konnect 2.4.1 published on Thursday, Mar 13, 2025 by kong
konnect.getGatewayPluginServiceProtection
Explore with Pulumi AI
Using getGatewayPluginServiceProtection
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getGatewayPluginServiceProtection(args: GetGatewayPluginServiceProtectionArgs, opts?: InvokeOptions): Promise<GetGatewayPluginServiceProtectionResult>
function getGatewayPluginServiceProtectionOutput(args: GetGatewayPluginServiceProtectionOutputArgs, opts?: InvokeOptions): Output<GetGatewayPluginServiceProtectionResult>
def get_gateway_plugin_service_protection(control_plane_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetGatewayPluginServiceProtectionResult
def get_gateway_plugin_service_protection_output(control_plane_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetGatewayPluginServiceProtectionResult]
func LookupGatewayPluginServiceProtection(ctx *Context, args *LookupGatewayPluginServiceProtectionArgs, opts ...InvokeOption) (*LookupGatewayPluginServiceProtectionResult, error)
func LookupGatewayPluginServiceProtectionOutput(ctx *Context, args *LookupGatewayPluginServiceProtectionOutputArgs, opts ...InvokeOption) LookupGatewayPluginServiceProtectionResultOutput
> Note: This function is named LookupGatewayPluginServiceProtection
in the Go SDK.
public static class GetGatewayPluginServiceProtection
{
public static Task<GetGatewayPluginServiceProtectionResult> InvokeAsync(GetGatewayPluginServiceProtectionArgs args, InvokeOptions? opts = null)
public static Output<GetGatewayPluginServiceProtectionResult> Invoke(GetGatewayPluginServiceProtectionInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetGatewayPluginServiceProtectionResult> getGatewayPluginServiceProtection(GetGatewayPluginServiceProtectionArgs args, InvokeOptions options)
public static Output<GetGatewayPluginServiceProtectionResult> getGatewayPluginServiceProtection(GetGatewayPluginServiceProtectionArgs args, InvokeOptions options)
fn::invoke:
function: konnect:index/getGatewayPluginServiceProtection:getGatewayPluginServiceProtection
arguments:
# arguments dictionary
The following arguments are supported:
- Control
Plane stringId
- Control
Plane stringId
- control
Plane StringId
- control
Plane stringId
- control_
plane_ strid
- control
Plane StringId
getGatewayPluginServiceProtection Result
The following output properties are available:
- Config
Get
Gateway Plugin Service Protection Config - Control
Plane stringId - Created
At double - Enabled bool
- Id string
- Instance
Name string - Ordering
Get
Gateway Plugin Service Protection Ordering - Protocols List<string>
- Service
Get
Gateway Plugin Service Protection Service - List<string>
- Updated
At double
- Config
Get
Gateway Plugin Service Protection Config - Control
Plane stringId - Created
At float64 - Enabled bool
- Id string
- Instance
Name string - Ordering
Get
Gateway Plugin Service Protection Ordering - Protocols []string
- Service
Get
Gateway Plugin Service Protection Service - []string
- Updated
At float64
- config
Get
Gateway Plugin Service Protection Config - control
Plane StringId - created
At Double - enabled Boolean
- id String
- instance
Name String - ordering
Get
Gateway Plugin Service Protection Ordering - protocols List<String>
- service
Get
Gateway Plugin Service Protection Service - List<String>
- updated
At Double
- config
Get
Gateway Plugin Service Protection Config - control
Plane stringId - created
At number - enabled boolean
- id string
- instance
Name string - ordering
Get
Gateway Plugin Service Protection Ordering - protocols string[]
- service
Get
Gateway Plugin Service Protection Service - string[]
- updated
At number
- config
Get
Gateway Plugin Service Protection Config - control_
plane_ strid - created_
at float - enabled bool
- id str
- instance_
name str - ordering
Get
Gateway Plugin Service Protection Ordering - protocols Sequence[str]
- service
Get
Gateway Plugin Service Protection Service - Sequence[str]
- updated_
at float
- config Property Map
- control
Plane StringId - created
At Number - enabled Boolean
- id String
- instance
Name String - ordering Property Map
- protocols List<String>
- service Property Map
- List<String>
- updated
At Number
Supporting Types
GetGatewayPluginServiceProtectionConfig
- Dictionary
Name string - The shared dictionary where counters are stored. When the plugin is configured to synchronize counter data externally (that is
config.strategy
iscluster
orredis
andconfig.sync_rate
isn't-1
), this dictionary serves as a buffer to populate counters in the data store on each synchronization cycle. - Disable
Penalty bool - If set to
true
, this doesn't count denied requests (status =429
). If set tofalse
, all requests, including denied ones, are counted. This parameter only affects thesliding
window_type. - Error
Code double - Set a custom error code to return when the rate limit is exceeded.
- Error
Message string - Set a custom error message to return when the rate limit is exceeded.
- Hide
Client boolHeaders - Optionally hide informative response headers that would otherwise provide information about the current status of limits and counters.
- Limits List<double>
- One or more requests-per-window limits to apply. There must be a matching number of window limits and sizes specified.
- Lock
Dictionary stringName - The shared dictionary where concurrency control locks are stored. The default shared dictionary is
kong_locks
. The shared dictionary should be declared in nginx-kong.conf. - Namespace string
- The rate limiting library namespace to use for this plugin instance. Counter data and sync configuration is isolated in each namespace. NOTE: For the plugin instances sharing the same namespace, all the configurations that are required for synchronizing counters, e.g.
strategy
,redis
,sync_rate
,dictionary_name
, need to be the same. - Redis
Get
Gateway Plugin Service Protection Config Redis - Retry
After doubleJitter Max - The upper bound of a jitter (random delay) in seconds to be added to the
Retry-After
header of denied requests (status =429
) in order to prevent all the clients from coming back at the same time. The lower bound of the jitter is0
; in this case, theRetry-After
header is equal to theRateLimit-Reset
header. - Strategy string
- The rate-limiting strategy to use for retrieving and incrementing the limits. Available values are:
local
andcluster
. - Sync
Rate double - How often to sync counter data to the central data store. A value of 0 results in synchronous behavior; a value of -1 ignores sync behavior entirely and only stores counters in node memory. A value greater than 0 will sync the counters in the specified number of seconds. The minimum allowed interval is 0.02 seconds (20ms).
- Window
Sizes List<double> - One or more window sizes to apply a limit to (defined in seconds). There must be a matching number of window limits and sizes specified.
- Window
Type string - Sets the time window type to either
sliding
(default) orfixed
. Sliding windows apply the rate limiting logic while taking into account previous hit rates (from the window that immediately precedes the current) using a dynamic weight. Fixed windows consist of buckets that are statically assigned to a definitive time range, each request is mapped to only one fixed window based on its timestamp and will affect only that window's counters.
- Dictionary
Name string - The shared dictionary where counters are stored. When the plugin is configured to synchronize counter data externally (that is
config.strategy
iscluster
orredis
andconfig.sync_rate
isn't-1
), this dictionary serves as a buffer to populate counters in the data store on each synchronization cycle. - Disable
Penalty bool - If set to
true
, this doesn't count denied requests (status =429
). If set tofalse
, all requests, including denied ones, are counted. This parameter only affects thesliding
window_type. - Error
Code float64 - Set a custom error code to return when the rate limit is exceeded.
- Error
Message string - Set a custom error message to return when the rate limit is exceeded.
- Hide
Client boolHeaders - Optionally hide informative response headers that would otherwise provide information about the current status of limits and counters.
- Limits []float64
- One or more requests-per-window limits to apply. There must be a matching number of window limits and sizes specified.
- Lock
Dictionary stringName - The shared dictionary where concurrency control locks are stored. The default shared dictionary is
kong_locks
. The shared dictionary should be declared in nginx-kong.conf. - Namespace string
- The rate limiting library namespace to use for this plugin instance. Counter data and sync configuration is isolated in each namespace. NOTE: For the plugin instances sharing the same namespace, all the configurations that are required for synchronizing counters, e.g.
strategy
,redis
,sync_rate
,dictionary_name
, need to be the same. - Redis
Get
Gateway Plugin Service Protection Config Redis - Retry
After float64Jitter Max - The upper bound of a jitter (random delay) in seconds to be added to the
Retry-After
header of denied requests (status =429
) in order to prevent all the clients from coming back at the same time. The lower bound of the jitter is0
; in this case, theRetry-After
header is equal to theRateLimit-Reset
header. - Strategy string
- The rate-limiting strategy to use for retrieving and incrementing the limits. Available values are:
local
andcluster
. - Sync
Rate float64 - How often to sync counter data to the central data store. A value of 0 results in synchronous behavior; a value of -1 ignores sync behavior entirely and only stores counters in node memory. A value greater than 0 will sync the counters in the specified number of seconds. The minimum allowed interval is 0.02 seconds (20ms).
- Window
Sizes []float64 - One or more window sizes to apply a limit to (defined in seconds). There must be a matching number of window limits and sizes specified.
- Window
Type string - Sets the time window type to either
sliding
(default) orfixed
. Sliding windows apply the rate limiting logic while taking into account previous hit rates (from the window that immediately precedes the current) using a dynamic weight. Fixed windows consist of buckets that are statically assigned to a definitive time range, each request is mapped to only one fixed window based on its timestamp and will affect only that window's counters.
- dictionary
Name String - The shared dictionary where counters are stored. When the plugin is configured to synchronize counter data externally (that is
config.strategy
iscluster
orredis
andconfig.sync_rate
isn't-1
), this dictionary serves as a buffer to populate counters in the data store on each synchronization cycle. - disable
Penalty Boolean - If set to
true
, this doesn't count denied requests (status =429
). If set tofalse
, all requests, including denied ones, are counted. This parameter only affects thesliding
window_type. - error
Code Double - Set a custom error code to return when the rate limit is exceeded.
- error
Message String - Set a custom error message to return when the rate limit is exceeded.
- hide
Client BooleanHeaders - Optionally hide informative response headers that would otherwise provide information about the current status of limits and counters.
- limits List<Double>
- One or more requests-per-window limits to apply. There must be a matching number of window limits and sizes specified.
- lock
Dictionary StringName - The shared dictionary where concurrency control locks are stored. The default shared dictionary is
kong_locks
. The shared dictionary should be declared in nginx-kong.conf. - namespace String
- The rate limiting library namespace to use for this plugin instance. Counter data and sync configuration is isolated in each namespace. NOTE: For the plugin instances sharing the same namespace, all the configurations that are required for synchronizing counters, e.g.
strategy
,redis
,sync_rate
,dictionary_name
, need to be the same. - redis
Get
Gateway Plugin Service Protection Config Redis - retry
After DoubleJitter Max - The upper bound of a jitter (random delay) in seconds to be added to the
Retry-After
header of denied requests (status =429
) in order to prevent all the clients from coming back at the same time. The lower bound of the jitter is0
; in this case, theRetry-After
header is equal to theRateLimit-Reset
header. - strategy String
- The rate-limiting strategy to use for retrieving and incrementing the limits. Available values are:
local
andcluster
. - sync
Rate Double - How often to sync counter data to the central data store. A value of 0 results in synchronous behavior; a value of -1 ignores sync behavior entirely and only stores counters in node memory. A value greater than 0 will sync the counters in the specified number of seconds. The minimum allowed interval is 0.02 seconds (20ms).
- window
Sizes List<Double> - One or more window sizes to apply a limit to (defined in seconds). There must be a matching number of window limits and sizes specified.
- window
Type String - Sets the time window type to either
sliding
(default) orfixed
. Sliding windows apply the rate limiting logic while taking into account previous hit rates (from the window that immediately precedes the current) using a dynamic weight. Fixed windows consist of buckets that are statically assigned to a definitive time range, each request is mapped to only one fixed window based on its timestamp and will affect only that window's counters.
- dictionary
Name string - The shared dictionary where counters are stored. When the plugin is configured to synchronize counter data externally (that is
config.strategy
iscluster
orredis
andconfig.sync_rate
isn't-1
), this dictionary serves as a buffer to populate counters in the data store on each synchronization cycle. - disable
Penalty boolean - If set to
true
, this doesn't count denied requests (status =429
). If set tofalse
, all requests, including denied ones, are counted. This parameter only affects thesliding
window_type. - error
Code number - Set a custom error code to return when the rate limit is exceeded.
- error
Message string - Set a custom error message to return when the rate limit is exceeded.
- hide
Client booleanHeaders - Optionally hide informative response headers that would otherwise provide information about the current status of limits and counters.
- limits number[]
- One or more requests-per-window limits to apply. There must be a matching number of window limits and sizes specified.
- lock
Dictionary stringName - The shared dictionary where concurrency control locks are stored. The default shared dictionary is
kong_locks
. The shared dictionary should be declared in nginx-kong.conf. - namespace string
- The rate limiting library namespace to use for this plugin instance. Counter data and sync configuration is isolated in each namespace. NOTE: For the plugin instances sharing the same namespace, all the configurations that are required for synchronizing counters, e.g.
strategy
,redis
,sync_rate
,dictionary_name
, need to be the same. - redis
Get
Gateway Plugin Service Protection Config Redis - retry
After numberJitter Max - The upper bound of a jitter (random delay) in seconds to be added to the
Retry-After
header of denied requests (status =429
) in order to prevent all the clients from coming back at the same time. The lower bound of the jitter is0
; in this case, theRetry-After
header is equal to theRateLimit-Reset
header. - strategy string
- The rate-limiting strategy to use for retrieving and incrementing the limits. Available values are:
local
andcluster
. - sync
Rate number - How often to sync counter data to the central data store. A value of 0 results in synchronous behavior; a value of -1 ignores sync behavior entirely and only stores counters in node memory. A value greater than 0 will sync the counters in the specified number of seconds. The minimum allowed interval is 0.02 seconds (20ms).
- window
Sizes number[] - One or more window sizes to apply a limit to (defined in seconds). There must be a matching number of window limits and sizes specified.
- window
Type string - Sets the time window type to either
sliding
(default) orfixed
. Sliding windows apply the rate limiting logic while taking into account previous hit rates (from the window that immediately precedes the current) using a dynamic weight. Fixed windows consist of buckets that are statically assigned to a definitive time range, each request is mapped to only one fixed window based on its timestamp and will affect only that window's counters.
- dictionary_
name str - The shared dictionary where counters are stored. When the plugin is configured to synchronize counter data externally (that is
config.strategy
iscluster
orredis
andconfig.sync_rate
isn't-1
), this dictionary serves as a buffer to populate counters in the data store on each synchronization cycle. - disable_
penalty bool - If set to
true
, this doesn't count denied requests (status =429
). If set tofalse
, all requests, including denied ones, are counted. This parameter only affects thesliding
window_type. - error_
code float - Set a custom error code to return when the rate limit is exceeded.
- error_
message str - Set a custom error message to return when the rate limit is exceeded.
- hide_
client_ boolheaders - Optionally hide informative response headers that would otherwise provide information about the current status of limits and counters.
- limits Sequence[float]
- One or more requests-per-window limits to apply. There must be a matching number of window limits and sizes specified.
- lock_
dictionary_ strname - The shared dictionary where concurrency control locks are stored. The default shared dictionary is
kong_locks
. The shared dictionary should be declared in nginx-kong.conf. - namespace str
- The rate limiting library namespace to use for this plugin instance. Counter data and sync configuration is isolated in each namespace. NOTE: For the plugin instances sharing the same namespace, all the configurations that are required for synchronizing counters, e.g.
strategy
,redis
,sync_rate
,dictionary_name
, need to be the same. - redis
Get
Gateway Plugin Service Protection Config Redis - retry_
after_ floatjitter_ max - The upper bound of a jitter (random delay) in seconds to be added to the
Retry-After
header of denied requests (status =429
) in order to prevent all the clients from coming back at the same time. The lower bound of the jitter is0
; in this case, theRetry-After
header is equal to theRateLimit-Reset
header. - strategy str
- The rate-limiting strategy to use for retrieving and incrementing the limits. Available values are:
local
andcluster
. - sync_
rate float - How often to sync counter data to the central data store. A value of 0 results in synchronous behavior; a value of -1 ignores sync behavior entirely and only stores counters in node memory. A value greater than 0 will sync the counters in the specified number of seconds. The minimum allowed interval is 0.02 seconds (20ms).
- window_
sizes Sequence[float] - One or more window sizes to apply a limit to (defined in seconds). There must be a matching number of window limits and sizes specified.
- window_
type str - Sets the time window type to either
sliding
(default) orfixed
. Sliding windows apply the rate limiting logic while taking into account previous hit rates (from the window that immediately precedes the current) using a dynamic weight. Fixed windows consist of buckets that are statically assigned to a definitive time range, each request is mapped to only one fixed window based on its timestamp and will affect only that window's counters.
- dictionary
Name String - The shared dictionary where counters are stored. When the plugin is configured to synchronize counter data externally (that is
config.strategy
iscluster
orredis
andconfig.sync_rate
isn't-1
), this dictionary serves as a buffer to populate counters in the data store on each synchronization cycle. - disable
Penalty Boolean - If set to
true
, this doesn't count denied requests (status =429
). If set tofalse
, all requests, including denied ones, are counted. This parameter only affects thesliding
window_type. - error
Code Number - Set a custom error code to return when the rate limit is exceeded.
- error
Message String - Set a custom error message to return when the rate limit is exceeded.
- hide
Client BooleanHeaders - Optionally hide informative response headers that would otherwise provide information about the current status of limits and counters.
- limits List<Number>
- One or more requests-per-window limits to apply. There must be a matching number of window limits and sizes specified.
- lock
Dictionary StringName - The shared dictionary where concurrency control locks are stored. The default shared dictionary is
kong_locks
. The shared dictionary should be declared in nginx-kong.conf. - namespace String
- The rate limiting library namespace to use for this plugin instance. Counter data and sync configuration is isolated in each namespace. NOTE: For the plugin instances sharing the same namespace, all the configurations that are required for synchronizing counters, e.g.
strategy
,redis
,sync_rate
,dictionary_name
, need to be the same. - redis Property Map
- retry
After NumberJitter Max - The upper bound of a jitter (random delay) in seconds to be added to the
Retry-After
header of denied requests (status =429
) in order to prevent all the clients from coming back at the same time. The lower bound of the jitter is0
; in this case, theRetry-After
header is equal to theRateLimit-Reset
header. - strategy String
- The rate-limiting strategy to use for retrieving and incrementing the limits. Available values are:
local
andcluster
. - sync
Rate Number - How often to sync counter data to the central data store. A value of 0 results in synchronous behavior; a value of -1 ignores sync behavior entirely and only stores counters in node memory. A value greater than 0 will sync the counters in the specified number of seconds. The minimum allowed interval is 0.02 seconds (20ms).
- window
Sizes List<Number> - One or more window sizes to apply a limit to (defined in seconds). There must be a matching number of window limits and sizes specified.
- window
Type String - Sets the time window type to either
sliding
(default) orfixed
. Sliding windows apply the rate limiting logic while taking into account previous hit rates (from the window that immediately precedes the current) using a dynamic weight. Fixed windows consist of buckets that are statically assigned to a definitive time range, each request is mapped to only one fixed window based on its timestamp and will affect only that window's counters.
GetGatewayPluginServiceProtectionConfigRedis
- Cluster
Max doubleRedirections - Maximum retry attempts for redirection.
- Cluster
Nodes List<GetGateway Plugin Service Protection Config Redis Cluster Node> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - Connect
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Connection
Is boolProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - Database double
- Database to use for the Redis connection when using the
redis
strategy - Host string
- A string representing a host name, such as example.com.
- Keepalive
Backlog double - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - Keepalive
Pool doubleSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - Password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- Port double
- An integer representing a port number between 0 and 65535, inclusive.
- Read
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Send
Timeout double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- Sentinel
Nodes List<GetGateway Plugin Service Protection Config Redis Sentinel Node> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - Sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- Sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - Sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- Server
Name string - A string representing an SNI (server name indication) value for TLS.
- Ssl bool
- If set to true, uses SSL to connect to Redis.
- Ssl
Verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - Username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- Cluster
Max float64Redirections - Maximum retry attempts for redirection.
- Cluster
Nodes []GetGateway Plugin Service Protection Config Redis Cluster Node - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - Connect
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Connection
Is boolProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - Database float64
- Database to use for the Redis connection when using the
redis
strategy - Host string
- A string representing a host name, such as example.com.
- Keepalive
Backlog float64 - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - Keepalive
Pool float64Size - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - Password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- Port float64
- An integer representing a port number between 0 and 65535, inclusive.
- Read
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Send
Timeout float64 - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- Sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- Sentinel
Nodes []GetGateway Plugin Service Protection Config Redis Sentinel Node - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - Sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- Sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - Sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- Server
Name string - A string representing an SNI (server name indication) value for TLS.
- Ssl bool
- If set to true, uses SSL to connect to Redis.
- Ssl
Verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - Username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max DoubleRedirections - Maximum retry attempts for redirection.
- cluster
Nodes List<GetGateway Plugin Service Protection Config Redis Cluster Node> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is BooleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database Double
- Database to use for the Redis connection when using the
redis
strategy - host String
- A string representing a host name, such as example.com.
- keepalive
Backlog Double - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool DoubleSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password String
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port Double
- An integer representing a port number between 0 and 65535, inclusive.
- read
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout Double - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master String - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes List<GetGateway Plugin Service Protection Config Redis Sentinel Node> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password String - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role String - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username String - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name String - A string representing an SNI (server name indication) value for TLS.
- ssl Boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify Boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username String
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max numberRedirections - Maximum retry attempts for redirection.
- cluster
Nodes GetGateway Plugin Service Protection Config Redis Cluster Node[] - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is booleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database number
- Database to use for the Redis connection when using the
redis
strategy - host string
- A string representing a host name, such as example.com.
- keepalive
Backlog number - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool numberSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password string
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port number
- An integer representing a port number between 0 and 65535, inclusive.
- read
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master string - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes GetGateway Plugin Service Protection Config Redis Sentinel Node[] - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password string - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role string - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username string - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name string - A string representing an SNI (server name indication) value for TLS.
- ssl boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username string
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster_
max_ floatredirections - Maximum retry attempts for redirection.
- cluster_
nodes Sequence[GetGateway Plugin Service Protection Config Redis Cluster Node] - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection_
is_ boolproxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database float
- Database to use for the Redis connection when using the
redis
strategy - host str
- A string representing a host name, such as example.com.
- keepalive_
backlog float - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive_
pool_ floatsize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password str
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port float
- An integer representing a port number between 0 and 65535, inclusive.
- read_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send_
timeout float - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel_
master str - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel_
nodes Sequence[GetGateway Plugin Service Protection Config Redis Sentinel Node] - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel_
password str - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel_
role str - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel_
username str - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server_
name str - A string representing an SNI (server name indication) value for TLS.
- ssl bool
- If set to true, uses SSL to connect to Redis.
- ssl_
verify bool - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username str
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
- cluster
Max NumberRedirections - Maximum retry attempts for redirection.
- cluster
Nodes List<Property Map> - Cluster addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Cluster. The minimum length of the array is 1 element. - connect
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- connection
Is BooleanProxied - If the connection to Redis is proxied (e.g. Envoy), set it
true
. Set thehost
andport
to point to the proxy address. - database Number
- Database to use for the Redis connection when using the
redis
strategy - host String
- A string representing a host name, such as example.com.
- keepalive
Backlog Number - Limits the total number of opened connections for a pool. If the connection pool is full, connection queues above the limit go into the backlog queue. If the backlog queue is full, subsequent connect operations fail and return
nil
. Queued operations (subject to set timeouts) resume once the number of connections in the pool is less thankeepalive_pool_size
. If latency is high or throughput is low, try increasing this value. Empirically, this value is larger thankeepalive_pool_size
. - keepalive
Pool NumberSize - The size limit for every cosocket connection pool associated with every remote server, per worker process. If neither
keepalive_pool_size
norkeepalive_backlog
is specified, no pool is created. Ifkeepalive_pool_size
isn't specified butkeepalive_backlog
is specified, then the pool uses the default value. Try to increase (e.g. 512) this value if latency is high or throughput is low. - password String
- Password to use for Redis connections. If undefined, no AUTH commands are sent to Redis.
- port Number
- An integer representing a port number between 0 and 65535, inclusive.
- read
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- send
Timeout Number - An integer representing a timeout in milliseconds. Must be between 0 and 2^31-2.
- sentinel
Master String - Sentinel master to use for Redis connections. Defining this value implies using Redis Sentinel.
- sentinel
Nodes List<Property Map> - Sentinel node addresses to use for Redis connections when the
redis
strategy is defined. Defining this field implies using a Redis Sentinel. The minimum length of the array is 1 element. - sentinel
Password String - Sentinel password to authenticate with a Redis Sentinel instance. If undefined, no AUTH commands are sent to Redis Sentinels.
- sentinel
Role String - Sentinel role to use for Redis connections when the
redis
strategy is defined. Defining this value implies using Redis Sentinel. - sentinel
Username String - Sentinel username to authenticate with a Redis Sentinel instance. If undefined, ACL authentication won't be performed. This requires Redis v6.2.0+.
- server
Name String - A string representing an SNI (server name indication) value for TLS.
- ssl Boolean
- If set to true, uses SSL to connect to Redis.
- ssl
Verify Boolean - If set to true, verifies the validity of the server SSL certificate. If setting this parameter, also configure
lua_ssl_trusted_certificate
inkong.conf
to specify the CA (or server) certificate used by your Redis server. You may also need to configurelua_ssl_verify_depth
accordingly. - username String
- Username to use for Redis connections. If undefined, ACL authentication won't be performed. This requires Redis v6.0.0+. To be compatible with Redis v5.x.y, you can set it to
default
.
GetGatewayPluginServiceProtectionConfigRedisClusterNode
GetGatewayPluginServiceProtectionConfigRedisSentinelNode
GetGatewayPluginServiceProtectionOrdering
GetGatewayPluginServiceProtectionOrderingAfter
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginServiceProtectionOrderingBefore
- Accesses List<string>
- Accesses []string
- accesses List<String>
- accesses string[]
- accesses Sequence[str]
- accesses List<String>
GetGatewayPluginServiceProtectionService
- Id string
- Id string
- id String
- id string
- id str
- id String
Package Details
- Repository
- konnect kong/terraform-provider-konnect
- License
- Notes
- This Pulumi package is based on the
konnect
Terraform Provider.