Skip to content

Commit

Permalink
Documentation Update Lb Listener and SG Rule (#3673)
Browse files Browse the repository at this point in the history
  • Loading branch information
SunithaGudisagarIBM authored May 12, 2022
1 parent 4cf3074 commit 08d431b
Show file tree
Hide file tree
Showing 2 changed files with 32 additions and 1 deletion.
6 changes: 6 additions & 0 deletions website/docs/r/is_lb_listener.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,7 @@ resource "ibm_is_lb" "example" {
resource "ibm_is_lb_listener" "example" {
lb = ibm_is_lb.example.id
protocol = "tcp"
default_pool = ibm_is_lb_pool.example.id
}
```

Expand Down Expand Up @@ -180,6 +181,11 @@ Review the argument references that you can specify for your resource.

- `protocol` - (Required, String) The listener protocol. Enumeration type are `http`, `tcp`, `https` and `udp`. Network load balancer supports only `tcp` and `udp` protocol.
- `default_pool` - (Optional, String) The load balancer pool unique identifier.
~> **NOTE**
- The specified pool must -
- Belong to this load balancer
- Have the same protocol as this listener, or have a compatible protocol. At present, the compatible protocols are http and https.
- Not already be the default_pool for another listener
- `certificate_instance` - (Optional, String) The CRN of the certificate instance, it is applicable(mandatory) only to https protocol.
- `connection_limit` - (Optional, Integer) The connection limit of the listener. Valid range is **1 to 15000**. Network load balancer do not support `connection_limit` argument.
- `https_redirect_listener` - (Optional, String) ID of the listener that will be set as http redirect target.
Expand Down
27 changes: 26 additions & 1 deletion website/docs/r/is_security_group_rule.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ provider "ibm" {
```

## Example usage
In the following example, you create a different type of protocol rules `ALL`, `ICMP`, `UDP` and `TCP`.
In the following example, you create a different type of protocol rules `ALL`, `ICMP`, `UDP`, `TCP` and `ANY`.

```terraform
resource "ibm_is_vpc" "example" {
Expand Down Expand Up @@ -69,6 +69,31 @@ resource "ibm_is_security_group_rule" "example3" {
port_max = 8080
}
}
resource "ibm_is_security_group_rule" "example_security_group_rule_icmp_any" {
group = ibm_is_security_group.example_security_group.id
direction = "inbound"
remote = "127.0.0.1"
icmp {
}
}
resource "ibm_is_security_group_rule" "example_security_group_rule_udp_any" {
group = ibm_is_security_group.example_security_group.id
direction = "inbound"
remote = "127.0.0.1"
udp {
}
}
resource "ibm_is_security_group_rule" "example_security_group_rule_tcp_any" {
group = ibm_is_security_group.example_security_group.id
direction = "inbound"
remote = "127.0.0.1"
tcp {
}
}
```

## Argument reference
Expand Down

0 comments on commit 08d431b

Please sign in to comment.