Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Managed Service for Kubernetes
  • Comparing with other Yandex Cloud services
  • Getting started
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
    • Overview
      • Ingress
      • HttpBackendGroup
      • GrpcBackendGroup
      • IngressClass
      • Ingress service
  • Release notes

In this article:

  • Ingress
  • ObjectMeta
  • Metadata.annotations
  • IngressSpec
  • IngressTLS
  • IngressRule
  • DefaultBackend
  • IngressGroupSettings
  1. Application Load Balancer tools
  2. Ingress controller
  3. Ingress

Ingress resource fields and annotations

Written by
Yandex Cloud
Updated at January 26, 2026
  • Ingress
  • ObjectMeta
    • Metadata.annotations
  • IngressSpec
    • IngressTLS
    • IngressRule
    • DefaultBackend
  • IngressGroupSettings

The Ingress resource defines rules for incoming traffic distribution across Kubernetes services. The Application Load Balancer ingress controller uses these rules to create a load balancer, its listeners, and HTTP routers. You can specify Application Load Balancer backend services in Ingress directly or as part of HttpBackendGroup backend groups.

Tip

We recommend using the new Yandex Cloud Gwin controller instead of an ALB Ingress controller and Gateway API.

Ingress is a standard Kubernetes resource. Below, we describe its fields and annotations used by the Application Load Balancer ingress controller. For resource configuration details, see this Kubernetes guide.

IngressIngress

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata: <ObjectMeta>
spec: <IngressSpec>

Field

Value / Type

Description

apiVersion

networking.k8s.io/v1

This is a required field.
Kubernetes API version.

kind

Ingress

Resource type.

metadata

ObjectMeta

This is a required field.
Resource metadata.

spec

IngressSpec

This is a required field.
Resource specification.

Example
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: alb-demo-tls
  annotations:
    ingress.alb.yc.io/subnets: <list_of_subnet_IDs>
    ingress.alb.yc.io/security-groups: <list_of_security_group_IDs>
    ingress.alb.yc.io/external-ipv4-address: <auto_or_static_IP_address>
    ingress.alb.yc.io/group-name: my-ingress-group
spec:
  tls:
    - hosts:
        - <domain_name>
      secretName: yc-certmgr-cert-id-<TLS_certificate_ID>
  rules:
    - host: <domain_name>
      http:
        paths:
          - path: /app1
            pathType: Prefix
            backend:
              service:
                name: alb-demo-1
                port:
                  number: 80
          - path: /app2
            pathType: Prefix
            backend:
              service:
                name: alb-demo-2
                port:
                  number: 80
          - pathType: Prefix
            path: "/"
            backend:
              service:
                name: alb-demo-2
                port:
                  name: http

ObjectMetaObjectMeta

name: <string>
annotations:
  ingress.alb.yc.io/group-name: <string>
  ingress.alb.yc.io/subnets: <string>
  ingress.alb.yc.io/security-groups: <string>
  ingress.alb.yc.io/external-ipv4-address: <string>
  ingress.alb.yc.io/internal-ipv4-address: <string>
  ingress.alb.yc.io/internal-alb-subnet: <string>
  ingress.alb.yc.io/protocol: <string>
  ingress.alb.yc.io/group-settings-name: <string>
  ingress.alb.yc.io/group-order: <string>
  ingress.alb.yc.io/transport-security: <string> # Only for versions up to but not including 0.2.0.
  ingress.alb.yc.io/prefix-rewrite: <string>
  ingress.alb.yc.io/upgrade-types: <string>
  ingress.alb.yc.io/request-timeout: <string>
  ingress.alb.yc.io/idle-timeout: <string>
  ingress.alb.yc.io/modify-header-response-append: <string>
  ingress.alb.yc.io/modify-header-response-replace: <string>
  ingress.alb.yc.io/modify-header-response-rename: <string>
  ingress.alb.yc.io/modify-header-response-remove: <string>
  ingress.alb.yc.io/modify-header-request-append: <string>
  ingress.alb.yc.io/modify-header-request-replace: <string>
  ingress.alb.yc.io/modify-header-request-rename: <string>
  ingress.alb.yc.io/modify-header-request-remove: <string>
  ingress.alb.yc.io/security-profile-id: <string>
  ingress.alb.yc.io/use-regex: <string>
  ingress.alb.yc.io/balancing-panic-threshold: <string>
  ingress.alb.yc.io/balancing-locality-aware-routing: <string>
  ingress.alb.yc.io/autoscale-max-size: <string>
  ingress.alb.yc.io/autoscale-min-zone-size: <string>
  ingress.alb.yc.io/session-affinity-header: <string>
  ingress.alb.yc.io/session-affinity-cookie: <string>
  ingress.alb.yc.io/session-affinity-connection: <string>

Field

Value / Type

Description

name

string

This is a required field.
Resource name.
Do not mistake this name for the Application Load Balancer load balancer name.

annotations

map[string]string

This is a required field.
Resource annotations.

Metadata.annotationsMetadata.annotations

Annotations are collections of key:value pairs for assigning metadata to objects. Annotation values have the string data type.

You can specify the annotation value as a comma-separated list of multiple <key>=<value> pairs:

annotation: <key>=<value>,<key>=<value>,<key>=<value>

You can map one key to multiple values. For example, to add an X-Robots response header with the noarchive,nofollow,noindex value, write the annotation as follows:

ingress.alb.yc.io/modify-header-response-replace: X-Robots-Tag=noarchive,X-Robots-Tag=nofollow,X-Robots-Tag=noindex

For more information on annotations, see this Kubernetes guide.

You can add the following annotations to ObjectMeta:

  • ingress.alb.yc.io/group-name

    Ingress resource group name. The system will create a separate load balancer for each group. You can group multiple Ingress resources to avoid creating load balancers for each individual resource. For more information about the format, see this Kubernetes guide.

    This is a required field even for one Ingress resource in a group.

  • ingress.alb.yc.io/subnets

    Virtual Private Cloud subnets where the load balancer resides. This is a comma-separated list of subnet IDs, e.g.:

    ingress.alb.yc.io/subnets: b0c2kotoidco********,e2lnhhdj9a0a********,e9bud5itjnl8********
    

    This field is required for at least one Ingress in a group, i.e., the ingress.alb.yc.io/group-name annotation, to create one load balancer. The load balancer will use all subnets specified in the relevant Ingress resources.

    All subnets of a single load balancer must be in the same network. You cannot specify more than one network per availability zone.

  • ingress.alb.yc.io/security-groups

    List of Virtual Private Cloud security groups for a load balancer. This is a comma separated list of group IDs, e.g.:

    ingress.alb.yc.io/security-groups: b0c2kotoidco********,e2lnhhdj9a0a********,e9bud5itjnl8********
    

    A load balancer created for a group of Ingress resources, i.e., the ingress.alb.yc.io/group-name annotation, uses all security groups specified in these resources.

    For the proper load balancer and Ingress controller operation, make sure to configure security groups as specified in Configuring security groups for Managed Service for Kubernetes Application Load Balancer tools.

  • ingress.alb.yc.io/external-ipv4-address

    Configuring the load balancer external IP address.

    To use a reserved IP address, put it in the annotation value. To enable automatic IP assignment for the load balancer, specify auto.

    If you set auto, deleting the ingress controller will also remove its associated IP address from the cloud. To avoid this, use a reserved IP address.

    A load balancer must be configured with either an external or internal IP address, i.e., the ingress.alb.yc.io/internal-ipv4-address annotation, but not both.

  • ingress.alb.yc.io/internal-ipv4-address

    Configuring the load balancer internal IP address.

    The IP address must belong to the subnet specified in the ingress.alb.yc.io/internal-alb-subnet annotation. To use an IP address from this subnet, specify it in the annotation. To enable automatic IP assignment for the load balancer, specify auto.

    A load balancer must be configured with either an internal or external IP address, i.e., the ingress.alb.yc.io/external-ipv4-address annotation, but not both.

  • ingress.alb.yc.io/internal-alb-subnet

    Subnet ID of the load balancer internal IP address.

    This field is required if you configure your load balancer with an internal IP address, i.e., the ingress.alb.yc.io/internal-ipv4-address annotation.

  • ingress.alb.yc.io/protocol

    Protocol for connections between the load balancer and backends defined in Ingress:

    • http: HTTP/1.1. This is a default value.
    • http2: HTTP/2.
    • grpc: gRPC.
  • ingress.alb.yc.io/group-settings-name

    Name for the Ingress resource group settings.

    To specify the settings, create an additional IngressGroupSettings resource.

  • ingress.alb.yc.io/group-order

    Ingress resource sequence number. Ingress group resource sequence numbers will define the order in which internal traffic routes will be added. Ingress resources are sorted in non-decreasing order.

    This annotation does not apply to routes specified in a single Ingress resource.

    Specify an integer value for this annotation. The default value is 0.

  • ingress.alb.yc.io/transport-security

    Warning

    In ALB Ingress Controller version 0.2.0 or later, you can only use this annotation in the Service object.

    Annotations specified in Ingress resources sharing a single service with the same backend group settings apply correctly. However, this feature is deprecated and will be discontinued.

    Encryption protocol for connections between the load balancer and backends specified in Ingress directly, without using HttpBackendGroup.

    The acceptable value is tls: TLS without certificate validation.

    If this annotation is not specified, the load balancer will connect to the backends without encryption.

    This annotation is ignored for grouped backends. To configure encryption for connections between the load balancer and grouped backends, use the spec.backend.tls field of the HttpBackendGroup resource. For more information, see this article.

  • ingress.alb.yc.io/prefix-rewrite

    URI path / gRPC call name replacements applied when routing requests to backends. The relevant paths and names are listed in the Ingress specification under rules.http.paths.

    The system will overwrite the entire path / name or its prefix based on the pathType value: pathType: Exact or pathType: Prefix, respectively.

    Example

    Specify the replacement instructing the load balancer to route incoming requests to backends with specific API versions:

    ...
    metadata:
      annotations:
        ingress.alb.yc.io/prefix-rewrite: /api/v4/
    ...
    spec:
      rules:
        - host: <domain_name>
          http:
            paths:
              - path: /api/
                pathType: Prefix
                ...
    

    Application Load Balancer will apply this replacement rule to all HTTP routers created for the Ingress resource.

  • ingress.alb.yc.io/upgrade-types

    Upgrade HTTP header values of incoming requests supported by the load balancer. Specify these values as a comma-separated list.

    For example, you can use this annotation to enable WebSocket support:

    ingress.alb.yc.io/upgrade-types: WebSocket
    

    Application Load Balancer will apply the Upgrade values to all HTTP routers created for the Ingress resource.

  • ingress.alb.yc.io/request-timeout

    Maximum duration for a connection between a load balancer node and a backend. Once this timeout expires, the load balancer will respond to the client with 504 Gateway Timeout.

    The default value is 60s.

    Application Load Balancer will apply this timeout to all HTTP routers created for the Ingress resource.

  • ingress.alb.yc.io/idle-timeout

    Maximum inactivity time for a connection between a load balancer node and a backend. Once this timeout expires, the load balancer will respond to the client with 504 Gateway Timeout.

    If this annotation is omitted, a connection can remain idle for any length of time before the timeout, i.e., the ingress.alb.yc.io/request-timeout annotation.

    Application Load Balancer will apply this timeout to all HTTP routers created for the Ingress resource.

  • ingress.alb.yc.io/modify-header-response-append

    Appends a string to the response header value. To specify the header and string, use this format:

    ingress.alb.yc.io/modify-header-response-append: <key>=<value>
    

    Where:

    • <key>: Name of the header to modify.
    • <value>: String to append to the header value.
  • ingress.alb.yc.io/modify-header-response-replace

    Replaces the response header value. To specify the header and its new value, use this format:

    ingress.alb.yc.io/modify-header-response-replace: <key>=<value>
    

    Where:

    • <key>: Name of the header to modify.
    • <value>: New header value.
  • ingress.alb.yc.io/modify-header-response-rename

    Renames the response header. To specify the header and its new name, use this format:

    ingress.alb.yc.io/modify-header-response-rename: <key>=<value>
    

    Where:

    • <key>: Name of the header to modify.
    • <value>: New header name.
  • ingress.alb.yc.io/modify-header-response-remove

    Removes the response header. To specify the header to remove, use this format:

    ingress.alb.yc.io/modify-header-response-remove: <key>=true
    

    Where <key> is the name of the header to remove.

  • ingress.alb.yc.io/modify-header-request-append

    Appends a string to the request header value. To specify the header and string, use this format:

    ingress.alb.yc.io/modify-header-request-append: <key>=<value>
    

    Where:

    • <key>: Name of the header to modify.
    • <value>: String to append to the header value.
  • ingress.alb.yc.io/modify-header-request-replace

    Replaces the request header value. To specify the header and its new value, use this format:

    ingress.alb.yc.io/modify-header-request-replace: <key>=<value>
    

    Where:

    • <key>: Name of the header to modify.
    • <value>: New header value.
  • ingress.alb.yc.io/modify-header-request-rename

    Renames the request header. To specify the header and its new name, use this format:

    ingress.alb.yc.io/modify-header-request-rename: <key>=<value>
    

    Where:

    • <key>: Name of the header to modify.
    • <value>: New header name.
  • ingress.alb.yc.io/modify-header-request-remove

    Removes the request header. To specify the header to remove, use this format:

    ingress.alb.yc.io/modify-header-request-remove: <key>=true
    

    Where <key> is the name of the header to remove.

  • ingress.alb.yc.io/security-profile-id

    Enables support for Yandex Smart Web Security, including DDoS protection, WAF, and resource overload protection.

    Note

    To connect your security profile to an Application Load Balancer virtual host, the service account used by the Ingress controller must have the smart-web-security.editor role for the folder hosting Application Load Balancer and Smart Web Security resources. For more information, see Assigning a role to a service account.

    This service checks HTTP requests to a protected resource through an L7 load balancer virtual host. Depending on check results, it forwards the requests to the protected resource, blocks them, or sends them to Yandex SmartCaptcha for additional verification.

    To enable this service, specify the Smart Web Security security profile ID in the Ingress annotation:

    ingress.alb.yc.io/security-profile-id: <security_profile_ID>
    

    This profile contains verification conditions and actions applied to incoming HTTP requests following the check results.

    If you do not have a security profile, create one.

  • ingress.alb.yc.io/use-regex

    Enables support for RE2 regular expressions when matching the request path if the true string is provided. This setting only applies when pathType is set to Exact.

  • ingress.alb.yc.io/balancing-panic-threshold

    Specifies the panic mode threshold. If the percentage of healthy endpoints falls below the specified threshold, it will trigger the panic mode.

    The default value is 0, which means the panic mode will never be activated.

  • ingress.alb.yc.io/balancing-locality-aware-routing

    Percentage of incoming traffic the load balancer forwards to its availability zone backends. The remaining traffic is evenly distributed across other availability zones.

    The default value is 0.

    For more information on locality-aware routing, see this guide.

  • ingress.alb.yc.io/autoscale-max-size

    Maximum total number of resource units. By default, it is unlimited. Make sure this value is no less than the number of load balancer availability zones multiplied by the minimum number of resource units per zone.

    Learn more about the autoscaling settings here.

  • ingress.alb.yc.io/autoscale-min-zone-size

    Minimum number of resource units per availability zone. The minimum and default value is 2.

    Learn more about the autoscaling settings here.

  • ingress.alb.yc.io/session-affinity-header

    HTTP header for session affinity.

    • name: HTTP header name.
  • ingress.alb.yc.io/session-affinity-cookie

    Cookie parameters for session affinity.

    • name: Cookie name.

    • ttl: Cookie lifetime. The value must be specified with units of measurement, e.g., 300ms or 1.5h. Acceptable units of measurement include:

      • ns, nanoseconds
      • us, microseconds
      • ms, milliseconds
      • s, seconds
      • m, minutes
      • h, hours

    The parameters are given as a comma-separated list. Here is an example:

    ...
    annotations:
      ingress.alb.yc.io/session-affinity-cookie: name=X-Example,ttl=30m
      ...
    
  • ingress.alb.yc.io/session-affinity-connection

    Indicator of using a client IP address for session affinity.

    • source-ip: true or false.

IngressSpecIngressSpec

ingressClassName: <string>
tls:
  - <IngressTLS>
  - ...
rules:
  - <IngressRule>
  - ...
defaultBackend:
  - <IngressBackend>
  - ...

Field

Value / Type

Description

ingressClassName

string

Name of the IngressClass resource associated with the Ingress resource.

When using multiple ingress controllers within a single application, the IngressClass determines which controller processes the requests. If you use multiple ingress controllers without specifying ingressClassName in your Ingress resources, you should create a default IngressClass resource.

tls

[]IngressTLS

This is a required field.
Incoming HTTPS traffic settings, i.e., domain name collections and their associated TLS certificates.

If this field is specified, the system will create two types of load balancer listeners: HTTPS listeners to serve traffic on port 443, and HTTP listeners redirecting requests on port 80 to port 443. If multiple Ingress rules apply to the same domain, rules without tls, i.e., HTTP-only, will take priority over HTTP-to-HTTPS redirects.

If this field is not specified, the system will only create listeners processing HTTP traffic on port 80.

rules

[]IngressRule

Rules for routing incoming traffic to backends, matching domain names and requested resources specified in host and http.paths fields, respectively.

In Application Load Balancer, these routing rules map to HTTP router virtual hosts.

If no routing rules are specified, you must configure a default backend to process all the traffic.

IngressTLSIngressTLS

- hosts:
    - <string>
    - ...
  secretName: <string>

Field

Value / Type

Description

hosts

[]string

This is a required field.
Domain names covered by the secretName TLS certificate.

The load balancer will create a dedicated listener for each domain name specified in the Server Name Indication (SNI) TLS extension.

To match all subdomains at any level, use a wildcard * in place of the first-level domain name. Wildcard domain values must be quoted.

For example, "*.example.com" matches foo.example.com, foo-bar.example.com, foo.bar.example.com, and foo.bar.baz.example.com, but not example.com.

Wildcards must replace complete domain levels; for example, *foo.example.com is invalid.

secretName

string

This is a required field.
Yandex Certificate Manager TLS certificate in yc-certmgr-cert-id-<certificate ID> format. You can use this name to access the certificate secret in Managed Service for Kubernetes.

In Certificate Manager, you can either issue a Let's Encrypt® certificate or upload your own custom certificate.

If the certificate is not available in Certificate Manager, provide it through a Kubernetes secret by specifying its name in the secretName field. Application Load Balancer Ingress controller will automatically add this certificate to Certificate Manager.

IngressRuleIngressRule

- host: <string>
  http:
    paths:
      - path: <string>
        pathType: <string>
        backend: <IngressBackend>

Pre-0.2.0 ALB Ingress Controller versions map each backend group to a distinct combination of host, http.paths.path, and http.paths.pathType values. ALB Ingress Controller 0.2.0 and later maps backend groups directly to the backend.service configuration, i.e., IngressBackend. This may cause collisions when upgrading the controller. To avoid them, check the upgrade restrictions for your infrastructure.

Field

Value / Type

Description

host

string

This is a required field.
Domain name, i.e., the HTTP/1.1 Host or HTTP/2 :authority header value, to which this rule applies.

To match all subdomains at any level, use a wildcard * in place of the first-level domain name. Wildcard domain values must be quoted.

For example, "*.example.com" matches foo.example.com, foo-bar.example.com, foo.bar.example.com, and foo.bar.baz.example.com, but not example.com.

Wildcards must replace complete domain levels; for example, *foo.example.com is invalid.

http

HTTPIngressRuleValue

This is a required field.
Rule that distributes incoming requests based on the domain name specified in the host field and the requested resource path.

http.paths

[]HTTPIngressPath

This is a required field.
Requested resource paths and their associated backends for this rule.

The order of paths matters because only the first path matching the incoming request will be used for routing. Therefore, we recommend listing your most specific paths first. This behavior differs from the Kubernetes standard path prioritization logic, where longer paths, i.e., the rules.http.paths.path field, take precedence.

Warning

When multiple Ingress resources (with the same ingress.alb.yc.io/group-name annotation value) share the same load balancer and define rules for the same domain name, route ordering is only enforced within individual Ingress resources, not across them.

http.paths.path

string

This is a required field.
Requested resource path:

  • For HTTP protocol, it is incoming request URI or its prefix for Exact or Prefix path types, respectively.
  • For gRPC protocol, i.e., the grpc ingress.alb.yc.io/protocol annotation value, it is the full gRPC method name or its prefix for Exact or Prefix path types, respectively, e.g., /my.custom.server.Service/Method.

In both cases, the path must begin with /.

http.paths.pathType

string

This is a required field.
Requested resource path type:

  • Exact: Request URI path or gRPC method name must match the rules.http.paths.path field value.
  • Prefix: Request URI path or gRPC method name must begin with the rules.http.paths.path field value.

The selected path type will affect traffic distribution and the path replacement mechanism for backend requests if it is configured using the ingress.alb.yc.io/prefix-rewrite annotation.

http.paths.backend

IngressBackend

This is a required field.
Backend or group of backends to process requests with the specified domain name and URI path or gRPC call name.

IngressBackendIngressBackend

service:
  name: <string>
  port:
    name: <string>
    number: <int32>
resource:
  kind: HttpBackendGroup
  name: <string>
  apiGroup: alb.yc.io

Field

Value / Type

Description

service

IngressServiceBackend

This is a required field.
Reference to the Kubernetes service to process requests as a backend.

The referred Service resource must be described per the standard configuration.

Each spec.rules.http.paths entry must be either a service backend or a backend group, i.e., resource, but not both.

  • name (string, required):

    Kubernetes service name.

  • port (ServiceBackendPort, required):

    Service port to which Ingress will direct traffic.

    The field is designed for ingress controller operation and has no equivalents in Application Load Balancer.

    • name (string):

      Service port name.

      This name must match one of the Service resource spec.ports.name values. For more information, see the resource specification.

      You must specify either the service port name or its number, but not both.

    • number (int32):

      Service port number.

      This number must match one of the Service resource spec.ports.port values. For more information, see the resource specification.

      You must specify either the service port name or its number, but not both.

resource

TypedLocalObjectReference

This is a required field.
Backend group for processing requests.

The Ingress controller implements the HttpBackendGroup resource this field points to as a custom resource. The referenced resource must comply with the standard configuration requirements.

Each spec.rules.http.paths entry must be either a backend group or a service backend, i.e., service resource, but not both.

  • kind: HttpBackendGroup

  • name (string): Backend group name

    This name must match the metadata.name value of the HttpBackendGroup resource. For more information, see the resource configuration.

  • apiGroup: alb.yc.io

DefaultBackendDefaultBackend

Default backend for requests if no incoming traffic distribution rules are specified. If the spec.rules field is not specified in the Ingress description, the spec.defaultBackend field becomes mandatory.

The default backend handles requests if the domain name and requested resource do not match the ones set in the rules.

The spec.defaultBackend field defines either a service backend, i.e., service, or a backend group, i.e., resource. Specify this field the same way as IngressBackend.

spec.defaultBackend.service example
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: testapp-ingress-with-default-backend
  namespace: testapp-ns
  annotations:
    ...
spec:
  defaultBackend:
    service:
      name: testapp-service
      port:
        name: http
spec.defaultBackend.resource example
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: ingress-1
  annotations:
    ...
spec:
  defaultBackend:
    resource:
      apiGroup: alb.yc.io
      kind: HttpBackendGroup
      name: bg-with-bucket

Warning

You can only specify one default backend for a single Ingress resource group, i.e., with the same ingress.alb.yc.io/group-name annotation value.

IngressGroupSettingsIngressGroupSettings

apiVersion: alb.yc.io/v1alpha1
kind: IngressGroupSettings
metadata:
  name: non-default-settings
logOptions:
  logGroupID: <log_group_ID>
  discardRules:
    - discardPercent: 50
      grpcCodes:
        - OK
        - CANCELLED
        - UNKNOWN
    - discardPercent: 67
      httpCodeIntervals:
        - HTTP_1XX
    - discardPercent: 20
      httpCodes:
        - 200
        - 404

Specify the log group ID and log discard rule settings:

  • httpCodes: HTTP codes.
  • httpCodeIntervals: HTTP code classes.
  • grpcCodes: gRPC codes.
  • discardPercent: Log discard rate.

Was the article helpful?

Previous
YCStorageBucket
Next
HttpBackendGroup
© 2026 Direct Cursus Technology L.L.C.