We recommend using Azure Native.
published on Monday, Mar 9, 2026 by Pulumi
We recommend using Azure Native.
published on Monday, Mar 9, 2026 by Pulumi
Manages a Iot Security Device Group.
Example Usage
using Pulumi;
using Azure = Pulumi.Azure;
class MyStack : Stack
{
public MyStack()
{
var exampleResourceGroup = new Azure.Core.ResourceGroup("exampleResourceGroup", new Azure.Core.ResourceGroupArgs
{
Location = "West Europe",
});
var exampleIoTHub = new Azure.Iot.IoTHub("exampleIoTHub", new Azure.Iot.IoTHubArgs
{
ResourceGroupName = exampleResourceGroup.Name,
Location = exampleResourceGroup.Location,
Sku = new Azure.Iot.Inputs.IoTHubSkuArgs
{
Name = "S1",
Capacity = 1,
},
});
var exampleSecuritySolution = new Azure.Iot.SecuritySolution("exampleSecuritySolution", new Azure.Iot.SecuritySolutionArgs
{
ResourceGroupName = exampleResourceGroup.Name,
Location = exampleResourceGroup.Location,
DisplayName = "Iot Security Solution",
IothubIds =
{
exampleIoTHub.Id,
},
});
var exampleSecurityDeviceGroup = new Azure.Iot.SecurityDeviceGroup("exampleSecurityDeviceGroup", new Azure.Iot.SecurityDeviceGroupArgs
{
IothubId = exampleIoTHub.Id,
AllowRule = new Azure.Iot.Inputs.SecurityDeviceGroupAllowRuleArgs
{
ConnectionToIpsNotAlloweds =
{
"10.0.0.0/24",
},
},
RangeRules =
{
new Azure.Iot.Inputs.SecurityDeviceGroupRangeRuleArgs
{
Type = "ActiveConnectionsNotInAllowedRange",
Min = 0,
Max = 30,
Duration = "PT5M",
},
},
}, new CustomResourceOptions
{
DependsOn =
{
exampleSecuritySolution,
},
});
}
}
package main
import (
"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/core"
"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/iot"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
exampleResourceGroup, err := core.NewResourceGroup(ctx, "exampleResourceGroup", &core.ResourceGroupArgs{
Location: pulumi.String("West Europe"),
})
if err != nil {
return err
}
exampleIoTHub, err := iot.NewIoTHub(ctx, "exampleIoTHub", &iot.IoTHubArgs{
ResourceGroupName: exampleResourceGroup.Name,
Location: exampleResourceGroup.Location,
Sku: &iot.IoTHubSkuArgs{
Name: pulumi.String("S1"),
Capacity: pulumi.Int(1),
},
})
if err != nil {
return err
}
exampleSecuritySolution, err := iot.NewSecuritySolution(ctx, "exampleSecuritySolution", &iot.SecuritySolutionArgs{
ResourceGroupName: exampleResourceGroup.Name,
Location: exampleResourceGroup.Location,
DisplayName: pulumi.String("Iot Security Solution"),
IothubIds: pulumi.StringArray{
exampleIoTHub.ID(),
},
})
if err != nil {
return err
}
_, err = iot.NewSecurityDeviceGroup(ctx, "exampleSecurityDeviceGroup", &iot.SecurityDeviceGroupArgs{
IothubId: exampleIoTHub.ID(),
AllowRule: &iot.SecurityDeviceGroupAllowRuleArgs{
ConnectionToIpsNotAlloweds: pulumi.StringArray{
pulumi.String("10.0.0.0/24"),
},
},
RangeRules: iot.SecurityDeviceGroupRangeRuleArray{
&iot.SecurityDeviceGroupRangeRuleArgs{
Type: pulumi.String("ActiveConnectionsNotInAllowedRange"),
Min: pulumi.Int(0),
Max: pulumi.Int(30),
Duration: pulumi.String("PT5M"),
},
},
}, pulumi.DependsOn([]pulumi.Resource{
exampleSecuritySolution,
}))
if err != nil {
return err
}
return nil
})
}
Example coming soon!
import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
const exampleResourceGroup = new azure.core.ResourceGroup("exampleResourceGroup", {location: "West Europe"});
const exampleIoTHub = new azure.iot.IoTHub("exampleIoTHub", {
resourceGroupName: exampleResourceGroup.name,
location: exampleResourceGroup.location,
sku: {
name: "S1",
capacity: "1",
},
});
const exampleSecuritySolution = new azure.iot.SecuritySolution("exampleSecuritySolution", {
resourceGroupName: exampleResourceGroup.name,
location: exampleResourceGroup.location,
displayName: "Iot Security Solution",
iothubIds: [exampleIoTHub.id],
});
const exampleSecurityDeviceGroup = new azure.iot.SecurityDeviceGroup("exampleSecurityDeviceGroup", {
iothubId: exampleIoTHub.id,
allowRule: {
connectionToIpsNotAlloweds: ["10.0.0.0/24"],
},
rangeRules: [{
type: "ActiveConnectionsNotInAllowedRange",
min: 0,
max: 30,
duration: "PT5M",
}],
}, {
dependsOn: [exampleSecuritySolution],
});
import pulumi
import pulumi_azure as azure
example_resource_group = azure.core.ResourceGroup("exampleResourceGroup", location="West Europe")
example_io_t_hub = azure.iot.IoTHub("exampleIoTHub",
resource_group_name=example_resource_group.name,
location=example_resource_group.location,
sku=azure.iot.IoTHubSkuArgs(
name="S1",
capacity=1,
))
example_security_solution = azure.iot.SecuritySolution("exampleSecuritySolution",
resource_group_name=example_resource_group.name,
location=example_resource_group.location,
display_name="Iot Security Solution",
iothub_ids=[example_io_t_hub.id])
example_security_device_group = azure.iot.SecurityDeviceGroup("exampleSecurityDeviceGroup",
iothub_id=example_io_t_hub.id,
allow_rule=azure.iot.SecurityDeviceGroupAllowRuleArgs(
connection_to_ips_not_alloweds=["10.0.0.0/24"],
),
range_rules=[azure.iot.SecurityDeviceGroupRangeRuleArgs(
type="ActiveConnectionsNotInAllowedRange",
min=0,
max=30,
duration="PT5M",
)],
opts=pulumi.ResourceOptions(depends_on=[example_security_solution]))
Example coming soon!
Create SecurityDeviceGroup Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecurityDeviceGroup(name: string, args: SecurityDeviceGroupArgs, opts?: CustomResourceOptions);@overload
def SecurityDeviceGroup(resource_name: str,
args: SecurityDeviceGroupArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SecurityDeviceGroup(resource_name: str,
opts: Optional[ResourceOptions] = None,
iothub_id: Optional[str] = None,
allow_rule: Optional[SecurityDeviceGroupAllowRuleArgs] = None,
name: Optional[str] = None,
range_rules: Optional[Sequence[SecurityDeviceGroupRangeRuleArgs]] = None)func NewSecurityDeviceGroup(ctx *Context, name string, args SecurityDeviceGroupArgs, opts ...ResourceOption) (*SecurityDeviceGroup, error)public SecurityDeviceGroup(string name, SecurityDeviceGroupArgs args, CustomResourceOptions? opts = null)
public SecurityDeviceGroup(String name, SecurityDeviceGroupArgs args)
public SecurityDeviceGroup(String name, SecurityDeviceGroupArgs args, CustomResourceOptions options)
type: azure:iot:SecurityDeviceGroup
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecurityDeviceGroupArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecurityDeviceGroupArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecurityDeviceGroupArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecurityDeviceGroupArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecurityDeviceGroupArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var securityDeviceGroupResource = new Azure.Iot.SecurityDeviceGroup("securityDeviceGroupResource", new()
{
IothubId = "string",
AllowRule = new Azure.Iot.Inputs.SecurityDeviceGroupAllowRuleArgs
{
ConnectionFromIpsNotAlloweds = new[]
{
"string",
},
ConnectionToIpsNotAlloweds = new[]
{
"string",
},
LocalUsersNotAlloweds = new[]
{
"string",
},
ProcessesNotAlloweds = new[]
{
"string",
},
},
Name = "string",
RangeRules = new[]
{
new Azure.Iot.Inputs.SecurityDeviceGroupRangeRuleArgs
{
Duration = "string",
Max = 0,
Min = 0,
Type = "string",
},
},
});
example, err := iot.NewSecurityDeviceGroup(ctx, "securityDeviceGroupResource", &iot.SecurityDeviceGroupArgs{
IothubId: pulumi.String("string"),
AllowRule: &iot.SecurityDeviceGroupAllowRuleArgs{
ConnectionFromIpsNotAlloweds: pulumi.StringArray{
pulumi.String("string"),
},
ConnectionToIpsNotAlloweds: pulumi.StringArray{
pulumi.String("string"),
},
LocalUsersNotAlloweds: pulumi.StringArray{
pulumi.String("string"),
},
ProcessesNotAlloweds: pulumi.StringArray{
pulumi.String("string"),
},
},
Name: pulumi.String("string"),
RangeRules: iot.SecurityDeviceGroupRangeRuleArray{
&iot.SecurityDeviceGroupRangeRuleArgs{
Duration: pulumi.String("string"),
Max: pulumi.Int(0),
Min: pulumi.Int(0),
Type: pulumi.String("string"),
},
},
})
var securityDeviceGroupResource = new SecurityDeviceGroup("securityDeviceGroupResource", SecurityDeviceGroupArgs.builder()
.iothubId("string")
.allowRule(SecurityDeviceGroupAllowRuleArgs.builder()
.connectionFromIpsNotAlloweds("string")
.connectionToIpsNotAlloweds("string")
.localUsersNotAlloweds("string")
.processesNotAlloweds("string")
.build())
.name("string")
.rangeRules(SecurityDeviceGroupRangeRuleArgs.builder()
.duration("string")
.max(0)
.min(0)
.type("string")
.build())
.build());
security_device_group_resource = azure.iot.SecurityDeviceGroup("securityDeviceGroupResource",
iothub_id="string",
allow_rule={
"connection_from_ips_not_alloweds": ["string"],
"connection_to_ips_not_alloweds": ["string"],
"local_users_not_alloweds": ["string"],
"processes_not_alloweds": ["string"],
},
name="string",
range_rules=[{
"duration": "string",
"max": 0,
"min": 0,
"type": "string",
}])
const securityDeviceGroupResource = new azure.iot.SecurityDeviceGroup("securityDeviceGroupResource", {
iothubId: "string",
allowRule: {
connectionFromIpsNotAlloweds: ["string"],
connectionToIpsNotAlloweds: ["string"],
localUsersNotAlloweds: ["string"],
processesNotAlloweds: ["string"],
},
name: "string",
rangeRules: [{
duration: "string",
max: 0,
min: 0,
type: "string",
}],
});
type: azure:iot:SecurityDeviceGroup
properties:
allowRule:
connectionFromIpsNotAlloweds:
- string
connectionToIpsNotAlloweds:
- string
localUsersNotAlloweds:
- string
processesNotAlloweds:
- string
iothubId: string
name: string
rangeRules:
- duration: string
max: 0
min: 0
type: string
SecurityDeviceGroup Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecurityDeviceGroup resource accepts the following input properties:
- Iothub
Id string - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- Allow
Rule SecurityDevice Group Allow Rule - an
allow_ruleblocks as defined below. - Name string
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- Range
Rules List<SecurityDevice Group Range Rule> - One or more
range_ruleblocks as defined below.
- Iothub
Id string - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- Allow
Rule SecurityDevice Group Allow Rule Args - an
allow_ruleblocks as defined below. - Name string
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- Range
Rules []SecurityDevice Group Range Rule Args - One or more
range_ruleblocks as defined below.
- iothub
Id String - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- allow
Rule SecurityDevice Group Allow Rule - an
allow_ruleblocks as defined below. - name String
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range
Rules List<SecurityDevice Group Range Rule> - One or more
range_ruleblocks as defined below.
- iothub
Id string - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- allow
Rule SecurityDevice Group Allow Rule - an
allow_ruleblocks as defined below. - name string
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range
Rules SecurityDevice Group Range Rule[] - One or more
range_ruleblocks as defined below.
- iothub_
id str - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- allow_
rule SecurityDevice Group Allow Rule Args - an
allow_ruleblocks as defined below. - name str
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range_
rules Sequence[SecurityDevice Group Range Rule Args] - One or more
range_ruleblocks as defined below.
- iothub
Id String - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- allow
Rule Property Map - an
allow_ruleblocks as defined below. - name String
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range
Rules List<Property Map> - One or more
range_ruleblocks as defined below.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecurityDeviceGroup resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SecurityDeviceGroup Resource
Get an existing SecurityDeviceGroup resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecurityDeviceGroupState, opts?: CustomResourceOptions): SecurityDeviceGroup@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
allow_rule: Optional[SecurityDeviceGroupAllowRuleArgs] = None,
iothub_id: Optional[str] = None,
name: Optional[str] = None,
range_rules: Optional[Sequence[SecurityDeviceGroupRangeRuleArgs]] = None) -> SecurityDeviceGroupfunc GetSecurityDeviceGroup(ctx *Context, name string, id IDInput, state *SecurityDeviceGroupState, opts ...ResourceOption) (*SecurityDeviceGroup, error)public static SecurityDeviceGroup Get(string name, Input<string> id, SecurityDeviceGroupState? state, CustomResourceOptions? opts = null)public static SecurityDeviceGroup get(String name, Output<String> id, SecurityDeviceGroupState state, CustomResourceOptions options)resources: _: type: azure:iot:SecurityDeviceGroup get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Allow
Rule SecurityDevice Group Allow Rule - an
allow_ruleblocks as defined below. - Iothub
Id string - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- Name string
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- Range
Rules List<SecurityDevice Group Range Rule> - One or more
range_ruleblocks as defined below.
- Allow
Rule SecurityDevice Group Allow Rule Args - an
allow_ruleblocks as defined below. - Iothub
Id string - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- Name string
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- Range
Rules []SecurityDevice Group Range Rule Args - One or more
range_ruleblocks as defined below.
- allow
Rule SecurityDevice Group Allow Rule - an
allow_ruleblocks as defined below. - iothub
Id String - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- name String
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range
Rules List<SecurityDevice Group Range Rule> - One or more
range_ruleblocks as defined below.
- allow
Rule SecurityDevice Group Allow Rule - an
allow_ruleblocks as defined below. - iothub
Id string - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- name string
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range
Rules SecurityDevice Group Range Rule[] - One or more
range_ruleblocks as defined below.
- allow_
rule SecurityDevice Group Allow Rule Args - an
allow_ruleblocks as defined below. - iothub_
id str - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- name str
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range_
rules Sequence[SecurityDevice Group Range Rule Args] - One or more
range_ruleblocks as defined below.
- allow
Rule Property Map - an
allow_ruleblocks as defined below. - iothub
Id String - The ID of the IoT Hub which to link the Security Device Group to. Changing this forces a new resource to be created.
- name String
- Specifies the name of the Device Security Group. Changing this forces a new resource to be created.
- range
Rules List<Property Map> - One or more
range_ruleblocks as defined below.
Supporting Types
SecurityDeviceGroupAllowRule, SecurityDeviceGroupAllowRuleArgs
- Connection
From List<string>Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for inbound connection.
- Connection
To List<string>Ip Not Alloweds - Connection
To List<string>Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for outbound connection.
- Local
User List<string>Not Alloweds - Local
Users List<string>Not Alloweds - Specifies which local user is not allowed to Login in current device group.
- Process
Not List<string>Alloweds - Processes
Not List<string>Alloweds - Specifies which process is not allowed to be executed in current device group.
- Connection
From []stringIps Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for inbound connection.
- Connection
To []stringIp Not Alloweds - Connection
To []stringIps Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for outbound connection.
- Local
User []stringNot Alloweds - Local
Users []stringNot Alloweds - Specifies which local user is not allowed to Login in current device group.
- Process
Not []stringAlloweds - Processes
Not []stringAlloweds - Specifies which process is not allowed to be executed in current device group.
- connection
From List<String>Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for inbound connection.
- connection
To List<String>Ip Not Alloweds - connection
To List<String>Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for outbound connection.
- local
User List<String>Not Alloweds - local
Users List<String>Not Alloweds - Specifies which local user is not allowed to Login in current device group.
- process
Not List<String>Alloweds - processes
Not List<String>Alloweds - Specifies which process is not allowed to be executed in current device group.
- connection
From string[]Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for inbound connection.
- connection
To string[]Ip Not Alloweds - connection
To string[]Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for outbound connection.
- local
User string[]Not Alloweds - local
Users string[]Not Alloweds - Specifies which local user is not allowed to Login in current device group.
- process
Not string[]Alloweds - processes
Not string[]Alloweds - Specifies which process is not allowed to be executed in current device group.
- connection_
from_ Sequence[str]ips_ not_ alloweds - Specifies which IP is not allowed to be connected to in current device group for inbound connection.
- connection_
to_ Sequence[str]ip_ not_ alloweds - connection_
to_ Sequence[str]ips_ not_ alloweds - Specifies which IP is not allowed to be connected to in current device group for outbound connection.
- local_
user_ Sequence[str]not_ alloweds - local_
users_ Sequence[str]not_ alloweds - Specifies which local user is not allowed to Login in current device group.
- process_
not_ Sequence[str]alloweds - processes_
not_ Sequence[str]alloweds - Specifies which process is not allowed to be executed in current device group.
- connection
From List<String>Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for inbound connection.
- connection
To List<String>Ip Not Alloweds - connection
To List<String>Ips Not Alloweds - Specifies which IP is not allowed to be connected to in current device group for outbound connection.
- local
User List<String>Not Alloweds - local
Users List<String>Not Alloweds - Specifies which local user is not allowed to Login in current device group.
- process
Not List<String>Alloweds - processes
Not List<String>Alloweds - Specifies which process is not allowed to be executed in current device group.
SecurityDeviceGroupRangeRule, SecurityDeviceGroupRangeRuleArgs
- Duration string
- Specifies the time range. represented in ISO 8601 duration format.
- Max int
- The maximum threshold in the given time window.
- Min int
- The minimum threshold in the given time window.
- Type string
- The type of supported rule type. Possible Values are
ActiveConnectionsNotInAllowedRange,AmqpC2DMessagesNotInAllowedRange,MqttC2DMessagesNotInAllowedRange,HttpC2DMessagesNotInAllowedRange,AmqpC2DRejectedMessagesNotInAllowedRange,MqttC2DRejectedMessagesNotInAllowedRange,HttpC2DRejectedMessagesNotInAllowedRange,AmqpD2CMessagesNotInAllowedRange,MqttD2CMessagesNotInAllowedRange,HttpD2CMessagesNotInAllowedRange,DirectMethodInvokesNotInAllowedRange,FailedLocalLoginsNotInAllowedRange,FileUploadsNotInAllowedRange,QueuePurgesNotInAllowedRange,TwinUpdatesNotInAllowedRangeandUnauthorizedOperationsNotInAllowedRange.
- Duration string
- Specifies the time range. represented in ISO 8601 duration format.
- Max int
- The maximum threshold in the given time window.
- Min int
- The minimum threshold in the given time window.
- Type string
- The type of supported rule type. Possible Values are
ActiveConnectionsNotInAllowedRange,AmqpC2DMessagesNotInAllowedRange,MqttC2DMessagesNotInAllowedRange,HttpC2DMessagesNotInAllowedRange,AmqpC2DRejectedMessagesNotInAllowedRange,MqttC2DRejectedMessagesNotInAllowedRange,HttpC2DRejectedMessagesNotInAllowedRange,AmqpD2CMessagesNotInAllowedRange,MqttD2CMessagesNotInAllowedRange,HttpD2CMessagesNotInAllowedRange,DirectMethodInvokesNotInAllowedRange,FailedLocalLoginsNotInAllowedRange,FileUploadsNotInAllowedRange,QueuePurgesNotInAllowedRange,TwinUpdatesNotInAllowedRangeandUnauthorizedOperationsNotInAllowedRange.
- duration String
- Specifies the time range. represented in ISO 8601 duration format.
- max Integer
- The maximum threshold in the given time window.
- min Integer
- The minimum threshold in the given time window.
- type String
- The type of supported rule type. Possible Values are
ActiveConnectionsNotInAllowedRange,AmqpC2DMessagesNotInAllowedRange,MqttC2DMessagesNotInAllowedRange,HttpC2DMessagesNotInAllowedRange,AmqpC2DRejectedMessagesNotInAllowedRange,MqttC2DRejectedMessagesNotInAllowedRange,HttpC2DRejectedMessagesNotInAllowedRange,AmqpD2CMessagesNotInAllowedRange,MqttD2CMessagesNotInAllowedRange,HttpD2CMessagesNotInAllowedRange,DirectMethodInvokesNotInAllowedRange,FailedLocalLoginsNotInAllowedRange,FileUploadsNotInAllowedRange,QueuePurgesNotInAllowedRange,TwinUpdatesNotInAllowedRangeandUnauthorizedOperationsNotInAllowedRange.
- duration string
- Specifies the time range. represented in ISO 8601 duration format.
- max number
- The maximum threshold in the given time window.
- min number
- The minimum threshold in the given time window.
- type string
- The type of supported rule type. Possible Values are
ActiveConnectionsNotInAllowedRange,AmqpC2DMessagesNotInAllowedRange,MqttC2DMessagesNotInAllowedRange,HttpC2DMessagesNotInAllowedRange,AmqpC2DRejectedMessagesNotInAllowedRange,MqttC2DRejectedMessagesNotInAllowedRange,HttpC2DRejectedMessagesNotInAllowedRange,AmqpD2CMessagesNotInAllowedRange,MqttD2CMessagesNotInAllowedRange,HttpD2CMessagesNotInAllowedRange,DirectMethodInvokesNotInAllowedRange,FailedLocalLoginsNotInAllowedRange,FileUploadsNotInAllowedRange,QueuePurgesNotInAllowedRange,TwinUpdatesNotInAllowedRangeandUnauthorizedOperationsNotInAllowedRange.
- duration str
- Specifies the time range. represented in ISO 8601 duration format.
- max int
- The maximum threshold in the given time window.
- min int
- The minimum threshold in the given time window.
- type str
- The type of supported rule type. Possible Values are
ActiveConnectionsNotInAllowedRange,AmqpC2DMessagesNotInAllowedRange,MqttC2DMessagesNotInAllowedRange,HttpC2DMessagesNotInAllowedRange,AmqpC2DRejectedMessagesNotInAllowedRange,MqttC2DRejectedMessagesNotInAllowedRange,HttpC2DRejectedMessagesNotInAllowedRange,AmqpD2CMessagesNotInAllowedRange,MqttD2CMessagesNotInAllowedRange,HttpD2CMessagesNotInAllowedRange,DirectMethodInvokesNotInAllowedRange,FailedLocalLoginsNotInAllowedRange,FileUploadsNotInAllowedRange,QueuePurgesNotInAllowedRange,TwinUpdatesNotInAllowedRangeandUnauthorizedOperationsNotInAllowedRange.
- duration String
- Specifies the time range. represented in ISO 8601 duration format.
- max Number
- The maximum threshold in the given time window.
- min Number
- The minimum threshold in the given time window.
- type String
- The type of supported rule type. Possible Values are
ActiveConnectionsNotInAllowedRange,AmqpC2DMessagesNotInAllowedRange,MqttC2DMessagesNotInAllowedRange,HttpC2DMessagesNotInAllowedRange,AmqpC2DRejectedMessagesNotInAllowedRange,MqttC2DRejectedMessagesNotInAllowedRange,HttpC2DRejectedMessagesNotInAllowedRange,AmqpD2CMessagesNotInAllowedRange,MqttD2CMessagesNotInAllowedRange,HttpD2CMessagesNotInAllowedRange,DirectMethodInvokesNotInAllowedRange,FailedLocalLoginsNotInAllowedRange,FileUploadsNotInAllowedRange,QueuePurgesNotInAllowedRange,TwinUpdatesNotInAllowedRangeandUnauthorizedOperationsNotInAllowedRange.
Import
Iot Security Device Group can be imported using the resource id, e.g.
$ pulumi import azure:iot/securityDeviceGroup:SecurityDeviceGroup example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/resGroup1/providers/Microsoft.Devices/iotHubs/hub1/providers/Microsoft.Security/deviceSecurityGroups/group1
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Classic pulumi/pulumi-azure
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
azurermTerraform Provider.
We recommend using Azure Native.
published on Monday, Mar 9, 2026 by Pulumi
