before sending traffic to backends with default preference. The possible values are: - PREFERRED: Backends with this preference level will be filled up to their capacity limits first, based on RTT. - DEFAULT: If preferred backends don't have enough capacity, backends in this layer would be used and traffic would be assigned based on the load balancing algorithm you use. This is the default

    BackendServiceCdnPolicy, BackendServiceCdnPolicyArgs

    BypassCacheOnRequestHeaders List<Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceCdnPolicyBypassCacheOnRequestHeader>
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    CacheKeyPolicy Pulumi.GoogleNative.Compute.Alpha.Inputs.CacheKeyPolicy
    The CacheKeyPolicy for this CdnPolicy.
    CacheMode Pulumi.GoogleNative.Compute.Alpha.BackendServiceCdnPolicyCacheMode
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    ClientTtl int
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    DefaultTtl int
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    MaxTtl int
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    NegativeCaching bool
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    NegativeCachingPolicy List<Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceCdnPolicyNegativeCachingPolicy>
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    RequestCoalescing bool
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    ServeWhileStale int
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    SignedUrlCacheMaxAgeSec string
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    BypassCacheOnRequestHeaders []BackendServiceCdnPolicyBypassCacheOnRequestHeader
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    CacheKeyPolicy CacheKeyPolicy
    The CacheKeyPolicy for this CdnPolicy.
    CacheMode BackendServiceCdnPolicyCacheMode
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    ClientTtl int
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    DefaultTtl int
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    MaxTtl int
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    NegativeCaching bool
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    NegativeCachingPolicy []BackendServiceCdnPolicyNegativeCachingPolicy
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    RequestCoalescing bool
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    ServeWhileStale int
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    SignedUrlCacheMaxAgeSec string
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    bypassCacheOnRequestHeaders List<BackendServiceCdnPolicyBypassCacheOnRequestHeader>
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cacheKeyPolicy CacheKeyPolicy
    The CacheKeyPolicy for this CdnPolicy.
    cacheMode BackendServiceCdnPolicyCacheMode
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    clientTtl Integer
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    defaultTtl Integer
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    maxTtl Integer
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negativeCaching Boolean
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negativeCachingPolicy List<BackendServiceCdnPolicyNegativeCachingPolicy>
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    requestCoalescing Boolean
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serveWhileStale Integer
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signedUrlCacheMaxAgeSec String
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    bypassCacheOnRequestHeaders BackendServiceCdnPolicyBypassCacheOnRequestHeader[]
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cacheKeyPolicy CacheKeyPolicy
    The CacheKeyPolicy for this CdnPolicy.
    cacheMode BackendServiceCdnPolicyCacheMode
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    clientTtl number
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    defaultTtl number
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    maxTtl number
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negativeCaching boolean
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negativeCachingPolicy BackendServiceCdnPolicyNegativeCachingPolicy[]
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    requestCoalescing boolean
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serveWhileStale number
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signedUrlCacheMaxAgeSec string
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    bypass_cache_on_request_headers Sequence[BackendServiceCdnPolicyBypassCacheOnRequestHeader]
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cache_key_policy CacheKeyPolicy
    The CacheKeyPolicy for this CdnPolicy.
    cache_mode BackendServiceCdnPolicyCacheMode
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    client_ttl int
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    default_ttl int
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    max_ttl int
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negative_caching bool
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negative_caching_policy Sequence[BackendServiceCdnPolicyNegativeCachingPolicy]
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    request_coalescing bool
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serve_while_stale int
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signed_url_cache_max_age_sec str
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    bypassCacheOnRequestHeaders List<Property Map>
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cacheKeyPolicy Property Map
    The CacheKeyPolicy for this CdnPolicy.
    cacheMode "CACHE_ALL_STATIC" | "FORCE_CACHE_ALL" | "INVALID_CACHE_MODE" | "USE_ORIGIN_HEADERS"
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    clientTtl Number
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    defaultTtl Number
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    maxTtl Number
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negativeCaching Boolean
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negativeCachingPolicy List<Property Map>
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    requestCoalescing Boolean
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serveWhileStale Number
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signedUrlCacheMaxAgeSec String
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.

    BackendServiceCdnPolicyBypassCacheOnRequestHeader, BackendServiceCdnPolicyBypassCacheOnRequestHeaderArgs

    HeaderName string
    The header field name to match on when bypassing cache. Values are case-insensitive.
    HeaderName string
    The header field name to match on when bypassing cache. Values are case-insensitive.
    headerName String
    The header field name to match on when bypassing cache. Values are case-insensitive.
    headerName string
    The header field name to match on when bypassing cache. Values are case-insensitive.
    header_name str
    The header field name to match on when bypassing cache. Values are case-insensitive.
    headerName String
    The header field name to match on when bypassing cache. Values are case-insensitive.

    BackendServiceCdnPolicyBypassCacheOnRequestHeaderResponse, BackendServiceCdnPolicyBypassCacheOnRequestHeaderResponseArgs

    HeaderName string
    The header field name to match on when bypassing cache. Values are case-insensitive.
    HeaderName string
    The header field name to match on when bypassing cache. Values are case-insensitive.
    headerName String
    The header field name to match on when bypassing cache. Values are case-insensitive.
    headerName string
    The header field name to match on when bypassing cache. Values are case-insensitive.
    header_name str
    The header field name to match on when bypassing cache. Values are case-insensitive.
    headerName String
    The header field name to match on when bypassing cache. Values are case-insensitive.

    BackendServiceCdnPolicyCacheMode, BackendServiceCdnPolicyCacheModeArgs

    CacheAllStatic
    CACHE_ALL_STATICAutomatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    ForceCacheAll
    FORCE_CACHE_ALLCache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content.
    InvalidCacheMode
    INVALID_CACHE_MODE
    UseOriginHeaders
    USE_ORIGIN_HEADERSRequires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server.
    BackendServiceCdnPolicyCacheModeCacheAllStatic
    CACHE_ALL_STATICAutomatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    BackendServiceCdnPolicyCacheModeForceCacheAll
    FORCE_CACHE_ALLCache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content.
    BackendServiceCdnPolicyCacheModeInvalidCacheMode
    INVALID_CACHE_MODE
    BackendServiceCdnPolicyCacheModeUseOriginHeaders
    USE_ORIGIN_HEADERSRequires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server.
    CacheAllStatic
    CACHE_ALL_STATICAutomatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    ForceCacheAll
    FORCE_CACHE_ALLCache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content.
    InvalidCacheMode
    INVALID_CACHE_MODE
    UseOriginHeaders
    USE_ORIGIN_HEADERSRequires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server.
    CacheAllStatic
    CACHE_ALL_STATICAutomatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    ForceCacheAll
    FORCE_CACHE_ALLCache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content.
    InvalidCacheMode
    INVALID_CACHE_MODE
    UseOriginHeaders
    USE_ORIGIN_HEADERSRequires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server.
    CACHE_ALL_STATIC
    CACHE_ALL_STATICAutomatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    FORCE_CACHE_ALL
    FORCE_CACHE_ALLCache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content.
    INVALID_CACHE_MODE
    INVALID_CACHE_MODE
    USE_ORIGIN_HEADERS
    USE_ORIGIN_HEADERSRequires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server.
    "CACHE_ALL_STATIC"
    CACHE_ALL_STATICAutomatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    "FORCE_CACHE_ALL"
    FORCE_CACHE_ALLCache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content.
    "INVALID_CACHE_MODE"
    INVALID_CACHE_MODE
    "USE_ORIGIN_HEADERS"
    USE_ORIGIN_HEADERSRequires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server.

    BackendServiceCdnPolicyNegativeCachingPolicy, BackendServiceCdnPolicyNegativeCachingPolicyArgs

    Code int
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    Ttl int
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    Code int
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    Ttl int
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code Integer
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl Integer
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code number
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl number
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code int
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl int
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code Number
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl Number
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.

    BackendServiceCdnPolicyNegativeCachingPolicyResponse, BackendServiceCdnPolicyNegativeCachingPolicyResponseArgs

    Code int
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    Ttl int
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    Code int
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    Ttl int
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code Integer
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl Integer
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code number
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl number
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code int
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl int
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    code Number
    The HTTP status code to define a TTL against. Only HTTP status codes 300, 301, 302, 307, 308, 404, 405, 410, 421, 451 and 501 are can be specified as values, and you cannot specify a status code more than once.
    ttl Number
    The TTL (in seconds) for which to cache responses with the corresponding status code. The maximum allowed value is 1800s (30 minutes), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.

    BackendServiceCdnPolicyResponse, BackendServiceCdnPolicyResponseArgs

    BypassCacheOnRequestHeaders List<Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceCdnPolicyBypassCacheOnRequestHeaderResponse>
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    CacheKeyPolicy Pulumi.GoogleNative.Compute.Alpha.Inputs.CacheKeyPolicyResponse
    The CacheKeyPolicy for this CdnPolicy.
    CacheMode string
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    ClientTtl int
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    DefaultTtl int
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    MaxTtl int
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    NegativeCaching bool
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    NegativeCachingPolicy List<Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceCdnPolicyNegativeCachingPolicyResponse>
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    RequestCoalescing bool
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    ServeWhileStale int
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    SignedUrlCacheMaxAgeSec string
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    SignedUrlKeyNames List<string>
    Names of the keys for signing request URLs.
    BypassCacheOnRequestHeaders []BackendServiceCdnPolicyBypassCacheOnRequestHeaderResponse
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    CacheKeyPolicy CacheKeyPolicyResponse
    The CacheKeyPolicy for this CdnPolicy.
    CacheMode string
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    ClientTtl int
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    DefaultTtl int
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    MaxTtl int
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    NegativeCaching bool
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    NegativeCachingPolicy []BackendServiceCdnPolicyNegativeCachingPolicyResponse
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    RequestCoalescing bool
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    ServeWhileStale int
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    SignedUrlCacheMaxAgeSec string
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    SignedUrlKeyNames []string
    Names of the keys for signing request URLs.
    bypassCacheOnRequestHeaders List<BackendServiceCdnPolicyBypassCacheOnRequestHeaderResponse>
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cacheKeyPolicy CacheKeyPolicyResponse
    The CacheKeyPolicy for this CdnPolicy.
    cacheMode String
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    clientTtl Integer
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    defaultTtl Integer
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    maxTtl Integer
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negativeCaching Boolean
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negativeCachingPolicy List<BackendServiceCdnPolicyNegativeCachingPolicyResponse>
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    requestCoalescing Boolean
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serveWhileStale Integer
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signedUrlCacheMaxAgeSec String
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    signedUrlKeyNames List<String>
    Names of the keys for signing request URLs.
    bypassCacheOnRequestHeaders BackendServiceCdnPolicyBypassCacheOnRequestHeaderResponse[]
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cacheKeyPolicy CacheKeyPolicyResponse
    The CacheKeyPolicy for this CdnPolicy.
    cacheMode string
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    clientTtl number
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    defaultTtl number
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    maxTtl number
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negativeCaching boolean
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negativeCachingPolicy BackendServiceCdnPolicyNegativeCachingPolicyResponse[]
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    requestCoalescing boolean
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serveWhileStale number
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signedUrlCacheMaxAgeSec string
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    signedUrlKeyNames string[]
    Names of the keys for signing request URLs.
    bypass_cache_on_request_headers Sequence[BackendServiceCdnPolicyBypassCacheOnRequestHeaderResponse]
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cache_key_policy CacheKeyPolicyResponse
    The CacheKeyPolicy for this CdnPolicy.
    cache_mode str
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    client_ttl int
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    default_ttl int
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    max_ttl int
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negative_caching bool
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negative_caching_policy Sequence[BackendServiceCdnPolicyNegativeCachingPolicyResponse]
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    request_coalescing bool
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serve_while_stale int
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signed_url_cache_max_age_sec str
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    signed_url_key_names Sequence[str]
    Names of the keys for signing request URLs.
    bypassCacheOnRequestHeaders List<Property Map>
    Bypass the cache when the specified request headers are matched - e.g. Pragma or Authorization headers. Up to 5 headers can be specified. The cache is bypassed for all cdnPolicy.cacheMode settings.
    cacheKeyPolicy Property Map
    The CacheKeyPolicy for this CdnPolicy.
    cacheMode String
    Specifies the cache setting for all responses from this backend. The possible values are: USE_ORIGIN_HEADERS Requires the origin to set valid caching headers to cache content. Responses without these headers will not be cached at Google's edge, and will require a full trip to the origin on every request, potentially impacting performance and increasing load on the origin server. FORCE_CACHE_ALL Cache all content, ignoring any "private", "no-store" or "no-cache" directives in Cache-Control response headers. Warning: this may result in Cloud CDN caching private, per-user (user identifiable) content. CACHE_ALL_STATIC Automatically cache static content, including common image formats, media (video and audio), and web assets (JavaScript and CSS). Requests and responses that are marked as uncacheable, as well as dynamic content (including HTML), will not be cached.
    clientTtl Number
    Specifies a separate client (e.g. browser client) maximum TTL. This is used to clamp the max-age (or Expires) value sent to the client. With FORCE_CACHE_ALL, the lesser of client_ttl and default_ttl is used for the response max-age directive, along with a "public" directive. For cacheable content in CACHE_ALL_STATIC mode, client_ttl clamps the max-age from the origin (if specified), or else sets the response max-age directive to the lesser of the client_ttl and default_ttl, and also ensures a "public" cache-control directive is present. If a client TTL is not specified, a default value (1 hour) will be used. The maximum allowed value is 31,622,400s (1 year).
    defaultTtl Number
    Specifies the default TTL for cached content served by this origin for responses that do not have an existing valid TTL (max-age or s-max-age). Setting a TTL of "0" means "always revalidate". The value of defaultTTL cannot be set to a value greater than that of maxTTL, but can be equal. When the cacheMode is set to FORCE_CACHE_ALL, the defaultTTL will overwrite the TTL set in all responses. The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    maxTtl Number
    Specifies the maximum allowed TTL for cached content served by this origin. Cache directives that attempt to set a max-age or s-maxage higher than this, or an Expires header more than maxTTL seconds in the future will be capped at the value of maxTTL, as if it were the value of an s-maxage Cache-Control directive. Headers sent to the client will not be modified. Setting a TTL of "0" means "always revalidate". The maximum allowed value is 31,622,400s (1 year), noting that infrequently accessed objects may be evicted from the cache before the defined TTL.
    negativeCaching Boolean
    Negative caching allows per-status code TTLs to be set, in order to apply fine-grained caching for common errors or redirects. This can reduce the load on your origin and improve end-user experience by reducing response latency. When the cache mode is set to CACHE_ALL_STATIC or USE_ORIGIN_HEADERS, negative caching applies to responses with the specified response code that lack any Cache-Control, Expires, or Pragma: no-cache directives. When the cache mode is set to FORCE_CACHE_ALL, negative caching applies to all responses with the specified response code, and override any caching headers. By default, Cloud CDN will apply the following default TTLs to these status codes: HTTP 300 (Multiple Choice), 301, 308 (Permanent Redirects): 10m HTTP 404 (Not Found), 410 (Gone), 451 (Unavailable For Legal Reasons): 120s HTTP 405 (Method Not Found), 421 (Misdirected Request), 501 (Not Implemented): 60s. These defaults can be overridden in negative_caching_policy.
    negativeCachingPolicy List<Property Map>
    Sets a cache TTL for the specified HTTP status code. negative_caching must be enabled to configure negative_caching_policy. Omitting the policy and leaving negative_caching enabled will use Cloud CDN's default cache TTLs. Note that when specifying an explicit negative_caching_policy, you should take care to specify a cache TTL for all response codes that you wish to cache. Cloud CDN will not apply any default negative caching when a policy exists.
    requestCoalescing Boolean
    If true then Cloud CDN will combine multiple concurrent cache fill requests into a small number of requests to the origin.
    serveWhileStale Number
    Serve existing content from the cache (if available) when revalidating content with the origin, or when an error is encountered when refreshing the cache. This setting defines the default "max-stale" duration for any cached responses that do not specify a max-stale directive. Stale responses that exceed the TTL configured here will not be served. The default limit (max-stale) is 86400s (1 day), which will allow stale content to be served up to this limit beyond the max-age (or s-max-age) of a cached response. The maximum allowed value is 604800 (1 week). Set this to zero (0) to disable serve-while-stale.
    signedUrlCacheMaxAgeSec String
    Maximum number of seconds the response to a signed URL request will be considered fresh. After this time period, the response will be revalidated before being served. Defaults to 1hr (3600s). When serving responses to signed URL requests, Cloud CDN will internally behave as though all responses from this backend had a "Cache-Control: public, max-age=[TTL]" header, regardless of any existing Cache-Control header. The actual headers served in responses will not be altered.
    signedUrlKeyNames List<String>
    Names of the keys for signing request URLs.

    BackendServiceConnectionTrackingPolicy, BackendServiceConnectionTrackingPolicyArgs

    ConnectionPersistenceOnUnhealthyBackends Pulumi.GoogleNative.Compute.Alpha.BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    EnableStrongAffinity bool
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    IdleTimeoutSec int
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    TrackingMode Pulumi.GoogleNative.Compute.Alpha.BackendServiceConnectionTrackingPolicyTrackingMode
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    ConnectionPersistenceOnUnhealthyBackends BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    EnableStrongAffinity bool
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    IdleTimeoutSec int
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    TrackingMode BackendServiceConnectionTrackingPolicyTrackingMode
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connectionPersistenceOnUnhealthyBackends BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enableStrongAffinity Boolean
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idleTimeoutSec Integer
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    trackingMode BackendServiceConnectionTrackingPolicyTrackingMode
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connectionPersistenceOnUnhealthyBackends BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enableStrongAffinity boolean
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idleTimeoutSec number
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    trackingMode BackendServiceConnectionTrackingPolicyTrackingMode
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connection_persistence_on_unhealthy_backends BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enable_strong_affinity bool
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idle_timeout_sec int
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    tracking_mode BackendServiceConnectionTrackingPolicyTrackingMode
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connectionPersistenceOnUnhealthyBackends "ALWAYS_PERSIST" | "DEFAULT_FOR_PROTOCOL" | "NEVER_PERSIST"
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enableStrongAffinity Boolean
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idleTimeoutSec Number
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    trackingMode "INVALID_TRACKING_MODE" | "PER_CONNECTION" | "PER_SESSION"
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.

    BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackends, BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackendsArgs

    AlwaysPersist
    ALWAYS_PERSIST
    DefaultForProtocol
    DEFAULT_FOR_PROTOCOL
    NeverPersist
    NEVER_PERSIST
    BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackendsAlwaysPersist
    ALWAYS_PERSIST
    BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackendsDefaultForProtocol
    DEFAULT_FOR_PROTOCOL
    BackendServiceConnectionTrackingPolicyConnectionPersistenceOnUnhealthyBackendsNeverPersist
    NEVER_PERSIST
    AlwaysPersist
    ALWAYS_PERSIST
    DefaultForProtocol
    DEFAULT_FOR_PROTOCOL
    NeverPersist
    NEVER_PERSIST
    AlwaysPersist
    ALWAYS_PERSIST
    DefaultForProtocol
    DEFAULT_FOR_PROTOCOL
    NeverPersist
    NEVER_PERSIST
    ALWAYS_PERSIST
    ALWAYS_PERSIST
    DEFAULT_FOR_PROTOCOL
    DEFAULT_FOR_PROTOCOL
    NEVER_PERSIST
    NEVER_PERSIST
    "ALWAYS_PERSIST"
    ALWAYS_PERSIST
    "DEFAULT_FOR_PROTOCOL"
    DEFAULT_FOR_PROTOCOL
    "NEVER_PERSIST"
    NEVER_PERSIST

    BackendServiceConnectionTrackingPolicyResponse, BackendServiceConnectionTrackingPolicyResponseArgs

    ConnectionPersistenceOnUnhealthyBackends string
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    EnableStrongAffinity bool
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    IdleTimeoutSec int
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    TrackingMode string
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    ConnectionPersistenceOnUnhealthyBackends string
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    EnableStrongAffinity bool
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    IdleTimeoutSec int
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    TrackingMode string
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connectionPersistenceOnUnhealthyBackends String
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enableStrongAffinity Boolean
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idleTimeoutSec Integer
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    trackingMode String
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connectionPersistenceOnUnhealthyBackends string
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enableStrongAffinity boolean
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idleTimeoutSec number
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    trackingMode string
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connection_persistence_on_unhealthy_backends str
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enable_strong_affinity bool
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idle_timeout_sec int
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    tracking_mode str
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.
    connectionPersistenceOnUnhealthyBackends String
    Specifies connection persistence when backends are unhealthy. The default value is DEFAULT_FOR_PROTOCOL. If set to DEFAULT_FOR_PROTOCOL, the existing connections persist on unhealthy backends only for connection-oriented protocols (TCP and SCTP) and only if the Tracking Mode is PER_CONNECTION (default tracking mode) or the Session Affinity is configured for 5-tuple. They do not persist for UDP. If set to NEVER_PERSIST, after a backend becomes unhealthy, the existing connections on the unhealthy backend are never persisted on the unhealthy backend. They are always diverted to newly selected healthy backends (unless all backends are unhealthy). If set to ALWAYS_PERSIST, existing connections always persist on unhealthy backends regardless of protocol and session affinity. It is generally not recommended to use this mode overriding the default. For more details, see Connection Persistence for Network Load Balancing and Connection Persistence for Internal TCP/UDP Load Balancing.
    enableStrongAffinity Boolean
    Enable Strong Session Affinity for Network Load Balancing. This option is not available publicly.
    idleTimeoutSec Number
    Specifies how long to keep a Connection Tracking entry while there is no matching traffic (in seconds). For Internal TCP/UDP Load Balancing: - The minimum (default) is 10 minutes and the maximum is 16 hours. - It can be set only if Connection Tracking is less than 5-tuple (i.e. Session Affinity is CLIENT_IP_NO_DESTINATION, CLIENT_IP or CLIENT_IP_PROTO, and Tracking Mode is PER_SESSION). For Network Load Balancer the default is 60 seconds. This option is not available publicly.
    trackingMode String
    Specifies the key used for connection tracking. There are two options: - PER_CONNECTION: This is the default mode. The Connection Tracking is performed as per the Connection Key (default Hash Method) for the specific protocol. - PER_SESSION: The Connection Tracking is performed as per the configured Session Affinity. It matches the configured Session Affinity. For more details, see Tracking Mode for Network Load Balancing and Tracking Mode for Internal TCP/UDP Load Balancing.

    BackendServiceConnectionTrackingPolicyTrackingMode, BackendServiceConnectionTrackingPolicyTrackingModeArgs

    InvalidTrackingMode
    INVALID_TRACKING_MODE
    PerConnection
    PER_CONNECTION
    PerSession
    PER_SESSION
    BackendServiceConnectionTrackingPolicyTrackingModeInvalidTrackingMode
    INVALID_TRACKING_MODE
    BackendServiceConnectionTrackingPolicyTrackingModePerConnection
    PER_CONNECTION
    BackendServiceConnectionTrackingPolicyTrackingModePerSession
    PER_SESSION
    InvalidTrackingMode
    INVALID_TRACKING_MODE
    PerConnection
    PER_CONNECTION
    PerSession
    PER_SESSION
    InvalidTrackingMode
    INVALID_TRACKING_MODE
    PerConnection
    PER_CONNECTION
    PerSession
    PER_SESSION
    INVALID_TRACKING_MODE
    INVALID_TRACKING_MODE
    PER_CONNECTION
    PER_CONNECTION
    PER_SESSION
    PER_SESSION
    "INVALID_TRACKING_MODE"
    INVALID_TRACKING_MODE
    "PER_CONNECTION"
    PER_CONNECTION
    "PER_SESSION"
    PER_SESSION

    BackendServiceFailoverPolicy, BackendServiceFailoverPolicyArgs

    DisableConnectionDrainOnFailover bool
    This can be set to true only if the protocol is TCP. The default is false.
    DropTrafficIfUnhealthy bool
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    FailoverRatio double
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    DisableConnectionDrainOnFailover bool
    This can be set to true only if the protocol is TCP. The default is false.
    DropTrafficIfUnhealthy bool
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    FailoverRatio float64
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disableConnectionDrainOnFailover Boolean
    This can be set to true only if the protocol is TCP. The default is false.
    dropTrafficIfUnhealthy Boolean
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failoverRatio Double
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disableConnectionDrainOnFailover boolean
    This can be set to true only if the protocol is TCP. The default is false.
    dropTrafficIfUnhealthy boolean
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failoverRatio number
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disable_connection_drain_on_failover bool
    This can be set to true only if the protocol is TCP. The default is false.
    drop_traffic_if_unhealthy bool
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failover_ratio float
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disableConnectionDrainOnFailover Boolean
    This can be set to true only if the protocol is TCP. The default is false.
    dropTrafficIfUnhealthy Boolean
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failoverRatio Number
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.

    BackendServiceFailoverPolicyResponse, BackendServiceFailoverPolicyResponseArgs

    DisableConnectionDrainOnFailover bool
    This can be set to true only if the protocol is TCP. The default is false.
    DropTrafficIfUnhealthy bool
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    FailoverRatio double
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    DisableConnectionDrainOnFailover bool
    This can be set to true only if the protocol is TCP. The default is false.
    DropTrafficIfUnhealthy bool
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    FailoverRatio float64
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disableConnectionDrainOnFailover Boolean
    This can be set to true only if the protocol is TCP. The default is false.
    dropTrafficIfUnhealthy Boolean
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failoverRatio Double
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disableConnectionDrainOnFailover boolean
    This can be set to true only if the protocol is TCP. The default is false.
    dropTrafficIfUnhealthy boolean
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failoverRatio number
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disable_connection_drain_on_failover bool
    This can be set to true only if the protocol is TCP. The default is false.
    drop_traffic_if_unhealthy bool
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failover_ratio float
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.
    disableConnectionDrainOnFailover Boolean
    This can be set to true only if the protocol is TCP. The default is false.
    dropTrafficIfUnhealthy Boolean
    If set to true, connections to the load balancer are dropped when all primary and all backup backend VMs are unhealthy.If set to false, connections are distributed among all primary VMs when all primary and all backup backend VMs are unhealthy. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing. The default is false.
    failoverRatio Number
    The value of the field must be in the range [0, 1]. If the value is 0, the load balancer performs a failover when the number of healthy primary VMs equals zero. For all other values, the load balancer performs a failover when the total number of healthy primary VMs is less than this ratio. For load balancers that have configurable failover: Internal TCP/UDP Load Balancing and external TCP/UDP Load Balancing.

    BackendServiceIAP, BackendServiceIAPArgs

    Enabled bool
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    Oauth2ClientId string
    OAuth2 client ID to use for the authentication flow.
    Oauth2ClientInfo Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceIAPOAuth2ClientInfo
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    Oauth2ClientSecret string
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    Enabled bool
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    Oauth2ClientId string
    OAuth2 client ID to use for the authentication flow.
    Oauth2ClientInfo BackendServiceIAPOAuth2ClientInfo
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    Oauth2ClientSecret string
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    enabled Boolean
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2ClientId String
    OAuth2 client ID to use for the authentication flow.
    oauth2ClientInfo BackendServiceIAPOAuth2ClientInfo
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2ClientSecret String
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    enabled boolean
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2ClientId string
    OAuth2 client ID to use for the authentication flow.
    oauth2ClientInfo BackendServiceIAPOAuth2ClientInfo
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2ClientSecret string
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    enabled bool
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2_client_id str
    OAuth2 client ID to use for the authentication flow.
    oauth2_client_info BackendServiceIAPOAuth2ClientInfo
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2_client_secret str
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    enabled Boolean
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2ClientId String
    OAuth2 client ID to use for the authentication flow.
    oauth2ClientInfo Property Map
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2ClientSecret String
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly

    BackendServiceIAPOAuth2ClientInfo, BackendServiceIAPOAuth2ClientInfoArgs

    ApplicationName string
    Application name to be used in OAuth consent screen.
    ClientName string
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    DeveloperEmailAddress string
    Developer's information to be used in OAuth consent screen.
    ApplicationName string
    Application name to be used in OAuth consent screen.
    ClientName string
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    DeveloperEmailAddress string
    Developer's information to be used in OAuth consent screen.
    applicationName String
    Application name to be used in OAuth consent screen.
    clientName String
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developerEmailAddress String
    Developer's information to be used in OAuth consent screen.
    applicationName string
    Application name to be used in OAuth consent screen.
    clientName string
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developerEmailAddress string
    Developer's information to be used in OAuth consent screen.
    application_name str
    Application name to be used in OAuth consent screen.
    client_name str
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developer_email_address str
    Developer's information to be used in OAuth consent screen.
    applicationName String
    Application name to be used in OAuth consent screen.
    clientName String
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developerEmailAddress String
    Developer's information to be used in OAuth consent screen.

    BackendServiceIAPOAuth2ClientInfoResponse, BackendServiceIAPOAuth2ClientInfoResponseArgs

    ApplicationName string
    Application name to be used in OAuth consent screen.
    ClientName string
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    DeveloperEmailAddress string
    Developer's information to be used in OAuth consent screen.
    ApplicationName string
    Application name to be used in OAuth consent screen.
    ClientName string
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    DeveloperEmailAddress string
    Developer's information to be used in OAuth consent screen.
    applicationName String
    Application name to be used in OAuth consent screen.
    clientName String
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developerEmailAddress String
    Developer's information to be used in OAuth consent screen.
    applicationName string
    Application name to be used in OAuth consent screen.
    clientName string
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developerEmailAddress string
    Developer's information to be used in OAuth consent screen.
    application_name str
    Application name to be used in OAuth consent screen.
    client_name str
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developer_email_address str
    Developer's information to be used in OAuth consent screen.
    applicationName String
    Application name to be used in OAuth consent screen.
    clientName String
    Name of the client to be generated. Optional - If not provided, the name will be autogenerated by the backend.
    developerEmailAddress String
    Developer's information to be used in OAuth consent screen.

    BackendServiceIAPResponse, BackendServiceIAPResponseArgs

    Enabled bool
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    Oauth2ClientId string
    OAuth2 client ID to use for the authentication flow.
    Oauth2ClientInfo Pulumi.GoogleNative.Compute.Alpha.Inputs.BackendServiceIAPOAuth2ClientInfoResponse
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    Oauth2ClientSecret string
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    Oauth2ClientSecretSha256 string
    SHA256 hash value for the field oauth2_client_secret above.
    Enabled bool
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    Oauth2ClientId string
    OAuth2 client ID to use for the authentication flow.
    Oauth2ClientInfo BackendServiceIAPOAuth2ClientInfoResponse
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    Oauth2ClientSecret string
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    Oauth2ClientSecretSha256 string
    SHA256 hash value for the field oauth2_client_secret above.
    enabled Boolean
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2ClientId String
    OAuth2 client ID to use for the authentication flow.
    oauth2ClientInfo BackendServiceIAPOAuth2ClientInfoResponse
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2ClientSecret String
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    oauth2ClientSecretSha256 String
    SHA256 hash value for the field oauth2_client_secret above.
    enabled boolean
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2ClientId string
    OAuth2 client ID to use for the authentication flow.
    oauth2ClientInfo BackendServiceIAPOAuth2ClientInfoResponse
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2ClientSecret string
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    oauth2ClientSecretSha256 string
    SHA256 hash value for the field oauth2_client_secret above.
    enabled bool
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2_client_id str
    OAuth2 client ID to use for the authentication flow.
    oauth2_client_info BackendServiceIAPOAuth2ClientInfoResponse
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2_client_secret str
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    oauth2_client_secret_sha256 str
    SHA256 hash value for the field oauth2_client_secret above.
    enabled Boolean
    Whether the serving infrastructure will authenticate and authorize all incoming requests.
    oauth2ClientId String
    OAuth2 client ID to use for the authentication flow.
    oauth2ClientInfo Property Map
    [Input Only] OAuth client info required to generate client id to be used for IAP.
    oauth2ClientSecret String
    OAuth2 client secret to use for the authentication flow. For security reasons, this value cannot be retrieved via the API. Instead, the SHA-256 hash of the value is returned in the oauth2ClientSecretSha256 field. @InputOnly
    oauth2ClientSecretSha256 String
    SHA256 hash value for the field oauth2_client_secret above.

    BackendServiceLocalityLoadBalancingPolicyConfig, BackendServiceLocalityLoadBalancingPolicyConfigArgs

    BackendServiceLocalityLoadBalancingPolicyConfigCustomPolicy, BackendServiceLocalityLoadBalancingPolicyConfigCustomPolicyArgs

    Data string
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    Name string
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    Data string
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    Name string
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data String
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name String
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data string
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name string
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data str
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name str
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data String
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name String
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.

    BackendServiceLocalityLoadBalancingPolicyConfigCustomPolicyResponse, BackendServiceLocalityLoadBalancingPolicyConfigCustomPolicyResponseArgs

    Data string
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    Name string
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    Data string
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    Name string
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data String
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name String
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data string
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name string
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data str
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name str
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.
    data String
    An optional, arbitrary JSON object with configuration data, understood by a locally installed custom policy implementation.
    name String
    Identifies the custom policy. The value should match the name of a custom implementation registered on the gRPC clients. It should follow protocol buffer message naming conventions and include the full path (for example, myorg.CustomLbPolicy). The maximum length is 256 characters. Do not specify the same custom policy more than once for a backend. If you do, the configuration is rejected. For an example of how to use this field, see Use a custom policy.

    BackendServiceLocalityLoadBalancingPolicyConfigPolicy, BackendServiceLocalityLoadBalancingPolicyConfigPolicyArgs

    Name Pulumi.GoogleNative.Compute.Alpha.BackendServiceLocalityLoadBalancingPolicyConfigPolicyName
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    Name BackendServiceLocalityLoadBalancingPolicyConfigPolicyName
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name BackendServiceLocalityLoadBalancingPolicyConfigPolicyName
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name BackendServiceLocalityLoadBalancingPolicyConfigPolicyName
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name BackendServiceLocalityLoadBalancingPolicyConfigPolicyName
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name "INVALID_LB_POLICY" | "LEAST_REQUEST" | "MAGLEV" | "ORIGINAL_DESTINATION" | "RANDOM" | "RING_HASH" | "ROUND_ROBIN" | "WEIGHTED_MAGLEV"
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.

    BackendServiceLocalityLoadBalancingPolicyConfigPolicyName, BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameArgs

    InvalidLbPolicy
    INVALID_LB_POLICY
    LeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    Maglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    OriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    Random
    RANDOMThe load balancer selects a random healthy host.
    RingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    RoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameInvalidLbPolicy
    INVALID_LB_POLICY
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameLeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameMaglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameOriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameRandom
    RANDOMThe load balancer selects a random healthy host.
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameRingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameRoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    BackendServiceLocalityLoadBalancingPolicyConfigPolicyNameWeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    InvalidLbPolicy
    INVALID_LB_POLICY
    LeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    Maglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    OriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    Random
    RANDOMThe load balancer selects a random healthy host.
    RingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    RoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    InvalidLbPolicy
    INVALID_LB_POLICY
    LeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    Maglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    OriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    Random
    RANDOMThe load balancer selects a random healthy host.
    RingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    RoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    INVALID_LB_POLICY
    INVALID_LB_POLICY
    LEAST_REQUEST
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    MAGLEV
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    ORIGINAL_DESTINATION
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    RANDOM
    RANDOMThe load balancer selects a random healthy host.
    RING_HASH
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    ROUND_ROBIN
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WEIGHTED_MAGLEV
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    "INVALID_LB_POLICY"
    INVALID_LB_POLICY
    "LEAST_REQUEST"
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    "MAGLEV"
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    "ORIGINAL_DESTINATION"
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    "RANDOM"
    RANDOMThe load balancer selects a random healthy host.
    "RING_HASH"
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    "ROUND_ROBIN"
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    "WEIGHTED_MAGLEV"
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.

    BackendServiceLocalityLoadBalancingPolicyConfigPolicyResponse, BackendServiceLocalityLoadBalancingPolicyConfigPolicyResponseArgs

    Name string
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    Name string
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name String
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name string
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name str
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.
    name String
    The name of a locality load-balancing policy. Valid values include ROUND_ROBIN and, for Java clients, LEAST_REQUEST. For information about these values, see the description of localityLbPolicy. Do not specify the same policy more than once for a backend. If you do, the configuration is rejected.

    BackendServiceLocalityLoadBalancingPolicyConfigResponse, BackendServiceLocalityLoadBalancingPolicyConfigResponseArgs

    BackendServiceLogConfig, BackendServiceLogConfigArgs

    Enable bool
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    Optional Pulumi.GoogleNative.Compute.Alpha.BackendServiceLogConfigOptional
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    OptionalFields List<string>
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    OptionalMode Pulumi.GoogleNative.Compute.Alpha.BackendServiceLogConfigOptionalMode
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    SampleRate double
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    Enable bool
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    Optional BackendServiceLogConfigOptional
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    OptionalFields []string
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    OptionalMode BackendServiceLogConfigOptionalMode
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    SampleRate float64
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable Boolean
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional BackendServiceLogConfigOptional
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optionalFields List<String>
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optionalMode BackendServiceLogConfigOptionalMode
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sampleRate Double
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable boolean
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional BackendServiceLogConfigOptional
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optionalFields string[]
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optionalMode BackendServiceLogConfigOptionalMode
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sampleRate number
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable bool
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional BackendServiceLogConfigOptional
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optional_fields Sequence[str]
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optional_mode BackendServiceLogConfigOptionalMode
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sample_rate float
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable Boolean
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional "CUSTOM" | "EXCLUDE_ALL_OPTIONAL" | "INCLUDE_ALL_OPTIONAL" | "UNSPECIFIED_OPTIONAL_MODE"
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optionalFields List<String>
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optionalMode "CUSTOM" | "EXCLUDE_ALL_OPTIONAL" | "INCLUDE_ALL_OPTIONAL" | "UNSPECIFIED_OPTIONAL_MODE"
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sampleRate Number
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.

    BackendServiceLogConfigOptional, BackendServiceLogConfigOptionalArgs

    Custom
    CUSTOMA subset of optional fields.
    ExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    IncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    UnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    BackendServiceLogConfigOptionalCustom
    CUSTOMA subset of optional fields.
    BackendServiceLogConfigOptionalExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    BackendServiceLogConfigOptionalIncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    BackendServiceLogConfigOptionalUnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    Custom
    CUSTOMA subset of optional fields.
    ExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    IncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    UnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    Custom
    CUSTOMA subset of optional fields.
    ExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    IncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    UnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    CUSTOM
    CUSTOMA subset of optional fields.
    EXCLUDE_ALL_OPTIONAL
    EXCLUDE_ALL_OPTIONALNone optional fields.
    INCLUDE_ALL_OPTIONAL
    INCLUDE_ALL_OPTIONALAll optional fields.
    UNSPECIFIED_OPTIONAL_MODE
    UNSPECIFIED_OPTIONAL_MODE
    "CUSTOM"
    CUSTOMA subset of optional fields.
    "EXCLUDE_ALL_OPTIONAL"
    EXCLUDE_ALL_OPTIONALNone optional fields.
    "INCLUDE_ALL_OPTIONAL"
    INCLUDE_ALL_OPTIONALAll optional fields.
    "UNSPECIFIED_OPTIONAL_MODE"
    UNSPECIFIED_OPTIONAL_MODE

    BackendServiceLogConfigOptionalMode, BackendServiceLogConfigOptionalModeArgs

    Custom
    CUSTOMA subset of optional fields.
    ExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    IncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    UnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    BackendServiceLogConfigOptionalModeCustom
    CUSTOMA subset of optional fields.
    BackendServiceLogConfigOptionalModeExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    BackendServiceLogConfigOptionalModeIncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    BackendServiceLogConfigOptionalModeUnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    Custom
    CUSTOMA subset of optional fields.
    ExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    IncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    UnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    Custom
    CUSTOMA subset of optional fields.
    ExcludeAllOptional
    EXCLUDE_ALL_OPTIONALNone optional fields.
    IncludeAllOptional
    INCLUDE_ALL_OPTIONALAll optional fields.
    UnspecifiedOptionalMode
    UNSPECIFIED_OPTIONAL_MODE
    CUSTOM
    CUSTOMA subset of optional fields.
    EXCLUDE_ALL_OPTIONAL
    EXCLUDE_ALL_OPTIONALNone optional fields.
    INCLUDE_ALL_OPTIONAL
    INCLUDE_ALL_OPTIONALAll optional fields.
    UNSPECIFIED_OPTIONAL_MODE
    UNSPECIFIED_OPTIONAL_MODE
    "CUSTOM"
    CUSTOMA subset of optional fields.
    "EXCLUDE_ALL_OPTIONAL"
    EXCLUDE_ALL_OPTIONALNone optional fields.
    "INCLUDE_ALL_OPTIONAL"
    INCLUDE_ALL_OPTIONALAll optional fields.
    "UNSPECIFIED_OPTIONAL_MODE"
    UNSPECIFIED_OPTIONAL_MODE

    BackendServiceLogConfigResponse, BackendServiceLogConfigResponseArgs

    Enable bool
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    Optional string
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    OptionalFields List<string>
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    OptionalMode string
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    SampleRate double
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    Enable bool
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    Optional string
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    OptionalFields []string
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    OptionalMode string
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    SampleRate float64
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable Boolean
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional String
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optionalFields List<String>
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optionalMode String
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sampleRate Double
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable boolean
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional string
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optionalFields string[]
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optionalMode string
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sampleRate number
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable bool
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional str
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optional_fields Sequence[str]
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optional_mode str
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sample_rate float
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.
    enable Boolean
    Denotes whether to enable logging for the load balancer traffic served by this backend service. The default value is false.
    optional String
    Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    Deprecated:Deprecated in favor of optionalMode. This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.

    optionalFields List<String>
    This field can only be specified if logging is enabled for this backend service and "logConfig.optionalMode" was set to CUSTOM. Contains a list of optional fields you want to include in the logs. For example: serverInstance, serverGkeDetails.cluster, serverGkeDetails.pod.podNamespace
    optionalMode String
    This field can only be specified if logging is enabled for this backend service. Configures whether all, none or a subset of optional fields should be added to the reported logs. One of [INCLUDE_ALL_OPTIONAL, EXCLUDE_ALL_OPTIONAL, CUSTOM]. Default is EXCLUDE_ALL_OPTIONAL.
    sampleRate Number
    This field can only be specified if logging is enabled for this backend service. The value of the field must be in [0, 1]. This configures the sampling rate of requests to the load balancer where 1.0 means all logged requests are reported and 0.0 means no logged requests are reported. The default value is 1.0.

    BackendServiceUsedBy, BackendServiceUsedByArgs

    Reference string
    Reference string
    reference String
    reference string
    reference String

    BackendServiceUsedByResponse, BackendServiceUsedByResponseArgs

    Reference string
    Reference string
    reference String
    reference string
    reference String

    CacheKeyPolicy, CacheKeyPolicyArgs

    IncludeHost bool
    If true, requests to different hosts will be cached separately.
    IncludeHttpHeaders List<string>
    Allows HTTP request headers (by name) to be used in the cache key.
    IncludeNamedCookies List<string>
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    IncludeProtocol bool
    If true, http and https requests will be cached separately.
    IncludeQueryString bool
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    QueryStringBlacklist List<string>
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    QueryStringWhitelist List<string>
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    IncludeHost bool
    If true, requests to different hosts will be cached separately.
    IncludeHttpHeaders []string
    Allows HTTP request headers (by name) to be used in the cache key.
    IncludeNamedCookies []string
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    IncludeProtocol bool
    If true, http and https requests will be cached separately.
    IncludeQueryString bool
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    QueryStringBlacklist []string
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    QueryStringWhitelist []string
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    includeHost Boolean
    If true, requests to different hosts will be cached separately.
    includeHttpHeaders List<String>
    Allows HTTP request headers (by name) to be used in the cache key.
    includeNamedCookies List<String>
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    includeProtocol Boolean
    If true, http and https requests will be cached separately.
    includeQueryString Boolean
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    queryStringBlacklist List<String>
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    queryStringWhitelist List<String>
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    includeHost boolean
    If true, requests to different hosts will be cached separately.
    includeHttpHeaders string[]
    Allows HTTP request headers (by name) to be used in the cache key.
    includeNamedCookies string[]
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    includeProtocol boolean
    If true, http and https requests will be cached separately.
    includeQueryString boolean
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    queryStringBlacklist string[]
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    queryStringWhitelist string[]
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    include_host bool
    If true, requests to different hosts will be cached separately.
    include_http_headers Sequence[str]
    Allows HTTP request headers (by name) to be used in the cache key.
    include_named_cookies Sequence[str]
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    include_protocol bool
    If true, http and https requests will be cached separately.
    include_query_string bool
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    query_string_blacklist Sequence[str]
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    query_string_whitelist Sequence[str]
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    includeHost Boolean
    If true, requests to different hosts will be cached separately.
    includeHttpHeaders List<String>
    Allows HTTP request headers (by name) to be used in the cache key.
    includeNamedCookies List<String>
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    includeProtocol Boolean
    If true, http and https requests will be cached separately.
    includeQueryString Boolean
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    queryStringBlacklist List<String>
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    queryStringWhitelist List<String>
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.

    CacheKeyPolicyResponse, CacheKeyPolicyResponseArgs

    IncludeHost bool
    If true, requests to different hosts will be cached separately.
    IncludeHttpHeaders List<string>
    Allows HTTP request headers (by name) to be used in the cache key.
    IncludeNamedCookies List<string>
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    IncludeProtocol bool
    If true, http and https requests will be cached separately.
    IncludeQueryString bool
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    QueryStringBlacklist List<string>
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    QueryStringWhitelist List<string>
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    IncludeHost bool
    If true, requests to different hosts will be cached separately.
    IncludeHttpHeaders []string
    Allows HTTP request headers (by name) to be used in the cache key.
    IncludeNamedCookies []string
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    IncludeProtocol bool
    If true, http and https requests will be cached separately.
    IncludeQueryString bool
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    QueryStringBlacklist []string
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    QueryStringWhitelist []string
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    includeHost Boolean
    If true, requests to different hosts will be cached separately.
    includeHttpHeaders List<String>
    Allows HTTP request headers (by name) to be used in the cache key.
    includeNamedCookies List<String>
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    includeProtocol Boolean
    If true, http and https requests will be cached separately.
    includeQueryString Boolean
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    queryStringBlacklist List<String>
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    queryStringWhitelist List<String>
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    includeHost boolean
    If true, requests to different hosts will be cached separately.
    includeHttpHeaders string[]
    Allows HTTP request headers (by name) to be used in the cache key.
    includeNamedCookies string[]
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    includeProtocol boolean
    If true, http and https requests will be cached separately.
    includeQueryString boolean
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    queryStringBlacklist string[]
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    queryStringWhitelist string[]
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    include_host bool
    If true, requests to different hosts will be cached separately.
    include_http_headers Sequence[str]
    Allows HTTP request headers (by name) to be used in the cache key.
    include_named_cookies Sequence[str]
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    include_protocol bool
    If true, http and https requests will be cached separately.
    include_query_string bool
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    query_string_blacklist Sequence[str]
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    query_string_whitelist Sequence[str]
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    includeHost Boolean
    If true, requests to different hosts will be cached separately.
    includeHttpHeaders List<String>
    Allows HTTP request headers (by name) to be used in the cache key.
    includeNamedCookies List<String>
    Allows HTTP cookies (by name) to be used in the cache key. The name=value pair will be used in the cache key Cloud CDN generates.
    includeProtocol Boolean
    If true, http and https requests will be cached separately.
    includeQueryString Boolean
    If true, include query string parameters in the cache key according to query_string_whitelist and query_string_blacklist. If neither is set, the entire query string will be included. If false, the query string will be excluded from the cache key entirely.
    queryStringBlacklist List<String>
    Names of query string parameters to exclude in cache keys. All other parameters will be included. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.
    queryStringWhitelist List<String>
    Names of query string parameters to include in cache keys. All other parameters will be excluded. Either specify query_string_whitelist or query_string_blacklist, not both. '&' and '=' will be percent encoded and not treated as delimiters.

    CallCredentials, CallCredentialsArgs

    CallCredentialType Pulumi.GoogleNative.Compute.Alpha.CallCredentialsCallCredentialType
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    FromPlugin Pulumi.GoogleNative.Compute.Alpha.Inputs.MetadataCredentialsFromPlugin
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    CallCredentialType CallCredentialsCallCredentialType
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    FromPlugin MetadataCredentialsFromPlugin
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    callCredentialType CallCredentialsCallCredentialType
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    fromPlugin MetadataCredentialsFromPlugin
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    callCredentialType CallCredentialsCallCredentialType
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    fromPlugin MetadataCredentialsFromPlugin
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    call_credential_type CallCredentialsCallCredentialType
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    from_plugin MetadataCredentialsFromPlugin
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    callCredentialType "FROM_PLUGIN" | "GCE_VM" | "INVALID"
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    fromPlugin Property Map
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.

    CallCredentialsCallCredentialType, CallCredentialsCallCredentialTypeArgs

    FromPlugin
    FROM_PLUGINCustom authenticator credentials are used to access the SDS server.
    GceVm
    GCE_VMThe local GCE VM service account credentials are used to access the SDS server.
    Invalid
    INVALID
    CallCredentialsCallCredentialTypeFromPlugin
    FROM_PLUGINCustom authenticator credentials are used to access the SDS server.
    CallCredentialsCallCredentialTypeGceVm
    GCE_VMThe local GCE VM service account credentials are used to access the SDS server.
    CallCredentialsCallCredentialTypeInvalid
    INVALID
    FromPlugin
    FROM_PLUGINCustom authenticator credentials are used to access the SDS server.
    GceVm
    GCE_VMThe local GCE VM service account credentials are used to access the SDS server.
    Invalid
    INVALID
    FromPlugin
    FROM_PLUGINCustom authenticator credentials are used to access the SDS server.
    GceVm
    GCE_VMThe local GCE VM service account credentials are used to access the SDS server.
    Invalid
    INVALID
    FROM_PLUGIN
    FROM_PLUGINCustom authenticator credentials are used to access the SDS server.
    GCE_VM
    GCE_VMThe local GCE VM service account credentials are used to access the SDS server.
    INVALID
    INVALID
    "FROM_PLUGIN"
    FROM_PLUGINCustom authenticator credentials are used to access the SDS server.
    "GCE_VM"
    GCE_VMThe local GCE VM service account credentials are used to access the SDS server.
    "INVALID"
    INVALID

    CallCredentialsResponse, CallCredentialsResponseArgs

    CallCredentialType string
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    FromPlugin Pulumi.GoogleNative.Compute.Alpha.Inputs.MetadataCredentialsFromPluginResponse
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    CallCredentialType string
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    FromPlugin MetadataCredentialsFromPluginResponse
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    callCredentialType String
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    fromPlugin MetadataCredentialsFromPluginResponse
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    callCredentialType string
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    fromPlugin MetadataCredentialsFromPluginResponse
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    call_credential_type str
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    from_plugin MetadataCredentialsFromPluginResponse
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.
    callCredentialType String
    The type of call credentials to use for GRPC requests to the SDS server. This field can be set to one of the following: - GCE_VM: The local GCE VM service account credentials are used to access the SDS server. - FROM_PLUGIN: Custom authenticator credentials are used to access the SDS server.
    fromPlugin Property Map
    Custom authenticator credentials. Valid if callCredentialType is FROM_PLUGIN.

    ChannelCredentials, ChannelCredentialsArgs

    Certificates Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsCertificatePaths
    The call credentials to access the SDS server.
    ChannelCredentialType Pulumi.GoogleNative.Compute.Alpha.ChannelCredentialsChannelCredentialType
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    Certificates TlsCertificatePaths
    The call credentials to access the SDS server.
    ChannelCredentialType ChannelCredentialsChannelCredentialType
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates TlsCertificatePaths
    The call credentials to access the SDS server.
    channelCredentialType ChannelCredentialsChannelCredentialType
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates TlsCertificatePaths
    The call credentials to access the SDS server.
    channelCredentialType ChannelCredentialsChannelCredentialType
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates TlsCertificatePaths
    The call credentials to access the SDS server.
    channel_credential_type ChannelCredentialsChannelCredentialType
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates Property Map
    The call credentials to access the SDS server.
    channelCredentialType "CERTIFICATES" | "GCE_VM" | "INVALID"
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.

    ChannelCredentialsChannelCredentialType, ChannelCredentialsChannelCredentialTypeArgs

    Certificates
    CERTIFICATESUse TLS certificates to access the SDS server.
    GceVm
    GCE_VMUse local GCE VM credentials to access the SDS server.
    Invalid
    INVALID
    ChannelCredentialsChannelCredentialTypeCertificates
    CERTIFICATESUse TLS certificates to access the SDS server.
    ChannelCredentialsChannelCredentialTypeGceVm
    GCE_VMUse local GCE VM credentials to access the SDS server.
    ChannelCredentialsChannelCredentialTypeInvalid
    INVALID
    Certificates
    CERTIFICATESUse TLS certificates to access the SDS server.
    GceVm
    GCE_VMUse local GCE VM credentials to access the SDS server.
    Invalid
    INVALID
    Certificates
    CERTIFICATESUse TLS certificates to access the SDS server.
    GceVm
    GCE_VMUse local GCE VM credentials to access the SDS server.
    Invalid
    INVALID
    CERTIFICATES
    CERTIFICATESUse TLS certificates to access the SDS server.
    GCE_VM
    GCE_VMUse local GCE VM credentials to access the SDS server.
    INVALID
    INVALID
    "CERTIFICATES"
    CERTIFICATESUse TLS certificates to access the SDS server.
    "GCE_VM"
    GCE_VMUse local GCE VM credentials to access the SDS server.
    "INVALID"
    INVALID

    ChannelCredentialsResponse, ChannelCredentialsResponseArgs

    Certificates Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsCertificatePathsResponse
    The call credentials to access the SDS server.
    ChannelCredentialType string
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    Certificates TlsCertificatePathsResponse
    The call credentials to access the SDS server.
    ChannelCredentialType string
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates TlsCertificatePathsResponse
    The call credentials to access the SDS server.
    channelCredentialType String
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates TlsCertificatePathsResponse
    The call credentials to access the SDS server.
    channelCredentialType string
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates TlsCertificatePathsResponse
    The call credentials to access the SDS server.
    channel_credential_type str
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.
    certificates Property Map
    The call credentials to access the SDS server.
    channelCredentialType String
    The channel credentials to access the SDS server. This field can be set to one of the following: CERTIFICATES: Use TLS certificates to access the SDS server. GCE_VM: Use local GCE VM credentials to access the SDS server.

    CircuitBreakers, CircuitBreakersArgs

    ConnectTimeout Pulumi.GoogleNative.Compute.Alpha.Inputs.Duration
    The timeout for new network connections to hosts.
    MaxConnections int
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxPendingRequests int
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRequests int
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    MaxRequestsPerConnection int
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRetries int
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    ConnectTimeout Duration
    The timeout for new network connections to hosts.
    MaxConnections int
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxPendingRequests int
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRequests int
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    MaxRequestsPerConnection int
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRetries int
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connectTimeout Duration
    The timeout for new network connections to hosts.
    maxConnections Integer
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxPendingRequests Integer
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRequests Integer
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    maxRequestsPerConnection Integer
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRetries Integer
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connectTimeout Duration
    The timeout for new network connections to hosts.
    maxConnections number
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxPendingRequests number
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRequests number
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    maxRequestsPerConnection number
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRetries number
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connect_timeout Duration
    The timeout for new network connections to hosts.
    max_connections int
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    max_pending_requests int
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    max_requests int
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    max_requests_per_connection int
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    max_retries int
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connectTimeout Property Map
    The timeout for new network connections to hosts.
    maxConnections Number
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxPendingRequests Number
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRequests Number
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    maxRequestsPerConnection Number
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRetries Number
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.

    CircuitBreakersResponse, CircuitBreakersResponseArgs

    ConnectTimeout Pulumi.GoogleNative.Compute.Alpha.Inputs.DurationResponse
    The timeout for new network connections to hosts.
    MaxConnections int
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxPendingRequests int
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRequests int
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    MaxRequestsPerConnection int
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRetries int
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    ConnectTimeout DurationResponse
    The timeout for new network connections to hosts.
    MaxConnections int
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxPendingRequests int
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRequests int
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    MaxRequestsPerConnection int
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    MaxRetries int
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connectTimeout DurationResponse
    The timeout for new network connections to hosts.
    maxConnections Integer
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxPendingRequests Integer
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRequests Integer
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    maxRequestsPerConnection Integer
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRetries Integer
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connectTimeout DurationResponse
    The timeout for new network connections to hosts.
    maxConnections number
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxPendingRequests number
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRequests number
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    maxRequestsPerConnection number
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRetries number
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connect_timeout DurationResponse
    The timeout for new network connections to hosts.
    max_connections int
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    max_pending_requests int
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    max_requests int
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    max_requests_per_connection int
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    max_retries int
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    connectTimeout Property Map
    The timeout for new network connections to hosts.
    maxConnections Number
    The maximum number of connections to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxPendingRequests Number
    The maximum number of pending requests allowed to the backend service. If not specified, there is no limit. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRequests Number
    The maximum number of parallel requests that allowed to the backend service. If not specified, there is no limit.
    maxRequestsPerConnection Number
    Maximum requests for a single connection to the backend service. This parameter is respected by both the HTTP/1.1 and HTTP/2 implementations. If not specified, there is no limit. Setting this parameter to 1 will effectively disable keep alive. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    maxRetries Number
    The maximum number of parallel retries allowed to the backend cluster. If not specified, the default is 1. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.

    ClientTlsSettings, ClientTlsSettingsArgs

    ClientTlsContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsContext
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    Mode Pulumi.GoogleNative.Compute.Alpha.ClientTlsSettingsMode
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    Sni string
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    SubjectAltNames List<string>
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    ClientTlsContext TlsContext
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    Mode ClientTlsSettingsMode
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    Sni string
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    SubjectAltNames []string
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    clientTlsContext TlsContext
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode ClientTlsSettingsMode
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni String
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subjectAltNames List<String>
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    clientTlsContext TlsContext
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode ClientTlsSettingsMode
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni string
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subjectAltNames string[]
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    client_tls_context TlsContext
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode ClientTlsSettingsMode
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni str
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subject_alt_names Sequence[str]
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    clientTlsContext Property Map
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode "DISABLE" | "INVALID" | "MUTUAL" | "SIMPLE"
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni String
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subjectAltNames List<String>
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.

    ClientTlsSettingsMode, ClientTlsSettingsModeArgs

    Disable
    DISABLEDo not setup a TLS connection to the backends.
    Invalid
    INVALID
    Mutual
    MUTUALSecure connections to the backends using mutual TLS by presenting client certificates for authentication.
    Simple
    SIMPLEOriginate a TLS connection to the backends.
    ClientTlsSettingsModeDisable
    DISABLEDo not setup a TLS connection to the backends.
    ClientTlsSettingsModeInvalid
    INVALID
    ClientTlsSettingsModeMutual
    MUTUALSecure connections to the backends using mutual TLS by presenting client certificates for authentication.
    ClientTlsSettingsModeSimple
    SIMPLEOriginate a TLS connection to the backends.
    Disable
    DISABLEDo not setup a TLS connection to the backends.
    Invalid
    INVALID
    Mutual
    MUTUALSecure connections to the backends using mutual TLS by presenting client certificates for authentication.
    Simple
    SIMPLEOriginate a TLS connection to the backends.
    Disable
    DISABLEDo not setup a TLS connection to the backends.
    Invalid
    INVALID
    Mutual
    MUTUALSecure connections to the backends using mutual TLS by presenting client certificates for authentication.
    Simple
    SIMPLEOriginate a TLS connection to the backends.
    DISABLE
    DISABLEDo not setup a TLS connection to the backends.
    INVALID
    INVALID
    MUTUAL
    MUTUALSecure connections to the backends using mutual TLS by presenting client certificates for authentication.
    SIMPLE
    SIMPLEOriginate a TLS connection to the backends.
    "DISABLE"
    DISABLEDo not setup a TLS connection to the backends.
    "INVALID"
    INVALID
    "MUTUAL"
    MUTUALSecure connections to the backends using mutual TLS by presenting client certificates for authentication.
    "SIMPLE"
    SIMPLEOriginate a TLS connection to the backends.

    ClientTlsSettingsResponse, ClientTlsSettingsResponseArgs

    ClientTlsContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsContextResponse
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    Mode string
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    Sni string
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    SubjectAltNames List<string>
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    ClientTlsContext TlsContextResponse
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    Mode string
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    Sni string
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    SubjectAltNames []string
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    clientTlsContext TlsContextResponse
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode String
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni String
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subjectAltNames List<String>
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    clientTlsContext TlsContextResponse
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode string
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni string
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subjectAltNames string[]
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    client_tls_context TlsContextResponse
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode str
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni str
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subject_alt_names Sequence[str]
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.
    clientTlsContext Property Map
    Configures the mechanism to obtain client-side security certificates and identity information. This field is only applicable when mode is set to MUTUAL.
    mode String
    Indicates whether connections to this port should be secured using TLS. The value of this field determines how TLS is enforced. This can be set to one of the following values: DISABLE: Do not setup a TLS connection to the backends. SIMPLE: Originate a TLS connection to the backends. MUTUAL: Secure connections to the backends using mutual TLS by presenting client certificates for authentication.
    sni String
    SNI string to present to the server during TLS handshake. This field is applicable only when mode is SIMPLE or MUTUAL.
    subjectAltNames List<String>
    A list of alternate names to verify the subject identity in the certificate.If specified, the proxy will verify that the server certificate's subject alt name matches one of the specified values. This field is applicable only when mode is SIMPLE or MUTUAL.

    ConnectionDraining, ConnectionDrainingArgs

    DrainingTimeoutSec int
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    DrainingTimeoutSec int
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    drainingTimeoutSec Integer
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    drainingTimeoutSec number
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    draining_timeout_sec int
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    drainingTimeoutSec Number
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.

    ConnectionDrainingResponse, ConnectionDrainingResponseArgs

    DrainingTimeoutSec int
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    DrainingTimeoutSec int
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    drainingTimeoutSec Integer
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    drainingTimeoutSec number
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    draining_timeout_sec int
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.
    drainingTimeoutSec Number
    Configures a duration timeout for existing requests on a removed backend instance. For supported load balancers and protocols, as described in Enabling connection draining.

    ConsistentHashLoadBalancerSettings, ConsistentHashLoadBalancerSettingsArgs

    HttpCookie Pulumi.GoogleNative.Compute.Alpha.Inputs.ConsistentHashLoadBalancerSettingsHttpCookie
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    HttpHeaderName string
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    MinimumRingSize string
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    HttpCookie ConsistentHashLoadBalancerSettingsHttpCookie
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    HttpHeaderName string
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    MinimumRingSize string
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    httpCookie ConsistentHashLoadBalancerSettingsHttpCookie
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    httpHeaderName String
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimumRingSize String
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    httpCookie ConsistentHashLoadBalancerSettingsHttpCookie
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    httpHeaderName string
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimumRingSize string
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    http_cookie ConsistentHashLoadBalancerSettingsHttpCookie
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    http_header_name str
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimum_ring_size str
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    httpCookie Property Map
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    httpHeaderName String
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimumRingSize String
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.

    ConsistentHashLoadBalancerSettingsHttpCookie, ConsistentHashLoadBalancerSettingsHttpCookieArgs

    Name string
    Name of the cookie.
    Path string
    Path to set for the cookie.
    Ttl Pulumi.GoogleNative.Compute.Alpha.Inputs.Duration
    Lifetime of the cookie.
    Name string
    Name of the cookie.
    Path string
    Path to set for the cookie.
    Ttl Duration
    Lifetime of the cookie.
    name String
    Name of the cookie.
    path String
    Path to set for the cookie.
    ttl Duration
    Lifetime of the cookie.
    name string
    Name of the cookie.
    path string
    Path to set for the cookie.
    ttl Duration
    Lifetime of the cookie.
    name str
    Name of the cookie.
    path str
    Path to set for the cookie.
    ttl Duration
    Lifetime of the cookie.
    name String
    Name of the cookie.
    path String
    Path to set for the cookie.
    ttl Property Map
    Lifetime of the cookie.

    ConsistentHashLoadBalancerSettingsHttpCookieResponse, ConsistentHashLoadBalancerSettingsHttpCookieResponseArgs

    Name string
    Name of the cookie.
    Path string
    Path to set for the cookie.
    Ttl Pulumi.GoogleNative.Compute.Alpha.Inputs.DurationResponse
    Lifetime of the cookie.
    Name string
    Name of the cookie.
    Path string
    Path to set for the cookie.
    Ttl DurationResponse
    Lifetime of the cookie.
    name String
    Name of the cookie.
    path String
    Path to set for the cookie.
    ttl DurationResponse
    Lifetime of the cookie.
    name string
    Name of the cookie.
    path string
    Path to set for the cookie.
    ttl DurationResponse
    Lifetime of the cookie.
    name str
    Name of the cookie.
    path str
    Path to set for the cookie.
    ttl DurationResponse
    Lifetime of the cookie.
    name String
    Name of the cookie.
    path String
    Path to set for the cookie.
    ttl Property Map
    Lifetime of the cookie.

    ConsistentHashLoadBalancerSettingsResponse, ConsistentHashLoadBalancerSettingsResponseArgs

    HttpCookie Pulumi.GoogleNative.Compute.Alpha.Inputs.ConsistentHashLoadBalancerSettingsHttpCookieResponse
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    HttpHeaderName string
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    MinimumRingSize string
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    HttpCookie ConsistentHashLoadBalancerSettingsHttpCookieResponse
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    HttpHeaderName string
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    MinimumRingSize string
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    httpCookie ConsistentHashLoadBalancerSettingsHttpCookieResponse
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    httpHeaderName String
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimumRingSize String
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    httpCookie ConsistentHashLoadBalancerSettingsHttpCookieResponse
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    httpHeaderName string
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimumRingSize string
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    http_cookie ConsistentHashLoadBalancerSettingsHttpCookieResponse
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    http_header_name str
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimum_ring_size str
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.
    httpCookie Property Map
    Hash is based on HTTP Cookie. This field describes a HTTP cookie that will be used as the hash key for the consistent hash load balancer. If the cookie is not present, it will be generated. This field is applicable if the sessionAffinity is set to HTTP_COOKIE. Not supported when the backend service is referenced by a URL map that is bound to target gRPC proxy that has validateForProxyless field set to true.
    httpHeaderName String
    The hash based on the value of the specified header field. This field is applicable if the sessionAffinity is set to HEADER_FIELD.
    minimumRingSize String
    The minimum number of virtual nodes to use for the hash ring. Defaults to 1024. Larger ring sizes result in more granular load distributions. If the number of hosts in the load balancing pool is larger than the ring size, each host will be assigned a single virtual node.

    Duration, DurationArgs

    Nanos int
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    Seconds string
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    Nanos int
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    Seconds string
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos Integer
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds String
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos number
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds string
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos int
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds str
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos Number
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds String
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years

    DurationResponse, DurationResponseArgs

    Nanos int
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    Seconds string
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    Nanos int
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    Seconds string
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos Integer
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds String
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos number
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds string
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos int
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds str
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years
    nanos Number
    Span of time that's a fraction of a second at nanosecond resolution. Durations less than one second are represented with a 0 seconds field and a positive nanos field. Must be from 0 to 999,999,999 inclusive.
    seconds String
    Span of time at a resolution of a second. Must be from 0 to 315,576,000,000 inclusive. Note: these bounds are computed from: 60 sec/min * 60 min/hr * 24 hr/day * 365.25 days/year * 10000 years

    GrpcServiceConfig, GrpcServiceConfigArgs

    CallCredentials Pulumi.GoogleNative.Compute.Alpha.Inputs.CallCredentials
    The call credentials to access the SDS server.
    ChannelCredentials Pulumi.GoogleNative.Compute.Alpha.Inputs.ChannelCredentials
    The channel credentials to access the SDS server.
    TargetUri string
    The target URI of the SDS server.
    CallCredentials CallCredentials
    The call credentials to access the SDS server.
    ChannelCredentials ChannelCredentials
    The channel credentials to access the SDS server.
    TargetUri string
    The target URI of the SDS server.
    callCredentials CallCredentials
    The call credentials to access the SDS server.
    channelCredentials ChannelCredentials
    The channel credentials to access the SDS server.
    targetUri String
    The target URI of the SDS server.
    callCredentials CallCredentials
    The call credentials to access the SDS server.
    channelCredentials ChannelCredentials
    The channel credentials to access the SDS server.
    targetUri string
    The target URI of the SDS server.
    call_credentials CallCredentials
    The call credentials to access the SDS server.
    channel_credentials ChannelCredentials
    The channel credentials to access the SDS server.
    target_uri str
    The target URI of the SDS server.
    callCredentials Property Map
    The call credentials to access the SDS server.
    channelCredentials Property Map
    The channel credentials to access the SDS server.
    targetUri String
    The target URI of the SDS server.

    GrpcServiceConfigResponse, GrpcServiceConfigResponseArgs

    CallCredentials Pulumi.GoogleNative.Compute.Alpha.Inputs.CallCredentialsResponse
    The call credentials to access the SDS server.
    ChannelCredentials Pulumi.GoogleNative.Compute.Alpha.Inputs.ChannelCredentialsResponse
    The channel credentials to access the SDS server.
    TargetUri string
    The target URI of the SDS server.
    CallCredentials CallCredentialsResponse
    The call credentials to access the SDS server.
    ChannelCredentials ChannelCredentialsResponse
    The channel credentials to access the SDS server.
    TargetUri string
    The target URI of the SDS server.
    callCredentials CallCredentialsResponse
    The call credentials to access the SDS server.
    channelCredentials ChannelCredentialsResponse
    The channel credentials to access the SDS server.
    targetUri String
    The target URI of the SDS server.
    callCredentials CallCredentialsResponse
    The call credentials to access the SDS server.
    channelCredentials ChannelCredentialsResponse
    The channel credentials to access the SDS server.
    targetUri string
    The target URI of the SDS server.
    call_credentials CallCredentialsResponse
    The call credentials to access the SDS server.
    channel_credentials ChannelCredentialsResponse
    The channel credentials to access the SDS server.
    target_uri str
    The target URI of the SDS server.
    callCredentials Property Map
    The call credentials to access the SDS server.
    channelCredentials Property Map
    The channel credentials to access the SDS server.
    targetUri String
    The target URI of the SDS server.

    Jwt, JwtArgs

    Audiences List<string>
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    Issuer string
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    JwksPublicKeys string
    The provider's public key set to validate the signature of the JWT.
    JwtHeaders List<Pulumi.GoogleNative.Compute.Alpha.Inputs.JwtHeader>
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    JwtParams List<string>
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    Audiences []string
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    Issuer string
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    JwksPublicKeys string
    The provider's public key set to validate the signature of the JWT.
    JwtHeaders []JwtHeader
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    JwtParams []string
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences List<String>
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer String
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwksPublicKeys String
    The provider's public key set to validate the signature of the JWT.
    jwtHeaders List<JwtHeader>
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwtParams List<String>
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences string[]
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer string
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwksPublicKeys string
    The provider's public key set to validate the signature of the JWT.
    jwtHeaders JwtHeader[]
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwtParams string[]
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences Sequence[str]
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer str
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwks_public_keys str
    The provider's public key set to validate the signature of the JWT.
    jwt_headers Sequence[JwtHeader]
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwt_params Sequence[str]
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences List<String>
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer String
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwksPublicKeys String
    The provider's public key set to validate the signature of the JWT.
    jwtHeaders List<Property Map>
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwtParams List<String>
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.

    JwtHeader, JwtHeaderArgs

    Name string
    The HTTP header name.
    ValuePrefix string
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    Name string
    The HTTP header name.
    ValuePrefix string
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name String
    The HTTP header name.
    valuePrefix String
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name string
    The HTTP header name.
    valuePrefix string
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name str
    The HTTP header name.
    value_prefix str
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name String
    The HTTP header name.
    valuePrefix String
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.

    JwtHeaderResponse, JwtHeaderResponseArgs

    Name string
    The HTTP header name.
    ValuePrefix string
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    Name string
    The HTTP header name.
    ValuePrefix string
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name String
    The HTTP header name.
    valuePrefix String
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name string
    The HTTP header name.
    valuePrefix string
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name str
    The HTTP header name.
    value_prefix str
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.
    name String
    The HTTP header name.
    valuePrefix String
    The value prefix. The value format is "value_prefix" For example, for "Authorization: Bearer ", value_prefix="Bearer " with a space at the end.

    JwtResponse, JwtResponseArgs

    Audiences List<string>
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    Issuer string
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    JwksPublicKeys string
    The provider's public key set to validate the signature of the JWT.
    JwtHeaders List<Pulumi.GoogleNative.Compute.Alpha.Inputs.JwtHeaderResponse>
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    JwtParams List<string>
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    Audiences []string
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    Issuer string
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    JwksPublicKeys string
    The provider's public key set to validate the signature of the JWT.
    JwtHeaders []JwtHeaderResponse
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    JwtParams []string
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences List<String>
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer String
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwksPublicKeys String
    The provider's public key set to validate the signature of the JWT.
    jwtHeaders List<JwtHeaderResponse>
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwtParams List<String>
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences string[]
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer string
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwksPublicKeys string
    The provider's public key set to validate the signature of the JWT.
    jwtHeaders JwtHeaderResponse[]
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwtParams string[]
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences Sequence[str]
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer str
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwks_public_keys str
    The provider's public key set to validate the signature of the JWT.
    jwt_headers Sequence[JwtHeaderResponse]
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwt_params Sequence[str]
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.
    audiences List<String>
    A JWT containing any of these audiences will be accepted. The service name will be accepted if audiences is empty. Examples: bookstore_android.apps.googleusercontent.com, bookstore_web.apps.googleusercontent.com
    issuer String
    Identifies the issuer that issued the JWT, which is usually a URL or an email address. Examples: https://securetoken.google.com, 1234567-compute@developer.gserviceaccount.com
    jwksPublicKeys String
    The provider's public key set to validate the signature of the JWT.
    jwtHeaders List<Property Map>
    jwt_headers and jwt_params define where to extract the JWT from an HTTP request. If no explicit location is specified, the following default locations are tried in order: 1. The Authorization header using the Bearer schema. See here _. Example: Authorization: Bearer . 2. access_token query parameter. See this _ Multiple JWTs can be verified for a request. Each JWT has to be extracted from the locations its issuer specified or from the default locations. This field is set if JWT is sent in a request header. This field specifies the header name. For example, if header=x-goog-iap-jwt-assertion, the header format will be x-goog-iap-jwt-assertion: .
    jwtParams List<String>
    This field is set if JWT is sent in a query parameter. This field specifies the query parameter name. For example, if jwt_params[0] is jwt_token, the JWT format in the query parameter is /path?jwt_token=.

    MetadataCredentialsFromPlugin, MetadataCredentialsFromPluginArgs

    Name string
    Plugin name.
    StructConfig string
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    Name string
    Plugin name.
    StructConfig string
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name String
    Plugin name.
    structConfig String
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name string
    Plugin name.
    structConfig string
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name str
    Plugin name.
    struct_config str
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name String
    Plugin name.
    structConfig String
    A text proto that conforms to a Struct type definition interpreted by the plugin.

    MetadataCredentialsFromPluginResponse, MetadataCredentialsFromPluginResponseArgs

    Name string
    Plugin name.
    StructConfig string
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    Name string
    Plugin name.
    StructConfig string
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name String
    Plugin name.
    structConfig String
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name string
    Plugin name.
    structConfig string
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name str
    Plugin name.
    struct_config str
    A text proto that conforms to a Struct type definition interpreted by the plugin.
    name String
    Plugin name.
    structConfig String
    A text proto that conforms to a Struct type definition interpreted by the plugin.

    MutualTls, MutualTlsArgs

    Mode Pulumi.GoogleNative.Compute.Alpha.MutualTlsMode
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    Mode MutualTlsMode
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode MutualTlsMode
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode MutualTlsMode
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode MutualTlsMode
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode "INVALID" | "PERMISSIVE" | "STRICT"
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.

    MutualTlsMode, MutualTlsModeArgs

    Invalid
    INVALID
    Permissive
    PERMISSIVEClient certificate can be omitted, connection can be either plaintext or TLS.
    Strict
    STRICTClient certificate must be presented, connection is in TLS.
    MutualTlsModeInvalid
    INVALID
    MutualTlsModePermissive
    PERMISSIVEClient certificate can be omitted, connection can be either plaintext or TLS.
    MutualTlsModeStrict
    STRICTClient certificate must be presented, connection is in TLS.
    Invalid
    INVALID
    Permissive
    PERMISSIVEClient certificate can be omitted, connection can be either plaintext or TLS.
    Strict
    STRICTClient certificate must be presented, connection is in TLS.
    Invalid
    INVALID
    Permissive
    PERMISSIVEClient certificate can be omitted, connection can be either plaintext or TLS.
    Strict
    STRICTClient certificate must be presented, connection is in TLS.
    INVALID
    INVALID
    PERMISSIVE
    PERMISSIVEClient certificate can be omitted, connection can be either plaintext or TLS.
    STRICT
    STRICTClient certificate must be presented, connection is in TLS.
    "INVALID"
    INVALID
    "PERMISSIVE"
    PERMISSIVEClient certificate can be omitted, connection can be either plaintext or TLS.
    "STRICT"
    STRICTClient certificate must be presented, connection is in TLS.

    MutualTlsResponse, MutualTlsResponseArgs

    Mode string
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    Mode string
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode String
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode string
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode str
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.
    mode String
    Specifies if the server TLS is configured to be strict or permissive. This field can be set to one of the following: STRICT: Client certificate must be presented, connection is in TLS. PERMISSIVE: Client certificate can be omitted, connection can be either plaintext or TLS.

    OriginAuthenticationMethod, OriginAuthenticationMethodArgs

    OriginAuthenticationMethodResponse, OriginAuthenticationMethodResponseArgs

    OutlierDetection, OutlierDetectionArgs

    BaseEjectionTime Pulumi.GoogleNative.Compute.Alpha.Inputs.Duration
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    ConsecutiveErrors int
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    ConsecutiveGatewayFailure int
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    EnforcingConsecutiveErrors int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    EnforcingConsecutiveGatewayFailure int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    EnforcingSuccessRate int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    Interval Pulumi.GoogleNative.Compute.Alpha.Inputs.Duration
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    MaxEjectionPercent int
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    SuccessRateMinimumHosts int
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    SuccessRateRequestVolume int
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    SuccessRateStdevFactor int
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    BaseEjectionTime Duration
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    ConsecutiveErrors int
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    ConsecutiveGatewayFailure int
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    EnforcingConsecutiveErrors int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    EnforcingConsecutiveGatewayFailure int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    EnforcingSuccessRate int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    Interval Duration
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    MaxEjectionPercent int
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    SuccessRateMinimumHosts int
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    SuccessRateRequestVolume int
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    SuccessRateStdevFactor int
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    baseEjectionTime Duration
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutiveErrors Integer
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutiveGatewayFailure Integer
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcingConsecutiveErrors Integer
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcingConsecutiveGatewayFailure Integer
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcingSuccessRate Integer
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval Duration
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    maxEjectionPercent Integer
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    successRateMinimumHosts Integer
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    successRateRequestVolume Integer
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    successRateStdevFactor Integer
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    baseEjectionTime Duration
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutiveErrors number
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutiveGatewayFailure number
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcingConsecutiveErrors number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcingConsecutiveGatewayFailure number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcingSuccessRate number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval Duration
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    maxEjectionPercent number
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    successRateMinimumHosts number
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    successRateRequestVolume number
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    successRateStdevFactor number
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    base_ejection_time Duration
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutive_errors int
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutive_gateway_failure int
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcing_consecutive_errors int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcing_consecutive_gateway_failure int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcing_success_rate int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval Duration
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    max_ejection_percent int
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    success_rate_minimum_hosts int
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    success_rate_request_volume int
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    success_rate_stdev_factor int
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    baseEjectionTime Property Map
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutiveErrors Number
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutiveGatewayFailure Number
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcingConsecutiveErrors Number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcingConsecutiveGatewayFailure Number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcingSuccessRate Number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval Property Map
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    maxEjectionPercent Number
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    successRateMinimumHosts Number
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    successRateRequestVolume Number
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    successRateStdevFactor Number
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.

    OutlierDetectionResponse, OutlierDetectionResponseArgs

    BaseEjectionTime Pulumi.GoogleNative.Compute.Alpha.Inputs.DurationResponse
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    ConsecutiveErrors int
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    ConsecutiveGatewayFailure int
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    EnforcingConsecutiveErrors int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    EnforcingConsecutiveGatewayFailure int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    EnforcingSuccessRate int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    Interval Pulumi.GoogleNative.Compute.Alpha.Inputs.DurationResponse
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    MaxEjectionPercent int
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    SuccessRateMinimumHosts int
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    SuccessRateRequestVolume int
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    SuccessRateStdevFactor int
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    BaseEjectionTime DurationResponse
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    ConsecutiveErrors int
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    ConsecutiveGatewayFailure int
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    EnforcingConsecutiveErrors int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    EnforcingConsecutiveGatewayFailure int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    EnforcingSuccessRate int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    Interval DurationResponse
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    MaxEjectionPercent int
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    SuccessRateMinimumHosts int
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    SuccessRateRequestVolume int
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    SuccessRateStdevFactor int
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    baseEjectionTime DurationResponse
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutiveErrors Integer
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutiveGatewayFailure Integer
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcingConsecutiveErrors Integer
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcingConsecutiveGatewayFailure Integer
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcingSuccessRate Integer
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval DurationResponse
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    maxEjectionPercent Integer
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    successRateMinimumHosts Integer
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    successRateRequestVolume Integer
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    successRateStdevFactor Integer
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    baseEjectionTime DurationResponse
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutiveErrors number
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutiveGatewayFailure number
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcingConsecutiveErrors number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcingConsecutiveGatewayFailure number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcingSuccessRate number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval DurationResponse
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    maxEjectionPercent number
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    successRateMinimumHosts number
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    successRateRequestVolume number
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    successRateStdevFactor number
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    base_ejection_time DurationResponse
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutive_errors int
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutive_gateway_failure int
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcing_consecutive_errors int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcing_consecutive_gateway_failure int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcing_success_rate int
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval DurationResponse
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    max_ejection_percent int
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    success_rate_minimum_hosts int
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    success_rate_request_volume int
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    success_rate_stdev_factor int
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.
    baseEjectionTime Property Map
    The base time that a backend endpoint is ejected for. Defaults to 30000ms or 30s. After a backend endpoint is returned back to the load balancing pool, it can be ejected again in another ejection analysis. Thus, the total ejection time is equal to the base ejection time multiplied by the number of times the backend endpoint has been ejected. Defaults to 30000ms or 30s.
    consecutiveErrors Number
    Number of consecutive errors before a backend endpoint is ejected from the load balancing pool. When the backend endpoint is accessed over HTTP, a 5xx return code qualifies as an error. Defaults to 5.
    consecutiveGatewayFailure Number
    The number of consecutive gateway failures (502, 503, 504 status or connection errors that are mapped to one of those status codes) before a consecutive gateway failure ejection occurs. Defaults to 3.
    enforcingConsecutiveErrors Number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive 5xx. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 0.
    enforcingConsecutiveGatewayFailure Number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through consecutive gateway failures. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100.
    enforcingSuccessRate Number
    The percentage chance that a backend endpoint will be ejected when an outlier status is detected through success rate statistics. This setting can be used to disable ejection or to ramp it up slowly. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    interval Property Map
    Time interval between ejection analysis sweeps. This can result in both new ejections and backend endpoints being returned to service. The interval is equal to the number of seconds as defined in outlierDetection.interval.seconds plus the number of nanoseconds as defined in outlierDetection.interval.nanos. Defaults to 1 second.
    maxEjectionPercent Number
    Maximum percentage of backend endpoints in the load balancing pool for the backend service that can be ejected if the ejection conditions are met. Defaults to 50%.
    successRateMinimumHosts Number
    The number of backend endpoints in the load balancing pool that must have enough request volume to detect success rate outliers. If the number of backend endpoints is fewer than this setting, outlier detection via success rate statistics is not performed for any backend endpoint in the load balancing pool. Defaults to 5. Not supported when the backend service uses Serverless NEG.
    successRateRequestVolume Number
    The minimum number of total requests that must be collected in one interval (as defined by the interval duration above) to include this backend endpoint in success rate based outlier detection. If the volume is lower than this setting, outlier detection via success rate statistics is not performed for that backend endpoint. Defaults to 100. Not supported when the backend service uses Serverless NEG.
    successRateStdevFactor Number
    This factor is used to determine the ejection threshold for success rate outlier ejection. The ejection threshold is the difference between the mean success rate, and the product of this factor and the standard deviation of the mean success rate: mean - (stdev * successRateStdevFactor). This factor is divided by a thousand to get a double. That is, if the desired factor is 1.9, the runtime value should be 1900. Defaults to 1900. Not supported when the backend service uses Serverless NEG.

    PeerAuthenticationMethod, PeerAuthenticationMethodArgs

    Mtls Pulumi.GoogleNative.Compute.Alpha.Inputs.MutualTls
    Set if mTLS is used for peer authentication.
    Mtls MutualTls
    Set if mTLS is used for peer authentication.
    mtls MutualTls
    Set if mTLS is used for peer authentication.
    mtls MutualTls
    Set if mTLS is used for peer authentication.
    mtls MutualTls
    Set if mTLS is used for peer authentication.
    mtls Property Map
    Set if mTLS is used for peer authentication.

    PeerAuthenticationMethodResponse, PeerAuthenticationMethodResponseArgs

    Mtls Pulumi.GoogleNative.Compute.Alpha.Inputs.MutualTlsResponse
    Set if mTLS is used for peer authentication.
    Mtls MutualTlsResponse
    Set if mTLS is used for peer authentication.
    mtls MutualTlsResponse
    Set if mTLS is used for peer authentication.
    mtls MutualTlsResponse
    Set if mTLS is used for peer authentication.
    mtls MutualTlsResponse
    Set if mTLS is used for peer authentication.
    mtls Property Map
    Set if mTLS is used for peer authentication.

    Permission, PermissionArgs

    Constraints List<Pulumi.GoogleNative.Compute.Alpha.Inputs.PermissionConstraint>
    Extra custom constraints. The constraints are ANDed together.
    Hosts List<string>
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    Methods List<string>
    HTTP method.
    NotHosts List<string>
    Negate of hosts. Specifies exclusions.
    NotMethods List<string>
    Negate of methods. Specifies exclusions.
    NotPaths List<string>
    Negate of paths. Specifies exclusions.
    NotPorts List<string>
    Negate of ports. Specifies exclusions.
    Paths List<string>
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    Ports List<string>
    Port names or numbers.
    Constraints []PermissionConstraint
    Extra custom constraints. The constraints are ANDed together.
    Hosts []string
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    Methods []string
    HTTP method.
    NotHosts []string
    Negate of hosts. Specifies exclusions.
    NotMethods []string
    Negate of methods. Specifies exclusions.
    NotPaths []string
    Negate of paths. Specifies exclusions.
    NotPorts []string
    Negate of ports. Specifies exclusions.
    Paths []string
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    Ports []string
    Port names or numbers.
    constraints List<PermissionConstraint>
    Extra custom constraints. The constraints are ANDed together.
    hosts List<String>
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods List<String>
    HTTP method.
    notHosts List<String>
    Negate of hosts. Specifies exclusions.
    notMethods List<String>
    Negate of methods. Specifies exclusions.
    notPaths List<String>
    Negate of paths. Specifies exclusions.
    notPorts List<String>
    Negate of ports. Specifies exclusions.
    paths List<String>
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports List<String>
    Port names or numbers.
    constraints PermissionConstraint[]
    Extra custom constraints. The constraints are ANDed together.
    hosts string[]
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods string[]
    HTTP method.
    notHosts string[]
    Negate of hosts. Specifies exclusions.
    notMethods string[]
    Negate of methods. Specifies exclusions.
    notPaths string[]
    Negate of paths. Specifies exclusions.
    notPorts string[]
    Negate of ports. Specifies exclusions.
    paths string[]
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports string[]
    Port names or numbers.
    constraints Sequence[PermissionConstraint]
    Extra custom constraints. The constraints are ANDed together.
    hosts Sequence[str]
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods Sequence[str]
    HTTP method.
    not_hosts Sequence[str]
    Negate of hosts. Specifies exclusions.
    not_methods Sequence[str]
    Negate of methods. Specifies exclusions.
    not_paths Sequence[str]
    Negate of paths. Specifies exclusions.
    not_ports Sequence[str]
    Negate of ports. Specifies exclusions.
    paths Sequence[str]
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports Sequence[str]
    Port names or numbers.
    constraints List<Property Map>
    Extra custom constraints. The constraints are ANDed together.
    hosts List<String>
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods List<String>
    HTTP method.
    notHosts List<String>
    Negate of hosts. Specifies exclusions.
    notMethods List<String>
    Negate of methods. Specifies exclusions.
    notPaths List<String>
    Negate of paths. Specifies exclusions.
    notPorts List<String>
    Negate of ports. Specifies exclusions.
    paths List<String>
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports List<String>
    Port names or numbers.

    PermissionConstraint, PermissionConstraintArgs

    Key string
    Key of the constraint.
    Values List<string>
    A list of allowed values.
    Key string
    Key of the constraint.
    Values []string
    A list of allowed values.
    key String
    Key of the constraint.
    values List<String>
    A list of allowed values.
    key string
    Key of the constraint.
    values string[]
    A list of allowed values.
    key str
    Key of the constraint.
    values Sequence[str]
    A list of allowed values.
    key String
    Key of the constraint.
    values List<String>
    A list of allowed values.

    PermissionConstraintResponse, PermissionConstraintResponseArgs

    Key string
    Key of the constraint.
    Values List<string>
    A list of allowed values.
    Key string
    Key of the constraint.
    Values []string
    A list of allowed values.
    key String
    Key of the constraint.
    values List<String>
    A list of allowed values.
    key string
    Key of the constraint.
    values string[]
    A list of allowed values.
    key str
    Key of the constraint.
    values Sequence[str]
    A list of allowed values.
    key String
    Key of the constraint.
    values List<String>
    A list of allowed values.

    PermissionResponse, PermissionResponseArgs

    Constraints List<Pulumi.GoogleNative.Compute.Alpha.Inputs.PermissionConstraintResponse>
    Extra custom constraints. The constraints are ANDed together.
    Hosts List<string>
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    Methods List<string>
    HTTP method.
    NotHosts List<string>
    Negate of hosts. Specifies exclusions.
    NotMethods List<string>
    Negate of methods. Specifies exclusions.
    NotPaths List<string>
    Negate of paths. Specifies exclusions.
    NotPorts List<string>
    Negate of ports. Specifies exclusions.
    Paths List<string>
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    Ports List<string>
    Port names or numbers.
    Constraints []PermissionConstraintResponse
    Extra custom constraints. The constraints are ANDed together.
    Hosts []string
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    Methods []string
    HTTP method.
    NotHosts []string
    Negate of hosts. Specifies exclusions.
    NotMethods []string
    Negate of methods. Specifies exclusions.
    NotPaths []string
    Negate of paths. Specifies exclusions.
    NotPorts []string
    Negate of ports. Specifies exclusions.
    Paths []string
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    Ports []string
    Port names or numbers.
    constraints List<PermissionConstraintResponse>
    Extra custom constraints. The constraints are ANDed together.
    hosts List<String>
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods List<String>
    HTTP method.
    notHosts List<String>
    Negate of hosts. Specifies exclusions.
    notMethods List<String>
    Negate of methods. Specifies exclusions.
    notPaths List<String>
    Negate of paths. Specifies exclusions.
    notPorts List<String>
    Negate of ports. Specifies exclusions.
    paths List<String>
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports List<String>
    Port names or numbers.
    constraints PermissionConstraintResponse[]
    Extra custom constraints. The constraints are ANDed together.
    hosts string[]
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods string[]
    HTTP method.
    notHosts string[]
    Negate of hosts. Specifies exclusions.
    notMethods string[]
    Negate of methods. Specifies exclusions.
    notPaths string[]
    Negate of paths. Specifies exclusions.
    notPorts string[]
    Negate of ports. Specifies exclusions.
    paths string[]
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports string[]
    Port names or numbers.
    constraints Sequence[PermissionConstraintResponse]
    Extra custom constraints. The constraints are ANDed together.
    hosts Sequence[str]
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods Sequence[str]
    HTTP method.
    not_hosts Sequence[str]
    Negate of hosts. Specifies exclusions.
    not_methods Sequence[str]
    Negate of methods. Specifies exclusions.
    not_paths Sequence[str]
    Negate of paths. Specifies exclusions.
    not_ports Sequence[str]
    Negate of ports. Specifies exclusions.
    paths Sequence[str]
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports Sequence[str]
    Port names or numbers.
    constraints List<Property Map>
    Extra custom constraints. The constraints are ANDed together.
    hosts List<String>
    Used in Ingress or Egress Gateway cases to specify hosts that the policy applies to. Exact match, prefix match, and suffix match are supported.
    methods List<String>
    HTTP method.
    notHosts List<String>
    Negate of hosts. Specifies exclusions.
    notMethods List<String>
    Negate of methods. Specifies exclusions.
    notPaths List<String>
    Negate of paths. Specifies exclusions.
    notPorts List<String>
    Negate of ports. Specifies exclusions.
    paths List<String>
    HTTP request paths or gRPC methods. Exact match, prefix match, and suffix match are supported.
    ports List<String>
    Port names or numbers.

    Principal, PrincipalArgs

    Condition string
    An expression to specify custom condition.
    Groups List<string>
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    Ips List<string>
    IPv4 or IPv6 address or range (In CIDR format)
    Namespaces List<string>
    The namespaces. Exact match, prefix match, and suffix match are supported.
    NotGroups List<string>
    Negate of groups. Specifies exclusions.
    NotIps List<string>
    Negate of IPs. Specifies exclusions.
    NotNamespaces List<string>
    Negate of namespaces. Specifies exclusions.
    NotUsers List<string>
    Negate of users. Specifies exclusions.
    Properties Dictionary<string, string>
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    Users List<string>
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    Condition string
    An expression to specify custom condition.
    Groups []string
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    Ips []string
    IPv4 or IPv6 address or range (In CIDR format)
    Namespaces []string
    The namespaces. Exact match, prefix match, and suffix match are supported.
    NotGroups []string
    Negate of groups. Specifies exclusions.
    NotIps []string
    Negate of IPs. Specifies exclusions.
    NotNamespaces []string
    Negate of namespaces. Specifies exclusions.
    NotUsers []string
    Negate of users. Specifies exclusions.
    Properties map[string]string
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    Users []string
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition String
    An expression to specify custom condition.
    groups List<String>
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips List<String>
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces List<String>
    The namespaces. Exact match, prefix match, and suffix match are supported.
    notGroups List<String>
    Negate of groups. Specifies exclusions.
    notIps List<String>
    Negate of IPs. Specifies exclusions.
    notNamespaces List<String>
    Negate of namespaces. Specifies exclusions.
    notUsers List<String>
    Negate of users. Specifies exclusions.
    properties Map<String,String>
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users List<String>
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition string
    An expression to specify custom condition.
    groups string[]
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips string[]
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces string[]
    The namespaces. Exact match, prefix match, and suffix match are supported.
    notGroups string[]
    Negate of groups. Specifies exclusions.
    notIps string[]
    Negate of IPs. Specifies exclusions.
    notNamespaces string[]
    Negate of namespaces. Specifies exclusions.
    notUsers string[]
    Negate of users. Specifies exclusions.
    properties {[key: string]: string}
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users string[]
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition str
    An expression to specify custom condition.
    groups Sequence[str]
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips Sequence[str]
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces Sequence[str]
    The namespaces. Exact match, prefix match, and suffix match are supported.
    not_groups Sequence[str]
    Negate of groups. Specifies exclusions.
    not_ips Sequence[str]
    Negate of IPs. Specifies exclusions.
    not_namespaces Sequence[str]
    Negate of namespaces. Specifies exclusions.
    not_users Sequence[str]
    Negate of users. Specifies exclusions.
    properties Mapping[str, str]
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users Sequence[str]
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition String
    An expression to specify custom condition.
    groups List<String>
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips List<String>
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces List<String>
    The namespaces. Exact match, prefix match, and suffix match are supported.
    notGroups List<String>
    Negate of groups. Specifies exclusions.
    notIps List<String>
    Negate of IPs. Specifies exclusions.
    notNamespaces List<String>
    Negate of namespaces. Specifies exclusions.
    notUsers List<String>
    Negate of users. Specifies exclusions.
    properties Map<String>
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users List<String>
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.

    PrincipalResponse, PrincipalResponseArgs

    Condition string
    An expression to specify custom condition.
    Groups List<string>
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    Ips List<string>
    IPv4 or IPv6 address or range (In CIDR format)
    Namespaces List<string>
    The namespaces. Exact match, prefix match, and suffix match are supported.
    NotGroups List<string>
    Negate of groups. Specifies exclusions.
    NotIps List<string>
    Negate of IPs. Specifies exclusions.
    NotNamespaces List<string>
    Negate of namespaces. Specifies exclusions.
    NotUsers List<string>
    Negate of users. Specifies exclusions.
    Properties Dictionary<string, string>
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    Users List<string>
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    Condition string
    An expression to specify custom condition.
    Groups []string
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    Ips []string
    IPv4 or IPv6 address or range (In CIDR format)
    Namespaces []string
    The namespaces. Exact match, prefix match, and suffix match are supported.
    NotGroups []string
    Negate of groups. Specifies exclusions.
    NotIps []string
    Negate of IPs. Specifies exclusions.
    NotNamespaces []string
    Negate of namespaces. Specifies exclusions.
    NotUsers []string
    Negate of users. Specifies exclusions.
    Properties map[string]string
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    Users []string
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition String
    An expression to specify custom condition.
    groups List<String>
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips List<String>
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces List<String>
    The namespaces. Exact match, prefix match, and suffix match are supported.
    notGroups List<String>
    Negate of groups. Specifies exclusions.
    notIps List<String>
    Negate of IPs. Specifies exclusions.
    notNamespaces List<String>
    Negate of namespaces. Specifies exclusions.
    notUsers List<String>
    Negate of users. Specifies exclusions.
    properties Map<String,String>
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users List<String>
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition string
    An expression to specify custom condition.
    groups string[]
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips string[]
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces string[]
    The namespaces. Exact match, prefix match, and suffix match are supported.
    notGroups string[]
    Negate of groups. Specifies exclusions.
    notIps string[]
    Negate of IPs. Specifies exclusions.
    notNamespaces string[]
    Negate of namespaces. Specifies exclusions.
    notUsers string[]
    Negate of users. Specifies exclusions.
    properties {[key: string]: string}
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users string[]
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition str
    An expression to specify custom condition.
    groups Sequence[str]
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips Sequence[str]
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces Sequence[str]
    The namespaces. Exact match, prefix match, and suffix match are supported.
    not_groups Sequence[str]
    Negate of groups. Specifies exclusions.
    not_ips Sequence[str]
    Negate of IPs. Specifies exclusions.
    not_namespaces Sequence[str]
    Negate of namespaces. Specifies exclusions.
    not_users Sequence[str]
    Negate of users. Specifies exclusions.
    properties Mapping[str, str]
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users Sequence[str]
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.
    condition String
    An expression to specify custom condition.
    groups List<String>
    The groups the principal belongs to. Exact match, prefix match, and suffix match are supported.
    ips List<String>
    IPv4 or IPv6 address or range (In CIDR format)
    namespaces List<String>
    The namespaces. Exact match, prefix match, and suffix match are supported.
    notGroups List<String>
    Negate of groups. Specifies exclusions.
    notIps List<String>
    Negate of IPs. Specifies exclusions.
    notNamespaces List<String>
    Negate of namespaces. Specifies exclusions.
    notUsers List<String>
    Negate of users. Specifies exclusions.
    properties Map<String>
    A map of Istio attribute to expected values. Exact match, prefix match, and suffix match are supported for values. For example, request.headers[version]: "v1". The properties are ANDed together.
    users List<String>
    The user names/IDs or service accounts. Exact match, prefix match, and suffix match are supported.

    RbacPolicy, RbacPolicyArgs

    Name string
    Name of the RbacPolicy.
    Permissions []Permission
    The list of permissions.
    Principals []Principal
    The list of principals.
    name String
    Name of the RbacPolicy.
    permissions List<Permission>
    The list of permissions.
    principals List<Principal>
    The list of principals.
    name string
    Name of the RbacPolicy.
    permissions Permission[]
    The list of permissions.
    principals Principal[]
    The list of principals.
    name str
    Name of the RbacPolicy.
    permissions Sequence[Permission]
    The list of permissions.
    principals Sequence[Principal]
    The list of principals.
    name String
    Name of the RbacPolicy.
    permissions List<Property Map>
    The list of permissions.
    principals List<Property Map>
    The list of principals.

    RbacPolicyResponse, RbacPolicyResponseArgs

    Name string
    Name of the RbacPolicy.
    Permissions []PermissionResponse
    The list of permissions.
    Principals []PrincipalResponse
    The list of principals.
    name String
    Name of the RbacPolicy.
    permissions List<PermissionResponse>
    The list of permissions.
    principals List<PrincipalResponse>
    The list of principals.
    name string
    Name of the RbacPolicy.
    permissions PermissionResponse[]
    The list of permissions.
    principals PrincipalResponse[]
    The list of principals.
    name str
    Name of the RbacPolicy.
    permissions Sequence[PermissionResponse]
    The list of permissions.
    principals Sequence[PrincipalResponse]
    The list of principals.
    name String
    Name of the RbacPolicy.
    permissions List<Property Map>
    The list of permissions.
    principals List<Property Map>
    The list of principals.

    RegionBackendServiceCompressionMode, RegionBackendServiceCompressionModeArgs

    Automatic
    AUTOMATICAutomatically uses the best compression based on the Accept-Encoding header sent by the client.
    Disabled
    DISABLEDDisables compression. Existing compressed responses cached by Cloud CDN will not be served to clients.
    RegionBackendServiceCompressionModeAutomatic
    AUTOMATICAutomatically uses the best compression based on the Accept-Encoding header sent by the client.
    RegionBackendServiceCompressionModeDisabled
    DISABLEDDisables compression. Existing compressed responses cached by Cloud CDN will not be served to clients.
    Automatic
    AUTOMATICAutomatically uses the best compression based on the Accept-Encoding header sent by the client.
    Disabled
    DISABLEDDisables compression. Existing compressed responses cached by Cloud CDN will not be served to clients.
    Automatic
    AUTOMATICAutomatically uses the best compression based on the Accept-Encoding header sent by the client.
    Disabled
    DISABLEDDisables compression. Existing compressed responses cached by Cloud CDN will not be served to clients.
    AUTOMATIC
    AUTOMATICAutomatically uses the best compression based on the Accept-Encoding header sent by the client.
    DISABLED
    DISABLEDDisables compression. Existing compressed responses cached by Cloud CDN will not be served to clients.
    "AUTOMATIC"
    AUTOMATICAutomatically uses the best compression based on the Accept-Encoding header sent by the client.
    "DISABLED"
    DISABLEDDisables compression. Existing compressed responses cached by Cloud CDN will not be served to clients.

    RegionBackendServiceIpAddressSelectionPolicy, RegionBackendServiceIpAddressSelectionPolicyArgs

    Ipv4Only
    IPV4_ONLYOnly send IPv4 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv4 health-checks are used to check the health of the backends. This is the default setting.
    Ipv6Only
    IPV6_ONLYOnly send IPv6 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv6 health-checks are used to check the health of the backends.
    IpAddressSelectionPolicyUnspecified
    IP_ADDRESS_SELECTION_POLICY_UNSPECIFIEDUnspecified IP address selection policy.
    PreferIpv6
    PREFER_IPV6Prioritize the connection to the endpoints IPv6 address over its IPv4 address (provided there is a healthy IPv6 address).
    RegionBackendServiceIpAddressSelectionPolicyIpv4Only
    IPV4_ONLYOnly send IPv4 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv4 health-checks are used to check the health of the backends. This is the default setting.
    RegionBackendServiceIpAddressSelectionPolicyIpv6Only
    IPV6_ONLYOnly send IPv6 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv6 health-checks are used to check the health of the backends.
    RegionBackendServiceIpAddressSelectionPolicyIpAddressSelectionPolicyUnspecified
    IP_ADDRESS_SELECTION_POLICY_UNSPECIFIEDUnspecified IP address selection policy.
    RegionBackendServiceIpAddressSelectionPolicyPreferIpv6
    PREFER_IPV6Prioritize the connection to the endpoints IPv6 address over its IPv4 address (provided there is a healthy IPv6 address).
    Ipv4Only
    IPV4_ONLYOnly send IPv4 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv4 health-checks are used to check the health of the backends. This is the default setting.
    Ipv6Only
    IPV6_ONLYOnly send IPv6 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv6 health-checks are used to check the health of the backends.
    IpAddressSelectionPolicyUnspecified
    IP_ADDRESS_SELECTION_POLICY_UNSPECIFIEDUnspecified IP address selection policy.
    PreferIpv6
    PREFER_IPV6Prioritize the connection to the endpoints IPv6 address over its IPv4 address (provided there is a healthy IPv6 address).
    Ipv4Only
    IPV4_ONLYOnly send IPv4 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv4 health-checks are used to check the health of the backends. This is the default setting.
    Ipv6Only
    IPV6_ONLYOnly send IPv6 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv6 health-checks are used to check the health of the backends.
    IpAddressSelectionPolicyUnspecified
    IP_ADDRESS_SELECTION_POLICY_UNSPECIFIEDUnspecified IP address selection policy.
    PreferIpv6
    PREFER_IPV6Prioritize the connection to the endpoints IPv6 address over its IPv4 address (provided there is a healthy IPv6 address).
    IPV4_ONLY
    IPV4_ONLYOnly send IPv4 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv4 health-checks are used to check the health of the backends. This is the default setting.
    IPV6_ONLY
    IPV6_ONLYOnly send IPv6 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv6 health-checks are used to check the health of the backends.
    IP_ADDRESS_SELECTION_POLICY_UNSPECIFIED
    IP_ADDRESS_SELECTION_POLICY_UNSPECIFIEDUnspecified IP address selection policy.
    PREFER_IPV6
    PREFER_IPV6Prioritize the connection to the endpoints IPv6 address over its IPv4 address (provided there is a healthy IPv6 address).
    "IPV4_ONLY"
    IPV4_ONLYOnly send IPv4 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv4 health-checks are used to check the health of the backends. This is the default setting.
    "IPV6_ONLY"
    IPV6_ONLYOnly send IPv6 traffic to the backends of the Backend Service (Instance Group, Managed Instance Group, Network Endpoint Group) regardless of traffic from the client to the proxy. Only IPv6 health-checks are used to check the health of the backends.
    "IP_ADDRESS_SELECTION_POLICY_UNSPECIFIED"
    IP_ADDRESS_SELECTION_POLICY_UNSPECIFIEDUnspecified IP address selection policy.
    "PREFER_IPV6"
    PREFER_IPV6Prioritize the connection to the endpoints IPv6 address over its IPv4 address (provided there is a healthy IPv6 address).

    RegionBackendServiceLoadBalancingScheme, RegionBackendServiceLoadBalancingSchemeArgs

    External
    EXTERNALSignifies that this will be used for external HTTP(S), SSL Proxy, TCP Proxy, or Network Load Balancing
    ExternalManaged
    EXTERNAL_MANAGEDSignifies that this will be used for External Managed HTTP(S) Load Balancing.
    Internal
    INTERNALSignifies that this will be used for Internal TCP/UDP Load Balancing.
    InternalManaged
    INTERNAL_MANAGEDSignifies that this will be used for Internal HTTP(S) Load Balancing.
    InternalSelfManaged
    INTERNAL_SELF_MANAGEDSignifies that this will be used by Traffic Director.
    InvalidLoadBalancingScheme
    INVALID_LOAD_BALANCING_SCHEME
    RegionBackendServiceLoadBalancingSchemeExternal
    EXTERNALSignifies that this will be used for external HTTP(S), SSL Proxy, TCP Proxy, or Network Load Balancing
    RegionBackendServiceLoadBalancingSchemeExternalManaged
    EXTERNAL_MANAGEDSignifies that this will be used for External Managed HTTP(S) Load Balancing.
    RegionBackendServiceLoadBalancingSchemeInternal
    INTERNALSignifies that this will be used for Internal TCP/UDP Load Balancing.
    RegionBackendServiceLoadBalancingSchemeInternalManaged
    INTERNAL_MANAGEDSignifies that this will be used for Internal HTTP(S) Load Balancing.
    RegionBackendServiceLoadBalancingSchemeInternalSelfManaged
    INTERNAL_SELF_MANAGEDSignifies that this will be used by Traffic Director.
    RegionBackendServiceLoadBalancingSchemeInvalidLoadBalancingScheme
    INVALID_LOAD_BALANCING_SCHEME
    External
    EXTERNALSignifies that this will be used for external HTTP(S), SSL Proxy, TCP Proxy, or Network Load Balancing
    ExternalManaged
    EXTERNAL_MANAGEDSignifies that this will be used for External Managed HTTP(S) Load Balancing.
    Internal
    INTERNALSignifies that this will be used for Internal TCP/UDP Load Balancing.
    InternalManaged
    INTERNAL_MANAGEDSignifies that this will be used for Internal HTTP(S) Load Balancing.
    InternalSelfManaged
    INTERNAL_SELF_MANAGEDSignifies that this will be used by Traffic Director.
    InvalidLoadBalancingScheme
    INVALID_LOAD_BALANCING_SCHEME
    External
    EXTERNALSignifies that this will be used for external HTTP(S), SSL Proxy, TCP Proxy, or Network Load Balancing
    ExternalManaged
    EXTERNAL_MANAGEDSignifies that this will be used for External Managed HTTP(S) Load Balancing.
    Internal
    INTERNALSignifies that this will be used for Internal TCP/UDP Load Balancing.
    InternalManaged
    INTERNAL_MANAGEDSignifies that this will be used for Internal HTTP(S) Load Balancing.
    InternalSelfManaged
    INTERNAL_SELF_MANAGEDSignifies that this will be used by Traffic Director.
    InvalidLoadBalancingScheme
    INVALID_LOAD_BALANCING_SCHEME
    EXTERNAL
    EXTERNALSignifies that this will be used for external HTTP(S), SSL Proxy, TCP Proxy, or Network Load Balancing
    EXTERNAL_MANAGED
    EXTERNAL_MANAGEDSignifies that this will be used for External Managed HTTP(S) Load Balancing.
    INTERNAL
    INTERNALSignifies that this will be used for Internal TCP/UDP Load Balancing.
    INTERNAL_MANAGED
    INTERNAL_MANAGEDSignifies that this will be used for Internal HTTP(S) Load Balancing.
    INTERNAL_SELF_MANAGED
    INTERNAL_SELF_MANAGEDSignifies that this will be used by Traffic Director.
    INVALID_LOAD_BALANCING_SCHEME
    INVALID_LOAD_BALANCING_SCHEME
    "EXTERNAL"
    EXTERNALSignifies that this will be used for external HTTP(S), SSL Proxy, TCP Proxy, or Network Load Balancing
    "EXTERNAL_MANAGED"
    EXTERNAL_MANAGEDSignifies that this will be used for External Managed HTTP(S) Load Balancing.
    "INTERNAL"
    INTERNALSignifies that this will be used for Internal TCP/UDP Load Balancing.
    "INTERNAL_MANAGED"
    INTERNAL_MANAGEDSignifies that this will be used for Internal HTTP(S) Load Balancing.
    "INTERNAL_SELF_MANAGED"
    INTERNAL_SELF_MANAGEDSignifies that this will be used by Traffic Director.
    "INVALID_LOAD_BALANCING_SCHEME"
    INVALID_LOAD_BALANCING_SCHEME

    RegionBackendServiceLocalityLbPolicy, RegionBackendServiceLocalityLbPolicyArgs

    InvalidLbPolicy
    INVALID_LB_POLICY
    LeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    Maglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    OriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    Random
    RANDOMThe load balancer selects a random healthy host.
    RingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    RoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    RegionBackendServiceLocalityLbPolicyInvalidLbPolicy
    INVALID_LB_POLICY
    RegionBackendServiceLocalityLbPolicyLeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    RegionBackendServiceLocalityLbPolicyMaglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    RegionBackendServiceLocalityLbPolicyOriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    RegionBackendServiceLocalityLbPolicyRandom
    RANDOMThe load balancer selects a random healthy host.
    RegionBackendServiceLocalityLbPolicyRingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    RegionBackendServiceLocalityLbPolicyRoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    RegionBackendServiceLocalityLbPolicyWeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    InvalidLbPolicy
    INVALID_LB_POLICY
    LeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    Maglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    OriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    Random
    RANDOMThe load balancer selects a random healthy host.
    RingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    RoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    InvalidLbPolicy
    INVALID_LB_POLICY
    LeastRequest
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    Maglev
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    OriginalDestination
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    Random
    RANDOMThe load balancer selects a random healthy host.
    RingHash
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    RoundRobin
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WeightedMaglev
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    INVALID_LB_POLICY
    INVALID_LB_POLICY
    LEAST_REQUEST
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    MAGLEV
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    ORIGINAL_DESTINATION
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    RANDOM
    RANDOMThe load balancer selects a random healthy host.
    RING_HASH
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    ROUND_ROBIN
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    WEIGHTED_MAGLEV
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.
    "INVALID_LB_POLICY"
    INVALID_LB_POLICY
    "LEAST_REQUEST"
    LEAST_REQUESTAn O(1) algorithm which selects two random healthy hosts and picks the host which has fewer active requests.
    "MAGLEV"
    MAGLEVThis algorithm implements consistent hashing to backends. Maglev can be used as a drop in replacement for the ring hash load balancer. Maglev is not as stable as ring hash but has faster table lookup build times and host selection times. For more information about Maglev, see https://ai.google/research/pubs/pub44824
    "ORIGINAL_DESTINATION"
    ORIGINAL_DESTINATIONBackend host is selected based on the client connection metadata, i.e., connections are opened to the same address as the destination address of the incoming connection before the connection was redirected to the load balancer.
    "RANDOM"
    RANDOMThe load balancer selects a random healthy host.
    "RING_HASH"
    RING_HASHThe ring/modulo hash load balancer implements consistent hashing to backends. The algorithm has the property that the addition/removal of a host from a set of N hosts only affects 1/N of the requests.
    "ROUND_ROBIN"
    ROUND_ROBINThis is a simple policy in which each healthy backend is selected in round robin order. This is the default.
    "WEIGHTED_MAGLEV"
    WEIGHTED_MAGLEVPer-instance weighted Load Balancing via health check reported weights. If set, the Backend Service must configure a non legacy HTTP-based Health Check, and health check replies are expected to contain non-standard HTTP response header field X-Load-Balancing-Endpoint-Weight to specify the per-instance weights. If set, Load Balancing is weighted based on the per-instance weights reported in the last processed health check replies, as long as every instance either reported a valid weight or had UNAVAILABLE_WEIGHT. Otherwise, Load Balancing remains equal-weight. This option is only supported in Network Load Balancing.

    RegionBackendServiceProtocol, RegionBackendServiceProtocolArgs

    All
    ALLALL includes TCP, UDP, ICMP, ESP, AH and SCTP. Note that this should never be used together with target_xx_proxies.
    Grpc
    GRPCgRPC (available for Traffic Director).
    Http
    HTTP
    Http2
    HTTP2HTTP/2 with SSL.
    Https
    HTTPS
    Ssl
    SSLTCP proxying with SSL.
    Tcp
    TCPTCP proxying or TCP pass-through.
    Udp
    UDPUDP.
    Unspecified
    UNSPECIFIEDIf a Backend Service has UNSPECIFIED as its protocol, it can be used with any L3/L4 Forwarding Rules.
    RegionBackendServiceProtocolAll
    ALLALL includes TCP, UDP, ICMP, ESP, AH and SCTP. Note that this should never be used together with target_xx_proxies.
    RegionBackendServiceProtocolGrpc
    GRPCgRPC (available for Traffic Director).
    RegionBackendServiceProtocolHttp
    HTTP
    RegionBackendServiceProtocolHttp2
    HTTP2HTTP/2 with SSL.
    RegionBackendServiceProtocolHttps
    HTTPS
    RegionBackendServiceProtocolSsl
    SSLTCP proxying with SSL.
    RegionBackendServiceProtocolTcp
    TCPTCP proxying or TCP pass-through.
    RegionBackendServiceProtocolUdp
    UDPUDP.
    RegionBackendServiceProtocolUnspecified
    UNSPECIFIEDIf a Backend Service has UNSPECIFIED as its protocol, it can be used with any L3/L4 Forwarding Rules.
    All
    ALLALL includes TCP, UDP, ICMP, ESP, AH and SCTP. Note that this should never be used together with target_xx_proxies.
    Grpc
    GRPCgRPC (available for Traffic Director).
    Http
    HTTP
    Http2
    HTTP2HTTP/2 with SSL.
    Https
    HTTPS
    Ssl
    SSLTCP proxying with SSL.
    Tcp
    TCPTCP proxying or TCP pass-through.
    Udp
    UDPUDP.
    Unspecified
    UNSPECIFIEDIf a Backend Service has UNSPECIFIED as its protocol, it can be used with any L3/L4 Forwarding Rules.
    All
    ALLALL includes TCP, UDP, ICMP, ESP, AH and SCTP. Note that this should never be used together with target_xx_proxies.
    Grpc
    GRPCgRPC (available for Traffic Director).
    Http
    HTTP
    Http2
    HTTP2HTTP/2 with SSL.
    Https
    HTTPS
    Ssl
    SSLTCP proxying with SSL.
    Tcp
    TCPTCP proxying or TCP pass-through.
    Udp
    UDPUDP.
    Unspecified
    UNSPECIFIEDIf a Backend Service has UNSPECIFIED as its protocol, it can be used with any L3/L4 Forwarding Rules.
    ALL
    ALLALL includes TCP, UDP, ICMP, ESP, AH and SCTP. Note that this should never be used together with target_xx_proxies.
    GRPC
    GRPCgRPC (available for Traffic Director).
    HTTP
    HTTP
    HTTP2
    HTTP2HTTP/2 with SSL.
    HTTPS
    HTTPS
    SSL
    SSLTCP proxying with SSL.
    TCP
    TCPTCP proxying or TCP pass-through.
    UDP
    UDPUDP.
    UNSPECIFIED
    UNSPECIFIEDIf a Backend Service has UNSPECIFIED as its protocol, it can be used with any L3/L4 Forwarding Rules.
    "ALL"
    ALLALL includes TCP, UDP, ICMP, ESP, AH and SCTP. Note that this should never be used together with target_xx_proxies.
    "GRPC"
    GRPCgRPC (available for Traffic Director).
    "HTTP"
    HTTP
    "HTTP2"
    HTTP2HTTP/2 with SSL.
    "HTTPS"
    HTTPS
    "SSL"
    SSLTCP proxying with SSL.
    "TCP"
    TCPTCP proxying or TCP pass-through.
    "UDP"
    UDPUDP.
    "UNSPECIFIED"
    UNSPECIFIEDIf a Backend Service has UNSPECIFIED as its protocol, it can be used with any L3/L4 Forwarding Rules.

    RegionBackendServiceSessionAffinity, RegionBackendServiceSessionAffinityArgs

    ClientIp
    CLIENT_IP2-tuple hash on packet's source and destination IP addresses. Connections from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy.
    ClientIpNoDestination
    CLIENT_IP_NO_DESTINATION1-tuple hash only on packet's source IP address. Connections from the same source IP address will be served by the same backend VM while that VM remains healthy. This option can only be used for Internal TCP/UDP Load Balancing.
    ClientIpPortProto
    CLIENT_IP_PORT_PROTO5-tuple hash on packet's source and destination IP addresses, IP protocol, and source and destination ports. Connections for the same IP protocol from the same source IP address and port to the same destination IP address and port will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    ClientIpProto
    CLIENT_IP_PROTO3-tuple hash on packet's source and destination IP addresses, and IP protocol. Connections for the same IP protocol from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    GeneratedCookie
    GENERATED_COOKIEHash based on a cookie generated by the L7 loadbalancer. Only valid for HTTP(S) load balancing.
    HeaderField
    HEADER_FIELDThe hash is based on a user specified header field.
    HttpCookie
    HTTP_COOKIEThe hash is based on a user provided cookie.
    None
    NONENo session affinity. Connections from the same client IP may go to any instance in the pool.
    RegionBackendServiceSessionAffinityClientIp
    CLIENT_IP2-tuple hash on packet's source and destination IP addresses. Connections from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy.
    RegionBackendServiceSessionAffinityClientIpNoDestination
    CLIENT_IP_NO_DESTINATION1-tuple hash only on packet's source IP address. Connections from the same source IP address will be served by the same backend VM while that VM remains healthy. This option can only be used for Internal TCP/UDP Load Balancing.
    RegionBackendServiceSessionAffinityClientIpPortProto
    CLIENT_IP_PORT_PROTO5-tuple hash on packet's source and destination IP addresses, IP protocol, and source and destination ports. Connections for the same IP protocol from the same source IP address and port to the same destination IP address and port will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    RegionBackendServiceSessionAffinityClientIpProto
    CLIENT_IP_PROTO3-tuple hash on packet's source and destination IP addresses, and IP protocol. Connections for the same IP protocol from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    RegionBackendServiceSessionAffinityGeneratedCookie
    GENERATED_COOKIEHash based on a cookie generated by the L7 loadbalancer. Only valid for HTTP(S) load balancing.
    RegionBackendServiceSessionAffinityHeaderField
    HEADER_FIELDThe hash is based on a user specified header field.
    RegionBackendServiceSessionAffinityHttpCookie
    HTTP_COOKIEThe hash is based on a user provided cookie.
    RegionBackendServiceSessionAffinityNone
    NONENo session affinity. Connections from the same client IP may go to any instance in the pool.
    ClientIp
    CLIENT_IP2-tuple hash on packet's source and destination IP addresses. Connections from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy.
    ClientIpNoDestination
    CLIENT_IP_NO_DESTINATION1-tuple hash only on packet's source IP address. Connections from the same source IP address will be served by the same backend VM while that VM remains healthy. This option can only be used for Internal TCP/UDP Load Balancing.
    ClientIpPortProto
    CLIENT_IP_PORT_PROTO5-tuple hash on packet's source and destination IP addresses, IP protocol, and source and destination ports. Connections for the same IP protocol from the same source IP address and port to the same destination IP address and port will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    ClientIpProto
    CLIENT_IP_PROTO3-tuple hash on packet's source and destination IP addresses, and IP protocol. Connections for the same IP protocol from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    GeneratedCookie
    GENERATED_COOKIEHash based on a cookie generated by the L7 loadbalancer. Only valid for HTTP(S) load balancing.
    HeaderField
    HEADER_FIELDThe hash is based on a user specified header field.
    HttpCookie
    HTTP_COOKIEThe hash is based on a user provided cookie.
    None
    NONENo session affinity. Connections from the same client IP may go to any instance in the pool.
    ClientIp
    CLIENT_IP2-tuple hash on packet's source and destination IP addresses. Connections from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy.
    ClientIpNoDestination
    CLIENT_IP_NO_DESTINATION1-tuple hash only on packet's source IP address. Connections from the same source IP address will be served by the same backend VM while that VM remains healthy. This option can only be used for Internal TCP/UDP Load Balancing.
    ClientIpPortProto
    CLIENT_IP_PORT_PROTO5-tuple hash on packet's source and destination IP addresses, IP protocol, and source and destination ports. Connections for the same IP protocol from the same source IP address and port to the same destination IP address and port will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    ClientIpProto
    CLIENT_IP_PROTO3-tuple hash on packet's source and destination IP addresses, and IP protocol. Connections for the same IP protocol from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    GeneratedCookie
    GENERATED_COOKIEHash based on a cookie generated by the L7 loadbalancer. Only valid for HTTP(S) load balancing.
    HeaderField
    HEADER_FIELDThe hash is based on a user specified header field.
    HttpCookie
    HTTP_COOKIEThe hash is based on a user provided cookie.
    None
    NONENo session affinity. Connections from the same client IP may go to any instance in the pool.
    CLIENT_IP
    CLIENT_IP2-tuple hash on packet's source and destination IP addresses. Connections from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy.
    CLIENT_IP_NO_DESTINATION
    CLIENT_IP_NO_DESTINATION1-tuple hash only on packet's source IP address. Connections from the same source IP address will be served by the same backend VM while that VM remains healthy. This option can only be used for Internal TCP/UDP Load Balancing.
    CLIENT_IP_PORT_PROTO
    CLIENT_IP_PORT_PROTO5-tuple hash on packet's source and destination IP addresses, IP protocol, and source and destination ports. Connections for the same IP protocol from the same source IP address and port to the same destination IP address and port will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    CLIENT_IP_PROTO
    CLIENT_IP_PROTO3-tuple hash on packet's source and destination IP addresses, and IP protocol. Connections for the same IP protocol from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    GENERATED_COOKIE
    GENERATED_COOKIEHash based on a cookie generated by the L7 loadbalancer. Only valid for HTTP(S) load balancing.
    HEADER_FIELD
    HEADER_FIELDThe hash is based on a user specified header field.
    HTTP_COOKIE
    HTTP_COOKIEThe hash is based on a user provided cookie.
    NONE
    NONENo session affinity. Connections from the same client IP may go to any instance in the pool.
    "CLIENT_IP"
    CLIENT_IP2-tuple hash on packet's source and destination IP addresses. Connections from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy.
    "CLIENT_IP_NO_DESTINATION"
    CLIENT_IP_NO_DESTINATION1-tuple hash only on packet's source IP address. Connections from the same source IP address will be served by the same backend VM while that VM remains healthy. This option can only be used for Internal TCP/UDP Load Balancing.
    "CLIENT_IP_PORT_PROTO"
    CLIENT_IP_PORT_PROTO5-tuple hash on packet's source and destination IP addresses, IP protocol, and source and destination ports. Connections for the same IP protocol from the same source IP address and port to the same destination IP address and port will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    "CLIENT_IP_PROTO"
    CLIENT_IP_PROTO3-tuple hash on packet's source and destination IP addresses, and IP protocol. Connections for the same IP protocol from the same source IP address to the same destination IP address will be served by the same backend VM while that VM remains healthy. This option cannot be used for HTTP(S) load balancing.
    "GENERATED_COOKIE"
    GENERATED_COOKIEHash based on a cookie generated by the L7 loadbalancer. Only valid for HTTP(S) load balancing.
    "HEADER_FIELD"
    HEADER_FIELDThe hash is based on a user specified header field.
    "HTTP_COOKIE"
    HTTP_COOKIEThe hash is based on a user provided cookie.
    "NONE"
    NONENo session affinity. Connections from the same client IP may go to any instance in the pool.

    RegionBackendServiceVpcNetworkScope, RegionBackendServiceVpcNetworkScopeArgs

    GlobalVpcNetwork
    GLOBAL_VPC_NETWORKThe backend service can only have backends in global VPCs
    RegionalVpcNetwork
    REGIONAL_VPC_NETWORKThe backend service can only have backends in regional VPCs
    RegionBackendServiceVpcNetworkScopeGlobalVpcNetwork
    GLOBAL_VPC_NETWORKThe backend service can only have backends in global VPCs
    RegionBackendServiceVpcNetworkScopeRegionalVpcNetwork
    REGIONAL_VPC_NETWORKThe backend service can only have backends in regional VPCs
    GlobalVpcNetwork
    GLOBAL_VPC_NETWORKThe backend service can only have backends in global VPCs
    RegionalVpcNetwork
    REGIONAL_VPC_NETWORKThe backend service can only have backends in regional VPCs
    GlobalVpcNetwork
    GLOBAL_VPC_NETWORKThe backend service can only have backends in global VPCs
    RegionalVpcNetwork
    REGIONAL_VPC_NETWORKThe backend service can only have backends in regional VPCs
    GLOBAL_VPC_NETWORK
    GLOBAL_VPC_NETWORKThe backend service can only have backends in global VPCs
    REGIONAL_VPC_NETWORK
    REGIONAL_VPC_NETWORKThe backend service can only have backends in regional VPCs
    "GLOBAL_VPC_NETWORK"
    GLOBAL_VPC_NETWORKThe backend service can only have backends in global VPCs
    "REGIONAL_VPC_NETWORK"
    REGIONAL_VPC_NETWORKThe backend service can only have backends in regional VPCs

    SdsConfig, SdsConfigArgs

    GrpcServiceConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.GrpcServiceConfig
    The configuration to access the SDS server over GRPC.
    GrpcServiceConfig GrpcServiceConfig
    The configuration to access the SDS server over GRPC.
    grpcServiceConfig GrpcServiceConfig
    The configuration to access the SDS server over GRPC.
    grpcServiceConfig GrpcServiceConfig
    The configuration to access the SDS server over GRPC.
    grpc_service_config GrpcServiceConfig
    The configuration to access the SDS server over GRPC.
    grpcServiceConfig Property Map
    The configuration to access the SDS server over GRPC.

    SdsConfigResponse, SdsConfigResponseArgs

    GrpcServiceConfig GrpcServiceConfigResponse
    The configuration to access the SDS server over GRPC.
    grpcServiceConfig GrpcServiceConfigResponse
    The configuration to access the SDS server over GRPC.
    grpcServiceConfig GrpcServiceConfigResponse
    The configuration to access the SDS server over GRPC.
    grpc_service_config GrpcServiceConfigResponse
    The configuration to access the SDS server over GRPC.
    grpcServiceConfig Property Map
    The configuration to access the SDS server over GRPC.

    SecuritySettings, SecuritySettingsArgs

    Authentication string
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    AuthenticationPolicy Pulumi.GoogleNative.Compute.Alpha.Inputs.AuthenticationPolicy
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    AuthorizationConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.AuthorizationConfig
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    AwsV4Authentication Pulumi.GoogleNative.Compute.Alpha.Inputs.AWSV4Signature
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    ClientTlsPolicy string
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    ClientTlsSettings Pulumi.GoogleNative.Compute.Alpha.Inputs.ClientTlsSettings
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    SubjectAltNames List<string>
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    Authentication string
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    AuthenticationPolicy AuthenticationPolicy
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    AuthorizationConfig AuthorizationConfig
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    AwsV4Authentication AWSV4Signature
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    ClientTlsPolicy string
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    ClientTlsSettings ClientTlsSettings
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    SubjectAltNames []string
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication String
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authenticationPolicy AuthenticationPolicy
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorizationConfig AuthorizationConfig
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    awsV4Authentication AWSV4Signature
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    clientTlsPolicy String
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    clientTlsSettings ClientTlsSettings
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subjectAltNames List<String>
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication string
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authenticationPolicy AuthenticationPolicy
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorizationConfig AuthorizationConfig
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    awsV4Authentication AWSV4Signature
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    clientTlsPolicy string
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    clientTlsSettings ClientTlsSettings
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subjectAltNames string[]
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication str
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authentication_policy AuthenticationPolicy
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorization_config AuthorizationConfig
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    aws_v4_authentication AWSV4Signature
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    client_tls_policy str
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    client_tls_settings ClientTlsSettings
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subject_alt_names Sequence[str]
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication String
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authenticationPolicy Property Map
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorizationConfig Property Map
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    awsV4Authentication Property Map
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    clientTlsPolicy String
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    clientTlsSettings Property Map
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subjectAltNames List<String>
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).

    SecuritySettingsResponse, SecuritySettingsResponseArgs

    Authentication string
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    AuthenticationPolicy Pulumi.GoogleNative.Compute.Alpha.Inputs.AuthenticationPolicyResponse
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    AuthorizationConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.AuthorizationConfigResponse
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    AwsV4Authentication Pulumi.GoogleNative.Compute.Alpha.Inputs.AWSV4SignatureResponse
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    ClientTlsPolicy string
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    ClientTlsSettings Pulumi.GoogleNative.Compute.Alpha.Inputs.ClientTlsSettingsResponse
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    SubjectAltNames List<string>
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    Authentication string
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    AuthenticationPolicy AuthenticationPolicyResponse
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    AuthorizationConfig AuthorizationConfigResponse
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    AwsV4Authentication AWSV4SignatureResponse
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    ClientTlsPolicy string
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    ClientTlsSettings ClientTlsSettingsResponse
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    SubjectAltNames []string
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication String
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authenticationPolicy AuthenticationPolicyResponse
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorizationConfig AuthorizationConfigResponse
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    awsV4Authentication AWSV4SignatureResponse
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    clientTlsPolicy String
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    clientTlsSettings ClientTlsSettingsResponse
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subjectAltNames List<String>
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication string
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authenticationPolicy AuthenticationPolicyResponse
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorizationConfig AuthorizationConfigResponse
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    awsV4Authentication AWSV4SignatureResponse
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    clientTlsPolicy string
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    clientTlsSettings ClientTlsSettingsResponse
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subjectAltNames string[]
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication str
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authentication_policy AuthenticationPolicyResponse
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorization_config AuthorizationConfigResponse
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    aws_v4_authentication AWSV4SignatureResponse
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    client_tls_policy str
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    client_tls_settings ClientTlsSettingsResponse
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subject_alt_names Sequence[str]
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).
    authentication String
    [Deprecated] Use clientTlsPolicy instead.

    Deprecated:[Deprecated] Use clientTlsPolicy instead.

    authenticationPolicy Property Map
    [Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    Deprecated:[Deprecated] Authentication policy defines what authentication methods can be accepted on backends, and if authenticated, which method/certificate will set the request principal. request principal.

    authorizationConfig Property Map
    [Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    Deprecated:[Deprecated] Authorization config defines the Role Based Access Control (RBAC) config. Authorization config defines the Role Based Access Control (RBAC) config.

    awsV4Authentication Property Map
    The configuration needed to generate a signature for access to private storage buckets that support AWS's Signature Version 4 for authentication. Allowed only for INTERNET_IP_PORT and INTERNET_FQDN_PORT NEG backends.
    clientTlsPolicy String
    Optional. A URL referring to a networksecurity.ClientTlsPolicy resource that describes how clients should authenticate with this service's backends. clientTlsPolicy only applies to a global BackendService with the loadBalancingScheme set to INTERNAL_SELF_MANAGED. If left blank, communications are not encrypted.
    clientTlsSettings Property Map
    [Deprecated] TLS Settings for the backend service.

    Deprecated:[Deprecated] TLS Settings for the backend service.

    subjectAltNames List<String>
    Optional. A list of Subject Alternative Names (SANs) that the client verifies during a mutual TLS handshake with an server/endpoint for this BackendService. When the server presents its X.509 certificate to the client, the client inspects the certificate's subjectAltName field. If the field contains one of the specified values, the communication continues. Otherwise, it fails. This additional check enables the client to verify that the server is authorized to run the requested service. Note that the contents of the server certificate's subjectAltName field are configured by the Public Key Infrastructure which provisions server identities. Only applies to a global BackendService with loadBalancingScheme set to INTERNAL_SELF_MANAGED. Only applies when BackendService has an attached clientTlsPolicy with clientCertificate (mTLS mode).

    Subsetting, SubsettingArgs

    Policy Pulumi.GoogleNative.Compute.Alpha.SubsettingPolicy
    SubsetSize int
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    Policy SubsettingPolicy
    SubsetSize int
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy SubsettingPolicy
    subsetSize Integer
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy SubsettingPolicy
    subsetSize number
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy SubsettingPolicy
    subset_size int
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy "CONSISTENT_HASH_SUBSETTING" | "NONE"
    subsetSize Number
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.

    SubsettingPolicy, SubsettingPolicyArgs

    ConsistentHashSubsetting
    CONSISTENT_HASH_SUBSETTINGSubsetting based on consistent hashing. For Traffic Director, the number of backends per backend group (the subset size) is based on the subset_size parameter. For Internal HTTP(S) load balancing, the number of backends per backend group (the subset size) is dynamically adjusted in two cases: - As the number of proxy instances participating in Internal HTTP(S) load balancing increases, the subset size decreases. - When the total number of backends in a network exceeds the capacity of a single proxy instance, subset sizes are reduced automatically for each service that has backend subsetting enabled.
    None
    NONENo Subsetting. Clients may open connections and send traffic to all backends of this backend service. This can lead to performance issues if there is substantial imbalance in the count of clients and backends.
    SubsettingPolicyConsistentHashSubsetting
    CONSISTENT_HASH_SUBSETTINGSubsetting based on consistent hashing. For Traffic Director, the number of backends per backend group (the subset size) is based on the subset_size parameter. For Internal HTTP(S) load balancing, the number of backends per backend group (the subset size) is dynamically adjusted in two cases: - As the number of proxy instances participating in Internal HTTP(S) load balancing increases, the subset size decreases. - When the total number of backends in a network exceeds the capacity of a single proxy instance, subset sizes are reduced automatically for each service that has backend subsetting enabled.
    SubsettingPolicyNone
    NONENo Subsetting. Clients may open connections and send traffic to all backends of this backend service. This can lead to performance issues if there is substantial imbalance in the count of clients and backends.
    ConsistentHashSubsetting
    CONSISTENT_HASH_SUBSETTINGSubsetting based on consistent hashing. For Traffic Director, the number of backends per backend group (the subset size) is based on the subset_size parameter. For Internal HTTP(S) load balancing, the number of backends per backend group (the subset size) is dynamically adjusted in two cases: - As the number of proxy instances participating in Internal HTTP(S) load balancing increases, the subset size decreases. - When the total number of backends in a network exceeds the capacity of a single proxy instance, subset sizes are reduced automatically for each service that has backend subsetting enabled.
    None
    NONENo Subsetting. Clients may open connections and send traffic to all backends of this backend service. This can lead to performance issues if there is substantial imbalance in the count of clients and backends.
    ConsistentHashSubsetting
    CONSISTENT_HASH_SUBSETTINGSubsetting based on consistent hashing. For Traffic Director, the number of backends per backend group (the subset size) is based on the subset_size parameter. For Internal HTTP(S) load balancing, the number of backends per backend group (the subset size) is dynamically adjusted in two cases: - As the number of proxy instances participating in Internal HTTP(S) load balancing increases, the subset size decreases. - When the total number of backends in a network exceeds the capacity of a single proxy instance, subset sizes are reduced automatically for each service that has backend subsetting enabled.
    None
    NONENo Subsetting. Clients may open connections and send traffic to all backends of this backend service. This can lead to performance issues if there is substantial imbalance in the count of clients and backends.
    CONSISTENT_HASH_SUBSETTING
    CONSISTENT_HASH_SUBSETTINGSubsetting based on consistent hashing. For Traffic Director, the number of backends per backend group (the subset size) is based on the subset_size parameter. For Internal HTTP(S) load balancing, the number of backends per backend group (the subset size) is dynamically adjusted in two cases: - As the number of proxy instances participating in Internal HTTP(S) load balancing increases, the subset size decreases. - When the total number of backends in a network exceeds the capacity of a single proxy instance, subset sizes are reduced automatically for each service that has backend subsetting enabled.
    NONE
    NONENo Subsetting. Clients may open connections and send traffic to all backends of this backend service. This can lead to performance issues if there is substantial imbalance in the count of clients and backends.
    "CONSISTENT_HASH_SUBSETTING"
    CONSISTENT_HASH_SUBSETTINGSubsetting based on consistent hashing. For Traffic Director, the number of backends per backend group (the subset size) is based on the subset_size parameter. For Internal HTTP(S) load balancing, the number of backends per backend group (the subset size) is dynamically adjusted in two cases: - As the number of proxy instances participating in Internal HTTP(S) load balancing increases, the subset size decreases. - When the total number of backends in a network exceeds the capacity of a single proxy instance, subset sizes are reduced automatically for each service that has backend subsetting enabled.
    "NONE"
    NONENo Subsetting. Clients may open connections and send traffic to all backends of this backend service. This can lead to performance issues if there is substantial imbalance in the count of clients and backends.

    SubsettingResponse, SubsettingResponseArgs

    Policy string
    SubsetSize int
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    Policy string
    SubsetSize int
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy String
    subsetSize Integer
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy string
    subsetSize number
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy str
    subset_size int
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.
    policy String
    subsetSize Number
    The number of backends per backend group assigned to each proxy instance or each service mesh client. An input parameter to the CONSISTENT_HASH_SUBSETTING algorithm. Can only be set if policy is set to CONSISTENT_HASH_SUBSETTING. Can only be set if load balancing scheme is INTERNAL_MANAGED or INTERNAL_SELF_MANAGED. subset_size is optional for Internal HTTP(S) load balancing and required for Traffic Director. If you do not provide this value, Cloud Load Balancing will calculate it dynamically to optimize the number of proxies/clients visible to each backend and vice versa. Must be greater than 0. If subset_size is larger than the number of backends/endpoints, then subsetting is disabled.

    TlsCertificateContext, TlsCertificateContextArgs

    CertificatePaths Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsCertificatePaths
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    CertificateSource Pulumi.GoogleNative.Compute.Alpha.TlsCertificateContextCertificateSource
    Defines how TLS certificates are obtained.
    SdsConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    CertificatePaths TlsCertificatePaths
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    CertificateSource TlsCertificateContextCertificateSource
    Defines how TLS certificates are obtained.
    SdsConfig SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificatePaths TlsCertificatePaths
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificateSource TlsCertificateContextCertificateSource
    Defines how TLS certificates are obtained.
    sdsConfig SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificatePaths TlsCertificatePaths
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificateSource TlsCertificateContextCertificateSource
    Defines how TLS certificates are obtained.
    sdsConfig SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificate_paths TlsCertificatePaths
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificate_source TlsCertificateContextCertificateSource
    Defines how TLS certificates are obtained.
    sds_config SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificatePaths Property Map
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificateSource "INVALID" | "USE_PATH" | "USE_SDS"
    Defines how TLS certificates are obtained.
    sdsConfig Property Map
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.

    TlsCertificateContextCertificateSource, TlsCertificateContextCertificateSourceArgs

    Invalid
    INVALID
    UsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    UseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    TlsCertificateContextCertificateSourceInvalid
    INVALID
    TlsCertificateContextCertificateSourceUsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    TlsCertificateContextCertificateSourceUseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    Invalid
    INVALID
    UsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    UseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    Invalid
    INVALID
    UsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    UseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    INVALID
    INVALID
    USE_PATH
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    USE_SDS
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    "INVALID"
    INVALID
    "USE_PATH"
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    "USE_SDS"
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.

    TlsCertificateContextResponse, TlsCertificateContextResponseArgs

    CertificatePaths Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsCertificatePathsResponse
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    CertificateSource string
    Defines how TLS certificates are obtained.
    SdsConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    CertificatePaths TlsCertificatePathsResponse
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    CertificateSource string
    Defines how TLS certificates are obtained.
    SdsConfig SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificatePaths TlsCertificatePathsResponse
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificateSource String
    Defines how TLS certificates are obtained.
    sdsConfig SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificatePaths TlsCertificatePathsResponse
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificateSource string
    Defines how TLS certificates are obtained.
    sdsConfig SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificate_paths TlsCertificatePathsResponse
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificate_source str
    Defines how TLS certificates are obtained.
    sds_config SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    certificatePaths Property Map
    Specifies the certificate and private key paths. This field is applicable only if tlsCertificateSource is set to USE_PATH.
    certificateSource String
    Defines how TLS certificates are obtained.
    sdsConfig Property Map
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.

    TlsCertificatePaths, TlsCertificatePathsArgs

    CertificatePath string
    The path to the file holding the client or server TLS certificate to use.
    PrivateKeyPath string
    The path to the file holding the client or server private key.
    CertificatePath string
    The path to the file holding the client or server TLS certificate to use.
    PrivateKeyPath string
    The path to the file holding the client or server private key.
    certificatePath String
    The path to the file holding the client or server TLS certificate to use.
    privateKeyPath String
    The path to the file holding the client or server private key.
    certificatePath string
    The path to the file holding the client or server TLS certificate to use.
    privateKeyPath string
    The path to the file holding the client or server private key.
    certificate_path str
    The path to the file holding the client or server TLS certificate to use.
    private_key_path str
    The path to the file holding the client or server private key.
    certificatePath String
    The path to the file holding the client or server TLS certificate to use.
    privateKeyPath String
    The path to the file holding the client or server private key.

    TlsCertificatePathsResponse, TlsCertificatePathsResponseArgs

    CertificatePath string
    The path to the file holding the client or server TLS certificate to use.
    PrivateKeyPath string
    The path to the file holding the client or server private key.
    CertificatePath string
    The path to the file holding the client or server TLS certificate to use.
    PrivateKeyPath string
    The path to the file holding the client or server private key.
    certificatePath String
    The path to the file holding the client or server TLS certificate to use.
    privateKeyPath String
    The path to the file holding the client or server private key.
    certificatePath string
    The path to the file holding the client or server TLS certificate to use.
    privateKeyPath string
    The path to the file holding the client or server private key.
    certificate_path str
    The path to the file holding the client or server TLS certificate to use.
    private_key_path str
    The path to the file holding the client or server private key.
    certificatePath String
    The path to the file holding the client or server TLS certificate to use.
    privateKeyPath String
    The path to the file holding the client or server private key.

    TlsContext, TlsContextArgs

    CertificateContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsCertificateContext
    Defines the mechanism to obtain the client or server certificate.
    ValidationContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsValidationContext
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    CertificateContext TlsCertificateContext
    Defines the mechanism to obtain the client or server certificate.
    ValidationContext TlsValidationContext
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificateContext TlsCertificateContext
    Defines the mechanism to obtain the client or server certificate.
    validationContext TlsValidationContext
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificateContext TlsCertificateContext
    Defines the mechanism to obtain the client or server certificate.
    validationContext TlsValidationContext
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificate_context TlsCertificateContext
    Defines the mechanism to obtain the client or server certificate.
    validation_context TlsValidationContext
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificateContext Property Map
    Defines the mechanism to obtain the client or server certificate.
    validationContext Property Map
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.

    TlsContextResponse, TlsContextResponseArgs

    CertificateContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsCertificateContextResponse
    Defines the mechanism to obtain the client or server certificate.
    ValidationContext Pulumi.GoogleNative.Compute.Alpha.Inputs.TlsValidationContextResponse
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    CertificateContext TlsCertificateContextResponse
    Defines the mechanism to obtain the client or server certificate.
    ValidationContext TlsValidationContextResponse
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificateContext TlsCertificateContextResponse
    Defines the mechanism to obtain the client or server certificate.
    validationContext TlsValidationContextResponse
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificateContext TlsCertificateContextResponse
    Defines the mechanism to obtain the client or server certificate.
    validationContext TlsValidationContextResponse
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificate_context TlsCertificateContextResponse
    Defines the mechanism to obtain the client or server certificate.
    validation_context TlsValidationContextResponse
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.
    certificateContext Property Map
    Defines the mechanism to obtain the client or server certificate.
    validationContext Property Map
    Defines the mechanism to obtain the Certificate Authority certificate to validate the client/server certificate. If omitted, the proxy will not validate the server or client certificate.

    TlsValidationContext, TlsValidationContextArgs

    CertificatePath string
    The path to the file holding the CA certificate to validate the client or server certificate.
    SdsConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    ValidationSource Pulumi.GoogleNative.Compute.Alpha.TlsValidationContextValidationSource
    Defines how TLS certificates are obtained.
    CertificatePath string
    The path to the file holding the CA certificate to validate the client or server certificate.
    SdsConfig SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    ValidationSource TlsValidationContextValidationSource
    Defines how TLS certificates are obtained.
    certificatePath String
    The path to the file holding the CA certificate to validate the client or server certificate.
    sdsConfig SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validationSource TlsValidationContextValidationSource
    Defines how TLS certificates are obtained.
    certificatePath string
    The path to the file holding the CA certificate to validate the client or server certificate.
    sdsConfig SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validationSource TlsValidationContextValidationSource
    Defines how TLS certificates are obtained.
    certificate_path str
    The path to the file holding the CA certificate to validate the client or server certificate.
    sds_config SdsConfig
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validation_source TlsValidationContextValidationSource
    Defines how TLS certificates are obtained.
    certificatePath String
    The path to the file holding the CA certificate to validate the client or server certificate.
    sdsConfig Property Map
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validationSource "INVALID" | "USE_PATH" | "USE_SDS"
    Defines how TLS certificates are obtained.

    TlsValidationContextResponse, TlsValidationContextResponseArgs

    CertificatePath string
    The path to the file holding the CA certificate to validate the client or server certificate.
    SdsConfig Pulumi.GoogleNative.Compute.Alpha.Inputs.SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    ValidationSource string
    Defines how TLS certificates are obtained.
    CertificatePath string
    The path to the file holding the CA certificate to validate the client or server certificate.
    SdsConfig SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    ValidationSource string
    Defines how TLS certificates are obtained.
    certificatePath String
    The path to the file holding the CA certificate to validate the client or server certificate.
    sdsConfig SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validationSource String
    Defines how TLS certificates are obtained.
    certificatePath string
    The path to the file holding the CA certificate to validate the client or server certificate.
    sdsConfig SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validationSource string
    Defines how TLS certificates are obtained.
    certificate_path str
    The path to the file holding the CA certificate to validate the client or server certificate.
    sds_config SdsConfigResponse
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validation_source str
    Defines how TLS certificates are obtained.
    certificatePath String
    The path to the file holding the CA certificate to validate the client or server certificate.
    sdsConfig Property Map
    Specifies the config to retrieve certificates through SDS. This field is applicable only if tlsCertificateSource is set to USE_SDS.
    validationSource String
    Defines how TLS certificates are obtained.

    TlsValidationContextValidationSource, TlsValidationContextValidationSourceArgs

    Invalid
    INVALID
    UsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    UseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    TlsValidationContextValidationSourceInvalid
    INVALID
    TlsValidationContextValidationSourceUsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    TlsValidationContextValidationSourceUseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    Invalid
    INVALID
    UsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    UseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    Invalid
    INVALID
    UsePath
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    UseSds
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    INVALID
    INVALID
    USE_PATH
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    USE_SDS
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.
    "INVALID"
    INVALID
    "USE_PATH"
    USE_PATHUSE_PATH specifies that the certificates and private key are obtained from a locally mounted filesystem path.
    "USE_SDS"
    USE_SDSUSE_SDS specifies that the certificates and private key are obtained from a SDS server.

    Package Details

    Repository
    Google Cloud Native pulumi/pulumi-google-native
    License
    Apache-2.0
    google-native logo

    Google Cloud Native is in preview. Google Cloud Classic is fully supported.

    Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi