You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+25-5Lines changed: 25 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ module "frontdoor" {
113
113
114
114
## **`backend_pools`** - Backends and backend pools
115
115
116
-
A backend pool in Front Door refers to the set of backends that receive similar traffic for their app. In other words, it's a logical grouping of your app instances across the world that receive the same traffic and respond with expected behavior. These backends are deployed across different regions or within the same region. All backends can be in Active/Active deployment mode or what is defined as Active/Passive configuration.
116
+
A backend pool in Front Door refers to the set of backends that receive similar traffic for their app. In other words, A logical grouping of app instances across the world that receive the same traffic and respond with expected behavior. These backends are deployed across different regions or within the same region. All backends can be in `Active/Active` deployment mode or what is defined as `Active/Passive` configuration. Azure by default allows specifying up to `50` Backend Pools.
117
117
118
118
Front Door backends refers to the host name or public IP of your application that serves your client requests. Front Door supports both Azure and non-Azure resources in the backend pool. The application can either be in your on-premises datacenter or located in another cloud provider.
119
119
@@ -126,7 +126,7 @@ Front Door backends refers to the host name or public IP of your application tha
126
126
`health_probe_name`|Specifies the name of the `backend_pool_health_probe` block within this resource to use for this `Backend Pool`.
127
127
`backend` | A backend block as defined below.
128
128
129
-
###`backend` - A backend block as defined below
129
+
>`backend` - A backend block as defined below
130
130
131
131
| Name | Description
132
132
|--|--
@@ -180,7 +180,7 @@ Before you can use a custom domain with your Front Door, you must first create a
180
180
`web_application_firewall_policy_link_id`|Defines the Web Application Firewall policy ID for each host. By default pickup existing WAF policy if specified with module.
181
181
`custom_https_configuration` | The `custom_https_configuration` block supports the following
182
182
183
-
###The `custom_https_configuration`- block supports the following
183
+
>The `custom_https_configuration`- block supports the following
184
184
185
185
| Name | Description
186
186
|--|--
@@ -202,7 +202,7 @@ A Front Door routing rule configuration is composed of two major parts: a "left-
202
202
`accepted_protocols`|Protocol schemes to match for the Backend Routing Rule. Defaults to `Http`.
203
203
`patterns_to_match`| The route patterns for the Backend Routing Rule. Defaults to `/*`.
204
204
205
-
###`forwarding_configuration`| A forwarding_configuration block as defined below
205
+
>`forwarding_configuration`| A forwarding_configuration block as defined below
206
206
207
207
| Name | Description
208
208
|--|--
@@ -215,7 +215,7 @@ A Front Door routing rule configuration is composed of two major parts: a "left-
215
215
`custom_forwarding_path`|Path to use when constructing the request to forward to the backend. This functions as a URL Rewrite. Default behaviour preserves the URL path.
216
216
forwarding_protocol | Protocol to use when redirecting. Valid options are `HttpOnly`, `HttpsOnly`, or `MatchRequest`. Defaults to `HttpsOnly`.
217
217
218
-
###`redirect_configuration`| A redirect_configuration block as defined below
218
+
>`redirect_configuration`| A redirect_configuration block as defined below
219
219
220
220
| Name | Description
221
221
|--|--
@@ -253,8 +253,20 @@ An effective naming convention assembles resource names by using important resou
253
253
254
254
Name | Description | Type | Default
255
255
---- | ----------- | ---- | -------
256
+
`create_resource_group`|Create new resource group and use it for all networking resources|string|`""`
256
257
`resource_group_name`|The name of an existing resource group.|string|`""`
257
258
`location`|The location for all resources while creating a new resource group.|string|`""`
259
+
`frontdoor_name`|Specifies the name of the Front Door service. Must be globally unique|string|`""`
260
+
friendly_name|A friendly name for the Front Door service|string|`""`
261
+
`backend_pools_send_receive_timeout_seconds`|Specifies the send and receive timeout on forwarding request to the backend. When the timeout is reached, the request fails and returns. Possible values are between `0` - `240`. Defaults to `60`.|number|`60`
262
+
string|`""`
263
+
`enforce_backend_pools_certificate_name_check`|Enforce certificate name check on HTTPS requests to all backend pools, this setting will have no effect on HTTP requests. Permitted values are `true` or `false`.|string|`false`
264
+
`backend_pools`|A logical grouping of app instances across the world that receive the same traffic and respond with expected behavior. These backends are deployed across different regions or within the same region. All backends can be in `Active/Active` deployment mode or what is defined as `Active/Passive` configuration. Azure by default allows specifying up to `50` Backend Pools.|list(object({}))|`[]`
265
+
`backend_pool_health_probes`|The list of backend pool health probes.|list(object({}))|`[]`
266
+
`backend_pool_load_balancing`|Load-balancing settings for the backend pool to determine if the backend is healthy or unhealthy. They also check how to load-balance traffic between different backends in the backend pool.|list(object({}))|`[]`
267
+
`frontend_endpoints`|Lists all of the frontend endpoints within a Front Door|list(object({}))|`[]`
268
+
`routing_rules`|The list of Routing Rules to determine which particular rule to match the request to and then take the defined action in the configuration|list(object({}))|`[]`
269
+
web_application_firewall_policy|Manages an Azure Front Door Web Application Firewall Policy instance|map(object({}))|`null`
258
270
`log_analytics_workspace_name`|The name of log analytics workspace name|string|`null`
259
271
`storage_account_name`|The name of the hub storage account to store logs|string|`null`
260
272
`Tags`|A map of tags to add to all resources|map|`{}`
@@ -266,6 +278,14 @@ Name | Description
266
278
`resource_group_name`| The name of the resource group in which resources are created
267
279
`resource_group_id`| The id of the resource group in which resources are created
268
280
`resource_group_location`| The location of the resource group in which resources are created
281
+
`backend_pool_ids`|The ID's of the Azure Front Door Backend Pool
282
+
`backend_pool_health_probes`|The ID's of the Azure Front Door Backend Health Probe
283
+
`backend_pool_load_balancing`|The ID of the Azure Front Door Backend Load Balancer
284
+
`frontend_endpoint_id`|The ID of the Azure Front Door Frontend Endpoint
285
+
`frontdoor_id`|The ID of the FrontDoor
286
+
`frontdoor_waf_policy_id`|The ID of the FrontDoor Firewall Policy
287
+
`frontdoor_waf_policy_location`|The Azure Region where this FrontDoor Firewall Policy exists
288
+
`frontdoor_waf_policy_frontend_endpoint_ids`|The Frontend Endpoints associated with this Front Door Web Application Firewall policy
0 commit comments