diff --git a/url_map_custom_error_response_policy/backing_file.tf b/url_map_custom_error_response_policy/backing_file.tf new file mode 100644 index 00000000..c60b1199 --- /dev/null +++ b/url_map_custom_error_response_policy/backing_file.tf @@ -0,0 +1,15 @@ +# This file has some scaffolding to make sure that names are unique and that +# a region and zone are selected when you try to create your Terraform resources. + +locals { + name_suffix = "${random_pet.suffix.id}" +} + +resource "random_pet" "suffix" { + length = 2 +} + +provider "google" { + region = "us-central1" + zone = "us-central1-c" +} diff --git a/url_map_custom_error_response_policy/main.tf b/url_map_custom_error_response_policy/main.tf new file mode 100644 index 00000000..393d8179 --- /dev/null +++ b/url_map_custom_error_response_policy/main.tf @@ -0,0 +1,81 @@ +resource "google_compute_url_map" "urlmap" { + name = "urlmap-${local.name_suffix}" + description = "a description" + + default_service = google_compute_backend_service.example.id + + default_custom_error_response_policy { + error_response_rule { + match_response_codes = ["5xx"] # Catch all 5xx responses + path = "/internal_error.html" # Serve /internal_error.html from error service + override_response_code = 502 + } + error_service = google_compute_backend_bucket.error.id + } + + host_rule { + hosts = ["mysite.com"] + path_matcher = "mysite" + } + + path_matcher { + name = "mysite" + default_service = google_compute_backend_service.example.id + + default_custom_error_response_policy { + error_response_rule { + match_response_codes = ["4xx", "5xx"] # Catch all 4xx and 5xx responses + path = "/login_error.html" # Serve /login_error.html from the error service + override_response_code = 404 + } + error_response_rule { + match_response_codes = ["503"] # Catch only 503 responses + path = "/bad_gateway.html" # Serve /bad_gateway.html from the error service + override_response_code = 502 + } + error_service = google_compute_backend_bucket.error.id + } + + path_rule { + paths = ["/private/*"] + service = google_compute_backend_service.example.id + + custom_error_response_policy { + error_response_rule { + match_response_codes = ["4xx"] # Catch all 4xx responses under /private/* + path = "/login.html" # Serve /login.html from the error service + override_response_code = 401 + } + error_service = google_compute_backend_bucket.error.id + } + } + } +} + +resource "google_compute_backend_service" "example" { + name = "login-${local.name_suffix}" + port_name = "http" + protocol = "HTTP" + timeout_sec = 10 + load_balancing_scheme = "EXTERNAL_MANAGED" + + health_checks = [google_compute_http_health_check.default.id] +} + +resource "google_compute_http_health_check" "default" { + name = "health-check-${local.name_suffix}" + request_path = "/" + check_interval_sec = 1 + timeout_sec = 1 +} + +resource "google_compute_backend_bucket" "error" { + name = "error-backend-bucket-${local.name_suffix}" + bucket_name = google_storage_bucket.error.name + enable_cdn = true +} + +resource "google_storage_bucket" "error" { + name = "static-asset-bucket-${local.name_suffix}" + location = "US" +} diff --git a/url_map_custom_error_response_policy/motd b/url_map_custom_error_response_policy/motd new file mode 100644 index 00000000..45a906e8 --- /dev/null +++ b/url_map_custom_error_response_policy/motd @@ -0,0 +1,7 @@ +=== + +These examples use real resources that will be billed to the +Google Cloud Platform project you use - so make sure that you +run "terraform destroy" before quitting! + +=== diff --git a/url_map_custom_error_response_policy/tutorial.md b/url_map_custom_error_response_policy/tutorial.md new file mode 100644 index 00000000..616e9eba --- /dev/null +++ b/url_map_custom_error_response_policy/tutorial.md @@ -0,0 +1,79 @@ +# Url Map Custom Error Response Policy - Terraform + +## Setup + + + +Welcome to Terraform in Google Cloud Shell! We need you to let us know what project you'd like to use with Terraform. + + + +Terraform provisions real GCP resources, so anything you create in this session will be billed against this project. + +## Terraforming! + +Let's use {{project-id}} with Terraform! Click the Cloud Shell icon below to copy the command +to your shell, and then run it from the shell by pressing Enter/Return. Terraform will pick up +the project name from the environment variable. + +```bash +export GOOGLE_CLOUD_PROJECT={{project-id}} +``` + +After that, let's get Terraform started. Run the following to pull in the providers. + +```bash +terraform init +``` + +With the providers downloaded and a project set, you're ready to use Terraform. Go ahead! + +```bash +terraform apply +``` + +Terraform will show you what it plans to do, and prompt you to accept. Type "yes" to accept the plan. + +```bash +yes +``` + + +## Post-Apply + +### Editing your config + +Now you've provisioned your resources in GCP! If you run a "plan", you should see no changes needed. + +```bash +terraform plan +``` + +So let's make a change! Try editing a number, or appending a value to the name in the editor. Then, +run a 'plan' again. + +```bash +terraform plan +``` + +Afterwards you can run an apply, which implicitly does a plan and shows you the intended changes +at the 'yes' prompt. + +```bash +terraform apply +``` + +```bash +yes +``` + +## Cleanup + +Run the following to remove the resources Terraform provisioned: + +```bash +terraform destroy +``` +```bash +yes +```