Create a domain
Authorizations
Service account key can be used as API keys
Path Parameters
Body
250
In 'cname' dnsMode, Control Plane will configure workloads to accept traffic for the domain but will not manage DNS records for the domain. End users configure CNAME records in their own DNS pointed to the canonical workload endpoint. Currently 'cname' dnsMode requires that a tls.serverCertificate is configured when subdomain based routing is used. In 'ns' dnsMode, Control Plane will manage the subdomains and create all necessary DNS records. End users configure an NS record to forward DNS requests to the Control Plane managed DNS servers.
cname
, ns
One of gvcLink and routes may be provided. When gvcLink is configured each workload in the GVC will receive a subdomain in the form ${workload.name}.${domain.name}
http
, http2
, tcp
A list of mappings to workloads.
Modify the headers for all http requests for this route.
Manipulates HTTP headers
This option allows forwarding traffic for different host headers to different workloads. This will only be used when the target GVC has dedicated load balancing enabled and the Domain is configure for wildcard support. Contact your account manager for details.
Used to match URI paths. One of prefix OR regex may be provided. Uses the google re2 regex syntax
When provided, the URI prefix will be replaced with this string before the request is sent to the workload.
Used for TLS connections for this Domain. End users are responsible for certificate updates.
ECDHE-ECDSA-AES256-GCM-SHA384
, ECDHE-ECDSA-CHACHA20-POLY1305
, ECDHE-ECDSA-AES128-GCM-SHA256
, ECDHE-RSA-AES256-GCM-SHA384
, ECDHE-RSA-CHACHA20-POLY1305
, ECDHE-RSA-AES128-GCM-SHA256
, AES256-GCM-SHA384
, AES128-GCM-SHA256
, TLS_RSA_WITH_AES_256_GCM_SHA384
, TLS_RSA_WITH_AES_128_GCM_SHA256
, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
, TLS_CHACHA20_POLY1305_SHA256
, TLS_AES_256_GCM_SHA384
, TLS_AES_128_GCM_SHA256
, DES-CBC3-SHA
, ECDHE-RSA-AES128-SHA
, ECDHE-RSA-AES256-SHA
, AES128-SHA
, AES256-SHA
When clientCertificate is defined, requests may optionally supply a client certificate. The certificate details are included in the x-forwarded-client-cert header.
The secret will include a client certificate authority cert in PEM format used to verify requests which include client certificates. The key subject must match the domain and the key usage properties must be configured for client certificate authorization. The secret type must be keypair.
TLSV1_3
, TLSV1_2
, TLSV1_1
, TLSV1_0
Configure an optional custom server certificate for the domain. When the port number is 443 and this is not supplied, a certificate is provisioned automatically.
When provided, this is used as the server certificate authority. The secret type must be keypair and the content must be PEM encoded.
Response
The response is of type any
.