upcloud.ServerFirewallRules
Explore with Pulumi AI
Firewall rules are used to control network access of UpCloud servers. Each server has its own firewall rules and there should be only one upcloud.ServerFirewallRules
resource per server.
The firewall is enabled on public and utility network interfaces.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as upcloud from "@upcloud/pulumi-upcloud";
// The following example defines a server and then links the server to a single firewall rule.
// The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
const example = new upcloud.Server("example", {
firewall: true,
hostname: "terraform.example.tld",
zone: "de-fra1",
plan: "1xCPU-1GB",
template: {
storage: "Ubuntu Server 20.04 LTS (Focal Fossa)",
size: 25,
},
networkInterfaces: [{
type: "utility",
}],
});
const exampleServerFirewallRules = new upcloud.ServerFirewallRules("example", {
serverId: example.id,
firewallRules: [{
action: "accept",
comment: "Allow SSH from this network",
destinationPortEnd: "22",
destinationPortStart: "22",
direction: "in",
family: "IPv4",
protocol: "tcp",
sourceAddressEnd: "192.168.1.255",
sourceAddressStart: "192.168.1.1",
}],
});
import pulumi
import pulumi_upcloud as upcloud
# The following example defines a server and then links the server to a single firewall rule.
# The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
example = upcloud.Server("example",
firewall=True,
hostname="terraform.example.tld",
zone="de-fra1",
plan="1xCPU-1GB",
template={
"storage": "Ubuntu Server 20.04 LTS (Focal Fossa)",
"size": 25,
},
network_interfaces=[{
"type": "utility",
}])
example_server_firewall_rules = upcloud.ServerFirewallRules("example",
server_id=example.id,
firewall_rules=[{
"action": "accept",
"comment": "Allow SSH from this network",
"destination_port_end": "22",
"destination_port_start": "22",
"direction": "in",
"family": "IPv4",
"protocol": "tcp",
"source_address_end": "192.168.1.255",
"source_address_start": "192.168.1.1",
}])
package main
import (
"github.com/UpCloudLtd/pulumi-upcloud/sdk/go/upcloud"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
// The following example defines a server and then links the server to a single firewall rule.
// The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
example, err := upcloud.NewServer(ctx, "example", &upcloud.ServerArgs{
Firewall: pulumi.Bool(true),
Hostname: pulumi.String("terraform.example.tld"),
Zone: pulumi.String("de-fra1"),
Plan: pulumi.String("1xCPU-1GB"),
Template: &upcloud.ServerTemplateArgs{
Storage: pulumi.String("Ubuntu Server 20.04 LTS (Focal Fossa)"),
Size: pulumi.Int(25),
},
NetworkInterfaces: upcloud.ServerNetworkInterfaceArray{
&upcloud.ServerNetworkInterfaceArgs{
Type: pulumi.String("utility"),
},
},
})
if err != nil {
return err
}
_, err = upcloud.NewServerFirewallRules(ctx, "example", &upcloud.ServerFirewallRulesArgs{
ServerId: example.ID(),
FirewallRules: upcloud.ServerFirewallRulesFirewallRuleArray{
&upcloud.ServerFirewallRulesFirewallRuleArgs{
Action: pulumi.String("accept"),
Comment: pulumi.String("Allow SSH from this network"),
DestinationPortEnd: pulumi.String("22"),
DestinationPortStart: pulumi.String("22"),
Direction: pulumi.String("in"),
Family: pulumi.String("IPv4"),
Protocol: pulumi.String("tcp"),
SourceAddressEnd: pulumi.String("192.168.1.255"),
SourceAddressStart: pulumi.String("192.168.1.1"),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using UpCloud = UpCloud.Pulumi.UpCloud;
return await Deployment.RunAsync(() =>
{
// The following example defines a server and then links the server to a single firewall rule.
// The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
var example = new UpCloud.Server("example", new()
{
Firewall = true,
Hostname = "terraform.example.tld",
Zone = "de-fra1",
Plan = "1xCPU-1GB",
Template = new UpCloud.Inputs.ServerTemplateArgs
{
Storage = "Ubuntu Server 20.04 LTS (Focal Fossa)",
Size = 25,
},
NetworkInterfaces = new[]
{
new UpCloud.Inputs.ServerNetworkInterfaceArgs
{
Type = "utility",
},
},
});
var exampleServerFirewallRules = new UpCloud.ServerFirewallRules("example", new()
{
ServerId = example.Id,
FirewallRules = new[]
{
new UpCloud.Inputs.ServerFirewallRulesFirewallRuleArgs
{
Action = "accept",
Comment = "Allow SSH from this network",
DestinationPortEnd = "22",
DestinationPortStart = "22",
Direction = "in",
Family = "IPv4",
Protocol = "tcp",
SourceAddressEnd = "192.168.1.255",
SourceAddressStart = "192.168.1.1",
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.upcloud.Server;
import com.pulumi.upcloud.ServerArgs;
import com.pulumi.upcloud.inputs.ServerTemplateArgs;
import com.pulumi.upcloud.inputs.ServerNetworkInterfaceArgs;
import com.pulumi.upcloud.ServerFirewallRules;
import com.pulumi.upcloud.ServerFirewallRulesArgs;
import com.pulumi.upcloud.inputs.ServerFirewallRulesFirewallRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
// The following example defines a server and then links the server to a single firewall rule.
// The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
var example = new Server("example", ServerArgs.builder()
.firewall(true)
.hostname("terraform.example.tld")
.zone("de-fra1")
.plan("1xCPU-1GB")
.template(ServerTemplateArgs.builder()
.storage("Ubuntu Server 20.04 LTS (Focal Fossa)")
.size(25)
.build())
.networkInterfaces(ServerNetworkInterfaceArgs.builder()
.type("utility")
.build())
.build());
var exampleServerFirewallRules = new ServerFirewallRules("exampleServerFirewallRules", ServerFirewallRulesArgs.builder()
.serverId(example.id())
.firewallRules(ServerFirewallRulesFirewallRuleArgs.builder()
.action("accept")
.comment("Allow SSH from this network")
.destinationPortEnd("22")
.destinationPortStart("22")
.direction("in")
.family("IPv4")
.protocol("tcp")
.sourceAddressEnd("192.168.1.255")
.sourceAddressStart("192.168.1.1")
.build())
.build());
}
}
resources:
# The following example defines a server and then links the server to a single firewall rule.
# The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
example:
type: upcloud:Server
properties:
firewall: true
hostname: terraform.example.tld
zone: de-fra1
plan: 1xCPU-1GB
template:
storage: Ubuntu Server 20.04 LTS (Focal Fossa)
size: 25
networkInterfaces:
- type: utility
exampleServerFirewallRules:
type: upcloud:ServerFirewallRules
name: example
properties:
serverId: ${example.id}
firewallRules:
- action: accept
comment: Allow SSH from this network
destinationPortEnd: '22'
destinationPortStart: '22'
direction: in
family: IPv4
protocol: tcp
sourceAddressEnd: 192.168.1.255
sourceAddressStart: 192.168.1.1
Create ServerFirewallRules Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ServerFirewallRules(name: string, args: ServerFirewallRulesArgs, opts?: CustomResourceOptions);
@overload
def ServerFirewallRules(resource_name: str,
args: ServerFirewallRulesArgs,
opts: Optional[ResourceOptions] = None)
@overload
def ServerFirewallRules(resource_name: str,
opts: Optional[ResourceOptions] = None,
firewall_rules: Optional[Sequence[ServerFirewallRulesFirewallRuleArgs]] = None,
server_id: Optional[str] = None)
func NewServerFirewallRules(ctx *Context, name string, args ServerFirewallRulesArgs, opts ...ResourceOption) (*ServerFirewallRules, error)
public ServerFirewallRules(string name, ServerFirewallRulesArgs args, CustomResourceOptions? opts = null)
public ServerFirewallRules(String name, ServerFirewallRulesArgs args)
public ServerFirewallRules(String name, ServerFirewallRulesArgs args, CustomResourceOptions options)
type: upcloud:ServerFirewallRules
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var serverFirewallRulesResource = new UpCloud.ServerFirewallRules("serverFirewallRulesResource", new()
{
FirewallRules = new[]
{
new UpCloud.Inputs.ServerFirewallRulesFirewallRuleArgs
{
Action = "string",
Direction = "string",
DestinationAddressStart = "string",
DestinationAddressEnd = "string",
DestinationPortEnd = "string",
DestinationPortStart = "string",
Comment = "string",
Family = "string",
IcmpType = "string",
Protocol = "string",
SourceAddressEnd = "string",
SourceAddressStart = "string",
SourcePortEnd = "string",
SourcePortStart = "string",
},
},
ServerId = "string",
});
example, err := upcloud.NewServerFirewallRules(ctx, "serverFirewallRulesResource", &upcloud.ServerFirewallRulesArgs{
FirewallRules: upcloud.ServerFirewallRulesFirewallRuleArray{
&upcloud.ServerFirewallRulesFirewallRuleArgs{
Action: pulumi.String("string"),
Direction: pulumi.String("string"),
DestinationAddressStart: pulumi.String("string"),
DestinationAddressEnd: pulumi.String("string"),
DestinationPortEnd: pulumi.String("string"),
DestinationPortStart: pulumi.String("string"),
Comment: pulumi.String("string"),
Family: pulumi.String("string"),
IcmpType: pulumi.String("string"),
Protocol: pulumi.String("string"),
SourceAddressEnd: pulumi.String("string"),
SourceAddressStart: pulumi.String("string"),
SourcePortEnd: pulumi.String("string"),
SourcePortStart: pulumi.String("string"),
},
},
ServerId: pulumi.String("string"),
})
var serverFirewallRulesResource = new ServerFirewallRules("serverFirewallRulesResource", ServerFirewallRulesArgs.builder()
.firewallRules(ServerFirewallRulesFirewallRuleArgs.builder()
.action("string")
.direction("string")
.destinationAddressStart("string")
.destinationAddressEnd("string")
.destinationPortEnd("string")
.destinationPortStart("string")
.comment("string")
.family("string")
.icmpType("string")
.protocol("string")
.sourceAddressEnd("string")
.sourceAddressStart("string")
.sourcePortEnd("string")
.sourcePortStart("string")
.build())
.serverId("string")
.build());
server_firewall_rules_resource = upcloud.ServerFirewallRules("serverFirewallRulesResource",
firewall_rules=[{
"action": "string",
"direction": "string",
"destination_address_start": "string",
"destination_address_end": "string",
"destination_port_end": "string",
"destination_port_start": "string",
"comment": "string",
"family": "string",
"icmp_type": "string",
"protocol": "string",
"source_address_end": "string",
"source_address_start": "string",
"source_port_end": "string",
"source_port_start": "string",
}],
server_id="string")
const serverFirewallRulesResource = new upcloud.ServerFirewallRules("serverFirewallRulesResource", {
firewallRules: [{
action: "string",
direction: "string",
destinationAddressStart: "string",
destinationAddressEnd: "string",
destinationPortEnd: "string",
destinationPortStart: "string",
comment: "string",
family: "string",
icmpType: "string",
protocol: "string",
sourceAddressEnd: "string",
sourceAddressStart: "string",
sourcePortEnd: "string",
sourcePortStart: "string",
}],
serverId: "string",
});
type: upcloud:ServerFirewallRules
properties:
firewallRules:
- action: string
comment: string
destinationAddressEnd: string
destinationAddressStart: string
destinationPortEnd: string
destinationPortStart: string
direction: string
family: string
icmpType: string
protocol: string
sourceAddressEnd: string
sourceAddressStart: string
sourcePortEnd: string
sourcePortStart: string
serverId: string
ServerFirewallRules Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ServerFirewallRules resource accepts the following input properties:
- Firewall
Rules List<UpCloud. Pulumi. Up Cloud. Inputs. Server Firewall Rules Firewall Rule> - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - Server
Id string - The unique id of the server to be protected the firewall rules
- Firewall
Rules []ServerFirewall Rules Firewall Rule Args - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - Server
Id string - The unique id of the server to be protected the firewall rules
- firewall
Rules List<ServerFirewall Rules Firewall Rule> - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server
Id String - The unique id of the server to be protected the firewall rules
- firewall
Rules ServerFirewall Rules Firewall Rule[] - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server
Id string - The unique id of the server to be protected the firewall rules
- firewall_
rules Sequence[ServerFirewall Rules Firewall Rule Args] - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server_
id str - The unique id of the server to be protected the firewall rules
- firewall
Rules List<Property Map> - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server
Id String - The unique id of the server to be protected the firewall rules
Outputs
All input properties are implicitly available as output properties. Additionally, the ServerFirewallRules resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ServerFirewallRules Resource
Get an existing ServerFirewallRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ServerFirewallRulesState, opts?: CustomResourceOptions): ServerFirewallRules
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
firewall_rules: Optional[Sequence[ServerFirewallRulesFirewallRuleArgs]] = None,
server_id: Optional[str] = None) -> ServerFirewallRules
func GetServerFirewallRules(ctx *Context, name string, id IDInput, state *ServerFirewallRulesState, opts ...ResourceOption) (*ServerFirewallRules, error)
public static ServerFirewallRules Get(string name, Input<string> id, ServerFirewallRulesState? state, CustomResourceOptions? opts = null)
public static ServerFirewallRules get(String name, Output<String> id, ServerFirewallRulesState state, CustomResourceOptions options)
resources: _: type: upcloud:ServerFirewallRules get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Firewall
Rules List<UpCloud. Pulumi. Up Cloud. Inputs. Server Firewall Rules Firewall Rule> - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - Server
Id string - The unique id of the server to be protected the firewall rules
- Firewall
Rules []ServerFirewall Rules Firewall Rule Args - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - Server
Id string - The unique id of the server to be protected the firewall rules
- firewall
Rules List<ServerFirewall Rules Firewall Rule> - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server
Id String - The unique id of the server to be protected the firewall rules
- firewall
Rules ServerFirewall Rules Firewall Rule[] - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server
Id string - The unique id of the server to be protected the firewall rules
- firewall_
rules Sequence[ServerFirewall Rules Firewall Rule Args] - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server_
id str - The unique id of the server to be protected the firewall rules
- firewall
Rules List<Property Map> - A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have
action
,direction
,protocol
,family
and at least one destination/source-address/port range. A default rule can be created by providing onlyaction
anddirection
attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP. - server
Id String - The unique id of the server to be protected the firewall rules
Supporting Types
ServerFirewallRulesFirewallRule, ServerFirewallRulesFirewallRuleArgs
- Action string
- Action to take if the rule conditions are met. Valid values
accept | drop
- Direction string
- The direction of network traffic this rule will be applied to
- Comment string
- Freeform comment string for the rule
- Destination
Address stringEnd - The destination address range ends from this address
- Destination
Address stringStart - The destination address range starts from this address
- Destination
Port stringEnd - The destination port range ends from this port number
- Destination
Port stringStart - The destination port range starts from this port number
- Family string
- The address family of new firewall rule
- Icmp
Type string - The ICMP type
- Protocol string
- The protocol this rule will be applied to
- Source
Address stringEnd - The source address range ends from this address
- Source
Address stringStart - The source address range starts from this address
- Source
Port stringEnd - The source port range ends from this port number
- Source
Port stringStart - The source port range starts from this port number
- Action string
- Action to take if the rule conditions are met. Valid values
accept | drop
- Direction string
- The direction of network traffic this rule will be applied to
- Comment string
- Freeform comment string for the rule
- Destination
Address stringEnd - The destination address range ends from this address
- Destination
Address stringStart - The destination address range starts from this address
- Destination
Port stringEnd - The destination port range ends from this port number
- Destination
Port stringStart - The destination port range starts from this port number
- Family string
- The address family of new firewall rule
- Icmp
Type string - The ICMP type
- Protocol string
- The protocol this rule will be applied to
- Source
Address stringEnd - The source address range ends from this address
- Source
Address stringStart - The source address range starts from this address
- Source
Port stringEnd - The source port range ends from this port number
- Source
Port stringStart - The source port range starts from this port number
- action String
- Action to take if the rule conditions are met. Valid values
accept | drop
- direction String
- The direction of network traffic this rule will be applied to
- comment String
- Freeform comment string for the rule
- destination
Address StringEnd - The destination address range ends from this address
- destination
Address StringStart - The destination address range starts from this address
- destination
Port StringEnd - The destination port range ends from this port number
- destination
Port StringStart - The destination port range starts from this port number
- family String
- The address family of new firewall rule
- icmp
Type String - The ICMP type
- protocol String
- The protocol this rule will be applied to
- source
Address StringEnd - The source address range ends from this address
- source
Address StringStart - The source address range starts from this address
- source
Port StringEnd - The source port range ends from this port number
- source
Port StringStart - The source port range starts from this port number
- action string
- Action to take if the rule conditions are met. Valid values
accept | drop
- direction string
- The direction of network traffic this rule will be applied to
- comment string
- Freeform comment string for the rule
- destination
Address stringEnd - The destination address range ends from this address
- destination
Address stringStart - The destination address range starts from this address
- destination
Port stringEnd - The destination port range ends from this port number
- destination
Port stringStart - The destination port range starts from this port number
- family string
- The address family of new firewall rule
- icmp
Type string - The ICMP type
- protocol string
- The protocol this rule will be applied to
- source
Address stringEnd - The source address range ends from this address
- source
Address stringStart - The source address range starts from this address
- source
Port stringEnd - The source port range ends from this port number
- source
Port stringStart - The source port range starts from this port number
- action str
- Action to take if the rule conditions are met. Valid values
accept | drop
- direction str
- The direction of network traffic this rule will be applied to
- comment str
- Freeform comment string for the rule
- destination_
address_ strend - The destination address range ends from this address
- destination_
address_ strstart - The destination address range starts from this address
- destination_
port_ strend - The destination port range ends from this port number
- destination_
port_ strstart - The destination port range starts from this port number
- family str
- The address family of new firewall rule
- icmp_
type str - The ICMP type
- protocol str
- The protocol this rule will be applied to
- source_
address_ strend - The source address range ends from this address
- source_
address_ strstart - The source address range starts from this address
- source_
port_ strend - The source port range ends from this port number
- source_
port_ strstart - The source port range starts from this port number
- action String
- Action to take if the rule conditions are met. Valid values
accept | drop
- direction String
- The direction of network traffic this rule will be applied to
- comment String
- Freeform comment string for the rule
- destination
Address StringEnd - The destination address range ends from this address
- destination
Address StringStart - The destination address range starts from this address
- destination
Port StringEnd - The destination port range ends from this port number
- destination
Port StringStart - The destination port range starts from this port number
- family String
- The address family of new firewall rule
- icmp
Type String - The ICMP type
- protocol String
- The protocol this rule will be applied to
- source
Address StringEnd - The source address range ends from this address
- source
Address StringStart - The source address range starts from this address
- source
Port StringEnd - The source port range ends from this port number
- source
Port StringStart - The source port range starts from this port number
Import
$ pulumi import upcloud:index/serverFirewallRules:ServerFirewallRules my_example_rules 049d7ca2-757e-4fb1-a833-f87ee056547a
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- upcloud UpCloudLtd/pulumi-upcloud
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
upcloud
Terraform Provider.