scaleway.InstanceSecurityGroupRules
Explore with Pulumi AI
Creates and manages Scaleway compute Instance security group rules. For more information, see the documentation.
This resource can be used to externalize rules from a scaleway.InstanceSecurityGroup
to solve circular dependency problems. When using this resource do not forget to set external_rules = true
on the security group.
Warning: In order to guaranty rules order in a given security group only one scaleway.InstanceSecurityGroupRules is allowed per security group.
Example Usage
Basic
import * as pulumi from "@pulumi/pulumi";
import * as scaleway from "@pulumiverse/scaleway";
const sg01 = new scaleway.InstanceSecurityGroup("sg01", {externalRules: true});
const sgrs01 = new scaleway.InstanceSecurityGroupRules("sgrs01", {
securityGroupId: sg01.id,
inboundRules: [{
action: "accept",
port: 80,
ipRange: "0.0.0.0/0",
}],
});
import pulumi
import pulumiverse_scaleway as scaleway
sg01 = scaleway.InstanceSecurityGroup("sg01", external_rules=True)
sgrs01 = scaleway.InstanceSecurityGroupRules("sgrs01",
security_group_id=sg01.id,
inbound_rules=[scaleway.InstanceSecurityGroupRulesInboundRuleArgs(
action="accept",
port=80,
ip_range="0.0.0.0/0",
)])
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/pulumiverse/pulumi-scaleway/sdk/go/scaleway"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
sg01, err := scaleway.NewInstanceSecurityGroup(ctx, "sg01", &scaleway.InstanceSecurityGroupArgs{
ExternalRules: pulumi.Bool(true),
})
if err != nil {
return err
}
_, err = scaleway.NewInstanceSecurityGroupRules(ctx, "sgrs01", &scaleway.InstanceSecurityGroupRulesArgs{
SecurityGroupId: sg01.ID(),
InboundRules: scaleway.InstanceSecurityGroupRulesInboundRuleArray{
&scaleway.InstanceSecurityGroupRulesInboundRuleArgs{
Action: pulumi.String("accept"),
Port: pulumi.Int(80),
IpRange: pulumi.String("0.0.0.0/0"),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Scaleway = Pulumiverse.Scaleway;
return await Deployment.RunAsync(() =>
{
var sg01 = new Scaleway.InstanceSecurityGroup("sg01", new()
{
ExternalRules = true,
});
var sgrs01 = new Scaleway.InstanceSecurityGroupRules("sgrs01", new()
{
SecurityGroupId = sg01.Id,
InboundRules = new[]
{
new Scaleway.Inputs.InstanceSecurityGroupRulesInboundRuleArgs
{
Action = "accept",
Port = 80,
IpRange = "0.0.0.0/0",
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.scaleway.InstanceSecurityGroup;
import com.pulumi.scaleway.InstanceSecurityGroupArgs;
import com.pulumi.scaleway.InstanceSecurityGroupRules;
import com.pulumi.scaleway.InstanceSecurityGroupRulesArgs;
import com.pulumi.scaleway.inputs.InstanceSecurityGroupRulesInboundRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var sg01 = new InstanceSecurityGroup("sg01", InstanceSecurityGroupArgs.builder()
.externalRules(true)
.build());
var sgrs01 = new InstanceSecurityGroupRules("sgrs01", InstanceSecurityGroupRulesArgs.builder()
.securityGroupId(sg01.id())
.inboundRules(InstanceSecurityGroupRulesInboundRuleArgs.builder()
.action("accept")
.port(80)
.ipRange("0.0.0.0/0")
.build())
.build());
}
}
resources:
sg01:
type: scaleway:InstanceSecurityGroup
properties:
externalRules: true
sgrs01:
type: scaleway:InstanceSecurityGroupRules
properties:
securityGroupId: ${sg01.id}
inboundRules:
- action: accept
port: 80
ipRange: 0.0.0.0/0
Simplify your rules using dynamic block and for_each
loop
You can use for_each
syntax to simplify the definition of your rules.
Let’s suppose that your inbound default policy is to drop, but you want to build a list of exceptions to accept.
Create a local containing your exceptions (locals.trusted
) and use the for_each
syntax in a dynamic block:
Coming soon!
Coming soon!
Coming soon!
Coming soon!
Coming soon!
resources:
mainInstanceSecurityGroup:
type: scaleway:InstanceSecurityGroup
properties:
description: test
inboundDefaultPolicy: drop
outboundDefaultPolicy: accept
mainInstanceSecurityGroupRules:
type: scaleway:InstanceSecurityGroupRules
properties:
securityGroupId: ${mainInstanceSecurityGroup.id}
dynamic:
- forEach: ${trusted}
content:
- action: accept
ip: ${inbound_rule.value}
port: 80
variables:
trusted:
- 1.2.3.4
- 4.5.6.7
- 7.8.9.10
You can also use object to assign IP and port in the same time. In your locals, you can use objects to encapsulate several values that will be used later on in the loop:
Coming soon!
Coming soon!
Coming soon!
Coming soon!
Coming soon!
resources:
mainInstanceSecurityGroup:
type: scaleway:InstanceSecurityGroup
properties:
description: test
inboundDefaultPolicy: drop
outboundDefaultPolicy: accept
mainInstanceSecurityGroupRules:
type: scaleway:InstanceSecurityGroupRules
properties:
securityGroupId: ${mainInstanceSecurityGroup.id}
dynamic:
- forEach: ${trusted}
content:
- action: accept
ip: ${inbound_rule.value.ip}
port: ${inbound_rule.value.port}
variables:
trusted:
- ip: 1.2.3.4
port: '80'
- ip: 5.6.7.8
port: '81'
- ip: 9.10.11.12
port: '81'
Create InstanceSecurityGroupRules Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new InstanceSecurityGroupRules(name: string, args: InstanceSecurityGroupRulesArgs, opts?: CustomResourceOptions);
@overload
def InstanceSecurityGroupRules(resource_name: str,
args: InstanceSecurityGroupRulesArgs,
opts: Optional[ResourceOptions] = None)
@overload
def InstanceSecurityGroupRules(resource_name: str,
opts: Optional[ResourceOptions] = None,
security_group_id: Optional[str] = None,
inbound_rules: Optional[Sequence[InstanceSecurityGroupRulesInboundRuleArgs]] = None,
outbound_rules: Optional[Sequence[InstanceSecurityGroupRulesOutboundRuleArgs]] = None)
func NewInstanceSecurityGroupRules(ctx *Context, name string, args InstanceSecurityGroupRulesArgs, opts ...ResourceOption) (*InstanceSecurityGroupRules, error)
public InstanceSecurityGroupRules(string name, InstanceSecurityGroupRulesArgs args, CustomResourceOptions? opts = null)
public InstanceSecurityGroupRules(String name, InstanceSecurityGroupRulesArgs args)
public InstanceSecurityGroupRules(String name, InstanceSecurityGroupRulesArgs args, CustomResourceOptions options)
type: scaleway:InstanceSecurityGroupRules
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args InstanceSecurityGroupRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args InstanceSecurityGroupRulesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args InstanceSecurityGroupRulesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args InstanceSecurityGroupRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args InstanceSecurityGroupRulesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var instanceSecurityGroupRulesResource = new Scaleway.InstanceSecurityGroupRules("instanceSecurityGroupRulesResource", new()
{
SecurityGroupId = "string",
InboundRules = new[]
{
new Scaleway.Inputs.InstanceSecurityGroupRulesInboundRuleArgs
{
Action = "string",
IpRange = "string",
Port = 0,
PortRange = "string",
Protocol = "string",
},
},
OutboundRules = new[]
{
new Scaleway.Inputs.InstanceSecurityGroupRulesOutboundRuleArgs
{
Action = "string",
IpRange = "string",
Port = 0,
PortRange = "string",
Protocol = "string",
},
},
});
example, err := scaleway.NewInstanceSecurityGroupRules(ctx, "instanceSecurityGroupRulesResource", &scaleway.InstanceSecurityGroupRulesArgs{
SecurityGroupId: pulumi.String("string"),
InboundRules: scaleway.InstanceSecurityGroupRulesInboundRuleArray{
&scaleway.InstanceSecurityGroupRulesInboundRuleArgs{
Action: pulumi.String("string"),
IpRange: pulumi.String("string"),
Port: pulumi.Int(0),
PortRange: pulumi.String("string"),
Protocol: pulumi.String("string"),
},
},
OutboundRules: scaleway.InstanceSecurityGroupRulesOutboundRuleArray{
&scaleway.InstanceSecurityGroupRulesOutboundRuleArgs{
Action: pulumi.String("string"),
IpRange: pulumi.String("string"),
Port: pulumi.Int(0),
PortRange: pulumi.String("string"),
Protocol: pulumi.String("string"),
},
},
})
var instanceSecurityGroupRulesResource = new InstanceSecurityGroupRules("instanceSecurityGroupRulesResource", InstanceSecurityGroupRulesArgs.builder()
.securityGroupId("string")
.inboundRules(InstanceSecurityGroupRulesInboundRuleArgs.builder()
.action("string")
.ipRange("string")
.port(0)
.portRange("string")
.protocol("string")
.build())
.outboundRules(InstanceSecurityGroupRulesOutboundRuleArgs.builder()
.action("string")
.ipRange("string")
.port(0)
.portRange("string")
.protocol("string")
.build())
.build());
instance_security_group_rules_resource = scaleway.InstanceSecurityGroupRules("instanceSecurityGroupRulesResource",
security_group_id="string",
inbound_rules=[scaleway.InstanceSecurityGroupRulesInboundRuleArgs(
action="string",
ip_range="string",
port=0,
port_range="string",
protocol="string",
)],
outbound_rules=[scaleway.InstanceSecurityGroupRulesOutboundRuleArgs(
action="string",
ip_range="string",
port=0,
port_range="string",
protocol="string",
)])
const instanceSecurityGroupRulesResource = new scaleway.InstanceSecurityGroupRules("instanceSecurityGroupRulesResource", {
securityGroupId: "string",
inboundRules: [{
action: "string",
ipRange: "string",
port: 0,
portRange: "string",
protocol: "string",
}],
outboundRules: [{
action: "string",
ipRange: "string",
port: 0,
portRange: "string",
protocol: "string",
}],
});
type: scaleway:InstanceSecurityGroupRules
properties:
inboundRules:
- action: string
ipRange: string
port: 0
portRange: string
protocol: string
outboundRules:
- action: string
ipRange: string
port: 0
portRange: string
protocol: string
securityGroupId: string
InstanceSecurityGroupRules Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The InstanceSecurityGroupRules resource accepts the following input properties:
- Security
Group stringId - The ID of the security group.
- Inbound
Rules List<Pulumiverse.Scaleway. Inputs. Instance Security Group Rules Inbound Rule> - A list of inbound rule to add to the security group. (Structure is documented below.)
- Outbound
Rules List<Pulumiverse.Scaleway. Inputs. Instance Security Group Rules Outbound Rule> - A list of outbound rule to add to the security group. (Structure is documented below.)
- Security
Group stringId - The ID of the security group.
- Inbound
Rules []InstanceSecurity Group Rules Inbound Rule Args - A list of inbound rule to add to the security group. (Structure is documented below.)
- Outbound
Rules []InstanceSecurity Group Rules Outbound Rule Args - A list of outbound rule to add to the security group. (Structure is documented below.)
- security
Group StringId - The ID of the security group.
- inbound
Rules List<InstanceSecurity Group Rules Inbound Rule> - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound
Rules List<InstanceSecurity Group Rules Outbound Rule> - A list of outbound rule to add to the security group. (Structure is documented below.)
- security
Group stringId - The ID of the security group.
- inbound
Rules InstanceSecurity Group Rules Inbound Rule[] - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound
Rules InstanceSecurity Group Rules Outbound Rule[] - A list of outbound rule to add to the security group. (Structure is documented below.)
- security_
group_ strid - The ID of the security group.
- inbound_
rules Sequence[InstanceSecurity Group Rules Inbound Rule Args] - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound_
rules Sequence[InstanceSecurity Group Rules Outbound Rule Args] - A list of outbound rule to add to the security group. (Structure is documented below.)
- security
Group StringId - The ID of the security group.
- inbound
Rules List<Property Map> - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound
Rules List<Property Map> - A list of outbound rule to add to the security group. (Structure is documented below.)
Outputs
All input properties are implicitly available as output properties. Additionally, the InstanceSecurityGroupRules resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing InstanceSecurityGroupRules Resource
Get an existing InstanceSecurityGroupRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: InstanceSecurityGroupRulesState, opts?: CustomResourceOptions): InstanceSecurityGroupRules
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
inbound_rules: Optional[Sequence[InstanceSecurityGroupRulesInboundRuleArgs]] = None,
outbound_rules: Optional[Sequence[InstanceSecurityGroupRulesOutboundRuleArgs]] = None,
security_group_id: Optional[str] = None) -> InstanceSecurityGroupRules
func GetInstanceSecurityGroupRules(ctx *Context, name string, id IDInput, state *InstanceSecurityGroupRulesState, opts ...ResourceOption) (*InstanceSecurityGroupRules, error)
public static InstanceSecurityGroupRules Get(string name, Input<string> id, InstanceSecurityGroupRulesState? state, CustomResourceOptions? opts = null)
public static InstanceSecurityGroupRules get(String name, Output<String> id, InstanceSecurityGroupRulesState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Inbound
Rules List<Pulumiverse.Scaleway. Inputs. Instance Security Group Rules Inbound Rule> - A list of inbound rule to add to the security group. (Structure is documented below.)
- Outbound
Rules List<Pulumiverse.Scaleway. Inputs. Instance Security Group Rules Outbound Rule> - A list of outbound rule to add to the security group. (Structure is documented below.)
- Security
Group stringId - The ID of the security group.
- Inbound
Rules []InstanceSecurity Group Rules Inbound Rule Args - A list of inbound rule to add to the security group. (Structure is documented below.)
- Outbound
Rules []InstanceSecurity Group Rules Outbound Rule Args - A list of outbound rule to add to the security group. (Structure is documented below.)
- Security
Group stringId - The ID of the security group.
- inbound
Rules List<InstanceSecurity Group Rules Inbound Rule> - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound
Rules List<InstanceSecurity Group Rules Outbound Rule> - A list of outbound rule to add to the security group. (Structure is documented below.)
- security
Group StringId - The ID of the security group.
- inbound
Rules InstanceSecurity Group Rules Inbound Rule[] - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound
Rules InstanceSecurity Group Rules Outbound Rule[] - A list of outbound rule to add to the security group. (Structure is documented below.)
- security
Group stringId - The ID of the security group.
- inbound_
rules Sequence[InstanceSecurity Group Rules Inbound Rule Args] - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound_
rules Sequence[InstanceSecurity Group Rules Outbound Rule Args] - A list of outbound rule to add to the security group. (Structure is documented below.)
- security_
group_ strid - The ID of the security group.
- inbound
Rules List<Property Map> - A list of inbound rule to add to the security group. (Structure is documented below.)
- outbound
Rules List<Property Map> - A list of outbound rule to add to the security group. (Structure is documented below.)
- security
Group StringId - The ID of the security group.
Supporting Types
InstanceSecurityGroupRulesInboundRule, InstanceSecurityGroupRulesInboundRuleArgs
- Action string
- The action to take when rule match. Possible values are:
accept
ordrop
. - Ip string
- The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - Ip
Range string - The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - Port int
- The port this rule apply to. If no port is specified, rule will apply to all port.
- Port
Range string - Computed port range for this rule (e.g: 1-1024, 22-22)
- Protocol string
- The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- Action string
- The action to take when rule match. Possible values are:
accept
ordrop
. - Ip string
- The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - Ip
Range string - The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - Port int
- The port this rule apply to. If no port is specified, rule will apply to all port.
- Port
Range string - Computed port range for this rule (e.g: 1-1024, 22-22)
- Protocol string
- The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action String
- The action to take when rule match. Possible values are:
accept
ordrop
. - ip String
- The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - ip
Range String - The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - port Integer
- The port this rule apply to. If no port is specified, rule will apply to all port.
- port
Range String - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol String
- The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action string
- The action to take when rule match. Possible values are:
accept
ordrop
. - ip string
- The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - ip
Range string - The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - port number
- The port this rule apply to. If no port is specified, rule will apply to all port.
- port
Range string - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol string
- The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action str
- The action to take when rule match. Possible values are:
accept
ordrop
. - ip str
- The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - ip_
range str - The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - port int
- The port this rule apply to. If no port is specified, rule will apply to all port.
- port_
range str - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol str
- The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action String
- The action to take when rule match. Possible values are:
accept
ordrop
. - ip String
- The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - ip
Range String - The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified. - port Number
- The port this rule apply to. If no port is specified, rule will apply to all port.
- port
Range String - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol String
- The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
InstanceSecurityGroupRulesOutboundRule, InstanceSecurityGroupRulesOutboundRuleArgs
- Action string
- Action when rule match request (drop or accept)
- Ip string
- Ip address for this rule (e.g: 1.1.1.1). Only one of ip or ip_range should be provided
- Ip
Range string - Ip range for this rule (e.g: 192.168.1.0/24). Only one of ip or ip_range should be provided
- Port int
- Network port for this rule
- Port
Range string - Computed port range for this rule (e.g: 1-1024, 22-22)
- Protocol string
- Protocol for this rule (TCP, UDP, ICMP or ANY)
- Action string
- Action when rule match request (drop or accept)
- Ip string
- Ip address for this rule (e.g: 1.1.1.1). Only one of ip or ip_range should be provided
- Ip
Range string - Ip range for this rule (e.g: 192.168.1.0/24). Only one of ip or ip_range should be provided
- Port int
- Network port for this rule
- Port
Range string - Computed port range for this rule (e.g: 1-1024, 22-22)
- Protocol string
- Protocol for this rule (TCP, UDP, ICMP or ANY)
- action String
- Action when rule match request (drop or accept)
- ip String
- Ip address for this rule (e.g: 1.1.1.1). Only one of ip or ip_range should be provided
- ip
Range String - Ip range for this rule (e.g: 192.168.1.0/24). Only one of ip or ip_range should be provided
- port Integer
- Network port for this rule
- port
Range String - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol String
- Protocol for this rule (TCP, UDP, ICMP or ANY)
- action string
- Action when rule match request (drop or accept)
- ip string
- Ip address for this rule (e.g: 1.1.1.1). Only one of ip or ip_range should be provided
- ip
Range string - Ip range for this rule (e.g: 192.168.1.0/24). Only one of ip or ip_range should be provided
- port number
- Network port for this rule
- port
Range string - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol string
- Protocol for this rule (TCP, UDP, ICMP or ANY)
- action str
- Action when rule match request (drop or accept)
- ip str
- Ip address for this rule (e.g: 1.1.1.1). Only one of ip or ip_range should be provided
- ip_
range str - Ip range for this rule (e.g: 192.168.1.0/24). Only one of ip or ip_range should be provided
- port int
- Network port for this rule
- port_
range str - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol str
- Protocol for this rule (TCP, UDP, ICMP or ANY)
- action String
- Action when rule match request (drop or accept)
- ip String
- Ip address for this rule (e.g: 1.1.1.1). Only one of ip or ip_range should be provided
- ip
Range String - Ip range for this rule (e.g: 192.168.1.0/24). Only one of ip or ip_range should be provided
- port Number
- Network port for this rule
- port
Range String - Computed port range for this rule (e.g: 1-1024, 22-22)
- protocol String
- Protocol for this rule (TCP, UDP, ICMP or ANY)
Import
Instance security group rules can be imported using the {zone}/{id}
, e.g.
bash
$ pulumi import scaleway:index/instanceSecurityGroupRules:InstanceSecurityGroupRules web fr-par-1/11111111-1111-1111-1111-111111111111
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- scaleway pulumiverse/pulumi-scaleway
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
scaleway
Terraform Provider.