exoscale.SecurityGroupRule
Explore with Pulumi AI
Manage Exoscale Security Group Rules.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as exoscale from "@pulumiverse/exoscale";
const mySecurityGroup = new exoscale.SecurityGroup("mySecurityGroup", {});
const mySecurityGroupRule = new exoscale.SecurityGroupRule("mySecurityGroupRule", {
securityGroupId: mySecurityGroup.id,
type: "INGRESS",
protocol: "TCP",
cidr: "0.0.0.0/0",
startPort: 80,
endPort: 80,
});
import pulumi
import pulumiverse_exoscale as exoscale
my_security_group = exoscale.SecurityGroup("mySecurityGroup")
my_security_group_rule = exoscale.SecurityGroupRule("mySecurityGroupRule",
security_group_id=my_security_group.id,
type="INGRESS",
protocol="TCP",
cidr="0.0.0.0/0",
start_port=80,
end_port=80)
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-exoscale/sdk/go/exoscale"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
mySecurityGroup, err := exoscale.NewSecurityGroup(ctx, "mySecurityGroup", nil)
if err != nil {
return err
}
_, err = exoscale.NewSecurityGroupRule(ctx, "mySecurityGroupRule", &exoscale.SecurityGroupRuleArgs{
SecurityGroupId: mySecurityGroup.ID(),
Type: pulumi.String("INGRESS"),
Protocol: pulumi.String("TCP"),
Cidr: pulumi.String("0.0.0.0/0"),
StartPort: pulumi.Int(80),
EndPort: pulumi.Int(80),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Exoscale = Pulumiverse.Exoscale;
return await Deployment.RunAsync(() =>
{
var mySecurityGroup = new Exoscale.SecurityGroup("mySecurityGroup");
var mySecurityGroupRule = new Exoscale.SecurityGroupRule("mySecurityGroupRule", new()
{
SecurityGroupId = mySecurityGroup.Id,
Type = "INGRESS",
Protocol = "TCP",
Cidr = "0.0.0.0/0",
StartPort = 80,
EndPort = 80,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.exoscale.SecurityGroup;
import com.pulumi.exoscale.SecurityGroupRule;
import com.pulumi.exoscale.SecurityGroupRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var mySecurityGroup = new SecurityGroup("mySecurityGroup");
var mySecurityGroupRule = new SecurityGroupRule("mySecurityGroupRule", SecurityGroupRuleArgs.builder()
.securityGroupId(mySecurityGroup.id())
.type("INGRESS")
.protocol("TCP")
.cidr("0.0.0.0/0")
.startPort(80)
.endPort(80)
.build());
}
}
resources:
mySecurityGroup:
type: exoscale:SecurityGroup
mySecurityGroupRule:
type: exoscale:SecurityGroupRule
properties:
securityGroupId: ${mySecurityGroup.id}
type: INGRESS
protocol: TCP
cidr: 0.0.0.0/0
# "::/0" for IPv6
startPort: 80
endPort: 80
Please refer to the examples directory for complete configuration examples.
Create SecurityGroupRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecurityGroupRule(name: string, args: SecurityGroupRuleArgs, opts?: CustomResourceOptions);
@overload
def SecurityGroupRule(resource_name: str,
args: SecurityGroupRuleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SecurityGroupRule(resource_name: str,
opts: Optional[ResourceOptions] = None,
type: Optional[str] = None,
public_security_group: Optional[str] = None,
end_port: Optional[int] = None,
icmp_code: Optional[int] = None,
icmp_type: Optional[int] = None,
protocol: Optional[str] = None,
cidr: Optional[str] = None,
security_group: Optional[str] = None,
security_group_id: Optional[str] = None,
start_port: Optional[int] = None,
description: Optional[str] = None,
user_security_group: Optional[str] = None,
user_security_group_id: Optional[str] = None)
func NewSecurityGroupRule(ctx *Context, name string, args SecurityGroupRuleArgs, opts ...ResourceOption) (*SecurityGroupRule, error)
public SecurityGroupRule(string name, SecurityGroupRuleArgs args, CustomResourceOptions? opts = null)
public SecurityGroupRule(String name, SecurityGroupRuleArgs args)
public SecurityGroupRule(String name, SecurityGroupRuleArgs args, CustomResourceOptions options)
type: exoscale:SecurityGroupRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecurityGroupRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecurityGroupRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecurityGroupRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecurityGroupRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecurityGroupRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var securityGroupRuleResource = new Exoscale.SecurityGroupRule("securityGroupRuleResource", new()
{
Type = "string",
PublicSecurityGroup = "string",
EndPort = 0,
IcmpCode = 0,
IcmpType = 0,
Protocol = "string",
Cidr = "string",
SecurityGroupId = "string",
StartPort = 0,
Description = "string",
UserSecurityGroupId = "string",
});
example, err := exoscale.NewSecurityGroupRule(ctx, "securityGroupRuleResource", &exoscale.SecurityGroupRuleArgs{
Type: pulumi.String("string"),
PublicSecurityGroup: pulumi.String("string"),
EndPort: pulumi.Int(0),
IcmpCode: pulumi.Int(0),
IcmpType: pulumi.Int(0),
Protocol: pulumi.String("string"),
Cidr: pulumi.String("string"),
SecurityGroupId: pulumi.String("string"),
StartPort: pulumi.Int(0),
Description: pulumi.String("string"),
UserSecurityGroupId: pulumi.String("string"),
})
var securityGroupRuleResource = new SecurityGroupRule("securityGroupRuleResource", SecurityGroupRuleArgs.builder()
.type("string")
.publicSecurityGroup("string")
.endPort(0)
.icmpCode(0)
.icmpType(0)
.protocol("string")
.cidr("string")
.securityGroupId("string")
.startPort(0)
.description("string")
.userSecurityGroupId("string")
.build());
security_group_rule_resource = exoscale.SecurityGroupRule("securityGroupRuleResource",
type="string",
public_security_group="string",
end_port=0,
icmp_code=0,
icmp_type=0,
protocol="string",
cidr="string",
security_group_id="string",
start_port=0,
description="string",
user_security_group_id="string")
const securityGroupRuleResource = new exoscale.SecurityGroupRule("securityGroupRuleResource", {
type: "string",
publicSecurityGroup: "string",
endPort: 0,
icmpCode: 0,
icmpType: 0,
protocol: "string",
cidr: "string",
securityGroupId: "string",
startPort: 0,
description: "string",
userSecurityGroupId: "string",
});
type: exoscale:SecurityGroupRule
properties:
cidr: string
description: string
endPort: 0
icmpCode: 0
icmpType: 0
protocol: string
publicSecurityGroup: string
securityGroupId: string
startPort: 0
type: string
userSecurityGroupId: string
SecurityGroupRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecurityGroupRule resource accepts the following input properties:
- Type string
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - Cidr string
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - Description string
- ❗ A free-form text describing the security group rule.
- End
Port int - ❗ A
TCP
/UDP
port range to match. - Icmp
Code int - ❗ An ICMP/ICMPv6 type/code to match.
- Icmp
Type int - ❗ An ICMP/ICMPv6 type/code to match.
- Protocol string
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - Public
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - Security
Group string - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - Security
Group stringId - ❗ The parent exoscalesecuritygroup ID.
- Start
Port int - ❗ A
TCP
/UDP
port range to match. - User
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - User
Security stringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- Type string
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - Cidr string
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - Description string
- ❗ A free-form text describing the security group rule.
- End
Port int - ❗ A
TCP
/UDP
port range to match. - Icmp
Code int - ❗ An ICMP/ICMPv6 type/code to match.
- Icmp
Type int - ❗ An ICMP/ICMPv6 type/code to match.
- Protocol string
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - Public
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - Security
Group string - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - Security
Group stringId - ❗ The parent exoscalesecuritygroup ID.
- Start
Port int - ❗ A
TCP
/UDP
port range to match. - User
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - User
Security stringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- type String
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - cidr String
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description String
- ❗ A free-form text describing the security group rule.
- end
Port Integer - ❗ A
TCP
/UDP
port range to match. - icmp
Code Integer - ❗ An ICMP/ICMPv6 type/code to match.
- icmp
Type Integer - ❗ An ICMP/ICMPv6 type/code to match.
- protocol String
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security
Group String - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security
Group StringId - ❗ The parent exoscalesecuritygroup ID.
- start
Port Integer - ❗ A
TCP
/UDP
port range to match. - user
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user
Security StringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- type string
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - cidr string
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description string
- ❗ A free-form text describing the security group rule.
- end
Port number - ❗ A
TCP
/UDP
port range to match. - icmp
Code number - ❗ An ICMP/ICMPv6 type/code to match.
- icmp
Type number - ❗ An ICMP/ICMPv6 type/code to match.
- protocol string
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security
Group string - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security
Group stringId - ❗ The parent exoscalesecuritygroup ID.
- start
Port number - ❗ A
TCP
/UDP
port range to match. - user
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user
Security stringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- type str
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - cidr str
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description str
- ❗ A free-form text describing the security group rule.
- end_
port int - ❗ A
TCP
/UDP
port range to match. - icmp_
code int - ❗ An ICMP/ICMPv6 type/code to match.
- icmp_
type int - ❗ An ICMP/ICMPv6 type/code to match.
- protocol str
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public_
security_ strgroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security_
group str - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security_
group_ strid - ❗ The parent exoscalesecuritygroup ID.
- start_
port int - ❗ A
TCP
/UDP
port range to match. - user_
security_ strgroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user_
security_ strgroup_ id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- type String
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - cidr String
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description String
- ❗ A free-form text describing the security group rule.
- end
Port Number - ❗ A
TCP
/UDP
port range to match. - icmp
Code Number - ❗ An ICMP/ICMPv6 type/code to match.
- icmp
Type Number - ❗ An ICMP/ICMPv6 type/code to match.
- protocol String
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security
Group String - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security
Group StringId - ❗ The parent exoscalesecuritygroup ID.
- start
Port Number - ❗ A
TCP
/UDP
port range to match. - user
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user
Security StringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
Outputs
All input properties are implicitly available as output properties. Additionally, the SecurityGroupRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SecurityGroupRule Resource
Get an existing SecurityGroupRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecurityGroupRuleState, opts?: CustomResourceOptions): SecurityGroupRule
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
cidr: Optional[str] = None,
description: Optional[str] = None,
end_port: Optional[int] = None,
icmp_code: Optional[int] = None,
icmp_type: Optional[int] = None,
protocol: Optional[str] = None,
public_security_group: Optional[str] = None,
security_group: Optional[str] = None,
security_group_id: Optional[str] = None,
start_port: Optional[int] = None,
type: Optional[str] = None,
user_security_group: Optional[str] = None,
user_security_group_id: Optional[str] = None) -> SecurityGroupRule
func GetSecurityGroupRule(ctx *Context, name string, id IDInput, state *SecurityGroupRuleState, opts ...ResourceOption) (*SecurityGroupRule, error)
public static SecurityGroupRule Get(string name, Input<string> id, SecurityGroupRuleState? state, CustomResourceOptions? opts = null)
public static SecurityGroupRule get(String name, Output<String> id, SecurityGroupRuleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Cidr string
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - Description string
- ❗ A free-form text describing the security group rule.
- End
Port int - ❗ A
TCP
/UDP
port range to match. - Icmp
Code int - ❗ An ICMP/ICMPv6 type/code to match.
- Icmp
Type int - ❗ An ICMP/ICMPv6 type/code to match.
- Protocol string
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - Public
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - Security
Group string - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - Security
Group stringId - ❗ The parent exoscalesecuritygroup ID.
- Start
Port int - ❗ A
TCP
/UDP
port range to match. - Type string
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - User
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - User
Security stringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- Cidr string
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - Description string
- ❗ A free-form text describing the security group rule.
- End
Port int - ❗ A
TCP
/UDP
port range to match. - Icmp
Code int - ❗ An ICMP/ICMPv6 type/code to match.
- Icmp
Type int - ❗ An ICMP/ICMPv6 type/code to match.
- Protocol string
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - Public
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - Security
Group string - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - Security
Group stringId - ❗ The parent exoscalesecuritygroup ID.
- Start
Port int - ❗ A
TCP
/UDP
port range to match. - Type string
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - User
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - User
Security stringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- cidr String
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description String
- ❗ A free-form text describing the security group rule.
- end
Port Integer - ❗ A
TCP
/UDP
port range to match. - icmp
Code Integer - ❗ An ICMP/ICMPv6 type/code to match.
- icmp
Type Integer - ❗ An ICMP/ICMPv6 type/code to match.
- protocol String
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security
Group String - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security
Group StringId - ❗ The parent exoscalesecuritygroup ID.
- start
Port Integer - ❗ A
TCP
/UDP
port range to match. - type String
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - user
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user
Security StringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- cidr string
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description string
- ❗ A free-form text describing the security group rule.
- end
Port number - ❗ A
TCP
/UDP
port range to match. - icmp
Code number - ❗ An ICMP/ICMPv6 type/code to match.
- icmp
Type number - ❗ An ICMP/ICMPv6 type/code to match.
- protocol string
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security
Group string - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security
Group stringId - ❗ The parent exoscalesecuritygroup ID.
- start
Port number - ❗ A
TCP
/UDP
port range to match. - type string
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - user
Security stringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user
Security stringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- cidr str
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description str
- ❗ A free-form text describing the security group rule.
- end_
port int - ❗ A
TCP
/UDP
port range to match. - icmp_
code int - ❗ An ICMP/ICMPv6 type/code to match.
- icmp_
type int - ❗ An ICMP/ICMPv6 type/code to match.
- protocol str
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public_
security_ strgroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security_
group str - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security_
group_ strid - ❗ The parent exoscalesecuritygroup ID.
- start_
port int - ❗ A
TCP
/UDP
port range to match. - type str
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - user_
security_ strgroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user_
security_ strgroup_ id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
- cidr String
- ❗ An (
INGRESS
) source / (EGRESS
) destination IP subnet (in CIDR notation) to match (conflicts withpublic_security_group
/user_security_group
/user_security_group_id
). - description String
- ❗ A free-form text describing the security group rule.
- end
Port Number - ❗ A
TCP
/UDP
port range to match. - icmp
Code Number - ❗ An ICMP/ICMPv6 type/code to match.
- icmp
Type Number - ❗ An ICMP/ICMPv6 type/code to match.
- protocol String
- ❗ The network protocol to match (
TCP
,UDP
,ICMP
,ICMPv6
,AH
,ESP
,GRE
,IPIP
orALL
) - public
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination public security group name to match (conflicts withcidr
/user_security_group
/user_security_group_id
). - security
Group String - ❗ The parent security group name. Please use the
security_group_id
argument along the exoscalesecuritygroup data source instead. - security
Group StringId - ❗ The parent exoscalesecuritygroup ID.
- start
Port Number - ❗ A
TCP
/UDP
port range to match. - type String
- ❗ The traffic direction to match (
INGRESS
orEGRESS
). - user
Security StringGroup - ❗ An (
INGRESS
) source / (EGRESS
) destination security group name to match (conflicts withcidr
/public_security_group
/user_security_group_id
). Please use theuser_security_group_id
argument along the exoscalesecuritygroup data source instead. - user
Security StringGroup Id - ❗ An (
INGRESS
) source / (EGRESS
) destination security group ID to match (conflicts withcidr
/public_security_group
/user_security_group)
).
Import
An existing security group rule may be imported by <security-group-ID>/<security-group-rule-ID>
:
$ pulumi import exoscale:index/securityGroupRule:SecurityGroupRule \
exoscale_security_group_rule.my_security_group_rule \
f81d4fae-7dec-11d0-a765-00a0c91e6bf6/9ecc6b8b-73d4-4211-8ced-f7f29bb79524
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- exoscale pulumiverse/pulumi-exoscale
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
exoscale
Terraform Provider.