ibm.FirewallPolicy
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as ibm from "@pulumi/ibm";
const demofw = new ibm.Firewall("demofw", {
haEnabled: false,
publicVlanId: 1234567,
});
const rules = new ibm.FirewallPolicy("rules", {
firewallId: demofw.firewallId,
rules: [
{
action: "permit",
srcIpAddress: "10.1.1.0",
srcIpCidr: 24,
dstIpAddress: "any",
dstIpCidr: 32,
dstPortRangeStart: 80,
dstPortRangeEnd: 80,
notes: "Permit from 10.1.1.0",
protocol: "udp",
},
{
action: "deny",
srcIpAddress: "10.1.1.0",
srcIpCidr: 24,
dstIpAddress: "any",
dstIpCidr: 32,
dstPortRangeStart: 81,
dstPortRangeEnd: 81,
notes: "Permit from 10.1.1.0",
protocol: "udp",
},
],
});
import pulumi
import pulumi_ibm as ibm
demofw = ibm.Firewall("demofw",
ha_enabled=False,
public_vlan_id=1234567)
rules = ibm.FirewallPolicy("rules",
firewall_id=demofw.firewall_id,
rules=[
{
"action": "permit",
"src_ip_address": "10.1.1.0",
"src_ip_cidr": 24,
"dst_ip_address": "any",
"dst_ip_cidr": 32,
"dst_port_range_start": 80,
"dst_port_range_end": 80,
"notes": "Permit from 10.1.1.0",
"protocol": "udp",
},
{
"action": "deny",
"src_ip_address": "10.1.1.0",
"src_ip_cidr": 24,
"dst_ip_address": "any",
"dst_ip_cidr": 32,
"dst_port_range_start": 81,
"dst_port_range_end": 81,
"notes": "Permit from 10.1.1.0",
"protocol": "udp",
},
])
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
demofw, err := ibm.NewFirewall(ctx, "demofw", &ibm.FirewallArgs{
HaEnabled: pulumi.Bool(false),
PublicVlanId: pulumi.Float64(1234567),
})
if err != nil {
return err
}
_, err = ibm.NewFirewallPolicy(ctx, "rules", &ibm.FirewallPolicyArgs{
FirewallId: demofw.FirewallId,
Rules: ibm.FirewallPolicyRuleArray{
&ibm.FirewallPolicyRuleArgs{
Action: pulumi.String("permit"),
SrcIpAddress: pulumi.String("10.1.1.0"),
SrcIpCidr: pulumi.Float64(24),
DstIpAddress: pulumi.String("any"),
DstIpCidr: pulumi.Float64(32),
DstPortRangeStart: pulumi.Float64(80),
DstPortRangeEnd: pulumi.Float64(80),
Notes: pulumi.String("Permit from 10.1.1.0"),
Protocol: pulumi.String("udp"),
},
&ibm.FirewallPolicyRuleArgs{
Action: pulumi.String("deny"),
SrcIpAddress: pulumi.String("10.1.1.0"),
SrcIpCidr: pulumi.Float64(24),
DstIpAddress: pulumi.String("any"),
DstIpCidr: pulumi.Float64(32),
DstPortRangeStart: pulumi.Float64(81),
DstPortRangeEnd: pulumi.Float64(81),
Notes: pulumi.String("Permit from 10.1.1.0"),
Protocol: pulumi.String("udp"),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ibm = Pulumi.Ibm;
return await Deployment.RunAsync(() =>
{
var demofw = new Ibm.Firewall("demofw", new()
{
HaEnabled = false,
PublicVlanId = 1234567,
});
var rules = new Ibm.FirewallPolicy("rules", new()
{
FirewallId = demofw.FirewallId,
Rules = new[]
{
new Ibm.Inputs.FirewallPolicyRuleArgs
{
Action = "permit",
SrcIpAddress = "10.1.1.0",
SrcIpCidr = 24,
DstIpAddress = "any",
DstIpCidr = 32,
DstPortRangeStart = 80,
DstPortRangeEnd = 80,
Notes = "Permit from 10.1.1.0",
Protocol = "udp",
},
new Ibm.Inputs.FirewallPolicyRuleArgs
{
Action = "deny",
SrcIpAddress = "10.1.1.0",
SrcIpCidr = 24,
DstIpAddress = "any",
DstIpCidr = 32,
DstPortRangeStart = 81,
DstPortRangeEnd = 81,
Notes = "Permit from 10.1.1.0",
Protocol = "udp",
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ibm.Firewall;
import com.pulumi.ibm.FirewallArgs;
import com.pulumi.ibm.FirewallPolicy;
import com.pulumi.ibm.FirewallPolicyArgs;
import com.pulumi.ibm.inputs.FirewallPolicyRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var demofw = new Firewall("demofw", FirewallArgs.builder()
.haEnabled(false)
.publicVlanId(1234567)
.build());
var rules = new FirewallPolicy("rules", FirewallPolicyArgs.builder()
.firewallId(demofw.firewallId())
.rules(
FirewallPolicyRuleArgs.builder()
.action("permit")
.srcIpAddress("10.1.1.0")
.srcIpCidr(24)
.dstIpAddress("any")
.dstIpCidr(32)
.dstPortRangeStart(80)
.dstPortRangeEnd(80)
.notes("Permit from 10.1.1.0")
.protocol("udp")
.build(),
FirewallPolicyRuleArgs.builder()
.action("deny")
.srcIpAddress("10.1.1.0")
.srcIpCidr(24)
.dstIpAddress("any")
.dstIpCidr(32)
.dstPortRangeStart(81)
.dstPortRangeEnd(81)
.notes("Permit from 10.1.1.0")
.protocol("udp")
.build())
.build());
}
}
resources:
demofw:
type: ibm:Firewall
properties:
haEnabled: false
publicVlanId: 1.234567e+06
rules:
type: ibm:FirewallPolicy
properties:
firewallId: ${demofw.firewallId}
rules:
- action: permit
srcIpAddress: 10.1.1.0
srcIpCidr: 24
dstIpAddress: any
dstIpCidr: 32
dstPortRangeStart: 80
dstPortRangeEnd: 80
notes: Permit from 10.1.1.0
protocol: udp
- action: deny
srcIpAddress: 10.1.1.0
srcIpCidr: 24
dstIpAddress: any
dstIpCidr: 32
dstPortRangeStart: 81
dstPortRangeEnd: 81
notes: Permit from 10.1.1.0
protocol: udp
Create FirewallPolicy Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new FirewallPolicy(name: string, args: FirewallPolicyArgs, opts?: CustomResourceOptions);
@overload
def FirewallPolicy(resource_name: str,
args: FirewallPolicyArgs,
opts: Optional[ResourceOptions] = None)
@overload
def FirewallPolicy(resource_name: str,
opts: Optional[ResourceOptions] = None,
firewall_id: Optional[float] = None,
rules: Optional[Sequence[FirewallPolicyRuleArgs]] = None,
firewall_policy_id: Optional[str] = None,
tags: Optional[Sequence[str]] = None)
func NewFirewallPolicy(ctx *Context, name string, args FirewallPolicyArgs, opts ...ResourceOption) (*FirewallPolicy, error)
public FirewallPolicy(string name, FirewallPolicyArgs args, CustomResourceOptions? opts = null)
public FirewallPolicy(String name, FirewallPolicyArgs args)
public FirewallPolicy(String name, FirewallPolicyArgs args, CustomResourceOptions options)
type: ibm:FirewallPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args FirewallPolicyArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var firewallPolicyResource = new Ibm.FirewallPolicy("firewallPolicyResource", new()
{
FirewallId = 0,
Rules = new[]
{
new Ibm.Inputs.FirewallPolicyRuleArgs
{
Action = "string",
DstIpAddress = "string",
DstIpCidr = 0,
Protocol = "string",
SrcIpAddress = "string",
SrcIpCidr = 0,
DstPortRangeEnd = 0,
DstPortRangeStart = 0,
Notes = "string",
},
},
FirewallPolicyId = "string",
Tags = new[]
{
"string",
},
});
example, err := ibm.NewFirewallPolicy(ctx, "firewallPolicyResource", &ibm.FirewallPolicyArgs{
FirewallId: pulumi.Float64(0),
Rules: ibm.FirewallPolicyRuleArray{
&ibm.FirewallPolicyRuleArgs{
Action: pulumi.String("string"),
DstIpAddress: pulumi.String("string"),
DstIpCidr: pulumi.Float64(0),
Protocol: pulumi.String("string"),
SrcIpAddress: pulumi.String("string"),
SrcIpCidr: pulumi.Float64(0),
DstPortRangeEnd: pulumi.Float64(0),
DstPortRangeStart: pulumi.Float64(0),
Notes: pulumi.String("string"),
},
},
FirewallPolicyId: pulumi.String("string"),
Tags: pulumi.StringArray{
pulumi.String("string"),
},
})
var firewallPolicyResource = new FirewallPolicy("firewallPolicyResource", FirewallPolicyArgs.builder()
.firewallId(0)
.rules(FirewallPolicyRuleArgs.builder()
.action("string")
.dstIpAddress("string")
.dstIpCidr(0)
.protocol("string")
.srcIpAddress("string")
.srcIpCidr(0)
.dstPortRangeEnd(0)
.dstPortRangeStart(0)
.notes("string")
.build())
.firewallPolicyId("string")
.tags("string")
.build());
firewall_policy_resource = ibm.FirewallPolicy("firewallPolicyResource",
firewall_id=0,
rules=[{
"action": "string",
"dst_ip_address": "string",
"dst_ip_cidr": 0,
"protocol": "string",
"src_ip_address": "string",
"src_ip_cidr": 0,
"dst_port_range_end": 0,
"dst_port_range_start": 0,
"notes": "string",
}],
firewall_policy_id="string",
tags=["string"])
const firewallPolicyResource = new ibm.FirewallPolicy("firewallPolicyResource", {
firewallId: 0,
rules: [{
action: "string",
dstIpAddress: "string",
dstIpCidr: 0,
protocol: "string",
srcIpAddress: "string",
srcIpCidr: 0,
dstPortRangeEnd: 0,
dstPortRangeStart: 0,
notes: "string",
}],
firewallPolicyId: "string",
tags: ["string"],
});
type: ibm:FirewallPolicy
properties:
firewallId: 0
firewallPolicyId: string
rules:
- action: string
dstIpAddress: string
dstIpCidr: 0
dstPortRangeEnd: 0
dstPortRangeStart: 0
notes: string
protocol: string
srcIpAddress: string
srcIpCidr: 0
tags:
- string
FirewallPolicy Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The FirewallPolicy resource accepts the following input properties:
- Firewall
Id double - The device ID for the target hardware firewall.
- Rules
List<Firewall
Policy Rule> The firewall rules. At least one rule is required.
Nested scheme for
rules
:- Firewall
Policy stringId - List<string>
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- Firewall
Id float64 - The device ID for the target hardware firewall.
- Rules
[]Firewall
Policy Rule Args The firewall rules. At least one rule is required.
Nested scheme for
rules
:- Firewall
Policy stringId - []string
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall
Id Double - The device ID for the target hardware firewall.
- rules
List<Firewall
Policy Rule> The firewall rules. At least one rule is required.
Nested scheme for
rules
:- firewall
Policy StringId - List<String>
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall
Id number - The device ID for the target hardware firewall.
- rules
Firewall
Policy Rule[] The firewall rules. At least one rule is required.
Nested scheme for
rules
:- firewall
Policy stringId - string[]
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall_
id float - The device ID for the target hardware firewall.
- rules
Sequence[Firewall
Policy Rule Args] The firewall rules. At least one rule is required.
Nested scheme for
rules
:- firewall_
policy_ strid - Sequence[str]
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall
Id Number - The device ID for the target hardware firewall.
- rules List<Property Map>
The firewall rules. At least one rule is required.
Nested scheme for
rules
:- firewall
Policy StringId - List<String>
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
Outputs
All input properties are implicitly available as output properties. Additionally, the FirewallPolicy resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing FirewallPolicy Resource
Get an existing FirewallPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: FirewallPolicyState, opts?: CustomResourceOptions): FirewallPolicy
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
firewall_id: Optional[float] = None,
firewall_policy_id: Optional[str] = None,
rules: Optional[Sequence[FirewallPolicyRuleArgs]] = None,
tags: Optional[Sequence[str]] = None) -> FirewallPolicy
func GetFirewallPolicy(ctx *Context, name string, id IDInput, state *FirewallPolicyState, opts ...ResourceOption) (*FirewallPolicy, error)
public static FirewallPolicy Get(string name, Input<string> id, FirewallPolicyState? state, CustomResourceOptions? opts = null)
public static FirewallPolicy get(String name, Output<String> id, FirewallPolicyState state, CustomResourceOptions options)
resources: _: type: ibm:FirewallPolicy get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Firewall
Id double - The device ID for the target hardware firewall.
- Firewall
Policy stringId - Rules
List<Firewall
Policy Rule> The firewall rules. At least one rule is required.
Nested scheme for
rules
:- List<string>
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- Firewall
Id float64 - The device ID for the target hardware firewall.
- Firewall
Policy stringId - Rules
[]Firewall
Policy Rule Args The firewall rules. At least one rule is required.
Nested scheme for
rules
:- []string
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall
Id Double - The device ID for the target hardware firewall.
- firewall
Policy StringId - rules
List<Firewall
Policy Rule> The firewall rules. At least one rule is required.
Nested scheme for
rules
:- List<String>
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall
Id number - The device ID for the target hardware firewall.
- firewall
Policy stringId - rules
Firewall
Policy Rule[] The firewall rules. At least one rule is required.
Nested scheme for
rules
:- string[]
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall_
id float - The device ID for the target hardware firewall.
- firewall_
policy_ strid - rules
Sequence[Firewall
Policy Rule Args] The firewall rules. At least one rule is required.
Nested scheme for
rules
:- Sequence[str]
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
- firewall
Id Number - The device ID for the target hardware firewall.
- firewall
Policy StringId - rules List<Property Map>
The firewall rules. At least one rule is required.
Nested scheme for
rules
:- List<String>
- Tags associated with the firewall policy instance. Note
Tags
are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
Supporting Types
FirewallPolicyRule, FirewallPolicyRuleArgs
- Action string
- Specifies whether traffic is allowed when rules are matched. Accepted values are
permit
ordeny
. - Dst
Ip stringAddress - Accepted values are
any
, a specific IP address, or the network address for a specific subnet. - Dst
Ip doubleCidr - Specifies the standard CIDR notation for the selected destination.
- Protocol string
- The protocol for the rule. Accepted values are
tcp
,udp
,icmp
,gre
,pptp
,ah
, oresp
. - Src
Ip stringAddress - Specifies either a specific IP address or the network address for a specific subnet.
- Src
Ip doubleCidr - Specifies the standard CIDR notation for the selected source.
32
implements the rule for a single IP while, for example,24
implements the rule for 256 IP's. - Dst
Port doubleRange End - The end of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - Dst
Port doubleRange Start - The start of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - Notes string
- Descriptive text about the rule.
- Action string
- Specifies whether traffic is allowed when rules are matched. Accepted values are
permit
ordeny
. - Dst
Ip stringAddress - Accepted values are
any
, a specific IP address, or the network address for a specific subnet. - Dst
Ip float64Cidr - Specifies the standard CIDR notation for the selected destination.
- Protocol string
- The protocol for the rule. Accepted values are
tcp
,udp
,icmp
,gre
,pptp
,ah
, oresp
. - Src
Ip stringAddress - Specifies either a specific IP address or the network address for a specific subnet.
- Src
Ip float64Cidr - Specifies the standard CIDR notation for the selected source.
32
implements the rule for a single IP while, for example,24
implements the rule for 256 IP's. - Dst
Port float64Range End - The end of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - Dst
Port float64Range Start - The start of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - Notes string
- Descriptive text about the rule.
- action String
- Specifies whether traffic is allowed when rules are matched. Accepted values are
permit
ordeny
. - dst
Ip StringAddress - Accepted values are
any
, a specific IP address, or the network address for a specific subnet. - dst
Ip DoubleCidr - Specifies the standard CIDR notation for the selected destination.
- protocol String
- The protocol for the rule. Accepted values are
tcp
,udp
,icmp
,gre
,pptp
,ah
, oresp
. - src
Ip StringAddress - Specifies either a specific IP address or the network address for a specific subnet.
- src
Ip DoubleCidr - Specifies the standard CIDR notation for the selected source.
32
implements the rule for a single IP while, for example,24
implements the rule for 256 IP's. - dst
Port DoubleRange End - The end of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - dst
Port DoubleRange Start - The start of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - notes String
- Descriptive text about the rule.
- action string
- Specifies whether traffic is allowed when rules are matched. Accepted values are
permit
ordeny
. - dst
Ip stringAddress - Accepted values are
any
, a specific IP address, or the network address for a specific subnet. - dst
Ip numberCidr - Specifies the standard CIDR notation for the selected destination.
- protocol string
- The protocol for the rule. Accepted values are
tcp
,udp
,icmp
,gre
,pptp
,ah
, oresp
. - src
Ip stringAddress - Specifies either a specific IP address or the network address for a specific subnet.
- src
Ip numberCidr - Specifies the standard CIDR notation for the selected source.
32
implements the rule for a single IP while, for example,24
implements the rule for 256 IP's. - dst
Port numberRange End - The end of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - dst
Port numberRange Start - The start of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - notes string
- Descriptive text about the rule.
- action str
- Specifies whether traffic is allowed when rules are matched. Accepted values are
permit
ordeny
. - dst_
ip_ straddress - Accepted values are
any
, a specific IP address, or the network address for a specific subnet. - dst_
ip_ floatcidr - Specifies the standard CIDR notation for the selected destination.
- protocol str
- The protocol for the rule. Accepted values are
tcp
,udp
,icmp
,gre
,pptp
,ah
, oresp
. - src_
ip_ straddress - Specifies either a specific IP address or the network address for a specific subnet.
- src_
ip_ floatcidr - Specifies the standard CIDR notation for the selected source.
32
implements the rule for a single IP while, for example,24
implements the rule for 256 IP's. - dst_
port_ floatrange_ end - The end of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - dst_
port_ floatrange_ start - The start of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - notes str
- Descriptive text about the rule.
- action String
- Specifies whether traffic is allowed when rules are matched. Accepted values are
permit
ordeny
. - dst
Ip StringAddress - Accepted values are
any
, a specific IP address, or the network address for a specific subnet. - dst
Ip NumberCidr - Specifies the standard CIDR notation for the selected destination.
- protocol String
- The protocol for the rule. Accepted values are
tcp
,udp
,icmp
,gre
,pptp
,ah
, oresp
. - src
Ip StringAddress - Specifies either a specific IP address or the network address for a specific subnet.
- src
Ip NumberCidr - Specifies the standard CIDR notation for the selected source.
32
implements the rule for a single IP while, for example,24
implements the rule for 256 IP's. - dst
Port NumberRange End - The end of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - dst
Port NumberRange Start - The start of the range of ports for TCP and UDP. Accepted values are
1
-65535
. - notes String
- Descriptive text about the rule.
Package Details
- Repository
- ibm ibm-cloud/terraform-provider-ibm
- License
- Notes
- This Pulumi package is based on the
ibm
Terraform Provider.