Annotations for Configuring LoadBalancer Ingresses
You can add annotations to a YAML file for more advanced ingress functions. This section describes the annotations that can be used when you create a LoadBalancer ingress.
Indexes
Category |
Ingress Annotation |
---|---|
Load balancer configuration |
|
Port or protocol configuration |
|
Advanced features of ELB listeners |
|
Forwarding policy |
|
Basic Configurations for Interconnecting with ELB
- Associate an existing load balancer. For details, see Associating an Existing Load Balancer to an Ingress While Creating the Ingress.
- Automatically create a load balancer. For details, see Automatically Creating a Load Balancer While Creating an Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.class |
String |
Select a proper load balancer type. Options:
|
v1.9 or later |
kubernetes.io/ingress.class |
String |
This parameter is mandatory when an ingress is created by calling the API. For clusters of v1.23 or later, use the parameter ingressClassName. For details, see Creating a LoadBalancer Ingress Using kubectl. |
Only clusters of v1.21 or earlier |
kubernetes.io/elb.port |
String |
This parameter indicates the external port registered with the address of the LoadBalancer Service. The value ranges from 1 to 65535.
NOTE:
Some ports are high-risk ports and are blocked by default, for example, port 21. |
v1.9 or later |
kubernetes.io/elb.id |
String |
Mandatory when an existing load balancer is to be interconnected. ID of a load balancer. How to obtain: On the management console, click Service List, and choose Networking > Elastic Load Balance. Click the name of the target load balancer. On the Summary tab page, find and copy the ID. |
v1.9 or later |
kubernetes.io/elb.ip |
String |
Mandatory when an existing load balancer is to be interconnected. Service address of a load balancer. The value can be the public IP address of a public network load balancer or the private IP address of a private network load balancer. |
v1.9 or later |
kubernetes.io/elb.autocreate |
Table 22 Object |
Mandatory when load balancers are automatically created. Example
|
v1.9 or later |
kubernetes.io/elb.enterpriseID |
String |
Optional when load balancers are automatically created. Clusters of v1.15 and later versions support this field. In clusters earlier than v1.15, load balancers are created in the default project by default. This parameter indicates the ID of the enterprise project in which the ELB load balancer will be created. If this parameter is not specified or is set to 0, resources will be bound to the default enterprise project. How to obtain: Log in to the management console and choose Enterprise > Project Management on the top menu bar. In the list displayed, click the name of the target enterprise project, and copy the ID on the enterprise project details page. |
v1.15 or later |
kubernetes.io/elb.subnet-id |
String |
Optional when load balancers are automatically created. ID of the subnet where the cluster is located. The value can contain 1 to 100 characters.
|
Mandatory for clusters earlier than v1.11.7-r0 Discarded in clusters of a version later than v1.11.7-r0 |
Configuring ELB Certificates
For details about application scenarios and use cases, see Using kubectl.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.tls-certificate-ids |
String |
ELB certificate IDs, which are separated by comma (,). The list length is greater than or equal to 1. The first ID in the list is the server certificate, and the other IDs are SNI certificates in which a domain name must be contained. To obtain the certificate, log in to the CCE console, choose Service List > Networking > Elastic Load Balance, and click Certificates in the navigation pane. In the load balancer list, copy the ID under the target certificate name. |
v1.19.16-r2, v1.21.5-r0, v1.23.3-r0, or later |
Adding Resource Tags
For details about application scenarios and use cases, see Automatically Creating a Load Balancer While Creating an Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.tags |
String |
Add resource tags to a load balancer. This parameter can be configured only when a load balancer is automatically created. A tag is in the format of "key=value". Use commas (,) to separate multiple tags. |
v1.23.11-r0, v1.25.6-r0, v1.27.3-r0, or later |
Using HTTP/2
For details about application scenarios and use cases, see Configuring HTTP/2 for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.http2-enable |
String |
Whether HTTP/2 is enabled. Request forwarding using HTTP/2 improves the access performance between your application and the load balancer. However, the load balancer still uses HTTP/1.x to forward requests to the backend server. Options:
Note: HTTP/2 can be enabled or disabled only when the listener uses HTTPS. This parameter is invalid and defaults to false when the listener protocol is HTTP. |
v1.23.13-r0, v1.25.8-r0, v1.27.5-r0, v1.28.3-r0, or later |
Interconnecting with HTTPS/GRPC Backend Services
For details about application scenarios and use cases, see Configuring HTTPS Backend Services for a LoadBalancer Ingress and Configuring gRPC Backend Services for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.pool-protocol |
String |
To interconnect with HTTPS backend services, set this parameter to https. |
v1.23.8, v1.25.3, or later |
To interconnect with GRPC backend services, set this parameter to grpc. |
v1.23.10-r20, v1.25.5-r20, v1.27.2-r20, v1.28.1-r0, or later |
Configuring Timeout for an Ingress
For details about application scenarios and use cases, see Configuring Timeout for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.keepalive_timeout |
String |
Timeout for client connections. If there are no requests reaching the load balancer during the timeout duration, the load balancer will disconnect the connection from the client and establish a new connection when there is a new request. Value:
For UDP listeners, this parameter does not take effect. |
Dedicated load balancers: v1.19.16-r30, v1.21.10-r10, v1.23.8-r10, v1.25.3-r10, or later Shared load balancers: v1.23.13-r0, v1.25.8-r0, v1.27.5-r0, v1.28.3-r0, or later |
kubernetes.io/elb.client_timeout |
String |
Timeout for waiting for a request from a client. There are two cases:
The value ranges from 1 to 300 (in seconds). The default value is 60. This parameter is available only for HTTP and HTTPS listeners. Minimum value: 1 Maximum value: 300 Default value: 60 |
|
kubernetes.io/elb.member_timeout |
String |
Timeout for waiting for a response from a backend server. After a request is forwarded to the backend server, if the backend server does not respond within the duration specified by member_timeout, the load balancer will stop waiting and return HTTP 504 Gateway Timeout. The value ranges from 1 to 300 (in seconds). The default value is 60. This parameter is available only for HTTP and HTTPS listeners. Minimum value: 1 Maximum value: 300 Default value: 60 |
Configuring a Slow Start
For details about application scenarios and use cases, see Configuring a Slow Start for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.slowstart |
String |
Duration of slow start, in seconds. The slow start duration ranges from 30 to 1200.
NOTE:
The load balancer linearly increases the proportion of requests to backend servers in slow start mode. When the configured slow start duration elapses, the load balancer sends full share of requests to backend servers and exits the slow start mode. |
v1.23 or later |
Configuring Grayscale Release
For details about application scenarios and use cases, see Configuring Grayscale Release for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.canary |
String |
Grayscale release status for an ingress. If this parameter is set to true, the implementation of grayscale release varies depending on annotation configurations. Option: true
|
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.canary-weight |
String |
Weight of a grayscale release. After this parameter is configured, the ingress will be grayscale released based on the weight.
|
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.session-affinity-mode |
String |
After weight-based grayscale release is enabled, configure sticky session. This parameter can only be set to HTTP_COOKIE for grayscale release. |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/ elb.session-affinity-option |
String |
Sticky session timeout after sticky session is enabled for weight-based grayscale release. The parameter value is a JSON string in the following format: {"persistence_timeout": "1440"} Parameters:
|
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.canary-by-header |
String |
Key of an ingress header used for grayscale release, indicating the name of a request header. This parameter must be used with kubernetes.io/elb.canary-by-header-value. Parameters: Enter 1 to 40 characters. Only letters, digits, hyphens (-), and underscores (_) are allowed. |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.canary-by-header-value |
String |
Value of an ingress header used for grayscale release. This parameter must be used with kubernetes.io/elb.canary-by-header. The parameter value is an array in JSON format, for example: '{"values":["a","b"]}' Parameters:
|
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.canary-by-cookie |
String |
Key of cookie-based grayscale release, indicating the name of a request cookie. This parameter must be used with kubernetes.io/elb.canary-by-cookie-value. Parameters: Enter 1 to 100 characters, including letters, digits, and other characters (!%'"()*+,./:=?@^\\-_`~). |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.canary-by-cookie-value |
String |
Value of cookie-based grayscale release. This parameter must be used with kubernetes.io/elb.canary-by-cookie. The parameter value is an array in JSON format, for example: '{"values":["a","b"]}' Parameters:
|
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.canary-related-ingress-uid |
String |
UID of the original ingress associated with the grayscale release ingress, which is used to display the association between the original ingress and the grayscale release ingress. ● Format: character string ● Value: metadata.uid of the original ingress |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
Blocklist/Trustlist
For details about application scenarios and use cases, see Configuring a Blocklist/Trustlist Access Policy for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.acl-id |
String |
|
v1.23.12-r0, v1.25.7-r0, v1.27.4-r0, v1.28.2-r0, or later |
kubernetes.io/elb.acl-status |
String |
Access control status. This parameter is mandatory when you configure an IP address blocklist or trustlist for a load balancer. Options:
|
v1.23.12-r0, v1.25.7-r0, v1.27.4-r0, v1.28.2-r0, or later |
kubernetes.io/elb.acl-type |
String |
IP address list type. This parameter is mandatory when you configure an IP address blocklist or trustlist for a load balancer. Options:
|
v1.23.12-r0, v1.25.7-r0, v1.27.4-r0, v1.28.2-r0, or later |
Configuring a Range of Listening Ports
A custom listening port can be configured for an ingress. In this way, both ports 80 and 443 can be exposed.
For details about application scenarios and use cases, see Configuring a Range of Listening Ports for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.listen-ports |
String |
Create multiple listening ports for an ingress. The port number ranges from 1 to 65535. The following is an example for JSON characters: kubernetes.io/elb.listen-ports: '[{"HTTP":80},{"HTTPS":443}]'
|
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
Configuring an HTTP/HTTPS Header
For details about application scenarios and use cases, see Configuring an HTTP/HTTPS Header for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.x-forwarded-port |
String |
A load balancer can obtain the port number of a listener using X-Forwarded-Port and transmit the port number to the packets of the backend server.
|
v1.23.13-r0, v1.25.8-r0, v1.27.5-r0, v1.28.3-r0, or later |
kubernetes.io/elb.x-forwarded-for-port |
String |
A load balancer can obtain a client port number for requests using X-Forwarded-For-Port and transmit the port number to the packets of the backend server.
|
|
kubernetes.io/elb.x-forwarded-host |
String |
|
Enabling GZIP
For details about application scenarios and use cases, see Configuring GZIP Data Compression for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.gzip-enabled |
String |
LoadBalancer ingresses support data compression, which reduces the size of files to be transferred, improves file transfer efficiency, and reduces the bandwidth needed for the transmission. If this function is enabled, specific files will be compressed. If you do not enable this function, files will not be compressed. By default, data compression is disabled. The files in the following format can be compressed:
This function is available only for HTTP/HTTPS listeners of dedicated load balancers. If the advanced configuration for enabling data compression or the target annotation is deleted, the ELB configuration will not be modified. |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
Configuring URL Redirection
For details about application scenarios and use cases, see Configuring URL Redirection for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.redirect-url |
String |
URL for redirection. Format: A valid URL must start with http:// or https://, for example, https://example.com/. Parameter: This configuration takes effect on all forwarding rules of a single ingress. After the configuration is deleted, the target URL redirection rule will be automatically cleared. Either this annotation or the annotation of a grayscale release can be configured. |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
kubernetes.io/elb.redirect-url-code |
String |
Code returned after an ingress is redirected to a URL. Format: The return code can be 301, 302, 303, 307, or 308. Parameter: The default value is 301. |
Configuring URL Rewriting
For details about application scenarios and use cases, see Configuring URL Rewriting for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.rewrite-target |
String |
Information about the rewritten path. Format: A proper rule matching a regular expression must start with a slash (/). Parameter: This configuration takes effect on the URL of a single ingress matching the regular expression. After the configuration is deleted, the target URL rewriting rule will be automatically cleared. Either this annotation or the annotation of a grayscale release can be configured. |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
Redirecting HTTP to HTTPS
For details about application scenarios and use cases, see Redirecting HTTP to HTTPS for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.ssl-redirect |
String |
Whether to enable redirection from HTTP to HTTPS. Format: The value can be true or false. Parameter: true indicates that redirection is enabled. If the value is false or the parameter is unavailable, redirection is disabled.
NOTE:
Either this annotation or the annotation of a grayscale release can be configured. |
v1.23.14-r0, v1.25.9-r0, v1.27.6-r0, v1.28.4-r0, or later |
Configuring the Priorities of Forwarding Rules
When ingresses use the same load balancer listener, forwarding rules can be prioritized based on the following rules:
- Forwarding rules of different ingresses: The rules are sorted based on the priorities (ranging from 1 to 1000) of the kubernetes.io/elb.ingress-order annotation. A smaller value indicates a higher priority.
- Forwarding rules of an ingress: If the kubernetes.io/elb.rule-priority-enabled annotation is set to true, the forwarding rules are sorted based on the sequence in which they are added during ingress creation. A forwarding rule added earlier indicates a higher priority. If the kubernetes.io/elb.rule-priority-enabled annotation is not configured, the default sorting of the forwarding rules on the load balancer will be used.
If the preceding annotations are not configured, the default sorting of the forwarding rules on the load balancer will be used, regardless of whether the forwarding rules are of the same ingress or different ingresses under the same load balancer listener.
For details about application scenarios and use cases, see Configuring the Priorities of Forwarding Rules for LoadBalancer Ingresses.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.ingress-order |
String |
Specifies the sequence of forwarding rules of different ingresses. The value ranges from 1 to 1000. A smaller value indicates a higher priority. The priority of a forwarding rule must be unique under the same load balancer listener. This parameter is available only for dedicated load balancers.
NOTE:
When this annotation is configured, the kubernetes.io/elb.rule-priority-enabled annotation is enabled by default. The forwarding rules of each ingress will be sorted. |
v1.23.15-r0, v1.25.10-r0, v1.27.7-r0, v1.28.5-r0, v1.29.1-r10, or later |
kubernetes.io/elb.rule-priority-enabled |
String |
This parameter can only be set to true, indicating to sort the forwarding rules of an ingress. The priorities of the forwarding rules are determined based on the sequence in which they are added during ingress creation. A forwarding rule added earlier indicates a higher priority. If this parameter is not configured, the default sorting of the forwarding rules on the load balancer will be used. After this parameter is enabled, it cannot be disabled. This parameter is available only for dedicated load balancers. |
Configuring a Custom Header Forwarding Policy
For details about application scenarios and use cases, see Configuring a Custom Header Forwarding Policy for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.headers.${svc_name} |
String |
Custom header of the Service associated with an ingress. ${svc_name} is the Service name. Format: a JSON string, for example, {"key": "test", "values": ["value1", "value2"]}
|
v1.23.16-r0, v1.25.11-r0, v1.27.8-r0, v1.28.6-r0, v1.29.2-r0, or later |
Configuring a Custom EIP
For details about application scenarios and use cases, see Configuring a Custom EIP for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.custom-eip-id |
String |
ID of the custom EIP, which can be seen on the EIP console The EIP must be bindable. |
v1.23.18-r0, v1.25.13-r0, v1.27.10-r0, v1.28.8-r0, v1.29.4-r0, v1.30.1-r0, or later |
Configuring Cross-Origin Access
For details about application scenarios and use cases, see Configuring Cross-Origin Access for LoadBalancer Ingresses.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.cors-allow-origin |
Array[string] |
Specify Access-Control-Allow-Origin for the origin that can be accessed. Options:
|
v1.23.18-r10, v1.25.16-r0, v1.27.16-r0, v1.28.13-r0, v1.29.8-r0, v1.30.4-r0, or later |
kubernetes.io/elb.cors-allow-headers |
Array[string] |
Specify Access-Control-Allow-Headers for allowed request headers. You can enter multiple values by separating them with commas (,). |
|
kubernetes.io/elb.cors-expose-headers |
Array[string] |
Specify Access-Control-Expose-Headers for custom response headers that can be accessed by a cross-origin request. This allows you to retrieve non-standard response headers using client-side JavaScript code. You can enter multiple values by separating them with commas (,). |
|
kubernetes.io/elb.cors-allow-methods |
Array[string] |
Specify Access-Control-Allow-Methods for allowed HTTP request methods. You can enter multiple values by separating them with commas (,). |
|
kubernetes.io/elb.cors-allow-credentials |
String |
Specify Access-Control-Allow-Credentials to control the sending of credentials (such as cookies). Options:
Once configured, the settings cannot be deleted. To remove the configuration, use kubernetes.io/elb.cors-disabled to delete all cross-origin settings. |
|
kubernetes.io/elb.cors-max-age |
String |
Specify Access-Control-Max-Age for the cache duration of a CORS pre-check request. Unit: second. Value range: -1 to 172800 Properly configure this parameter based on service requirements. If the value is too low, pre-check requests may happen frequently. If the value is too high, the CORS policy may not take effect immediately. |
|
kubernetes.io/elb.cors-disabled |
String |
Specify whether to disable all cross-origin settings. Options:
|
Writing or Deleting a Header
For details about application scenarios and use cases, see Configuring Header Writing or Deletion for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.actions.${svc_name} |
String |
Rewrite the header of the Service associated with an ingress. ${svc_name} indicates the Service name, which contains a maximum of 51 characters. If the annotation value is set to [], the header rewriting policy is deleted. An annotation value is a JSON string array. For example: [{"type":"InsertHeader","InsertHeaderConfig":{"key":"aa","value_type":"USER_DEFINED","value":"aa"}}]
NOTE:
A maximum of five configurations are allowed for writing or deleting a header. |
v1.23.18-r10, v1.25.16-r0, v1.27.16-r0, v1.28.13-r0, v1.29.8-r0, v1.30.4-r0, or later |
Configuring Advanced Forwarding Rules
For details about application scenarios and use cases, see Configuring Advanced Forwarding Rules for a LoadBalancer Ingress.
Parameter |
Type |
Description |
Supported Cluster Version |
---|---|---|---|
kubernetes.io/elb.conditions.${svc_name} |
String |
Configure an advanced forwarding rule. ${svc_name} indicates the Service name, which contains a maximum of 51 characters. If the annotation value is set to [], the advanced forwarding rule is deleted. The annotation value is in the form of a JSON array. For details, see Table 2.
NOTICE:
|
v1.23.18-r10, v1.25.16-r0, v1.27.16-r0, v1.28.13-r0, v1.29.8-r0, v1.30.4-r0, or later |
Parameters for Automatically Creating a Load Balancer
Parameter |
Mandatory |
Type |
Description |
---|---|---|---|
name |
No |
String |
Name of the automatically created load balancer. The value can contain 1 to 64 characters. Only letters, digits, underscores (_), hyphens (-), and periods (.) are allowed. Default: cce-lb+service.UID |
type |
No |
String |
Network type of the load balancer.
Default: inner |
bandwidth_name |
Yes for public network load balancers |
String |
Bandwidth name. The default value is cce-bandwidth-******. The value can contain 1 to 64 characters. Only letters, digits, underscores (_), hyphens (-), and periods (.) are allowed. |
bandwidth_chargemode |
No |
String |
Bandwidth billing mode.
Default: bandwidth |
bandwidth_size |
Yes for public network load balancers |
Integer |
Bandwidth size. The value ranges from 1 Mbit/s to 2000 Mbit/s by default. Configure this parameter based on the bandwidth range allowed in your region.
The minimum increment for bandwidth adjustment varies depending on the bandwidth range.
|
bandwidth_sharetype |
Yes for public network load balancers |
String |
Bandwidth sharing mode.
|
eip_type |
Yes for public network load balancers |
String |
EIP type.
The specific type varies with regions. For details, see the EIP console. |
vip_subnet_cidr_id |
No |
String |
Subnet where a load balancer is located. The subnet must belong to the VPC where the cluster resides. If this parameter is not specified, the ELB load balancer and the cluster are in the same subnet. This field can be specified only for clusters of v1.21 or later. |
vip_address |
No |
String |
Private IP address of the load balancer. Only IPv4 addresses are supported. The IP address must be in the ELB CIDR block. If this parameter is not specified, an IP address will be automatically assigned from the ELB CIDR block. This parameter is available only in clusters of v1.23.11-r0, v1.25.6-r0, v1.27.3-r0, or later versions. |
available_zone |
Yes |
Array of strings |
AZ where the load balancer is located. You can obtain all supported AZs by getting the AZ list. This parameter is available only for dedicated load balancers. |
l4_flavor_name |
Yes |
String |
Flavor name of the layer-4 load balancer. You can obtain all supported types by getting the flavor list. This parameter is available only for dedicated load balancers. |
l7_flavor_name |
No |
String |
Flavor name of the layer-7 load balancer. You can obtain all supported types by getting the flavor list. This parameter is available only for dedicated load balancers. The value of this parameter must be the same as that of l4_flavor_name, that is, both are elastic specifications or fixed specifications. |
elb_virsubnet_ids |
No |
Array of strings |
Subnet where the backend server of the load balancer is located. If this parameter is left blank, the default cluster subnet is used. Load balancers occupy different number of subnet IP addresses based on their specifications. Do not use the subnet CIDR blocks of other resources (such as clusters and nodes) as the load balancer CIDR block. This parameter is available only for dedicated load balancers. Example: "elb_virsubnet_ids": [ "14567f27-8ae4-42b8-ae47-9f847a4690dd" ] |
ipv6_vip_virsubnet_id |
No |
String |
ID of the IPv6 subnet where the load balancer resides. IPv6 must be enabled for the corresponding subnet. This parameter is mandatory only when the dual-stack clusters are used. This parameter is available only for dedicated load balancers. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot