a10_glid
Synopsis
Configure global limit ID
Parameters
Parameters |
Choices/Defaults |
Comment |
|
---|---|---|---|
state str/required |
[‘noop’, ‘present’, ‘absent’] |
State of the object to be created. |
|
ansible_host str/required |
Host for AXAPI authentication |
||
ansible_username str/required |
Username for AXAPI authentication |
||
ansible_password str/required |
Password for AXAPI authentication |
||
ansible_port int/required |
Port for AXAPI authentication |
||
a10_device_context_id int |
[‘1-8’] |
Device ID for aVCS configuration |
|
a10_partition str |
Destination/target partition for object/command |
||
name str/required |
Global Limit ID Name (PBSLB allows number only) |
||
description str |
Description for glid |
||
rate_unit str |
‘1sec’= 1sec for internal glid rate unit; ‘system-global-setting’= use global rate interval; |
||
conn_limit int |
Connection Limit for the GLID (PBSLB range 1-1048575) |
||
conn_rate_limit int |
Connection rate limit per rate-interval (TPS range 1-16000000) |
||
conn_rate_limit_interval int |
Field conn_rate_limit_interval |
||
request_limit int |
Request limit |
||
request_rate_limit int |
Request rate limit |
||
request_rate_limit_interval int |
Number of 100ms |
||
dns dict |
Field dns |
||
action str |
‘cache-disable’= Disable dns cache; ‘cache-enable’= Enable dns cache; |
||
weight int |
Weight for cache entry |
||
ttl int |
TTL for cache entry (TTL in seconds) |
||
dns64 dict |
Field dns64 |
||
disable bool |
Disable |
||
exclusive_answer bool |
Exclusive Answer in DNS Response |
||
prefix str |
IPv6 prefix |
||
use_nat_pool str |
Use NAT pool specified to do reverse NAT for class list members bound to the lid |
||
pkt_rate_limit int |
Packet rate limit per rate-interval |
||
bit_rate_limit int |
Kibit (kibibit / 1024-bit) rate limit per rate-interval |
||
frag_pkt_rate_limit int |
Fragmented packet rate limit per rate-interval |
||
syn_cookie_thr int |
Syn Cookie threshold for the GLID |
||
over_limit_cfg dict |
Field over_limit_cfg |
||
over_limit_action bool |
Action to take when limit(s) exceeds |
||
action_type str |
‘drop’= Silently Drop the new connection / new packet when it exceeds limit; ‘blacklist-src’= Black List source entry for X minutes (only applied to src and src-dst entries); |
||
blacklist_src_min int |
Black List source entry for X minutes |
||
action_value str |
‘drop’= Silently Drop the new connection / new packet when it exceeds limit; ‘dns-cache-disable’= Disable dns cache when it exceeds limit; ‘dns-cache- enable’= Enable dns cache when it exceeds limit; ‘forward’= Forward the traffic even it exceeds limit; ‘reset’= Reset the connection when it exceeds limit; |
||
lockout int |
Don’t accept any new connection for certain time (Lockout duration in minutes) |
||
log bool |
Log a message |
||
log_interval int |
Log interval (minute, by default system will log every over limit instance) |
||
uuid str |
uuid of the object |
||
user_tag str |
Customized tag |
Examples
Return Values
- modified_values (changed, dict, )
Values modified (or potential changes if using check_mode) as a result of task operation
- axapi_calls (always, list, )
Sequential list of AXAPI calls made by the task
- endpoint (, str, [‘/axapi/v3/slb/virtual_server’, ‘/axapi/v3/file/ssl-cert’])
The AXAPI endpoint being accessed.
- http_method (, str, [‘POST’, ‘GET’])
HTTP method being used by the primary task to interact with the AXAPI endpoint.
- request_body (, complex, )
Params used to query the AXAPI
- response_body (, complex, )
Response from the AXAPI
Status
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by community.