civo.Firewall
Explore with Pulumi AI
Provides a Civo firewall resource. This can be used to create, modify, and delete firewalls.
Example Usage
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Civo = Pulumi.Civo;
return await Deployment.RunAsync(() =>
{
// Create a network
var customNet = new Civo.Network("customNet", new()
{
Label = "my-custom-network",
});
// Create a firewall
var wwwFirewall = new Civo.Firewall("wwwFirewall", new()
{
NetworkId = customNet.Id,
});
// Create a firewall with the default rules
var wwwIndex_firewallFirewall = new Civo.Firewall("wwwIndex/firewallFirewall", new()
{
NetworkId = customNet.Id,
CreateDefaultRules = true,
});
// Create a firewall withouth the default rules but with a custom rule
var wwwCivoIndex_firewallFirewall = new Civo.Firewall("wwwCivoIndex/firewallFirewall", new()
{
NetworkId = customNet.Id,
CreateDefaultRules = false,
IngressRules = new[]
{
new Civo.Inputs.FirewallIngressRuleArgs
{
Label = "k8s",
Protocol = "tcp",
PortRange = "6443",
Cidrs = new[]
{
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32",
},
Action = "allow",
},
new Civo.Inputs.FirewallIngressRuleArgs
{
Label = "ssh",
Protocol = "tcp",
PortRange = "22",
Cidrs = new[]
{
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32",
},
Action = "allow",
},
},
EgressRules = new[]
{
new Civo.Inputs.FirewallEgressRuleArgs
{
Label = "all",
Protocol = "tcp",
PortRange = "1-65535",
Cidrs = new[]
{
"0.0.0.0/0",
},
Action = "allow",
},
},
});
});
package main
import (
"github.com/pulumi/pulumi-civo/sdk/v2/go/civo"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
customNet, err := civo.NewNetwork(ctx, "customNet", &civo.NetworkArgs{
Label: pulumi.String("my-custom-network"),
})
if err != nil {
return err
}
_, err = civo.NewFirewall(ctx, "wwwFirewall", &civo.FirewallArgs{
NetworkId: customNet.ID(),
})
if err != nil {
return err
}
_, err = civo.NewFirewall(ctx, "wwwIndex/firewallFirewall", &civo.FirewallArgs{
NetworkId: customNet.ID(),
CreateDefaultRules: pulumi.Bool(true),
})
if err != nil {
return err
}
_, err = civo.NewFirewall(ctx, "wwwCivoIndex/firewallFirewall", &civo.FirewallArgs{
NetworkId: customNet.ID(),
CreateDefaultRules: pulumi.Bool(false),
IngressRules: civo.FirewallIngressRuleArray{
&civo.FirewallIngressRuleArgs{
Label: pulumi.String("k8s"),
Protocol: pulumi.String("tcp"),
PortRange: pulumi.String("6443"),
Cidrs: pulumi.StringArray{
pulumi.String("192.168.1.1/32"),
pulumi.String("192.168.10.4/32"),
pulumi.String("192.168.10.10/32"),
},
Action: pulumi.String("allow"),
},
&civo.FirewallIngressRuleArgs{
Label: pulumi.String("ssh"),
Protocol: pulumi.String("tcp"),
PortRange: pulumi.String("22"),
Cidrs: pulumi.StringArray{
pulumi.String("192.168.1.1/32"),
pulumi.String("192.168.10.4/32"),
pulumi.String("192.168.10.10/32"),
},
Action: pulumi.String("allow"),
},
},
EgressRules: civo.FirewallEgressRuleArray{
&civo.FirewallEgressRuleArgs{
Label: pulumi.String("all"),
Protocol: pulumi.String("tcp"),
PortRange: pulumi.String("1-65535"),
Cidrs: pulumi.StringArray{
pulumi.String("0.0.0.0/0"),
},
Action: pulumi.String("allow"),
},
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.civo.Network;
import com.pulumi.civo.NetworkArgs;
import com.pulumi.civo.Firewall;
import com.pulumi.civo.FirewallArgs;
import com.pulumi.civo.inputs.FirewallIngressRuleArgs;
import com.pulumi.civo.inputs.FirewallEgressRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var customNet = new Network("customNet", NetworkArgs.builder()
.label("my-custom-network")
.build());
var wwwFirewall = new Firewall("wwwFirewall", FirewallArgs.builder()
.networkId(customNet.id())
.build());
var wwwIndex_firewallFirewall = new Firewall("wwwIndex/firewallFirewall", FirewallArgs.builder()
.networkId(customNet.id())
.createDefaultRules(true)
.build());
var wwwCivoIndex_firewallFirewall = new Firewall("wwwCivoIndex/firewallFirewall", FirewallArgs.builder()
.networkId(customNet.id())
.createDefaultRules(false)
.ingressRules(
FirewallIngressRuleArgs.builder()
.label("k8s")
.protocol("tcp")
.portRange("6443")
.cidrs(
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32")
.action("allow")
.build(),
FirewallIngressRuleArgs.builder()
.label("ssh")
.protocol("tcp")
.portRange("22")
.cidrs(
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32")
.action("allow")
.build())
.egressRules(FirewallEgressRuleArgs.builder()
.label("all")
.protocol("tcp")
.portRange("1-65535")
.cidrs("0.0.0.0/0")
.action("allow")
.build())
.build());
}
}
import pulumi
import pulumi_civo as civo
# Create a network
custom_net = civo.Network("customNet", label="my-custom-network")
# Create a firewall
www_firewall = civo.Firewall("wwwFirewall", network_id=custom_net.id)
# Create a firewall with the default rules
www_index_firewall_firewall = civo.Firewall("wwwIndex/firewallFirewall",
network_id=custom_net.id,
create_default_rules=True)
# Create a firewall withouth the default rules but with a custom rule
www_civo_index_firewall_firewall = civo.Firewall("wwwCivoIndex/firewallFirewall",
network_id=custom_net.id,
create_default_rules=False,
ingress_rules=[
civo.FirewallIngressRuleArgs(
label="k8s",
protocol="tcp",
port_range="6443",
cidrs=[
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32",
],
action="allow",
),
civo.FirewallIngressRuleArgs(
label="ssh",
protocol="tcp",
port_range="22",
cidrs=[
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32",
],
action="allow",
),
],
egress_rules=[civo.FirewallEgressRuleArgs(
label="all",
protocol="tcp",
port_range="1-65535",
cidrs=["0.0.0.0/0"],
action="allow",
)])
import * as pulumi from "@pulumi/pulumi";
import * as civo from "@pulumi/civo";
// Create a network
const customNet = new civo.Network("customNet", {label: "my-custom-network"});
// Create a firewall
const wwwFirewall = new civo.Firewall("wwwFirewall", {networkId: customNet.id});
// Create a firewall with the default rules
const wwwIndex_firewallFirewall = new civo.Firewall("wwwIndex/firewallFirewall", {
networkId: customNet.id,
createDefaultRules: true,
});
// Create a firewall withouth the default rules but with a custom rule
const wwwCivoIndex_firewallFirewall = new civo.Firewall("wwwCivoIndex/firewallFirewall", {
networkId: customNet.id,
createDefaultRules: false,
ingressRules: [
{
label: "k8s",
protocol: "tcp",
portRange: "6443",
cidrs: [
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32",
],
action: "allow",
},
{
label: "ssh",
protocol: "tcp",
portRange: "22",
cidrs: [
"192.168.1.1/32",
"192.168.10.4/32",
"192.168.10.10/32",
],
action: "allow",
},
],
egressRules: [{
label: "all",
protocol: "tcp",
portRange: "1-65535",
cidrs: ["0.0.0.0/0"],
action: "allow",
}],
});
resources:
# Create a network
customNet:
type: civo:Network
properties:
label: my-custom-network
# Create a firewall
wwwFirewall:
type: civo:Firewall
properties:
networkId: ${customNet.id}
# Create a firewall with the default rules
wwwIndex/firewallFirewall:
type: civo:Firewall
properties:
networkId: ${customNet.id}
createDefaultRules: true
# Create a firewall withouth the default rules but with a custom rule
wwwCivoIndex/firewallFirewall:
type: civo:Firewall
properties:
networkId: ${customNet.id}
createDefaultRules: false
ingressRules:
- label: k8s
protocol: tcp
portRange: '6443'
cidrs:
- 192.168.1.1/32
- 192.168.10.4/32
- 192.168.10.10/32
action: allow
- label: ssh
protocol: tcp
portRange: '22'
cidrs:
- 192.168.1.1/32
- 192.168.10.4/32
- 192.168.10.10/32
action: allow
egressRules:
- label: all
protocol: tcp
portRange: 1-65535
cidrs:
- 0.0.0.0/0
action: allow
Create Firewall Resource
new Firewall(name: string, args?: FirewallArgs, opts?: CustomResourceOptions);
@overload
def Firewall(resource_name: str,
opts: Optional[ResourceOptions] = None,
create_default_rules: Optional[bool] = None,
egress_rules: Optional[Sequence[FirewallEgressRuleArgs]] = None,
ingress_rules: Optional[Sequence[FirewallIngressRuleArgs]] = None,
name: Optional[str] = None,
network_id: Optional[str] = None,
region: Optional[str] = None)
@overload
def Firewall(resource_name: str,
args: Optional[FirewallArgs] = None,
opts: Optional[ResourceOptions] = None)
func NewFirewall(ctx *Context, name string, args *FirewallArgs, opts ...ResourceOption) (*Firewall, error)
public Firewall(string name, FirewallArgs? args = null, CustomResourceOptions? opts = null)
public Firewall(String name, FirewallArgs args)
public Firewall(String name, FirewallArgs args, CustomResourceOptions options)
type: civo:Firewall
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args FirewallArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args FirewallArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args FirewallArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Firewall Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Firewall resource accepts the following input properties:
- Create
Default boolRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- Egress
Rules List<FirewallEgress Rule> The egress rules, this is a list of rules that will be applied to the firewall
- Ingress
Rules List<FirewallIngress Rule> The ingress rules, this is a list of rules that will be applied to the firewall
- Name string
The firewall name
- Network
Id string The firewall network, if is not defined we use the default network
- Region string
The firewall region, if is not defined we use the global defined in the provider
- Create
Default boolRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- Egress
Rules []FirewallEgress Rule Args The egress rules, this is a list of rules that will be applied to the firewall
- Ingress
Rules []FirewallIngress Rule Args The ingress rules, this is a list of rules that will be applied to the firewall
- Name string
The firewall name
- Network
Id string The firewall network, if is not defined we use the default network
- Region string
The firewall region, if is not defined we use the global defined in the provider
- create
Default BooleanRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress
Rules List<FirewallEgress Rule> The egress rules, this is a list of rules that will be applied to the firewall
- ingress
Rules List<FirewallIngress Rule> The ingress rules, this is a list of rules that will be applied to the firewall
- name String
The firewall name
- network
Id String The firewall network, if is not defined we use the default network
- region String
The firewall region, if is not defined we use the global defined in the provider
- create
Default booleanRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress
Rules FirewallEgress Rule[] The egress rules, this is a list of rules that will be applied to the firewall
- ingress
Rules FirewallIngress Rule[] The ingress rules, this is a list of rules that will be applied to the firewall
- name string
The firewall name
- network
Id string The firewall network, if is not defined we use the default network
- region string
The firewall region, if is not defined we use the global defined in the provider
- create_
default_ boolrules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress_
rules Sequence[FirewallEgress Rule Args] The egress rules, this is a list of rules that will be applied to the firewall
- ingress_
rules Sequence[FirewallIngress Rule Args] The ingress rules, this is a list of rules that will be applied to the firewall
- name str
The firewall name
- network_
id str The firewall network, if is not defined we use the default network
- region str
The firewall region, if is not defined we use the global defined in the provider
- create
Default BooleanRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress
Rules List<Property Map> The egress rules, this is a list of rules that will be applied to the firewall
- ingress
Rules List<Property Map> The ingress rules, this is a list of rules that will be applied to the firewall
- name String
The firewall name
- network
Id String The firewall network, if is not defined we use the default network
- region String
The firewall region, if is not defined we use the global defined in the provider
Outputs
All input properties are implicitly available as output properties. Additionally, the Firewall resource produces the following output properties:
- Id string
The provider-assigned unique ID for this managed resource.
- Id string
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
- id string
The provider-assigned unique ID for this managed resource.
- id str
The provider-assigned unique ID for this managed resource.
- id String
The provider-assigned unique ID for this managed resource.
Look up Existing Firewall Resource
Get an existing Firewall resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: FirewallState, opts?: CustomResourceOptions): Firewall
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
create_default_rules: Optional[bool] = None,
egress_rules: Optional[Sequence[FirewallEgressRuleArgs]] = None,
ingress_rules: Optional[Sequence[FirewallIngressRuleArgs]] = None,
name: Optional[str] = None,
network_id: Optional[str] = None,
region: Optional[str] = None) -> Firewall
func GetFirewall(ctx *Context, name string, id IDInput, state *FirewallState, opts ...ResourceOption) (*Firewall, error)
public static Firewall Get(string name, Input<string> id, FirewallState? state, CustomResourceOptions? opts = null)
public static Firewall get(String name, Output<String> id, FirewallState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Create
Default boolRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- Egress
Rules List<FirewallEgress Rule> The egress rules, this is a list of rules that will be applied to the firewall
- Ingress
Rules List<FirewallIngress Rule> The ingress rules, this is a list of rules that will be applied to the firewall
- Name string
The firewall name
- Network
Id string The firewall network, if is not defined we use the default network
- Region string
The firewall region, if is not defined we use the global defined in the provider
- Create
Default boolRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- Egress
Rules []FirewallEgress Rule Args The egress rules, this is a list of rules that will be applied to the firewall
- Ingress
Rules []FirewallIngress Rule Args The ingress rules, this is a list of rules that will be applied to the firewall
- Name string
The firewall name
- Network
Id string The firewall network, if is not defined we use the default network
- Region string
The firewall region, if is not defined we use the global defined in the provider
- create
Default BooleanRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress
Rules List<FirewallEgress Rule> The egress rules, this is a list of rules that will be applied to the firewall
- ingress
Rules List<FirewallIngress Rule> The ingress rules, this is a list of rules that will be applied to the firewall
- name String
The firewall name
- network
Id String The firewall network, if is not defined we use the default network
- region String
The firewall region, if is not defined we use the global defined in the provider
- create
Default booleanRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress
Rules FirewallEgress Rule[] The egress rules, this is a list of rules that will be applied to the firewall
- ingress
Rules FirewallIngress Rule[] The ingress rules, this is a list of rules that will be applied to the firewall
- name string
The firewall name
- network
Id string The firewall network, if is not defined we use the default network
- region string
The firewall region, if is not defined we use the global defined in the provider
- create_
default_ boolrules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress_
rules Sequence[FirewallEgress Rule Args] The egress rules, this is a list of rules that will be applied to the firewall
- ingress_
rules Sequence[FirewallIngress Rule Args] The ingress rules, this is a list of rules that will be applied to the firewall
- name str
The firewall name
- network_
id str The firewall network, if is not defined we use the default network
- region str
The firewall region, if is not defined we use the global defined in the provider
- create
Default BooleanRules The create rules flag is used to create the default firewall rules, if is not defined will be set to true, and if you set to false you need to define at least one ingress or egress rule
- egress
Rules List<Property Map> The egress rules, this is a list of rules that will be applied to the firewall
- ingress
Rules List<Property Map> The ingress rules, this is a list of rules that will be applied to the firewall
- name String
The firewall name
- network
Id String The firewall network, if is not defined we use the default network
- region String
The firewall region, if is not defined we use the global defined in the provider
Supporting Types
FirewallEgressRule, FirewallEgressRuleArgs
- Action string
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- Cidrs List<string>
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- Id string
The ID of this resource.
- Label string
A string that will be the displayed name/reference for this rule
- Port
Range string The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- Protocol string
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- Action string
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- Cidrs []string
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- Id string
The ID of this resource.
- Label string
A string that will be the displayed name/reference for this rule
- Port
Range string The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- Protocol string
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action String
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs List<String>
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id String
The ID of this resource.
- label String
A string that will be the displayed name/reference for this rule
- port
Range String The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol String
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action string
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs string[]
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id string
The ID of this resource.
- label string
A string that will be the displayed name/reference for this rule
- port
Range string The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol string
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action str
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs Sequence[str]
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id str
The ID of this resource.
- label str
A string that will be the displayed name/reference for this rule
- port_
range str The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol str
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action String
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs List<String>
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id String
The ID of this resource.
- label String
A string that will be the displayed name/reference for this rule
- port
Range String The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol String
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
FirewallIngressRule, FirewallIngressRuleArgs
- Action string
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- Cidrs List<string>
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- Id string
The ID of this resource.
- Label string
A string that will be the displayed name/reference for this rule
- Port
Range string The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- Protocol string
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- Action string
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- Cidrs []string
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- Id string
The ID of this resource.
- Label string
A string that will be the displayed name/reference for this rule
- Port
Range string The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- Protocol string
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action String
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs List<String>
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id String
The ID of this resource.
- label String
A string that will be the displayed name/reference for this rule
- port
Range String The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol String
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action string
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs string[]
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id string
The ID of this resource.
- label string
A string that will be the displayed name/reference for this rule
- port
Range string The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol string
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action str
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs Sequence[str]
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id str
The ID of this resource.
- label str
A string that will be the displayed name/reference for this rule
- port_
range str The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol str
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
- action String
The action of the rule can be allow or deny. When we set the
action = 'allow'
, this is going to add a rule to allow traffic. Similarly, settingaction = 'deny'
will deny the traffic.- cidrs List<String>
The CIDR notation of the other end to affect, or a valid network CIDR (e.g. 0.0.0.0/0 to open for everyone or 1.2.3.4/32 to open just for a specific IP address)
- id String
The ID of this resource.
- label String
A string that will be the displayed name/reference for this rule
- port
Range String The port or port range to open, can be a single port or a range separated by a dash (
-
), e.g.80
or80-443
- protocol String
The protocol choice from
tcp
,udp
oricmp
(the default if unspecified istcp
)
Import
using ID
$ pulumi import civo:index/firewall:Firewall www b8ecd2ab-2267-4a5e-8692-cbf1d32583e3
Package Details
- Repository
- Civo pulumi/pulumi-civo
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
civo
Terraform Provider.