Oracle Cloud Infrastructure v2.11.0 published on Thursday, Sep 19, 2024 by Pulumi
oci.Core.getNetworkSecurityGroupSecurityRules
Explore with Pulumi AI
This data source provides the list of Network Security Group Security Rules in Oracle Cloud Infrastructure Core service.
Lists the security rules in the specified network security group.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testNetworkSecurityGroupSecurityRules = oci.Core.getNetworkSecurityGroupSecurityRules({
networkSecurityGroupId: testNetworkSecurityGroup.id,
direction: networkSecurityGroupSecurityRuleDirection,
});
import pulumi
import pulumi_oci as oci
test_network_security_group_security_rules = oci.Core.get_network_security_group_security_rules(network_security_group_id=test_network_security_group["id"],
direction=network_security_group_security_rule_direction)
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/Core"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Core.GetNetworkSecurityGroupSecurityRules(ctx, &core.GetNetworkSecurityGroupSecurityRulesArgs{
NetworkSecurityGroupId: testNetworkSecurityGroup.Id,
Direction: pulumi.StringRef(networkSecurityGroupSecurityRuleDirection),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testNetworkSecurityGroupSecurityRules = Oci.Core.GetNetworkSecurityGroupSecurityRules.Invoke(new()
{
NetworkSecurityGroupId = testNetworkSecurityGroup.Id,
Direction = networkSecurityGroupSecurityRuleDirection,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Core.CoreFunctions;
import com.pulumi.oci.Core.inputs.GetNetworkSecurityGroupSecurityRulesArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testNetworkSecurityGroupSecurityRules = CoreFunctions.getNetworkSecurityGroupSecurityRules(GetNetworkSecurityGroupSecurityRulesArgs.builder()
.networkSecurityGroupId(testNetworkSecurityGroup.id())
.direction(networkSecurityGroupSecurityRuleDirection)
.build());
}
}
variables:
testNetworkSecurityGroupSecurityRules:
fn::invoke:
Function: oci:Core:getNetworkSecurityGroupSecurityRules
Arguments:
networkSecurityGroupId: ${testNetworkSecurityGroup.id}
direction: ${networkSecurityGroupSecurityRuleDirection}
Using getNetworkSecurityGroupSecurityRules
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getNetworkSecurityGroupSecurityRules(args: GetNetworkSecurityGroupSecurityRulesArgs, opts?: InvokeOptions): Promise<GetNetworkSecurityGroupSecurityRulesResult>
function getNetworkSecurityGroupSecurityRulesOutput(args: GetNetworkSecurityGroupSecurityRulesOutputArgs, opts?: InvokeOptions): Output<GetNetworkSecurityGroupSecurityRulesResult>
def get_network_security_group_security_rules(direction: Optional[str] = None,
filters: Optional[Sequence[_core.GetNetworkSecurityGroupSecurityRulesFilter]] = None,
network_security_group_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetNetworkSecurityGroupSecurityRulesResult
def get_network_security_group_security_rules_output(direction: Optional[pulumi.Input[str]] = None,
filters: Optional[pulumi.Input[Sequence[pulumi.Input[_core.GetNetworkSecurityGroupSecurityRulesFilterArgs]]]] = None,
network_security_group_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetNetworkSecurityGroupSecurityRulesResult]
func GetNetworkSecurityGroupSecurityRules(ctx *Context, args *GetNetworkSecurityGroupSecurityRulesArgs, opts ...InvokeOption) (*GetNetworkSecurityGroupSecurityRulesResult, error)
func GetNetworkSecurityGroupSecurityRulesOutput(ctx *Context, args *GetNetworkSecurityGroupSecurityRulesOutputArgs, opts ...InvokeOption) GetNetworkSecurityGroupSecurityRulesResultOutput
> Note: This function is named GetNetworkSecurityGroupSecurityRules
in the Go SDK.
public static class GetNetworkSecurityGroupSecurityRules
{
public static Task<GetNetworkSecurityGroupSecurityRulesResult> InvokeAsync(GetNetworkSecurityGroupSecurityRulesArgs args, InvokeOptions? opts = null)
public static Output<GetNetworkSecurityGroupSecurityRulesResult> Invoke(GetNetworkSecurityGroupSecurityRulesInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetNetworkSecurityGroupSecurityRulesResult> getNetworkSecurityGroupSecurityRules(GetNetworkSecurityGroupSecurityRulesArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:Core/getNetworkSecurityGroupSecurityRules:getNetworkSecurityGroupSecurityRules
arguments:
# arguments dictionary
The following arguments are supported:
- Network
Security stringGroup Id - The OCID of the network security group.
- Direction string
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - Filters
List<Get
Network Security Group Security Rules Filter>
- Network
Security stringGroup Id - The OCID of the network security group.
- Direction string
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - Filters
[]Get
Network Security Group Security Rules Filter
- network
Security StringGroup Id - The OCID of the network security group.
- direction String
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - filters
List<Get
Network Security Group Security Rules Filter>
- network
Security stringGroup Id - The OCID of the network security group.
- direction string
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - filters
Get
Network Security Group Security Rules Filter[]
- network_
security_ strgroup_ id - The OCID of the network security group.
- direction str
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - filters
Sequence[core.
Get Network Security Group Security Rules Filter]
- network
Security StringGroup Id - The OCID of the network security group.
- direction String
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - filters List<Property Map>
getNetworkSecurityGroupSecurityRules Result
The following output properties are available:
- Id string
- The provider-assigned unique ID for this managed resource.
- Network
Security stringGroup Id - Security
Rules List<GetNetwork Security Group Security Rules Security Rule> - The list of security_rules.
- Direction string
- Direction of the security rule. Set to
EGRESS
for rules to allow outbound IP packets, orINGRESS
for rules to allow inbound IP packets. - Filters
List<Get
Network Security Group Security Rules Filter>
- Id string
- The provider-assigned unique ID for this managed resource.
- Network
Security stringGroup Id - Security
Rules []GetNetwork Security Group Security Rules Security Rule - The list of security_rules.
- Direction string
- Direction of the security rule. Set to
EGRESS
for rules to allow outbound IP packets, orINGRESS
for rules to allow inbound IP packets. - Filters
[]Get
Network Security Group Security Rules Filter
- id String
- The provider-assigned unique ID for this managed resource.
- network
Security StringGroup Id - security
Rules List<GetNetwork Security Group Security Rules Security Rule> - The list of security_rules.
- direction String
- Direction of the security rule. Set to
EGRESS
for rules to allow outbound IP packets, orINGRESS
for rules to allow inbound IP packets. - filters
List<Get
Network Security Group Security Rules Filter>
- id string
- The provider-assigned unique ID for this managed resource.
- network
Security stringGroup Id - security
Rules GetNetwork Security Group Security Rules Security Rule[] - The list of security_rules.
- direction string
- Direction of the security rule. Set to
EGRESS
for rules to allow outbound IP packets, orINGRESS
for rules to allow inbound IP packets. - filters
Get
Network Security Group Security Rules Filter[]
- id str
- The provider-assigned unique ID for this managed resource.
- network_
security_ strgroup_ id - security_
rules Sequence[core.Get Network Security Group Security Rules Security Rule] - The list of security_rules.
- direction str
- Direction of the security rule. Set to
EGRESS
for rules to allow outbound IP packets, orINGRESS
for rules to allow inbound IP packets. - filters
Sequence[core.
Get Network Security Group Security Rules Filter]
- id String
- The provider-assigned unique ID for this managed resource.
- network
Security StringGroup Id - security
Rules List<Property Map> - The list of security_rules.
- direction String
- Direction of the security rule. Set to
EGRESS
for rules to allow outbound IP packets, orINGRESS
for rules to allow inbound IP packets. - filters List<Property Map>
Supporting Types
GetNetworkSecurityGroupSecurityRulesFilter
GetNetworkSecurityGroupSecurityRulesSecurityRule
- Description string
- An optional description of your choice for the rule.
- Destination string
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- Destination
Type string - Type of destination for the rule. Required if
direction
=EGRESS
. - Direction string
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - Icmp
Options List<GetNetwork Security Group Security Rules Security Rule Icmp Option> - Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- Id string
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example:
04ABEC
- Is
Valid bool - Whether the rule is valid. The value is
True
when the rule is first created. If the rule'ssource
ordestination
is a network security group, the value changes toFalse
if that network security group is deleted. - Protocol string
- The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - Source string
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- Source
Type string - Type of source for the rule. Required if
direction
=INGRESS
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).NETWORK_SECURITY_GROUP
: If the rule'ssource
is the OCID of a NetworkSecurityGroup.
- Stateless bool
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- Tcp
Options List<GetNetwork Security Group Security Rules Security Rule Tcp Option> - Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- Time
Created string - The date and time the security rule was created. Format defined by RFC3339.
- Udp
Options List<GetNetwork Security Group Security Rules Security Rule Udp Option> - Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- Description string
- An optional description of your choice for the rule.
- Destination string
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- Destination
Type string - Type of destination for the rule. Required if
direction
=EGRESS
. - Direction string
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - Icmp
Options []GetNetwork Security Group Security Rules Security Rule Icmp Option - Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- Id string
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example:
04ABEC
- Is
Valid bool - Whether the rule is valid. The value is
True
when the rule is first created. If the rule'ssource
ordestination
is a network security group, the value changes toFalse
if that network security group is deleted. - Protocol string
- The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - Source string
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- Source
Type string - Type of source for the rule. Required if
direction
=INGRESS
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).NETWORK_SECURITY_GROUP
: If the rule'ssource
is the OCID of a NetworkSecurityGroup.
- Stateless bool
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- Tcp
Options []GetNetwork Security Group Security Rules Security Rule Tcp Option - Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- Time
Created string - The date and time the security rule was created. Format defined by RFC3339.
- Udp
Options []GetNetwork Security Group Security Rules Security Rule Udp Option - Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description String
- An optional description of your choice for the rule.
- destination String
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destination
Type String - Type of destination for the rule. Required if
direction
=EGRESS
. - direction String
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - icmp
Options List<GetNetwork Security Group Security Rules Security Rule Icmp Option> - Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id String
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example:
04ABEC
- is
Valid Boolean - Whether the rule is valid. The value is
True
when the rule is first created. If the rule'ssource
ordestination
is a network security group, the value changes toFalse
if that network security group is deleted. - protocol String
- The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source String
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- source
Type String - Type of source for the rule. Required if
direction
=INGRESS
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).NETWORK_SECURITY_GROUP
: If the rule'ssource
is the OCID of a NetworkSecurityGroup.
- stateless Boolean
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options List<GetNetwork Security Group Security Rules Security Rule Tcp Option> - Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- time
Created String - The date and time the security rule was created. Format defined by RFC3339.
- udp
Options List<GetNetwork Security Group Security Rules Security Rule Udp Option> - Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description string
- An optional description of your choice for the rule.
- destination string
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destination
Type string - Type of destination for the rule. Required if
direction
=EGRESS
. - direction string
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - icmp
Options GetNetwork Security Group Security Rules Security Rule Icmp Option[] - Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id string
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example:
04ABEC
- is
Valid boolean - Whether the rule is valid. The value is
True
when the rule is first created. If the rule'ssource
ordestination
is a network security group, the value changes toFalse
if that network security group is deleted. - protocol string
- The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source string
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- source
Type string - Type of source for the rule. Required if
direction
=INGRESS
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).NETWORK_SECURITY_GROUP
: If the rule'ssource
is the OCID of a NetworkSecurityGroup.
- stateless boolean
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options GetNetwork Security Group Security Rules Security Rule Tcp Option[] - Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- time
Created string - The date and time the security rule was created. Format defined by RFC3339.
- udp
Options GetNetwork Security Group Security Rules Security Rule Udp Option[] - Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description str
- An optional description of your choice for the rule.
- destination str
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destination_
type str - Type of destination for the rule. Required if
direction
=EGRESS
. - direction str
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - icmp_
options Sequence[core.Get Network Security Group Security Rules Security Rule Icmp Option] - Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id str
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example:
04ABEC
- is_
valid bool - Whether the rule is valid. The value is
True
when the rule is first created. If the rule'ssource
ordestination
is a network security group, the value changes toFalse
if that network security group is deleted. - protocol str
- The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source str
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- source_
type str - Type of source for the rule. Required if
direction
=INGRESS
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).NETWORK_SECURITY_GROUP
: If the rule'ssource
is the OCID of a NetworkSecurityGroup.
- stateless bool
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp_
options Sequence[core.Get Network Security Group Security Rules Security Rule Tcp Option] - Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- time_
created str - The date and time the security rule was created. Format defined by RFC3339.
- udp_
options Sequence[core.Get Network Security Group Security Rules Security Rule Udp Option] - Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
- description String
- An optional description of your choice for the rule.
- destination String
- Conceptually, this is the range of IP addresses that a packet originating from the instance can go to.
- destination
Type String - Type of destination for the rule. Required if
direction
=EGRESS
. - direction String
- Direction of the security rule. Set to
EGRESS
for rules that allow outbound IP packets, orINGRESS
for rules that allow inbound IP packets. - icmp
Options List<Property Map> - Optional and valid only for ICMP and ICMPv6. Use to specify a particular ICMP type and code as defined in:
- id String
- An Oracle-assigned identifier for the security rule. You specify this ID when you want to update or delete the rule. Example:
04ABEC
- is
Valid Boolean - Whether the rule is valid. The value is
True
when the rule is first created. If the rule'ssource
ordestination
is a network security group, the value changes toFalse
if that network security group is deleted. - protocol String
- The transport protocol. Specify either
all
or an IPv4 protocol number as defined in Protocol Numbers. Options are supported only for ICMP ("1"), TCP ("6"), UDP ("17"), and ICMPv6 ("58"). - source String
- Conceptually, this is the range of IP addresses that a packet coming into the instance can come from.
- source
Type String - Type of source for the rule. Required if
direction
=INGRESS
.CIDR_BLOCK
: If the rule'ssource
is an IP address range in CIDR notation.SERVICE_CIDR_BLOCK
: If the rule'ssource
is thecidrBlock
value for a Service (the rule is for traffic coming from a particularService
through a service gateway).NETWORK_SECURITY_GROUP
: If the rule'ssource
is the OCID of a NetworkSecurityGroup.
- stateless Boolean
- A stateless rule allows traffic in one direction. Remember to add a corresponding stateless rule in the other direction if you need to support bidirectional traffic. For example, if egress traffic allows TCP destination port 80, there should be an ingress rule to allow TCP source port 80. Defaults to false, which means the rule is stateful and a corresponding rule is not necessary for bidirectional traffic.
- tcp
Options List<Property Map> - Optional and valid only for TCP. Use to specify particular destination ports for TCP rules. If you specify TCP as the protocol but omit this object, then all destination ports are allowed.
- time
Created String - The date and time the security rule was created. Format defined by RFC3339.
- udp
Options List<Property Map> - Optional and valid only for UDP. Use to specify particular destination ports for UDP rules. If you specify UDP as the protocol but omit this object, then all destination ports are allowed.
GetNetworkSecurityGroupSecurityRulesSecurityRuleIcmpOption
GetNetworkSecurityGroupSecurityRulesSecurityRuleTcpOption
GetNetworkSecurityGroupSecurityRulesSecurityRuleTcpOptionDestinationPortRange
GetNetworkSecurityGroupSecurityRulesSecurityRuleTcpOptionSourcePortRange
GetNetworkSecurityGroupSecurityRulesSecurityRuleUdpOption
GetNetworkSecurityGroupSecurityRulesSecurityRuleUdpOptionDestinationPortRange
GetNetworkSecurityGroupSecurityRulesSecurityRuleUdpOptionSourcePortRange
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.