1. Packages
  2. Exoscale
  3. API Docs
  4. SecurityGroupRule
Exoscale v0.59.2 published on Monday, Jul 22, 2024 by Pulumiverse

exoscale.SecurityGroupRule

Explore with Pulumi AI

exoscale logo
Exoscale v0.59.2 published on Monday, Jul 22, 2024 by Pulumiverse

    Manage Exoscale Security Group Rules.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as exoscale from "@pulumiverse/exoscale";
    
    const mySecurityGroup = new exoscale.SecurityGroup("mySecurityGroup", {});
    const mySecurityGroupRule = new exoscale.SecurityGroupRule("mySecurityGroupRule", {
        securityGroupId: mySecurityGroup.id,
        type: "INGRESS",
        protocol: "TCP",
        cidr: "0.0.0.0/0",
        startPort: 80,
        endPort: 80,
    });
    
    import pulumi
    import pulumiverse_exoscale as exoscale
    
    my_security_group = exoscale.SecurityGroup("mySecurityGroup")
    my_security_group_rule = exoscale.SecurityGroupRule("mySecurityGroupRule",
        security_group_id=my_security_group.id,
        type="INGRESS",
        protocol="TCP",
        cidr="0.0.0.0/0",
        start_port=80,
        end_port=80)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/pulumiverse/pulumi-exoscale/sdk/go/exoscale"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		mySecurityGroup, err := exoscale.NewSecurityGroup(ctx, "mySecurityGroup", nil)
    		if err != nil {
    			return err
    		}
    		_, err = exoscale.NewSecurityGroupRule(ctx, "mySecurityGroupRule", &exoscale.SecurityGroupRuleArgs{
    			SecurityGroupId: mySecurityGroup.ID(),
    			Type:            pulumi.String("INGRESS"),
    			Protocol:        pulumi.String("TCP"),
    			Cidr:            pulumi.String("0.0.0.0/0"),
    			StartPort:       pulumi.Int(80),
    			EndPort:         pulumi.Int(80),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Exoscale = Pulumiverse.Exoscale;
    
    return await Deployment.RunAsync(() => 
    {
        var mySecurityGroup = new Exoscale.SecurityGroup("mySecurityGroup");
    
        var mySecurityGroupRule = new Exoscale.SecurityGroupRule("mySecurityGroupRule", new()
        {
            SecurityGroupId = mySecurityGroup.Id,
            Type = "INGRESS",
            Protocol = "TCP",
            Cidr = "0.0.0.0/0",
            StartPort = 80,
            EndPort = 80,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.exoscale.SecurityGroup;
    import com.pulumi.exoscale.SecurityGroupRule;
    import com.pulumi.exoscale.SecurityGroupRuleArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var mySecurityGroup = new SecurityGroup("mySecurityGroup");
    
            var mySecurityGroupRule = new SecurityGroupRule("mySecurityGroupRule", SecurityGroupRuleArgs.builder()
                .securityGroupId(mySecurityGroup.id())
                .type("INGRESS")
                .protocol("TCP")
                .cidr("0.0.0.0/0")
                .startPort(80)
                .endPort(80)
                .build());
    
        }
    }
    
    resources:
      mySecurityGroup:
        type: exoscale:SecurityGroup
      mySecurityGroupRule:
        type: exoscale:SecurityGroupRule
        properties:
          securityGroupId: ${mySecurityGroup.id}
          type: INGRESS
          protocol: TCP
          cidr: 0.0.0.0/0
          # "::/0" for IPv6
          startPort: 80
          endPort: 80
    

    Please refer to the examples directory for complete configuration examples.

    Create SecurityGroupRule Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SecurityGroupRule(name: string, args: SecurityGroupRuleArgs, opts?: CustomResourceOptions);
    @overload
    def SecurityGroupRule(resource_name: str,
                          args: SecurityGroupRuleArgs,
                          opts: Optional[ResourceOptions] = None)
    
    @overload
    def SecurityGroupRule(resource_name: str,
                          opts: Optional[ResourceOptions] = None,
                          type: Optional[str] = None,
                          public_security_group: Optional[str] = None,
                          end_port: Optional[int] = None,
                          icmp_code: Optional[int] = None,
                          icmp_type: Optional[int] = None,
                          protocol: Optional[str] = None,
                          cidr: Optional[str] = None,
                          security_group: Optional[str] = None,
                          security_group_id: Optional[str] = None,
                          start_port: Optional[int] = None,
                          description: Optional[str] = None,
                          user_security_group: Optional[str] = None,
                          user_security_group_id: Optional[str] = None)
    func NewSecurityGroupRule(ctx *Context, name string, args SecurityGroupRuleArgs, opts ...ResourceOption) (*SecurityGroupRule, error)
    public SecurityGroupRule(string name, SecurityGroupRuleArgs args, CustomResourceOptions? opts = null)
    public SecurityGroupRule(String name, SecurityGroupRuleArgs args)
    public SecurityGroupRule(String name, SecurityGroupRuleArgs args, CustomResourceOptions options)
    
    type: exoscale:SecurityGroupRule
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SecurityGroupRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SecurityGroupRuleArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SecurityGroupRuleArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SecurityGroupRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SecurityGroupRuleArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var securityGroupRuleResource = new Exoscale.SecurityGroupRule("securityGroupRuleResource", new()
    {
        Type = "string",
        PublicSecurityGroup = "string",
        EndPort = 0,
        IcmpCode = 0,
        IcmpType = 0,
        Protocol = "string",
        Cidr = "string",
        SecurityGroupId = "string",
        StartPort = 0,
        Description = "string",
        UserSecurityGroupId = "string",
    });
    
    example, err := exoscale.NewSecurityGroupRule(ctx, "securityGroupRuleResource", &exoscale.SecurityGroupRuleArgs{
    	Type:                pulumi.String("string"),
    	PublicSecurityGroup: pulumi.String("string"),
    	EndPort:             pulumi.Int(0),
    	IcmpCode:            pulumi.Int(0),
    	IcmpType:            pulumi.Int(0),
    	Protocol:            pulumi.String("string"),
    	Cidr:                pulumi.String("string"),
    	SecurityGroupId:     pulumi.String("string"),
    	StartPort:           pulumi.Int(0),
    	Description:         pulumi.String("string"),
    	UserSecurityGroupId: pulumi.String("string"),
    })
    
    var securityGroupRuleResource = new SecurityGroupRule("securityGroupRuleResource", SecurityGroupRuleArgs.builder()
        .type("string")
        .publicSecurityGroup("string")
        .endPort(0)
        .icmpCode(0)
        .icmpType(0)
        .protocol("string")
        .cidr("string")
        .securityGroupId("string")
        .startPort(0)
        .description("string")
        .userSecurityGroupId("string")
        .build());
    
    security_group_rule_resource = exoscale.SecurityGroupRule("securityGroupRuleResource",
        type="string",
        public_security_group="string",
        end_port=0,
        icmp_code=0,
        icmp_type=0,
        protocol="string",
        cidr="string",
        security_group_id="string",
        start_port=0,
        description="string",
        user_security_group_id="string")
    
    const securityGroupRuleResource = new exoscale.SecurityGroupRule("securityGroupRuleResource", {
        type: "string",
        publicSecurityGroup: "string",
        endPort: 0,
        icmpCode: 0,
        icmpType: 0,
        protocol: "string",
        cidr: "string",
        securityGroupId: "string",
        startPort: 0,
        description: "string",
        userSecurityGroupId: "string",
    });
    
    type: exoscale:SecurityGroupRule
    properties:
        cidr: string
        description: string
        endPort: 0
        icmpCode: 0
        icmpType: 0
        protocol: string
        publicSecurityGroup: string
        securityGroupId: string
        startPort: 0
        type: string
        userSecurityGroupId: string
    

    SecurityGroupRule Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SecurityGroupRule resource accepts the following input properties:

    Type string
    ❗ The traffic direction to match (INGRESS or EGRESS).
    Cidr string
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    Description string
    ❗ A free-form text describing the security group rule.
    EndPort int
    ❗ A TCP/UDP port range to match.
    IcmpCode int
    ❗ An ICMP/ICMPv6 type/code to match.
    IcmpType int
    ❗ An ICMP/ICMPv6 type/code to match.
    Protocol string
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    PublicSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    SecurityGroup string
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    SecurityGroupId string
    ❗ The parent exoscalesecuritygroup ID.
    StartPort int
    ❗ A TCP/UDP port range to match.
    UserSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    UserSecurityGroupId string
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    Type string
    ❗ The traffic direction to match (INGRESS or EGRESS).
    Cidr string
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    Description string
    ❗ A free-form text describing the security group rule.
    EndPort int
    ❗ A TCP/UDP port range to match.
    IcmpCode int
    ❗ An ICMP/ICMPv6 type/code to match.
    IcmpType int
    ❗ An ICMP/ICMPv6 type/code to match.
    Protocol string
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    PublicSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    SecurityGroup string
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    SecurityGroupId string
    ❗ The parent exoscalesecuritygroup ID.
    StartPort int
    ❗ A TCP/UDP port range to match.
    UserSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    UserSecurityGroupId string
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    type String
    ❗ The traffic direction to match (INGRESS or EGRESS).
    cidr String
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description String
    ❗ A free-form text describing the security group rule.
    endPort Integer
    ❗ A TCP/UDP port range to match.
    icmpCode Integer
    ❗ An ICMP/ICMPv6 type/code to match.
    icmpType Integer
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol String
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    publicSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    securityGroup String
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    securityGroupId String
    ❗ The parent exoscalesecuritygroup ID.
    startPort Integer
    ❗ A TCP/UDP port range to match.
    userSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    userSecurityGroupId String
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    type string
    ❗ The traffic direction to match (INGRESS or EGRESS).
    cidr string
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description string
    ❗ A free-form text describing the security group rule.
    endPort number
    ❗ A TCP/UDP port range to match.
    icmpCode number
    ❗ An ICMP/ICMPv6 type/code to match.
    icmpType number
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol string
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    publicSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    securityGroup string
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    securityGroupId string
    ❗ The parent exoscalesecuritygroup ID.
    startPort number
    ❗ A TCP/UDP port range to match.
    userSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    userSecurityGroupId string
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    type str
    ❗ The traffic direction to match (INGRESS or EGRESS).
    cidr str
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description str
    ❗ A free-form text describing the security group rule.
    end_port int
    ❗ A TCP/UDP port range to match.
    icmp_code int
    ❗ An ICMP/ICMPv6 type/code to match.
    icmp_type int
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol str
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    public_security_group str
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    security_group str
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    security_group_id str
    ❗ The parent exoscalesecuritygroup ID.
    start_port int
    ❗ A TCP/UDP port range to match.
    user_security_group str
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    user_security_group_id str
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    type String
    ❗ The traffic direction to match (INGRESS or EGRESS).
    cidr String
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description String
    ❗ A free-form text describing the security group rule.
    endPort Number
    ❗ A TCP/UDP port range to match.
    icmpCode Number
    ❗ An ICMP/ICMPv6 type/code to match.
    icmpType Number
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol String
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    publicSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    securityGroup String
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    securityGroupId String
    ❗ The parent exoscalesecuritygroup ID.
    startPort Number
    ❗ A TCP/UDP port range to match.
    userSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    userSecurityGroupId String
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SecurityGroupRule resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing SecurityGroupRule Resource

    Get an existing SecurityGroupRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SecurityGroupRuleState, opts?: CustomResourceOptions): SecurityGroupRule
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            cidr: Optional[str] = None,
            description: Optional[str] = None,
            end_port: Optional[int] = None,
            icmp_code: Optional[int] = None,
            icmp_type: Optional[int] = None,
            protocol: Optional[str] = None,
            public_security_group: Optional[str] = None,
            security_group: Optional[str] = None,
            security_group_id: Optional[str] = None,
            start_port: Optional[int] = None,
            type: Optional[str] = None,
            user_security_group: Optional[str] = None,
            user_security_group_id: Optional[str] = None) -> SecurityGroupRule
    func GetSecurityGroupRule(ctx *Context, name string, id IDInput, state *SecurityGroupRuleState, opts ...ResourceOption) (*SecurityGroupRule, error)
    public static SecurityGroupRule Get(string name, Input<string> id, SecurityGroupRuleState? state, CustomResourceOptions? opts = null)
    public static SecurityGroupRule get(String name, Output<String> id, SecurityGroupRuleState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Cidr string
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    Description string
    ❗ A free-form text describing the security group rule.
    EndPort int
    ❗ A TCP/UDP port range to match.
    IcmpCode int
    ❗ An ICMP/ICMPv6 type/code to match.
    IcmpType int
    ❗ An ICMP/ICMPv6 type/code to match.
    Protocol string
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    PublicSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    SecurityGroup string
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    SecurityGroupId string
    ❗ The parent exoscalesecuritygroup ID.
    StartPort int
    ❗ A TCP/UDP port range to match.
    Type string
    ❗ The traffic direction to match (INGRESS or EGRESS).
    UserSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    UserSecurityGroupId string
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    Cidr string
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    Description string
    ❗ A free-form text describing the security group rule.
    EndPort int
    ❗ A TCP/UDP port range to match.
    IcmpCode int
    ❗ An ICMP/ICMPv6 type/code to match.
    IcmpType int
    ❗ An ICMP/ICMPv6 type/code to match.
    Protocol string
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    PublicSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    SecurityGroup string
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    SecurityGroupId string
    ❗ The parent exoscalesecuritygroup ID.
    StartPort int
    ❗ A TCP/UDP port range to match.
    Type string
    ❗ The traffic direction to match (INGRESS or EGRESS).
    UserSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    UserSecurityGroupId string
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    cidr String
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description String
    ❗ A free-form text describing the security group rule.
    endPort Integer
    ❗ A TCP/UDP port range to match.
    icmpCode Integer
    ❗ An ICMP/ICMPv6 type/code to match.
    icmpType Integer
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol String
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    publicSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    securityGroup String
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    securityGroupId String
    ❗ The parent exoscalesecuritygroup ID.
    startPort Integer
    ❗ A TCP/UDP port range to match.
    type String
    ❗ The traffic direction to match (INGRESS or EGRESS).
    userSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    userSecurityGroupId String
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    cidr string
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description string
    ❗ A free-form text describing the security group rule.
    endPort number
    ❗ A TCP/UDP port range to match.
    icmpCode number
    ❗ An ICMP/ICMPv6 type/code to match.
    icmpType number
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol string
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    publicSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    securityGroup string
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    securityGroupId string
    ❗ The parent exoscalesecuritygroup ID.
    startPort number
    ❗ A TCP/UDP port range to match.
    type string
    ❗ The traffic direction to match (INGRESS or EGRESS).
    userSecurityGroup string
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    userSecurityGroupId string
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    cidr str
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description str
    ❗ A free-form text describing the security group rule.
    end_port int
    ❗ A TCP/UDP port range to match.
    icmp_code int
    ❗ An ICMP/ICMPv6 type/code to match.
    icmp_type int
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol str
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    public_security_group str
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    security_group str
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    security_group_id str
    ❗ The parent exoscalesecuritygroup ID.
    start_port int
    ❗ A TCP/UDP port range to match.
    type str
    ❗ The traffic direction to match (INGRESS or EGRESS).
    user_security_group str
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    user_security_group_id str
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).
    cidr String
    ❗ An (INGRESS) source / (EGRESS) destination IP subnet (in CIDR notation) to match (conflicts with public_security_group/user_security_group/user_security_group_id).
    description String
    ❗ A free-form text describing the security group rule.
    endPort Number
    ❗ A TCP/UDP port range to match.
    icmpCode Number
    ❗ An ICMP/ICMPv6 type/code to match.
    icmpType Number
    ❗ An ICMP/ICMPv6 type/code to match.
    protocol String
    ❗ The network protocol to match (TCP, UDP, ICMP, ICMPv6, AH, ESP, GRE, IPIP or ALL)
    publicSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination public security group name to match (conflicts with cidr/user_security_group/user_security_group_id).
    securityGroup String
    ❗ The parent security group name. Please use the security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of security_group_id

    securityGroupId String
    ❗ The parent exoscalesecuritygroup ID.
    startPort Number
    ❗ A TCP/UDP port range to match.
    type String
    ❗ The traffic direction to match (INGRESS or EGRESS).
    userSecurityGroup String
    ❗ An (INGRESS) source / (EGRESS) destination security group name to match (conflicts with cidr/public_security_group/user_security_group_id). Please use the user_security_group_id argument along the exoscalesecuritygroup data source instead.

    Deprecated: Deprecated in favor of user_security_group_id

    userSecurityGroupId String
    ❗ An (INGRESS) source / (EGRESS) destination security group ID to match (conflicts with cidr/public_security_group/user_security_group)).

    Import

    An existing security group rule may be imported by <security-group-ID>/<security-group-rule-ID>:

    $ pulumi import exoscale:index/securityGroupRule:SecurityGroupRule \
    

    exoscale_security_group_rule.my_security_group_rule \

    f81d4fae-7dec-11d0-a765-00a0c91e6bf6/9ecc6b8b-73d4-4211-8ced-f7f29bb79524

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    exoscale pulumiverse/pulumi-exoscale
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the exoscale Terraform Provider.
    exoscale logo
    Exoscale v0.59.2 published on Monday, Jul 22, 2024 by Pulumiverse