ionoscloud_application_loadbalancer_forwardingrule
Creates and manages IonosCloud Application Load Balancer Forwarding Rule.
Example Usage
resource "ionoscloud_datacenter" "example" {
name = "Datacenter Example"
location = "us/las"
description = "datacenter description"
sec_auth_protection = false
}
resource "ionoscloud_lan" "example_1" {
datacenter_id = ionoscloud_datacenter.example.id
public = true
name = "Lan Example"
}
resource "ionoscloud_lan" "example_2" {
datacenter_id = ionoscloud_datacenter.example.id
public = true
name = "Lan Example"
}
resource "ionoscloud_application_loadbalancer" "example" {
datacenter_id = ionoscloud_datacenter.example.id
name = "ALB Example"
listener_lan = ionoscloud_lan.example_1.id
ips = [ "10.12.118.224"]
target_lan = ionoscloud_lan.example_2.id
lb_private_ips = [ "10.13.72.225/24"]
}
resource "ionoscloud_application_loadbalancer_forwardingrule" "example" {
datacenter_id = ionoscloud_datacenter.example.id
application_loadbalancer_id = ionoscloud_application_loadbalancer.example.id
name = "ALB FR Example"
protocol = "HTTP"
listener_ip = "10.12.118.224"
listener_port = 8080
client_timeout = 1000
http_rules {
name = "http_rule"
type = "REDIRECT"
drop_query = true
location = "www.ionos.com"
status_code = 301
conditions {
type = "HEADER"
condition = "EQUALS"
negate = true
key = "key"
value = "10.12.120.224/24"
}
}
http_rules {
name = "http_rule_2"
type = "STATIC"
drop_query = false
status_code = 303
response_message = "Response"
content_type = "text/plain"
conditions {
type = "QUERY"
condition = "MATCHES"
negate = false
key = "key"
value = "10.12.120.224/24"
}
}
server_certificates = [ ionoscloud_certificate.cert.id ]
}
#optionally you can add a certificate to the application load balancer
resource "ionoscloud_certificate" "cert" {
name = "add_name_here"
certificate = "${file("path_to_cert")}"
certificate_chain = "${file("path_to_cert_chain")}"
private_key = "${file("path_to_private_key")}"
}Argument Reference
Import
Last updated
