gcorelabs.Securitygroup
Explore with Pulumi AI
Represent SecurityGroups(Firewall)
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as gcore from "@pulumi/gcore";
const sg = new gcore.index.Gcore_securitygroup("sg", {
name: "test sg",
regionId: 1,
projectId: 1,
securityGroupRules: [
{
direction: "egress",
ethertype: "IPv4",
protocol: "tcp",
portRangeMin: 19990,
portRangeMax: 19990,
},
{
direction: "ingress",
ethertype: "IPv4",
protocol: "tcp",
portRangeMin: 19990,
portRangeMax: 19990,
},
{
direction: "egress",
ethertype: "IPv4",
protocol: "vrrp",
},
],
});
import pulumi
import pulumi_gcore as gcore
sg = gcore.index.Gcore_securitygroup("sg",
name=test sg,
region_id=1,
project_id=1,
security_group_rules=[
{
direction: egress,
ethertype: IPv4,
protocol: tcp,
portRangeMin: 19990,
portRangeMax: 19990,
},
{
direction: ingress,
ethertype: IPv4,
protocol: tcp,
portRangeMin: 19990,
portRangeMax: 19990,
},
{
direction: egress,
ethertype: IPv4,
protocol: vrrp,
},
])
package main
import (
"github.com/pulumi/pulumi-gcore/sdk/go/gcore"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := gcore.NewGcore_securitygroup(ctx, "sg", &gcore.Gcore_securitygroupArgs{
Name: "test sg",
RegionId: 1,
ProjectId: 1,
SecurityGroupRules: []interface{}{
map[string]interface{}{
"direction": "egress",
"ethertype": "IPv4",
"protocol": "tcp",
"portRangeMin": 19990,
"portRangeMax": 19990,
},
map[string]interface{}{
"direction": "ingress",
"ethertype": "IPv4",
"protocol": "tcp",
"portRangeMin": 19990,
"portRangeMax": 19990,
},
map[string]interface{}{
"direction": "egress",
"ethertype": "IPv4",
"protocol": "vrrp",
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Gcore = Pulumi.Gcore;
return await Deployment.RunAsync(() =>
{
var sg = new Gcore.Index.Gcore_securitygroup("sg", new()
{
Name = "test sg",
RegionId = 1,
ProjectId = 1,
SecurityGroupRules = new[]
{
{
{ "direction", "egress" },
{ "ethertype", "IPv4" },
{ "protocol", "tcp" },
{ "portRangeMin", 19990 },
{ "portRangeMax", 19990 },
},
{
{ "direction", "ingress" },
{ "ethertype", "IPv4" },
{ "protocol", "tcp" },
{ "portRangeMin", 19990 },
{ "portRangeMax", 19990 },
},
{
{ "direction", "egress" },
{ "ethertype", "IPv4" },
{ "protocol", "vrrp" },
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcore.gcore_securitygroup;
import com.pulumi.gcore.Gcore_securitygroupArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var sg = new Gcore_securitygroup("sg", Gcore_securitygroupArgs.builder()
.name("test sg")
.regionId(1)
.projectId(1)
.securityGroupRules(
%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference),
%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference),
%!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference))
.build());
}
}
resources:
sg:
type: gcore:gcore_securitygroup
properties:
name: test sg
regionId: 1
projectId: 1
securityGroupRules:
- direction: egress
ethertype: IPv4
protocol: tcp
portRangeMin: 19990
portRangeMax: 19990
- direction: ingress
ethertype: IPv4
protocol: tcp
portRangeMin: 19990
portRangeMax: 19990
- direction: egress
ethertype: IPv4
protocol: vrrp
Create Securitygroup Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Securitygroup(name: string, args: SecuritygroupArgs, opts?: CustomResourceOptions);
@overload
def Securitygroup(resource_name: str,
args: SecuritygroupArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Securitygroup(resource_name: str,
opts: Optional[ResourceOptions] = None,
security_group_rules: Optional[Sequence[SecuritygroupSecurityGroupRuleArgs]] = None,
description: Optional[str] = None,
last_updated: Optional[str] = None,
metadata_map: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
project_id: Optional[float] = None,
project_name: Optional[str] = None,
region_id: Optional[float] = None,
region_name: Optional[str] = None,
securitygroup_id: Optional[str] = None)
func NewSecuritygroup(ctx *Context, name string, args SecuritygroupArgs, opts ...ResourceOption) (*Securitygroup, error)
public Securitygroup(string name, SecuritygroupArgs args, CustomResourceOptions? opts = null)
public Securitygroup(String name, SecuritygroupArgs args)
public Securitygroup(String name, SecuritygroupArgs args, CustomResourceOptions options)
type: gcorelabs:Securitygroup
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecuritygroupArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecuritygroupArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecuritygroupArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecuritygroupArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecuritygroupArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var securitygroupResource = new Gcorelabs.Securitygroup("securitygroupResource", new()
{
SecurityGroupRules = new[]
{
new Gcorelabs.Inputs.SecuritygroupSecurityGroupRuleArgs
{
Direction = "string",
Ethertype = "string",
Protocol = "string",
CreatedAt = "string",
Description = "string",
Id = "string",
PortRangeMax = 0,
PortRangeMin = 0,
RemoteIpPrefix = "string",
UpdatedAt = "string",
},
},
Description = "string",
LastUpdated = "string",
MetadataMap =
{
{ "string", "string" },
},
Name = "string",
ProjectId = 0,
ProjectName = "string",
RegionId = 0,
RegionName = "string",
SecuritygroupId = "string",
});
example, err := gcorelabs.NewSecuritygroup(ctx, "securitygroupResource", &gcorelabs.SecuritygroupArgs{
SecurityGroupRules: gcorelabs.SecuritygroupSecurityGroupRuleArray{
&gcorelabs.SecuritygroupSecurityGroupRuleArgs{
Direction: pulumi.String("string"),
Ethertype: pulumi.String("string"),
Protocol: pulumi.String("string"),
CreatedAt: pulumi.String("string"),
Description: pulumi.String("string"),
Id: pulumi.String("string"),
PortRangeMax: pulumi.Float64(0),
PortRangeMin: pulumi.Float64(0),
RemoteIpPrefix: pulumi.String("string"),
UpdatedAt: pulumi.String("string"),
},
},
Description: pulumi.String("string"),
LastUpdated: pulumi.String("string"),
MetadataMap: pulumi.StringMap{
"string": pulumi.String("string"),
},
Name: pulumi.String("string"),
ProjectId: pulumi.Float64(0),
ProjectName: pulumi.String("string"),
RegionId: pulumi.Float64(0),
RegionName: pulumi.String("string"),
SecuritygroupId: pulumi.String("string"),
})
var securitygroupResource = new Securitygroup("securitygroupResource", SecuritygroupArgs.builder()
.securityGroupRules(SecuritygroupSecurityGroupRuleArgs.builder()
.direction("string")
.ethertype("string")
.protocol("string")
.createdAt("string")
.description("string")
.id("string")
.portRangeMax(0)
.portRangeMin(0)
.remoteIpPrefix("string")
.updatedAt("string")
.build())
.description("string")
.lastUpdated("string")
.metadataMap(Map.of("string", "string"))
.name("string")
.projectId(0)
.projectName("string")
.regionId(0)
.regionName("string")
.securitygroupId("string")
.build());
securitygroup_resource = gcorelabs.Securitygroup("securitygroupResource",
security_group_rules=[{
"direction": "string",
"ethertype": "string",
"protocol": "string",
"created_at": "string",
"description": "string",
"id": "string",
"port_range_max": 0,
"port_range_min": 0,
"remote_ip_prefix": "string",
"updated_at": "string",
}],
description="string",
last_updated="string",
metadata_map={
"string": "string",
},
name="string",
project_id=0,
project_name="string",
region_id=0,
region_name="string",
securitygroup_id="string")
const securitygroupResource = new gcorelabs.Securitygroup("securitygroupResource", {
securityGroupRules: [{
direction: "string",
ethertype: "string",
protocol: "string",
createdAt: "string",
description: "string",
id: "string",
portRangeMax: 0,
portRangeMin: 0,
remoteIpPrefix: "string",
updatedAt: "string",
}],
description: "string",
lastUpdated: "string",
metadataMap: {
string: "string",
},
name: "string",
projectId: 0,
projectName: "string",
regionId: 0,
regionName: "string",
securitygroupId: "string",
});
type: gcorelabs:Securitygroup
properties:
description: string
lastUpdated: string
metadataMap:
string: string
name: string
projectId: 0
projectName: string
regionId: 0
regionName: string
securityGroupRules:
- createdAt: string
description: string
direction: string
ethertype: string
id: string
portRangeMax: 0
portRangeMin: 0
protocol: string
remoteIpPrefix: string
updatedAt: string
securitygroupId: string
Securitygroup Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Securitygroup resource accepts the following input properties:
- Security
Group List<SecuritygroupRules Security Group Rule> - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- Description string
- Last
Updated string - Metadata
Map Dictionary<string, string> - Name string
- Project
Id double - Project
Name string - Region
Id double - Region
Name string - Securitygroup
Id string - The ID of this resource.
- Security
Group []SecuritygroupRules Security Group Rule Args - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- Description string
- Last
Updated string - Metadata
Map map[string]string - Name string
- Project
Id float64 - Project
Name string - Region
Id float64 - Region
Name string - Securitygroup
Id string - The ID of this resource.
- security
Group List<SecuritygroupRules Security Group Rule> - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- description String
- last
Updated String - metadata
Map Map<String,String> - name String
- project
Id Double - project
Name String - region
Id Double - region
Name String - securitygroup
Id String - The ID of this resource.
- security
Group SecuritygroupRules Security Group Rule[] - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- description string
- last
Updated string - metadata
Map {[key: string]: string} - name string
- project
Id number - project
Name string - region
Id number - region
Name string - securitygroup
Id string - The ID of this resource.
- security_
group_ Sequence[Securitygrouprules Security Group Rule Args] - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- description str
- last_
updated str - metadata_
map Mapping[str, str] - name str
- project_
id float - project_
name str - region_
id float - region_
name str - securitygroup_
id str - The ID of this resource.
- security
Group List<Property Map>Rules - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- description String
- last
Updated String - metadata
Map Map<String> - name String
- project
Id Number - project
Name String - region
Id Number - region
Name String - securitygroup
Id String - The ID of this resource.
Outputs
All input properties are implicitly available as output properties. Additionally, the Securitygroup resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Metadata
Read List<SecuritygroupOnlies Metadata Read Only>
- Id string
- The provider-assigned unique ID for this managed resource.
- Metadata
Read []SecuritygroupOnlies Metadata Read Only
- id String
- The provider-assigned unique ID for this managed resource.
- metadata
Read List<SecuritygroupOnlies Metadata Read Only>
- id string
- The provider-assigned unique ID for this managed resource.
- metadata
Read SecuritygroupOnlies Metadata Read Only[]
- id str
- The provider-assigned unique ID for this managed resource.
- metadata_
read_ Sequence[Securitygrouponlies Metadata Read Only]
- id String
- The provider-assigned unique ID for this managed resource.
- metadata
Read List<Property Map>Onlies
Look up Existing Securitygroup Resource
Get an existing Securitygroup resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecuritygroupState, opts?: CustomResourceOptions): Securitygroup
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
description: Optional[str] = None,
last_updated: Optional[str] = None,
metadata_map: Optional[Mapping[str, str]] = None,
metadata_read_onlies: Optional[Sequence[SecuritygroupMetadataReadOnlyArgs]] = None,
name: Optional[str] = None,
project_id: Optional[float] = None,
project_name: Optional[str] = None,
region_id: Optional[float] = None,
region_name: Optional[str] = None,
security_group_rules: Optional[Sequence[SecuritygroupSecurityGroupRuleArgs]] = None,
securitygroup_id: Optional[str] = None) -> Securitygroup
func GetSecuritygroup(ctx *Context, name string, id IDInput, state *SecuritygroupState, opts ...ResourceOption) (*Securitygroup, error)
public static Securitygroup Get(string name, Input<string> id, SecuritygroupState? state, CustomResourceOptions? opts = null)
public static Securitygroup get(String name, Output<String> id, SecuritygroupState state, CustomResourceOptions options)
resources: _: type: gcorelabs:Securitygroup get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Description string
- Last
Updated string - Metadata
Map Dictionary<string, string> - Metadata
Read List<SecuritygroupOnlies Metadata Read Only> - Name string
- Project
Id double - Project
Name string - Region
Id double - Region
Name string - Security
Group List<SecuritygroupRules Security Group Rule> - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- Securitygroup
Id string - The ID of this resource.
- Description string
- Last
Updated string - Metadata
Map map[string]string - Metadata
Read []SecuritygroupOnlies Metadata Read Only Args - Name string
- Project
Id float64 - Project
Name string - Region
Id float64 - Region
Name string - Security
Group []SecuritygroupRules Security Group Rule Args - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- Securitygroup
Id string - The ID of this resource.
- description String
- last
Updated String - metadata
Map Map<String,String> - metadata
Read List<SecuritygroupOnlies Metadata Read Only> - name String
- project
Id Double - project
Name String - region
Id Double - region
Name String - security
Group List<SecuritygroupRules Security Group Rule> - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- securitygroup
Id String - The ID of this resource.
- description string
- last
Updated string - metadata
Map {[key: string]: string} - metadata
Read SecuritygroupOnlies Metadata Read Only[] - name string
- project
Id number - project
Name string - region
Id number - region
Name string - security
Group SecuritygroupRules Security Group Rule[] - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- securitygroup
Id string - The ID of this resource.
- description str
- last_
updated str - metadata_
map Mapping[str, str] - metadata_
read_ Sequence[Securitygrouponlies Metadata Read Only Args] - name str
- project_
id float - project_
name str - region_
id float - region_
name str - security_
group_ Sequence[Securitygrouprules Security Group Rule Args] - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- securitygroup_
id str - The ID of this resource.
- description String
- last
Updated String - metadata
Map Map<String> - metadata
Read List<Property Map>Onlies - name String
- project
Id Number - project
Name String - region
Id Number - region
Name String - security
Group List<Property Map>Rules - Firewall rules control what inbound(ingress) and outbound(egress) traffic is allowed to enter or leave a Instance. At least one 'egress' rule should be set
- securitygroup
Id String - The ID of this resource.
Supporting Types
SecuritygroupMetadataReadOnly, SecuritygroupMetadataReadOnlyArgs
SecuritygroupSecurityGroupRule, SecuritygroupSecurityGroupRuleArgs
- Direction string
- Available value is 'ingress', 'egress'
- Ethertype string
- Available value is 'IPv4', 'IPv6'
- Protocol string
- Available value is udp,tcp,any,icmp,ah,dccp,egp,esp,gre,igmp,ospf,pgm,rsvp,sctp,udplite,vrrp,51,50,112,0,4,ipip,ipencap
- Created
At string - Description string
- Id string
- The ID of this resource.
- Port
Range doubleMax - Port
Range doubleMin - Remote
Ip stringPrefix - Updated
At string
- Direction string
- Available value is 'ingress', 'egress'
- Ethertype string
- Available value is 'IPv4', 'IPv6'
- Protocol string
- Available value is udp,tcp,any,icmp,ah,dccp,egp,esp,gre,igmp,ospf,pgm,rsvp,sctp,udplite,vrrp,51,50,112,0,4,ipip,ipencap
- Created
At string - Description string
- Id string
- The ID of this resource.
- Port
Range float64Max - Port
Range float64Min - Remote
Ip stringPrefix - Updated
At string
- direction String
- Available value is 'ingress', 'egress'
- ethertype String
- Available value is 'IPv4', 'IPv6'
- protocol String
- Available value is udp,tcp,any,icmp,ah,dccp,egp,esp,gre,igmp,ospf,pgm,rsvp,sctp,udplite,vrrp,51,50,112,0,4,ipip,ipencap
- created
At String - description String
- id String
- The ID of this resource.
- port
Range DoubleMax - port
Range DoubleMin - remote
Ip StringPrefix - updated
At String
- direction string
- Available value is 'ingress', 'egress'
- ethertype string
- Available value is 'IPv4', 'IPv6'
- protocol string
- Available value is udp,tcp,any,icmp,ah,dccp,egp,esp,gre,igmp,ospf,pgm,rsvp,sctp,udplite,vrrp,51,50,112,0,4,ipip,ipencap
- created
At string - description string
- id string
- The ID of this resource.
- port
Range numberMax - port
Range numberMin - remote
Ip stringPrefix - updated
At string
- direction str
- Available value is 'ingress', 'egress'
- ethertype str
- Available value is 'IPv4', 'IPv6'
- protocol str
- Available value is udp,tcp,any,icmp,ah,dccp,egp,esp,gre,igmp,ospf,pgm,rsvp,sctp,udplite,vrrp,51,50,112,0,4,ipip,ipencap
- created_
at str - description str
- id str
- The ID of this resource.
- port_
range_ floatmax - port_
range_ floatmin - remote_
ip_ strprefix - updated_
at str
- direction String
- Available value is 'ingress', 'egress'
- ethertype String
- Available value is 'IPv4', 'IPv6'
- protocol String
- Available value is udp,tcp,any,icmp,ah,dccp,egp,esp,gre,igmp,ospf,pgm,rsvp,sctp,udplite,vrrp,51,50,112,0,4,ipip,ipencap
- created
At String - description String
- id String
- The ID of this resource.
- port
Range NumberMax - port
Range NumberMin - remote
Ip StringPrefix - updated
At String
Import
import using <project_id>:<region_id>:<securitygroup_id> format
$ pulumi import gcorelabs:index/securitygroup:Securitygroup securitygroup1 1:6:447d2959-8ae0-4ca0-8d47-9f050a3637d7
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- gcorelabs g-core/terraform-provider-gcorelabs
- License
- Notes
- This Pulumi package is based on the
gcorelabs
Terraform Provider.