scaleway.InstanceSecurityGroup
Explore with Pulumi AI
Import
Instance security group can be imported using the {zone}/{id}
, e.g. bash
$ pulumi import scaleway:index/instanceSecurityGroup:InstanceSecurityGroup web fr-par-1/11111111-1111-1111-1111-111111111111
Create InstanceSecurityGroup Resource
new InstanceSecurityGroup(name: string, args?: InstanceSecurityGroupArgs, opts?: CustomResourceOptions);
@overload
def InstanceSecurityGroup(resource_name: str,
opts: Optional[ResourceOptions] = None,
description: Optional[str] = None,
enable_default_security: Optional[bool] = None,
external_rules: Optional[bool] = None,
inbound_default_policy: Optional[str] = None,
inbound_rules: Optional[Sequence[InstanceSecurityGroupInboundRuleArgs]] = None,
name: Optional[str] = None,
outbound_default_policy: Optional[str] = None,
outbound_rules: Optional[Sequence[InstanceSecurityGroupOutboundRuleArgs]] = None,
project_id: Optional[str] = None,
stateful: Optional[bool] = None,
tags: Optional[Sequence[str]] = None,
zone: Optional[str] = None)
@overload
def InstanceSecurityGroup(resource_name: str,
args: Optional[InstanceSecurityGroupArgs] = None,
opts: Optional[ResourceOptions] = None)
func NewInstanceSecurityGroup(ctx *Context, name string, args *InstanceSecurityGroupArgs, opts ...ResourceOption) (*InstanceSecurityGroup, error)
public InstanceSecurityGroup(string name, InstanceSecurityGroupArgs? args = null, CustomResourceOptions? opts = null)
public InstanceSecurityGroup(String name, InstanceSecurityGroupArgs args)
public InstanceSecurityGroup(String name, InstanceSecurityGroupArgs args, CustomResourceOptions options)
type: scaleway:InstanceSecurityGroup
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args InstanceSecurityGroupArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args InstanceSecurityGroupArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args InstanceSecurityGroupArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args InstanceSecurityGroupArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args InstanceSecurityGroupArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
InstanceSecurityGroup Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The InstanceSecurityGroup resource accepts the following input properties:
- Description string
The description of the security group.
- Enable
Default boolSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- External
Rules bool A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- Inbound
Default stringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- Inbound
Rules List<Lbrlabs.Pulumi Package. Scaleway. Inputs. Instance Security Group Inbound Rule> A list of inbound rule to add to the security group. (Structure is documented below.)
- Name string
The name of the security group.
- Outbound
Default stringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- Outbound
Rules List<Lbrlabs.Pulumi Package. Scaleway. Inputs. Instance Security Group Outbound Rule> A list of outbound rule to add to the security group. (Structure is documented below.)
- Project
Id string project_id
) The ID of the project the security group is associated with.- Stateful bool
A boolean to specify whether the security group should be stateful or not.
- List<string>
The tags of the security group.
- Zone string
zone
) The zone in which the security group should be created.
- Description string
The description of the security group.
- Enable
Default boolSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- External
Rules bool A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- Inbound
Default stringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- Inbound
Rules []InstanceSecurity Group Inbound Rule Args A list of inbound rule to add to the security group. (Structure is documented below.)
- Name string
The name of the security group.
- Outbound
Default stringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- Outbound
Rules []InstanceSecurity Group Outbound Rule Args A list of outbound rule to add to the security group. (Structure is documented below.)
- Project
Id string project_id
) The ID of the project the security group is associated with.- Stateful bool
A boolean to specify whether the security group should be stateful or not.
- []string
The tags of the security group.
- Zone string
zone
) The zone in which the security group should be created.
- description String
The description of the security group.
- enable
Default BooleanSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external
Rules Boolean A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound
Default StringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound
Rules List<InstanceSecurity Group Inbound Rule> A list of inbound rule to add to the security group. (Structure is documented below.)
- name String
The name of the security group.
- outbound
Default StringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound
Rules List<InstanceSecurity Group Outbound Rule> A list of outbound rule to add to the security group. (Structure is documented below.)
- project
Id String project_id
) The ID of the project the security group is associated with.- stateful Boolean
A boolean to specify whether the security group should be stateful or not.
- List<String>
The tags of the security group.
- zone String
zone
) The zone in which the security group should be created.
- description string
The description of the security group.
- enable
Default booleanSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external
Rules boolean A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound
Default stringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound
Rules InstanceSecurity Group Inbound Rule[] A list of inbound rule to add to the security group. (Structure is documented below.)
- name string
The name of the security group.
- outbound
Default stringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound
Rules InstanceSecurity Group Outbound Rule[] A list of outbound rule to add to the security group. (Structure is documented below.)
- project
Id string project_id
) The ID of the project the security group is associated with.- stateful boolean
A boolean to specify whether the security group should be stateful or not.
- string[]
The tags of the security group.
- zone string
zone
) The zone in which the security group should be created.
- description str
The description of the security group.
- enable_
default_ boolsecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external_
rules bool A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound_
default_ strpolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound_
rules Sequence[InstanceSecurity Group Inbound Rule Args] A list of inbound rule to add to the security group. (Structure is documented below.)
- name str
The name of the security group.
- outbound_
default_ strpolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound_
rules Sequence[InstanceSecurity Group Outbound Rule Args] A list of outbound rule to add to the security group. (Structure is documented below.)
- project_
id str project_id
) The ID of the project the security group is associated with.- stateful bool
A boolean to specify whether the security group should be stateful or not.
- Sequence[str]
The tags of the security group.
- zone str
zone
) The zone in which the security group should be created.
- description String
The description of the security group.
- enable
Default BooleanSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external
Rules Boolean A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound
Default StringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound
Rules List<Property Map> A list of inbound rule to add to the security group. (Structure is documented below.)
- name String
The name of the security group.
- outbound
Default StringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound
Rules List<Property Map> A list of outbound rule to add to the security group. (Structure is documented below.)
- project
Id String project_id
) The ID of the project the security group is associated with.- stateful Boolean
A boolean to specify whether the security group should be stateful or not.
- List<String>
The tags of the security group.
- zone String
zone
) The zone in which the security group should be created.
Outputs
All input properties are implicitly available as output properties. Additionally, the InstanceSecurityGroup resource produces the following output properties:
- Id string
The provider-assigned unique ID for this managed resource.
- Organization
Id string The organization ID the security group is associated with.
- Id string
The provider-assigned unique ID for this managed resource.
- Organization
Id string The organization ID the security group is associated with.
- id String
The provider-assigned unique ID for this managed resource.
- organization
Id String The organization ID the security group is associated with.
- id string
The provider-assigned unique ID for this managed resource.
- organization
Id string The organization ID the security group is associated with.
- id str
The provider-assigned unique ID for this managed resource.
- organization_
id str The organization ID the security group is associated with.
- id String
The provider-assigned unique ID for this managed resource.
- organization
Id String The organization ID the security group is associated with.
Look up Existing InstanceSecurityGroup Resource
Get an existing InstanceSecurityGroup resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: InstanceSecurityGroupState, opts?: CustomResourceOptions): InstanceSecurityGroup
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
description: Optional[str] = None,
enable_default_security: Optional[bool] = None,
external_rules: Optional[bool] = None,
inbound_default_policy: Optional[str] = None,
inbound_rules: Optional[Sequence[InstanceSecurityGroupInboundRuleArgs]] = None,
name: Optional[str] = None,
organization_id: Optional[str] = None,
outbound_default_policy: Optional[str] = None,
outbound_rules: Optional[Sequence[InstanceSecurityGroupOutboundRuleArgs]] = None,
project_id: Optional[str] = None,
stateful: Optional[bool] = None,
tags: Optional[Sequence[str]] = None,
zone: Optional[str] = None) -> InstanceSecurityGroup
func GetInstanceSecurityGroup(ctx *Context, name string, id IDInput, state *InstanceSecurityGroupState, opts ...ResourceOption) (*InstanceSecurityGroup, error)
public static InstanceSecurityGroup Get(string name, Input<string> id, InstanceSecurityGroupState? state, CustomResourceOptions? opts = null)
public static InstanceSecurityGroup get(String name, Output<String> id, InstanceSecurityGroupState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Description string
The description of the security group.
- Enable
Default boolSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- External
Rules bool A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- Inbound
Default stringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- Inbound
Rules List<Lbrlabs.Pulumi Package. Scaleway. Inputs. Instance Security Group Inbound Rule> A list of inbound rule to add to the security group. (Structure is documented below.)
- Name string
The name of the security group.
- Organization
Id string The organization ID the security group is associated with.
- Outbound
Default stringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- Outbound
Rules List<Lbrlabs.Pulumi Package. Scaleway. Inputs. Instance Security Group Outbound Rule> A list of outbound rule to add to the security group. (Structure is documented below.)
- Project
Id string project_id
) The ID of the project the security group is associated with.- Stateful bool
A boolean to specify whether the security group should be stateful or not.
- List<string>
The tags of the security group.
- Zone string
zone
) The zone in which the security group should be created.
- Description string
The description of the security group.
- Enable
Default boolSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- External
Rules bool A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- Inbound
Default stringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- Inbound
Rules []InstanceSecurity Group Inbound Rule Args A list of inbound rule to add to the security group. (Structure is documented below.)
- Name string
The name of the security group.
- Organization
Id string The organization ID the security group is associated with.
- Outbound
Default stringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- Outbound
Rules []InstanceSecurity Group Outbound Rule Args A list of outbound rule to add to the security group. (Structure is documented below.)
- Project
Id string project_id
) The ID of the project the security group is associated with.- Stateful bool
A boolean to specify whether the security group should be stateful or not.
- []string
The tags of the security group.
- Zone string
zone
) The zone in which the security group should be created.
- description String
The description of the security group.
- enable
Default BooleanSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external
Rules Boolean A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound
Default StringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound
Rules List<InstanceSecurity Group Inbound Rule> A list of inbound rule to add to the security group. (Structure is documented below.)
- name String
The name of the security group.
- organization
Id String The organization ID the security group is associated with.
- outbound
Default StringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound
Rules List<InstanceSecurity Group Outbound Rule> A list of outbound rule to add to the security group. (Structure is documented below.)
- project
Id String project_id
) The ID of the project the security group is associated with.- stateful Boolean
A boolean to specify whether the security group should be stateful or not.
- List<String>
The tags of the security group.
- zone String
zone
) The zone in which the security group should be created.
- description string
The description of the security group.
- enable
Default booleanSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external
Rules boolean A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound
Default stringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound
Rules InstanceSecurity Group Inbound Rule[] A list of inbound rule to add to the security group. (Structure is documented below.)
- name string
The name of the security group.
- organization
Id string The organization ID the security group is associated with.
- outbound
Default stringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound
Rules InstanceSecurity Group Outbound Rule[] A list of outbound rule to add to the security group. (Structure is documented below.)
- project
Id string project_id
) The ID of the project the security group is associated with.- stateful boolean
A boolean to specify whether the security group should be stateful or not.
- string[]
The tags of the security group.
- zone string
zone
) The zone in which the security group should be created.
- description str
The description of the security group.
- enable_
default_ boolsecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external_
rules bool A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound_
default_ strpolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound_
rules Sequence[InstanceSecurity Group Inbound Rule Args] A list of inbound rule to add to the security group. (Structure is documented below.)
- name str
The name of the security group.
- organization_
id str The organization ID the security group is associated with.
- outbound_
default_ strpolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound_
rules Sequence[InstanceSecurity Group Outbound Rule Args] A list of outbound rule to add to the security group. (Structure is documented below.)
- project_
id str project_id
) The ID of the project the security group is associated with.- stateful bool
A boolean to specify whether the security group should be stateful or not.
- Sequence[str]
The tags of the security group.
- zone str
zone
) The zone in which the security group should be created.
- description String
The description of the security group.
- enable
Default BooleanSecurity Whether to block SMTP on IPv4/IPv6 (Port 25, 465, 587). Set to false will unblock SMTP if your account is authorized to. If your organization is not yet authorized to send SMTP traffic, open a support ticket.
- external
Rules Boolean A boolean to specify whether to use instance_security_group_rules. If
external_rules
is set totrue
,inbound_rule
andoutbound_rule
can not be set directly in the security group.- inbound
Default StringPolicy The default policy on incoming traffic. Possible values are:
accept
ordrop
.- inbound
Rules List<Property Map> A list of inbound rule to add to the security group. (Structure is documented below.)
- name String
The name of the security group.
- organization
Id String The organization ID the security group is associated with.
- outbound
Default StringPolicy The default policy on outgoing traffic. Possible values are:
accept
ordrop
.- outbound
Rules List<Property Map> A list of outbound rule to add to the security group. (Structure is documented below.)
- project
Id String project_id
) The ID of the project the security group is associated with.- stateful Boolean
A boolean to specify whether the security group should be stateful or not.
- List<String>
The tags of the security group.
- zone String
zone
) The zone in which the security group should be created.
Supporting Types
InstanceSecurityGroupInboundRule, InstanceSecurityGroupInboundRuleArgs
- Action string
The action to take when rule match. Possible values are:
accept
ordrop
.- Ip string
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- Ip
Range string The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- Port int
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- Port
Range string - Protocol string
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- Action string
The action to take when rule match. Possible values are:
accept
ordrop
.- Ip string
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- Ip
Range string The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- Port int
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- Port
Range string - Protocol string
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action String
The action to take when rule match. Possible values are:
accept
ordrop
.- ip String
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip
Range String The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port Integer
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port
Range String - protocol String
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action string
The action to take when rule match. Possible values are:
accept
ordrop
.- ip string
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip
Range string The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port number
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port
Range string - protocol string
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action str
The action to take when rule match. Possible values are:
accept
ordrop
.- ip str
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip_
range str The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port int
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port_
range str - protocol str
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action String
The action to take when rule match. Possible values are:
accept
ordrop
.- ip String
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip
Range String The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port Number
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port
Range String - protocol String
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
InstanceSecurityGroupOutboundRule, InstanceSecurityGroupOutboundRuleArgs
- Action string
The action to take when rule match. Possible values are:
accept
ordrop
.- Ip string
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- Ip
Range string The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- Port int
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- Port
Range string - Protocol string
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- Action string
The action to take when rule match. Possible values are:
accept
ordrop
.- Ip string
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- Ip
Range string The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- Port int
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- Port
Range string - Protocol string
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action String
The action to take when rule match. Possible values are:
accept
ordrop
.- ip String
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip
Range String The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port Integer
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port
Range String - protocol String
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action string
The action to take when rule match. Possible values are:
accept
ordrop
.- ip string
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip
Range string The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port number
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port
Range string - protocol string
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action str
The action to take when rule match. Possible values are:
accept
ordrop
.- ip str
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip_
range str The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port int
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port_
range str - protocol str
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
- action String
The action to take when rule match. Possible values are:
accept
ordrop
.- ip String
The ip this rule apply to. If no
ip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.Ip address is deprecated. Please use ip_range instead
- ip
Range String The ip range (e.g
192.168.1.0/24
) this rule applies to. If noip
norip_range
are specified, rule will apply to all ip. Only one ofip
andip_range
should be specified.- port Number
The port this rule applies to. If no
port
norport_range
are specified, the rule will apply to all port. Only one ofport
andport_range
should be specified.- port
Range String - protocol String
The protocol this rule apply to. Possible values are:
TCP
,UDP
,ICMP
orANY
.
Package Details
- Repository
- scaleway lbrlabs/pulumi-scaleway
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
scaleway
Terraform Provider.