opentelekomcloud.WafDedicatedDomainV1
Explore with Pulumi AI
Up-to-date reference of API arguments for WAF dedicated domain you can get at documentation portal.
Manages a WAF dedicated domain resource within OpenTelekomCloud.
Note: For this resource region must be set in environment variable
OS_REGION_NAME
or inclouds.yaml
Example Usage
Basic
import * as pulumi from "@pulumi/pulumi";
import * as opentelekomcloud from "@pulumi/opentelekomcloud";
const sharedSubnet = opentelekomcloud.getVpcSubnetV1({
name: "my_subnet",
});
const domain1 = new opentelekomcloud.WafDedicatedDomainV1("domain1", {
domain: "www.mydom.com",
keepPolicy: false,
proxy: true,
servers: [{
clientProtocol: "HTTP",
serverProtocol: "HTTP",
address: "192.168.0.10",
port: 8080,
type: "ipv4",
vpcId: sharedSubnet.then(sharedSubnet => sharedSubnet.vpcId),
}],
timeoutConfig: {
connectTimeout: 150,
readTimeout: 200,
sendTimeout: 100,
},
});
import pulumi
import pulumi_opentelekomcloud as opentelekomcloud
shared_subnet = opentelekomcloud.get_vpc_subnet_v1(name="my_subnet")
domain1 = opentelekomcloud.WafDedicatedDomainV1("domain1",
domain="www.mydom.com",
keep_policy=False,
proxy=True,
servers=[{
"client_protocol": "HTTP",
"server_protocol": "HTTP",
"address": "192.168.0.10",
"port": 8080,
"type": "ipv4",
"vpc_id": shared_subnet.vpc_id,
}],
timeout_config={
"connect_timeout": 150,
"read_timeout": 200,
"send_timeout": 100,
})
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/opentelekomcloud/opentelekomcloud"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
sharedSubnet, err := opentelekomcloud.LookupVpcSubnetV1(ctx, &opentelekomcloud.LookupVpcSubnetV1Args{
Name: pulumi.StringRef("my_subnet"),
}, nil)
if err != nil {
return err
}
_, err = opentelekomcloud.NewWafDedicatedDomainV1(ctx, "domain1", &opentelekomcloud.WafDedicatedDomainV1Args{
Domain: pulumi.String("www.mydom.com"),
KeepPolicy: pulumi.Bool(false),
Proxy: pulumi.Bool(true),
Servers: opentelekomcloud.WafDedicatedDomainV1ServerArray{
&opentelekomcloud.WafDedicatedDomainV1ServerArgs{
ClientProtocol: pulumi.String("HTTP"),
ServerProtocol: pulumi.String("HTTP"),
Address: pulumi.String("192.168.0.10"),
Port: pulumi.Float64(8080),
Type: pulumi.String("ipv4"),
VpcId: pulumi.String(sharedSubnet.VpcId),
},
},
TimeoutConfig: &opentelekomcloud.WafDedicatedDomainV1TimeoutConfigArgs{
ConnectTimeout: pulumi.Float64(150),
ReadTimeout: pulumi.Float64(200),
SendTimeout: pulumi.Float64(100),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Opentelekomcloud = Pulumi.Opentelekomcloud;
return await Deployment.RunAsync(() =>
{
var sharedSubnet = Opentelekomcloud.GetVpcSubnetV1.Invoke(new()
{
Name = "my_subnet",
});
var domain1 = new Opentelekomcloud.WafDedicatedDomainV1("domain1", new()
{
Domain = "www.mydom.com",
KeepPolicy = false,
Proxy = true,
Servers = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedDomainV1ServerArgs
{
ClientProtocol = "HTTP",
ServerProtocol = "HTTP",
Address = "192.168.0.10",
Port = 8080,
Type = "ipv4",
VpcId = sharedSubnet.Apply(getVpcSubnetV1Result => getVpcSubnetV1Result.VpcId),
},
},
TimeoutConfig = new Opentelekomcloud.Inputs.WafDedicatedDomainV1TimeoutConfigArgs
{
ConnectTimeout = 150,
ReadTimeout = 200,
SendTimeout = 100,
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.opentelekomcloud.OpentelekomcloudFunctions;
import com.pulumi.opentelekomcloud.inputs.GetVpcSubnetV1Args;
import com.pulumi.opentelekomcloud.WafDedicatedDomainV1;
import com.pulumi.opentelekomcloud.WafDedicatedDomainV1Args;
import com.pulumi.opentelekomcloud.inputs.WafDedicatedDomainV1ServerArgs;
import com.pulumi.opentelekomcloud.inputs.WafDedicatedDomainV1TimeoutConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var sharedSubnet = OpentelekomcloudFunctions.getVpcSubnetV1(GetVpcSubnetV1Args.builder()
.name("my_subnet")
.build());
var domain1 = new WafDedicatedDomainV1("domain1", WafDedicatedDomainV1Args.builder()
.domain("www.mydom.com")
.keepPolicy(false)
.proxy(true)
.servers(WafDedicatedDomainV1ServerArgs.builder()
.clientProtocol("HTTP")
.serverProtocol("HTTP")
.address("192.168.0.10")
.port(8080)
.type("ipv4")
.vpcId(sharedSubnet.applyValue(getVpcSubnetV1Result -> getVpcSubnetV1Result.vpcId()))
.build())
.timeoutConfig(WafDedicatedDomainV1TimeoutConfigArgs.builder()
.connectTimeout(150)
.readTimeout(200)
.sendTimeout(100)
.build())
.build());
}
}
resources:
domain1:
type: opentelekomcloud:WafDedicatedDomainV1
properties:
domain: www.mydom.com
keepPolicy: false
proxy: true
servers:
- clientProtocol: HTTP
serverProtocol: HTTP
address: 192.168.0.10
port: 8080
type: ipv4
vpcId: ${sharedSubnet.vpcId}
timeoutConfig:
connectTimeout: 150
readTimeout: 200
sendTimeout: 100
variables:
sharedSubnet:
fn::invoke:
function: opentelekomcloud:getVpcSubnetV1
arguments:
name: my_subnet
With certificate
import * as pulumi from "@pulumi/pulumi";
import * as opentelekomcloud from "@pulumi/opentelekomcloud";
const sharedSubnet = opentelekomcloud.getVpcSubnetV1({
name: "my_subnet",
});
const certificate1 = new opentelekomcloud.WafDedicatedCertificateV1("certificate1", {
content: `-----BEGIN CERTIFICATE-----
MIIFazCCA1OgAwIBAgIUN3w1KX8/T/HWVxZIOdHXPhUOnsAwDQYJKoZIhvcNAQEL
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
...
dKvZbPEsygYRIjwyhHHUh/YXH8KDI/uu6u6AxDckQ3rP1BkkKXr5NPBGjVgM3ZI=
-----END CERTIFICATE-----
`,
key: `-----BEGIN PRIVATE KEY-----
MIIJQQIBADANBgkqhkiG9w0BAQEFAASCCSswggknAgEAAoICAQC+9uwFVenCdPD9
5LWSWMuy4riZW718wxBpYV5Y9N8nM7N0qZLLdpImZrzBbaBldTI+AZGI3Nupuurw
...
s9urs/Kk/tbQhsEvu0X8FyGwo0zH6rG8apTFTlac+v4mJ4vlpxSvT5+FW2lgLISE
+4sM7kp0qO3/p+45HykwBY5iHq3H
-----END PRIVATE KEY-----
`,
});
const domain1 = new opentelekomcloud.WafDedicatedDomainV1("domain1", {
domain: "www.mydom.com",
certificateId: certificate1.wafDedicatedCertificateV1Id,
keepPolicy: false,
proxy: false,
tls: "TLS v1.1",
cipher: "cipher_1",
servers: [{
clientProtocol: "HTTPS",
serverProtocol: "HTTP",
address: "192.168.0.20",
port: 8443,
type: "ipv4",
vpcId: sharedSubnet.then(sharedSubnet => sharedSubnet.vpcId),
}],
}, {
dependsOn: [certificate1],
});
import pulumi
import pulumi_opentelekomcloud as opentelekomcloud
shared_subnet = opentelekomcloud.get_vpc_subnet_v1(name="my_subnet")
certificate1 = opentelekomcloud.WafDedicatedCertificateV1("certificate1",
content="""-----BEGIN CERTIFICATE-----
MIIFazCCA1OgAwIBAgIUN3w1KX8/T/HWVxZIOdHXPhUOnsAwDQYJKoZIhvcNAQEL
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
...
dKvZbPEsygYRIjwyhHHUh/YXH8KDI/uu6u6AxDckQ3rP1BkkKXr5NPBGjVgM3ZI=
-----END CERTIFICATE-----
""",
key="""-----BEGIN PRIVATE KEY-----
MIIJQQIBADANBgkqhkiG9w0BAQEFAASCCSswggknAgEAAoICAQC+9uwFVenCdPD9
5LWSWMuy4riZW718wxBpYV5Y9N8nM7N0qZLLdpImZrzBbaBldTI+AZGI3Nupuurw
...
s9urs/Kk/tbQhsEvu0X8FyGwo0zH6rG8apTFTlac+v4mJ4vlpxSvT5+FW2lgLISE
+4sM7kp0qO3/p+45HykwBY5iHq3H
-----END PRIVATE KEY-----
""")
domain1 = opentelekomcloud.WafDedicatedDomainV1("domain1",
domain="www.mydom.com",
certificate_id=certificate1.waf_dedicated_certificate_v1_id,
keep_policy=False,
proxy=False,
tls="TLS v1.1",
cipher="cipher_1",
servers=[{
"client_protocol": "HTTPS",
"server_protocol": "HTTP",
"address": "192.168.0.20",
"port": 8443,
"type": "ipv4",
"vpc_id": shared_subnet.vpc_id,
}],
opts = pulumi.ResourceOptions(depends_on=[certificate1]))
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/opentelekomcloud/opentelekomcloud"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
sharedSubnet, err := opentelekomcloud.LookupVpcSubnetV1(ctx, &opentelekomcloud.LookupVpcSubnetV1Args{
Name: pulumi.StringRef("my_subnet"),
}, nil)
if err != nil {
return err
}
certificate1, err := opentelekomcloud.NewWafDedicatedCertificateV1(ctx, "certificate1", &opentelekomcloud.WafDedicatedCertificateV1Args{
Content: pulumi.String(`-----BEGIN CERTIFICATE-----
MIIFazCCA1OgAwIBAgIUN3w1KX8/T/HWVxZIOdHXPhUOnsAwDQYJKoZIhvcNAQEL
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
...
dKvZbPEsygYRIjwyhHHUh/YXH8KDI/uu6u6AxDckQ3rP1BkkKXr5NPBGjVgM3ZI=
-----END CERTIFICATE-----
`),
Key: pulumi.String(`-----BEGIN PRIVATE KEY-----
MIIJQQIBADANBgkqhkiG9w0BAQEFAASCCSswggknAgEAAoICAQC+9uwFVenCdPD9
5LWSWMuy4riZW718wxBpYV5Y9N8nM7N0qZLLdpImZrzBbaBldTI+AZGI3Nupuurw
...
s9urs/Kk/tbQhsEvu0X8FyGwo0zH6rG8apTFTlac+v4mJ4vlpxSvT5+FW2lgLISE
+4sM7kp0qO3/p+45HykwBY5iHq3H
-----END PRIVATE KEY-----
`),
})
if err != nil {
return err
}
_, err = opentelekomcloud.NewWafDedicatedDomainV1(ctx, "domain1", &opentelekomcloud.WafDedicatedDomainV1Args{
Domain: pulumi.String("www.mydom.com"),
CertificateId: certificate1.WafDedicatedCertificateV1Id,
KeepPolicy: pulumi.Bool(false),
Proxy: pulumi.Bool(false),
Tls: pulumi.String("TLS v1.1"),
Cipher: pulumi.String("cipher_1"),
Servers: opentelekomcloud.WafDedicatedDomainV1ServerArray{
&opentelekomcloud.WafDedicatedDomainV1ServerArgs{
ClientProtocol: pulumi.String("HTTPS"),
ServerProtocol: pulumi.String("HTTP"),
Address: pulumi.String("192.168.0.20"),
Port: pulumi.Float64(8443),
Type: pulumi.String("ipv4"),
VpcId: pulumi.String(sharedSubnet.VpcId),
},
},
}, pulumi.DependsOn([]pulumi.Resource{
certificate1,
}))
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Opentelekomcloud = Pulumi.Opentelekomcloud;
return await Deployment.RunAsync(() =>
{
var sharedSubnet = Opentelekomcloud.GetVpcSubnetV1.Invoke(new()
{
Name = "my_subnet",
});
var certificate1 = new Opentelekomcloud.WafDedicatedCertificateV1("certificate1", new()
{
Content = @"-----BEGIN CERTIFICATE-----
MIIFazCCA1OgAwIBAgIUN3w1KX8/T/HWVxZIOdHXPhUOnsAwDQYJKoZIhvcNAQEL
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
...
dKvZbPEsygYRIjwyhHHUh/YXH8KDI/uu6u6AxDckQ3rP1BkkKXr5NPBGjVgM3ZI=
-----END CERTIFICATE-----
",
Key = @"-----BEGIN PRIVATE KEY-----
MIIJQQIBADANBgkqhkiG9w0BAQEFAASCCSswggknAgEAAoICAQC+9uwFVenCdPD9
5LWSWMuy4riZW718wxBpYV5Y9N8nM7N0qZLLdpImZrzBbaBldTI+AZGI3Nupuurw
...
s9urs/Kk/tbQhsEvu0X8FyGwo0zH6rG8apTFTlac+v4mJ4vlpxSvT5+FW2lgLISE
+4sM7kp0qO3/p+45HykwBY5iHq3H
-----END PRIVATE KEY-----
",
});
var domain1 = new Opentelekomcloud.WafDedicatedDomainV1("domain1", new()
{
Domain = "www.mydom.com",
CertificateId = certificate1.WafDedicatedCertificateV1Id,
KeepPolicy = false,
Proxy = false,
Tls = "TLS v1.1",
Cipher = "cipher_1",
Servers = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedDomainV1ServerArgs
{
ClientProtocol = "HTTPS",
ServerProtocol = "HTTP",
Address = "192.168.0.20",
Port = 8443,
Type = "ipv4",
VpcId = sharedSubnet.Apply(getVpcSubnetV1Result => getVpcSubnetV1Result.VpcId),
},
},
}, new CustomResourceOptions
{
DependsOn =
{
certificate1,
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.opentelekomcloud.OpentelekomcloudFunctions;
import com.pulumi.opentelekomcloud.inputs.GetVpcSubnetV1Args;
import com.pulumi.opentelekomcloud.WafDedicatedCertificateV1;
import com.pulumi.opentelekomcloud.WafDedicatedCertificateV1Args;
import com.pulumi.opentelekomcloud.WafDedicatedDomainV1;
import com.pulumi.opentelekomcloud.WafDedicatedDomainV1Args;
import com.pulumi.opentelekomcloud.inputs.WafDedicatedDomainV1ServerArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var sharedSubnet = OpentelekomcloudFunctions.getVpcSubnetV1(GetVpcSubnetV1Args.builder()
.name("my_subnet")
.build());
var certificate1 = new WafDedicatedCertificateV1("certificate1", WafDedicatedCertificateV1Args.builder()
.content("""
-----BEGIN CERTIFICATE-----
MIIFazCCA1OgAwIBAgIUN3w1KX8/T/HWVxZIOdHXPhUOnsAwDQYJKoZIhvcNAQEL
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
...
dKvZbPEsygYRIjwyhHHUh/YXH8KDI/uu6u6AxDckQ3rP1BkkKXr5NPBGjVgM3ZI=
-----END CERTIFICATE-----
""")
.key("""
-----BEGIN PRIVATE KEY-----
MIIJQQIBADANBgkqhkiG9w0BAQEFAASCCSswggknAgEAAoICAQC+9uwFVenCdPD9
5LWSWMuy4riZW718wxBpYV5Y9N8nM7N0qZLLdpImZrzBbaBldTI+AZGI3Nupuurw
...
s9urs/Kk/tbQhsEvu0X8FyGwo0zH6rG8apTFTlac+v4mJ4vlpxSvT5+FW2lgLISE
+4sM7kp0qO3/p+45HykwBY5iHq3H
-----END PRIVATE KEY-----
""")
.build());
var domain1 = new WafDedicatedDomainV1("domain1", WafDedicatedDomainV1Args.builder()
.domain("www.mydom.com")
.certificateId(certificate1.wafDedicatedCertificateV1Id())
.keepPolicy(false)
.proxy(false)
.tls("TLS v1.1")
.cipher("cipher_1")
.servers(WafDedicatedDomainV1ServerArgs.builder()
.clientProtocol("HTTPS")
.serverProtocol("HTTP")
.address("192.168.0.20")
.port(8443)
.type("ipv4")
.vpcId(sharedSubnet.applyValue(getVpcSubnetV1Result -> getVpcSubnetV1Result.vpcId()))
.build())
.build(), CustomResourceOptions.builder()
.dependsOn(certificate1)
.build());
}
}
resources:
certificate1:
type: opentelekomcloud:WafDedicatedCertificateV1
properties:
content: |
-----BEGIN CERTIFICATE-----
MIIFazCCA1OgAwIBAgIUN3w1KX8/T/HWVxZIOdHXPhUOnsAwDQYJKoZIhvcNAQEL
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
...
dKvZbPEsygYRIjwyhHHUh/YXH8KDI/uu6u6AxDckQ3rP1BkkKXr5NPBGjVgM3ZI=
-----END CERTIFICATE-----
key: |
-----BEGIN PRIVATE KEY-----
MIIJQQIBADANBgkqhkiG9w0BAQEFAASCCSswggknAgEAAoICAQC+9uwFVenCdPD9
5LWSWMuy4riZW718wxBpYV5Y9N8nM7N0qZLLdpImZrzBbaBldTI+AZGI3Nupuurw
...
s9urs/Kk/tbQhsEvu0X8FyGwo0zH6rG8apTFTlac+v4mJ4vlpxSvT5+FW2lgLISE
+4sM7kp0qO3/p+45HykwBY5iHq3H
-----END PRIVATE KEY-----
domain1:
type: opentelekomcloud:WafDedicatedDomainV1
properties:
domain: www.mydom.com
certificateId: ${certificate1.wafDedicatedCertificateV1Id}
keepPolicy: false
proxy: false
tls: TLS v1.1
cipher: cipher_1
servers:
- clientProtocol: HTTPS
serverProtocol: HTTP
address: 192.168.0.20
port: 8443
type: ipv4
vpcId: ${sharedSubnet.vpcId}
options:
dependsOn:
- ${certificate1}
variables:
sharedSubnet:
fn::invoke:
function: opentelekomcloud:getVpcSubnetV1
arguments:
name: my_subnet
Create WafDedicatedDomainV1 Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new WafDedicatedDomainV1(name: string, args: WafDedicatedDomainV1Args, opts?: CustomResourceOptions);
@overload
def WafDedicatedDomainV1(resource_name: str,
args: WafDedicatedDomainV1Args,
opts: Optional[ResourceOptions] = None)
@overload
def WafDedicatedDomainV1(resource_name: str,
opts: Optional[ResourceOptions] = None,
domain: Optional[str] = None,
servers: Optional[Sequence[WafDedicatedDomainV1ServerArgs]] = None,
policy_id: Optional[str] = None,
keep_policy: Optional[bool] = None,
pci3ds: Optional[bool] = None,
pci_dss: Optional[bool] = None,
certificate_id: Optional[str] = None,
protect_status: Optional[float] = None,
proxy: Optional[bool] = None,
region: Optional[str] = None,
cipher: Optional[str] = None,
timeout_config: Optional[WafDedicatedDomainV1TimeoutConfigArgs] = None,
tls: Optional[str] = None,
waf_dedicated_domain_v1_id: Optional[str] = None)
func NewWafDedicatedDomainV1(ctx *Context, name string, args WafDedicatedDomainV1Args, opts ...ResourceOption) (*WafDedicatedDomainV1, error)
public WafDedicatedDomainV1(string name, WafDedicatedDomainV1Args args, CustomResourceOptions? opts = null)
public WafDedicatedDomainV1(String name, WafDedicatedDomainV1Args args)
public WafDedicatedDomainV1(String name, WafDedicatedDomainV1Args args, CustomResourceOptions options)
type: opentelekomcloud:WafDedicatedDomainV1
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args WafDedicatedDomainV1Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args WafDedicatedDomainV1Args
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args WafDedicatedDomainV1Args
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args WafDedicatedDomainV1Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args WafDedicatedDomainV1Args
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var wafDedicatedDomainV1Resource = new Opentelekomcloud.WafDedicatedDomainV1("wafDedicatedDomainV1Resource", new()
{
Domain = "string",
Servers = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedDomainV1ServerArgs
{
Address = "string",
ClientProtocol = "string",
Port = 0,
ServerProtocol = "string",
Type = "string",
VpcId = "string",
},
},
PolicyId = "string",
KeepPolicy = false,
Pci3ds = false,
PciDss = false,
CertificateId = "string",
ProtectStatus = 0,
Proxy = false,
Region = "string",
Cipher = "string",
TimeoutConfig = new Opentelekomcloud.Inputs.WafDedicatedDomainV1TimeoutConfigArgs
{
ConnectTimeout = 0,
ReadTimeout = 0,
SendTimeout = 0,
},
Tls = "string",
WafDedicatedDomainV1Id = "string",
});
example, err := opentelekomcloud.NewWafDedicatedDomainV1(ctx, "wafDedicatedDomainV1Resource", &opentelekomcloud.WafDedicatedDomainV1Args{
Domain: pulumi.String("string"),
Servers: opentelekomcloud.WafDedicatedDomainV1ServerArray{
&opentelekomcloud.WafDedicatedDomainV1ServerArgs{
Address: pulumi.String("string"),
ClientProtocol: pulumi.String("string"),
Port: pulumi.Float64(0),
ServerProtocol: pulumi.String("string"),
Type: pulumi.String("string"),
VpcId: pulumi.String("string"),
},
},
PolicyId: pulumi.String("string"),
KeepPolicy: pulumi.Bool(false),
Pci3ds: pulumi.Bool(false),
PciDss: pulumi.Bool(false),
CertificateId: pulumi.String("string"),
ProtectStatus: pulumi.Float64(0),
Proxy: pulumi.Bool(false),
Region: pulumi.String("string"),
Cipher: pulumi.String("string"),
TimeoutConfig: &opentelekomcloud.WafDedicatedDomainV1TimeoutConfigArgs{
ConnectTimeout: pulumi.Float64(0),
ReadTimeout: pulumi.Float64(0),
SendTimeout: pulumi.Float64(0),
},
Tls: pulumi.String("string"),
WafDedicatedDomainV1Id: pulumi.String("string"),
})
var wafDedicatedDomainV1Resource = new WafDedicatedDomainV1("wafDedicatedDomainV1Resource", WafDedicatedDomainV1Args.builder()
.domain("string")
.servers(WafDedicatedDomainV1ServerArgs.builder()
.address("string")
.clientProtocol("string")
.port(0)
.serverProtocol("string")
.type("string")
.vpcId("string")
.build())
.policyId("string")
.keepPolicy(false)
.pci3ds(false)
.pciDss(false)
.certificateId("string")
.protectStatus(0)
.proxy(false)
.region("string")
.cipher("string")
.timeoutConfig(WafDedicatedDomainV1TimeoutConfigArgs.builder()
.connectTimeout(0)
.readTimeout(0)
.sendTimeout(0)
.build())
.tls("string")
.wafDedicatedDomainV1Id("string")
.build());
waf_dedicated_domain_v1_resource = opentelekomcloud.WafDedicatedDomainV1("wafDedicatedDomainV1Resource",
domain="string",
servers=[{
"address": "string",
"client_protocol": "string",
"port": 0,
"server_protocol": "string",
"type": "string",
"vpc_id": "string",
}],
policy_id="string",
keep_policy=False,
pci3ds=False,
pci_dss=False,
certificate_id="string",
protect_status=0,
proxy=False,
region="string",
cipher="string",
timeout_config={
"connect_timeout": 0,
"read_timeout": 0,
"send_timeout": 0,
},
tls="string",
waf_dedicated_domain_v1_id="string")
const wafDedicatedDomainV1Resource = new opentelekomcloud.WafDedicatedDomainV1("wafDedicatedDomainV1Resource", {
domain: "string",
servers: [{
address: "string",
clientProtocol: "string",
port: 0,
serverProtocol: "string",
type: "string",
vpcId: "string",
}],
policyId: "string",
keepPolicy: false,
pci3ds: false,
pciDss: false,
certificateId: "string",
protectStatus: 0,
proxy: false,
region: "string",
cipher: "string",
timeoutConfig: {
connectTimeout: 0,
readTimeout: 0,
sendTimeout: 0,
},
tls: "string",
wafDedicatedDomainV1Id: "string",
});
type: opentelekomcloud:WafDedicatedDomainV1
properties:
certificateId: string
cipher: string
domain: string
keepPolicy: false
pci3ds: false
pciDss: false
policyId: string
protectStatus: 0
proxy: false
region: string
servers:
- address: string
clientProtocol: string
port: 0
serverProtocol: string
type: string
vpcId: string
timeoutConfig:
connectTimeout: 0
readTimeout: 0
sendTimeout: 0
tls: string
wafDedicatedDomainV1Id: string
WafDedicatedDomainV1 Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The WafDedicatedDomainV1 resource accepts the following input properties:
- Domain string
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - Servers
List<Waf
Dedicated Domain V1Server> - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - Certificate
Id string - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - Cipher string
- Specifies the cipher suite of domain. Values are:
- Keep
Policy bool - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - Pci3ds bool
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- Pci
Dss bool Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- Policy
Id string - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- Protect
Status double - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - Proxy bool
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- Region string
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- Timeout
Config WafDedicated Domain V1Timeout Config - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - Tls string
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- Waf
Dedicated stringDomain V1Id - ID of the domain.
- Domain string
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - Servers
[]Waf
Dedicated Domain V1Server Args - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - Certificate
Id string - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - Cipher string
- Specifies the cipher suite of domain. Values are:
- Keep
Policy bool - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - Pci3ds bool
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- Pci
Dss bool Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- Policy
Id string - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- Protect
Status float64 - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - Proxy bool
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- Region string
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- Timeout
Config WafDedicated Domain V1Timeout Config Args - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - Tls string
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- Waf
Dedicated stringDomain V1Id - ID of the domain.
- domain String
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - servers
List<Waf
Dedicated Domain V1Server> - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - certificate
Id String - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - cipher String
- Specifies the cipher suite of domain. Values are:
- keep
Policy Boolean - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds Boolean
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci
Dss Boolean Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy
Id String - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect
Status Double - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - proxy Boolean
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region String
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- timeout
Config WafDedicated Domain V1Timeout Config - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls String
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- waf
Dedicated StringDomain V1Id - ID of the domain.
- domain string
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - servers
Waf
Dedicated Domain V1Server[] - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - certificate
Id string - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - cipher string
- Specifies the cipher suite of domain. Values are:
- keep
Policy boolean - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds boolean
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci
Dss boolean Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy
Id string - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect
Status number - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - proxy boolean
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region string
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- timeout
Config WafDedicated Domain V1Timeout Config - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls string
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- waf
Dedicated stringDomain V1Id - ID of the domain.
- domain str
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - servers
Sequence[Waf
Dedicated Domain V1Server Args] - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - certificate_
id str - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - cipher str
- Specifies the cipher suite of domain. Values are:
- keep_
policy bool - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds bool
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci_
dss bool Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy_
id str - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect_
status float - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - proxy bool
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region str
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- timeout_
config WafDedicated Domain V1Timeout Config Args - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls str
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- waf_
dedicated_ strdomain_ v1_ id - ID of the domain.
- domain String
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - servers List<Property Map>
- The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - certificate
Id String - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - cipher String
- Specifies the cipher suite of domain. Values are:
- keep
Policy Boolean - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds Boolean
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci
Dss Boolean Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy
Id String - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect
Status Number - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - proxy Boolean
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region String
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- timeout
Config Property Map - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls String
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- waf
Dedicated StringDomain V1Id - ID of the domain.
Outputs
All input properties are implicitly available as output properties. Additionally, the WafDedicatedDomainV1 resource produces the following output properties:
- Access
Status double - Whether a domain name is connected to WAF. Valid values are:
- Alarm
Page Dictionary<string, string> - The alarm page of domain. Valid values are:
- Certificate
Name string - The name of the certificate used by the domain name.
- Compliance
Certification Dictionary<string, bool> - The compliance certifications of the domain, values are:
- Created
At double - Timestamp when the dedicated WAF domain was created.
- Id string
- The provider-assigned unique ID for this managed resource.
- Protocol string
- The protocol type of the client. The options are
HTTP
andHTTPS
. - Traffic
Identifier Dictionary<string, string> - The traffic identifier of domain. Valid values are:
- Access
Status float64 - Whether a domain name is connected to WAF. Valid values are:
- Alarm
Page map[string]string - The alarm page of domain. Valid values are:
- Certificate
Name string - The name of the certificate used by the domain name.
- Compliance
Certification map[string]bool - The compliance certifications of the domain, values are:
- Created
At float64 - Timestamp when the dedicated WAF domain was created.
- Id string
- The provider-assigned unique ID for this managed resource.
- Protocol string
- The protocol type of the client. The options are
HTTP
andHTTPS
. - Traffic
Identifier map[string]string - The traffic identifier of domain. Valid values are:
- access
Status Double - Whether a domain name is connected to WAF. Valid values are:
- alarm
Page Map<String,String> - The alarm page of domain. Valid values are:
- certificate
Name String - The name of the certificate used by the domain name.
- compliance
Certification Map<String,Boolean> - The compliance certifications of the domain, values are:
- created
At Double - Timestamp when the dedicated WAF domain was created.
- id String
- The provider-assigned unique ID for this managed resource.
- protocol String
- The protocol type of the client. The options are
HTTP
andHTTPS
. - traffic
Identifier Map<String,String> - The traffic identifier of domain. Valid values are:
- access
Status number - Whether a domain name is connected to WAF. Valid values are:
- alarm
Page {[key: string]: string} - The alarm page of domain. Valid values are:
- certificate
Name string - The name of the certificate used by the domain name.
- compliance
Certification {[key: string]: boolean} - The compliance certifications of the domain, values are:
- created
At number - Timestamp when the dedicated WAF domain was created.
- id string
- The provider-assigned unique ID for this managed resource.
- protocol string
- The protocol type of the client. The options are
HTTP
andHTTPS
. - traffic
Identifier {[key: string]: string} - The traffic identifier of domain. Valid values are:
- access_
status float - Whether a domain name is connected to WAF. Valid values are:
- alarm_
page Mapping[str, str] - The alarm page of domain. Valid values are:
- certificate_
name str - The name of the certificate used by the domain name.
- compliance_
certification Mapping[str, bool] - The compliance certifications of the domain, values are:
- created_
at float - Timestamp when the dedicated WAF domain was created.
- id str
- The provider-assigned unique ID for this managed resource.
- protocol str
- The protocol type of the client. The options are
HTTP
andHTTPS
. - traffic_
identifier Mapping[str, str] - The traffic identifier of domain. Valid values are:
- access
Status Number - Whether a domain name is connected to WAF. Valid values are:
- alarm
Page Map<String> - The alarm page of domain. Valid values are:
- certificate
Name String - The name of the certificate used by the domain name.
- compliance
Certification Map<Boolean> - The compliance certifications of the domain, values are:
- created
At Number - Timestamp when the dedicated WAF domain was created.
- id String
- The provider-assigned unique ID for this managed resource.
- protocol String
- The protocol type of the client. The options are
HTTP
andHTTPS
. - traffic
Identifier Map<String> - The traffic identifier of domain. Valid values are:
Look up Existing WafDedicatedDomainV1 Resource
Get an existing WafDedicatedDomainV1 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: WafDedicatedDomainV1State, opts?: CustomResourceOptions): WafDedicatedDomainV1
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_status: Optional[float] = None,
alarm_page: Optional[Mapping[str, str]] = None,
certificate_id: Optional[str] = None,
certificate_name: Optional[str] = None,
cipher: Optional[str] = None,
compliance_certification: Optional[Mapping[str, bool]] = None,
created_at: Optional[float] = None,
domain: Optional[str] = None,
keep_policy: Optional[bool] = None,
pci3ds: Optional[bool] = None,
pci_dss: Optional[bool] = None,
policy_id: Optional[str] = None,
protect_status: Optional[float] = None,
protocol: Optional[str] = None,
proxy: Optional[bool] = None,
region: Optional[str] = None,
servers: Optional[Sequence[WafDedicatedDomainV1ServerArgs]] = None,
timeout_config: Optional[WafDedicatedDomainV1TimeoutConfigArgs] = None,
tls: Optional[str] = None,
traffic_identifier: Optional[Mapping[str, str]] = None,
waf_dedicated_domain_v1_id: Optional[str] = None) -> WafDedicatedDomainV1
func GetWafDedicatedDomainV1(ctx *Context, name string, id IDInput, state *WafDedicatedDomainV1State, opts ...ResourceOption) (*WafDedicatedDomainV1, error)
public static WafDedicatedDomainV1 Get(string name, Input<string> id, WafDedicatedDomainV1State? state, CustomResourceOptions? opts = null)
public static WafDedicatedDomainV1 get(String name, Output<String> id, WafDedicatedDomainV1State state, CustomResourceOptions options)
resources: _: type: opentelekomcloud:WafDedicatedDomainV1 get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Status double - Whether a domain name is connected to WAF. Valid values are:
- Alarm
Page Dictionary<string, string> - The alarm page of domain. Valid values are:
- Certificate
Id string - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - Certificate
Name string - The name of the certificate used by the domain name.
- Cipher string
- Specifies the cipher suite of domain. Values are:
- Compliance
Certification Dictionary<string, bool> - The compliance certifications of the domain, values are:
- Created
At double - Timestamp when the dedicated WAF domain was created.
- Domain string
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - Keep
Policy bool - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - Pci3ds bool
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- Pci
Dss bool Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- Policy
Id string - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- Protect
Status double - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - Protocol string
- The protocol type of the client. The options are
HTTP
andHTTPS
. - Proxy bool
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- Region string
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- Servers
List<Waf
Dedicated Domain V1Server> - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - Timeout
Config WafDedicated Domain V1Timeout Config - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - Tls string
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- Traffic
Identifier Dictionary<string, string> - The traffic identifier of domain. Valid values are:
- Waf
Dedicated stringDomain V1Id - ID of the domain.
- Access
Status float64 - Whether a domain name is connected to WAF. Valid values are:
- Alarm
Page map[string]string - The alarm page of domain. Valid values are:
- Certificate
Id string - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - Certificate
Name string - The name of the certificate used by the domain name.
- Cipher string
- Specifies the cipher suite of domain. Values are:
- Compliance
Certification map[string]bool - The compliance certifications of the domain, values are:
- Created
At float64 - Timestamp when the dedicated WAF domain was created.
- Domain string
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - Keep
Policy bool - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - Pci3ds bool
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- Pci
Dss bool Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- Policy
Id string - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- Protect
Status float64 - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - Protocol string
- The protocol type of the client. The options are
HTTP
andHTTPS
. - Proxy bool
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- Region string
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- Servers
[]Waf
Dedicated Domain V1Server Args - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - Timeout
Config WafDedicated Domain V1Timeout Config Args - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - Tls string
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- Traffic
Identifier map[string]string - The traffic identifier of domain. Valid values are:
- Waf
Dedicated stringDomain V1Id - ID of the domain.
- access
Status Double - Whether a domain name is connected to WAF. Valid values are:
- alarm
Page Map<String,String> - The alarm page of domain. Valid values are:
- certificate
Id String - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - certificate
Name String - The name of the certificate used by the domain name.
- cipher String
- Specifies the cipher suite of domain. Values are:
- compliance
Certification Map<String,Boolean> - The compliance certifications of the domain, values are:
- created
At Double - Timestamp when the dedicated WAF domain was created.
- domain String
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - keep
Policy Boolean - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds Boolean
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci
Dss Boolean Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy
Id String - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect
Status Double - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - protocol String
- The protocol type of the client. The options are
HTTP
andHTTPS
. - proxy Boolean
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region String
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- servers
List<Waf
Dedicated Domain V1Server> - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - timeout
Config WafDedicated Domain V1Timeout Config - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls String
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- traffic
Identifier Map<String,String> - The traffic identifier of domain. Valid values are:
- waf
Dedicated StringDomain V1Id - ID of the domain.
- access
Status number - Whether a domain name is connected to WAF. Valid values are:
- alarm
Page {[key: string]: string} - The alarm page of domain. Valid values are:
- certificate
Id string - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - certificate
Name string - The name of the certificate used by the domain name.
- cipher string
- Specifies the cipher suite of domain. Values are:
- compliance
Certification {[key: string]: boolean} - The compliance certifications of the domain, values are:
- created
At number - Timestamp when the dedicated WAF domain was created.
- domain string
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - keep
Policy boolean - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds boolean
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci
Dss boolean Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy
Id string - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect
Status number - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - protocol string
- The protocol type of the client. The options are
HTTP
andHTTPS
. - proxy boolean
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region string
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- servers
Waf
Dedicated Domain V1Server[] - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - timeout
Config WafDedicated Domain V1Timeout Config - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls string
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- traffic
Identifier {[key: string]: string} - The traffic identifier of domain. Valid values are:
- waf
Dedicated stringDomain V1Id - ID of the domain.
- access_
status float - Whether a domain name is connected to WAF. Valid values are:
- alarm_
page Mapping[str, str] - The alarm page of domain. Valid values are:
- certificate_
id str - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - certificate_
name str - The name of the certificate used by the domain name.
- cipher str
- Specifies the cipher suite of domain. Values are:
- compliance_
certification Mapping[str, bool] - The compliance certifications of the domain, values are:
- created_
at float - Timestamp when the dedicated WAF domain was created.
- domain str
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - keep_
policy bool - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds bool
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci_
dss bool Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy_
id str - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect_
status float - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - protocol str
- The protocol type of the client. The options are
HTTP
andHTTPS
. - proxy bool
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region str
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- servers
Sequence[Waf
Dedicated Domain V1Server Args] - The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - timeout_
config WafDedicated Domain V1Timeout Config Args - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls str
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- traffic_
identifier Mapping[str, str] - The traffic identifier of domain. Valid values are:
- waf_
dedicated_ strdomain_ v1_ id - ID of the domain.
- access
Status Number - Whether a domain name is connected to WAF. Valid values are:
- alarm
Page Map<String> - The alarm page of domain. Valid values are:
- certificate
Id String - Specifies the certificate ID. This parameter is mandatory when
client_protocol
is set to HTTPS. - certificate
Name String - The name of the certificate used by the domain name.
- cipher String
- Specifies the cipher suite of domain. Values are:
- compliance
Certification Map<Boolean> - The compliance certifications of the domain, values are:
- created
At Number - Timestamp when the dedicated WAF domain was created.
- domain String
- Specifies the protected domain name or IP address (port allowed). For example,
www.example.com
or*.example.com
orwww.example.com:89
. Changing this creates a new domain. - keep
Policy Boolean - Specifies whether to retain the policy when deleting a domain name.
Defaults to
true
. - pci3ds Boolean
Specifies the status of the PCI 3DS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
. The PCI 3DS compliance certification check cannot be disabled after being enabled.- pci
Dss Boolean Specifies the status of the PCI DSS compliance certification check. Values are:
true
andfalse
. This parameter must be used together with tls and cipher.NOTE: Tls must be set to
TLS v1.2
, and cipher must be set tocipher_2
.- policy
Id String - Specifies the policy ID associated with the domain. If not specified, a new policy will be created automatically.
- protect
Status Number - The protection status of domain,
0
: suspended,1
: enabled. Default value is1
. - protocol String
- The protocol type of the client. The options are
HTTP
andHTTPS
. - proxy Boolean
Specifies whether a proxy is configured. Default value is
false
.NOTE: WAF forwards only HTTP/S traffic. So WAF cannot serve your non-HTTP/S traffic, such as UDP, SMTP, FTP, and basically all other non-HTTP/S traffic. If a proxy such as public network ELB (or Nginx) has been used, set proxy
true
to ensure that the WAF security policy takes effect for the real source IP address.- region String
- The region in which to create the dedicated mode domain resource. If omitted, the provider-level region will be used. Changing this setting will push a new domain.
- servers List<Property Map>
- The server configuration list of the domain. A maximum of 80 can be configured.
The
server
block supports: - timeout
Config Property Map - Specifies the timeout configuration.
The
timeout_config
structure is documented below. - tls String
- Specifies the minimum required TLS version.
Values are:
TLS v1.0
TLS v1.1
TLS v1.2
TLS v1.3
- traffic
Identifier Map<String> - The traffic identifier of domain. Valid values are:
- waf
Dedicated StringDomain V1Id - ID of the domain.
Supporting Types
WafDedicatedDomainV1Server, WafDedicatedDomainV1ServerArgs
- Address string
- IP address or domain name of the web server that the client accesses. For
example,
192.168.1.1
orwww.example.com
. Changing this creates a new server. - Client
Protocol string - Protocol type of the client. Values are
HTTP
andHTTPS
. Changing this creates a new server. - Port double
- Port number used by the web server. The value ranges from 0 to 65535. Changing this creates a new server.
- Server
Protocol string - Protocol used by WAF to forward client requests to the server.
Values are
HTTP
andHTTPS
. Changing this creates a new server. - Type string
- Server network type, IPv4 or IPv6. Valid values are:
ipv4
andipv6
. Changing this creates a new server. - Vpc
Id string - The id of the vpc used by the server. Changing this creates a server.
- Address string
- IP address or domain name of the web server that the client accesses. For
example,
192.168.1.1
orwww.example.com
. Changing this creates a new server. - Client
Protocol string - Protocol type of the client. Values are
HTTP
andHTTPS
. Changing this creates a new server. - Port float64
- Port number used by the web server. The value ranges from 0 to 65535. Changing this creates a new server.
- Server
Protocol string - Protocol used by WAF to forward client requests to the server.
Values are
HTTP
andHTTPS
. Changing this creates a new server. - Type string
- Server network type, IPv4 or IPv6. Valid values are:
ipv4
andipv6
. Changing this creates a new server. - Vpc
Id string - The id of the vpc used by the server. Changing this creates a server.
- address String
- IP address or domain name of the web server that the client accesses. For
example,
192.168.1.1
orwww.example.com
. Changing this creates a new server. - client
Protocol String - Protocol type of the client. Values are
HTTP
andHTTPS
. Changing this creates a new server. - port Double
- Port number used by the web server. The value ranges from 0 to 65535. Changing this creates a new server.
- server
Protocol String - Protocol used by WAF to forward client requests to the server.
Values are
HTTP
andHTTPS
. Changing this creates a new server. - type String
- Server network type, IPv4 or IPv6. Valid values are:
ipv4
andipv6
. Changing this creates a new server. - vpc
Id String - The id of the vpc used by the server. Changing this creates a server.
- address string
- IP address or domain name of the web server that the client accesses. For
example,
192.168.1.1
orwww.example.com
. Changing this creates a new server. - client
Protocol string - Protocol type of the client. Values are
HTTP
andHTTPS
. Changing this creates a new server. - port number
- Port number used by the web server. The value ranges from 0 to 65535. Changing this creates a new server.
- server
Protocol string - Protocol used by WAF to forward client requests to the server.
Values are
HTTP
andHTTPS
. Changing this creates a new server. - type string
- Server network type, IPv4 or IPv6. Valid values are:
ipv4
andipv6
. Changing this creates a new server. - vpc
Id string - The id of the vpc used by the server. Changing this creates a server.
- address str
- IP address or domain name of the web server that the client accesses. For
example,
192.168.1.1
orwww.example.com
. Changing this creates a new server. - client_
protocol str - Protocol type of the client. Values are
HTTP
andHTTPS
. Changing this creates a new server. - port float
- Port number used by the web server. The value ranges from 0 to 65535. Changing this creates a new server.
- server_
protocol str - Protocol used by WAF to forward client requests to the server.
Values are
HTTP
andHTTPS
. Changing this creates a new server. - type str
- Server network type, IPv4 or IPv6. Valid values are:
ipv4
andipv6
. Changing this creates a new server. - vpc_
id str - The id of the vpc used by the server. Changing this creates a server.
- address String
- IP address or domain name of the web server that the client accesses. For
example,
192.168.1.1
orwww.example.com
. Changing this creates a new server. - client
Protocol String - Protocol type of the client. Values are
HTTP
andHTTPS
. Changing this creates a new server. - port Number
- Port number used by the web server. The value ranges from 0 to 65535. Changing this creates a new server.
- server
Protocol String - Protocol used by WAF to forward client requests to the server.
Values are
HTTP
andHTTPS
. Changing this creates a new server. - type String
- Server network type, IPv4 or IPv6. Valid values are:
ipv4
andipv6
. Changing this creates a new server. - vpc
Id String - The id of the vpc used by the server. Changing this creates a server.
WafDedicatedDomainV1TimeoutConfig, WafDedicatedDomainV1TimeoutConfigArgs
- Connect
Timeout double - Specifies the timeout in seconds for WAF to connect to the origin server.
- Read
Timeout double - Specifies the timeout in seconds for WAF to receive responses from the origin server.
- Send
Timeout double
- Connect
Timeout float64 - Specifies the timeout in seconds for WAF to connect to the origin server.
- Read
Timeout float64 - Specifies the timeout in seconds for WAF to receive responses from the origin server.
- Send
Timeout float64
- connect
Timeout Double - Specifies the timeout in seconds for WAF to connect to the origin server.
- read
Timeout Double - Specifies the timeout in seconds for WAF to receive responses from the origin server.
- send
Timeout Double
- connect
Timeout number - Specifies the timeout in seconds for WAF to connect to the origin server.
- read
Timeout number - Specifies the timeout in seconds for WAF to receive responses from the origin server.
- send
Timeout number
- connect_
timeout float - Specifies the timeout in seconds for WAF to connect to the origin server.
- read_
timeout float - Specifies the timeout in seconds for WAF to receive responses from the origin server.
- send_
timeout float
- connect
Timeout Number - Specifies the timeout in seconds for WAF to connect to the origin server.
- read
Timeout Number - Specifies the timeout in seconds for WAF to receive responses from the origin server.
- send
Timeout Number
Import
WAF dedicated domain can be imported using the id
, e.g.
bash
$ pulumi import opentelekomcloud:index/wafDedicatedDomainV1:WafDedicatedDomainV1 dom <id>
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- opentelekomcloud opentelekomcloud/terraform-provider-opentelekomcloud
- License
- Notes
- This Pulumi package is based on the
opentelekomcloud
Terraform Provider.