1. Packages
  2. UpCloud
  3. API Docs
  4. ServerFirewallRules
UpCloud v0.1.0 published on Friday, Mar 14, 2025 by UpCloudLtd

upcloud.ServerFirewallRules

Explore with Pulumi AI

upcloud logo
UpCloud v0.1.0 published on Friday, Mar 14, 2025 by UpCloudLtd

    Firewall rules are used to control network access of UpCloud servers. Each server has its own firewall rules and there should be only one upcloud.ServerFirewallRules resource per server. The firewall is enabled on public and utility network interfaces.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as upcloud from "@upcloud/pulumi-upcloud";
    
    // The following example defines a server and then links the server to a single firewall rule. 
    // The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
    const example = new upcloud.Server("example", {
        firewall: true,
        hostname: "terraform.example.tld",
        zone: "de-fra1",
        plan: "1xCPU-1GB",
        template: {
            storage: "Ubuntu Server 20.04 LTS (Focal Fossa)",
            size: 25,
        },
        networkInterfaces: [{
            type: "utility",
        }],
    });
    const exampleServerFirewallRules = new upcloud.ServerFirewallRules("example", {
        serverId: example.id,
        firewallRules: [{
            action: "accept",
            comment: "Allow SSH from this network",
            destinationPortEnd: "22",
            destinationPortStart: "22",
            direction: "in",
            family: "IPv4",
            protocol: "tcp",
            sourceAddressEnd: "192.168.1.255",
            sourceAddressStart: "192.168.1.1",
        }],
    });
    
    import pulumi
    import pulumi_upcloud as upcloud
    
    # The following example defines a server and then links the server to a single firewall rule. 
    # The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
    example = upcloud.Server("example",
        firewall=True,
        hostname="terraform.example.tld",
        zone="de-fra1",
        plan="1xCPU-1GB",
        template={
            "storage": "Ubuntu Server 20.04 LTS (Focal Fossa)",
            "size": 25,
        },
        network_interfaces=[{
            "type": "utility",
        }])
    example_server_firewall_rules = upcloud.ServerFirewallRules("example",
        server_id=example.id,
        firewall_rules=[{
            "action": "accept",
            "comment": "Allow SSH from this network",
            "destination_port_end": "22",
            "destination_port_start": "22",
            "direction": "in",
            "family": "IPv4",
            "protocol": "tcp",
            "source_address_end": "192.168.1.255",
            "source_address_start": "192.168.1.1",
        }])
    
    package main
    
    import (
    	"github.com/UpCloudLtd/pulumi-upcloud/sdk/go/upcloud"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		// The following example defines a server and then links the server to a single firewall rule.
    		// The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
    		example, err := upcloud.NewServer(ctx, "example", &upcloud.ServerArgs{
    			Firewall: pulumi.Bool(true),
    			Hostname: pulumi.String("terraform.example.tld"),
    			Zone:     pulumi.String("de-fra1"),
    			Plan:     pulumi.String("1xCPU-1GB"),
    			Template: &upcloud.ServerTemplateArgs{
    				Storage: pulumi.String("Ubuntu Server 20.04 LTS (Focal Fossa)"),
    				Size:    pulumi.Int(25),
    			},
    			NetworkInterfaces: upcloud.ServerNetworkInterfaceArray{
    				&upcloud.ServerNetworkInterfaceArgs{
    					Type: pulumi.String("utility"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = upcloud.NewServerFirewallRules(ctx, "example", &upcloud.ServerFirewallRulesArgs{
    			ServerId: example.ID(),
    			FirewallRules: upcloud.ServerFirewallRulesFirewallRuleArray{
    				&upcloud.ServerFirewallRulesFirewallRuleArgs{
    					Action:               pulumi.String("accept"),
    					Comment:              pulumi.String("Allow SSH from this network"),
    					DestinationPortEnd:   pulumi.String("22"),
    					DestinationPortStart: pulumi.String("22"),
    					Direction:            pulumi.String("in"),
    					Family:               pulumi.String("IPv4"),
    					Protocol:             pulumi.String("tcp"),
    					SourceAddressEnd:     pulumi.String("192.168.1.255"),
    					SourceAddressStart:   pulumi.String("192.168.1.1"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using UpCloud = UpCloud.Pulumi.UpCloud;
    
    return await Deployment.RunAsync(() => 
    {
        // The following example defines a server and then links the server to a single firewall rule. 
        // The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
        var example = new UpCloud.Server("example", new()
        {
            Firewall = true,
            Hostname = "terraform.example.tld",
            Zone = "de-fra1",
            Plan = "1xCPU-1GB",
            Template = new UpCloud.Inputs.ServerTemplateArgs
            {
                Storage = "Ubuntu Server 20.04 LTS (Focal Fossa)",
                Size = 25,
            },
            NetworkInterfaces = new[]
            {
                new UpCloud.Inputs.ServerNetworkInterfaceArgs
                {
                    Type = "utility",
                },
            },
        });
    
        var exampleServerFirewallRules = new UpCloud.ServerFirewallRules("example", new()
        {
            ServerId = example.Id,
            FirewallRules = new[]
            {
                new UpCloud.Inputs.ServerFirewallRulesFirewallRuleArgs
                {
                    Action = "accept",
                    Comment = "Allow SSH from this network",
                    DestinationPortEnd = "22",
                    DestinationPortStart = "22",
                    Direction = "in",
                    Family = "IPv4",
                    Protocol = "tcp",
                    SourceAddressEnd = "192.168.1.255",
                    SourceAddressStart = "192.168.1.1",
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.upcloud.Server;
    import com.pulumi.upcloud.ServerArgs;
    import com.pulumi.upcloud.inputs.ServerTemplateArgs;
    import com.pulumi.upcloud.inputs.ServerNetworkInterfaceArgs;
    import com.pulumi.upcloud.ServerFirewallRules;
    import com.pulumi.upcloud.ServerFirewallRulesArgs;
    import com.pulumi.upcloud.inputs.ServerFirewallRulesFirewallRuleArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // The following example defines a server and then links the server to a single firewall rule. 
            // The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
            var example = new Server("example", ServerArgs.builder()
                .firewall(true)
                .hostname("terraform.example.tld")
                .zone("de-fra1")
                .plan("1xCPU-1GB")
                .template(ServerTemplateArgs.builder()
                    .storage("Ubuntu Server 20.04 LTS (Focal Fossa)")
                    .size(25)
                    .build())
                .networkInterfaces(ServerNetworkInterfaceArgs.builder()
                    .type("utility")
                    .build())
                .build());
    
            var exampleServerFirewallRules = new ServerFirewallRules("exampleServerFirewallRules", ServerFirewallRulesArgs.builder()
                .serverId(example.id())
                .firewallRules(ServerFirewallRulesFirewallRuleArgs.builder()
                    .action("accept")
                    .comment("Allow SSH from this network")
                    .destinationPortEnd("22")
                    .destinationPortStart("22")
                    .direction("in")
                    .family("IPv4")
                    .protocol("tcp")
                    .sourceAddressEnd("192.168.1.255")
                    .sourceAddressStart("192.168.1.1")
                    .build())
                .build());
    
        }
    }
    
    resources:
      # The following example defines a server and then links the server to a single firewall rule. 
      # The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
      example:
        type: upcloud:Server
        properties:
          firewall: true
          hostname: terraform.example.tld
          zone: de-fra1
          plan: 1xCPU-1GB
          template:
            storage: Ubuntu Server 20.04 LTS (Focal Fossa)
            size: 25
          networkInterfaces:
            - type: utility
      exampleServerFirewallRules:
        type: upcloud:ServerFirewallRules
        name: example
        properties:
          serverId: ${example.id}
          firewallRules:
            - action: accept
              comment: Allow SSH from this network
              destinationPortEnd: '22'
              destinationPortStart: '22'
              direction: in
              family: IPv4
              protocol: tcp
              sourceAddressEnd: 192.168.1.255
              sourceAddressStart: 192.168.1.1
    

    Create ServerFirewallRules Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ServerFirewallRules(name: string, args: ServerFirewallRulesArgs, opts?: CustomResourceOptions);
    @overload
    def ServerFirewallRules(resource_name: str,
                            args: ServerFirewallRulesArgs,
                            opts: Optional[ResourceOptions] = None)
    
    @overload
    def ServerFirewallRules(resource_name: str,
                            opts: Optional[ResourceOptions] = None,
                            firewall_rules: Optional[Sequence[ServerFirewallRulesFirewallRuleArgs]] = None,
                            server_id: Optional[str] = None)
    func NewServerFirewallRules(ctx *Context, name string, args ServerFirewallRulesArgs, opts ...ResourceOption) (*ServerFirewallRules, error)
    public ServerFirewallRules(string name, ServerFirewallRulesArgs args, CustomResourceOptions? opts = null)
    public ServerFirewallRules(String name, ServerFirewallRulesArgs args)
    public ServerFirewallRules(String name, ServerFirewallRulesArgs args, CustomResourceOptions options)
    
    type: upcloud:ServerFirewallRules
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ServerFirewallRulesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ServerFirewallRulesArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ServerFirewallRulesArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ServerFirewallRulesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ServerFirewallRulesArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var serverFirewallRulesResource = new UpCloud.ServerFirewallRules("serverFirewallRulesResource", new()
    {
        FirewallRules = new[]
        {
            new UpCloud.Inputs.ServerFirewallRulesFirewallRuleArgs
            {
                Action = "string",
                Direction = "string",
                DestinationAddressStart = "string",
                DestinationAddressEnd = "string",
                DestinationPortEnd = "string",
                DestinationPortStart = "string",
                Comment = "string",
                Family = "string",
                IcmpType = "string",
                Protocol = "string",
                SourceAddressEnd = "string",
                SourceAddressStart = "string",
                SourcePortEnd = "string",
                SourcePortStart = "string",
            },
        },
        ServerId = "string",
    });
    
    example, err := upcloud.NewServerFirewallRules(ctx, "serverFirewallRulesResource", &upcloud.ServerFirewallRulesArgs{
    	FirewallRules: upcloud.ServerFirewallRulesFirewallRuleArray{
    		&upcloud.ServerFirewallRulesFirewallRuleArgs{
    			Action:                  pulumi.String("string"),
    			Direction:               pulumi.String("string"),
    			DestinationAddressStart: pulumi.String("string"),
    			DestinationAddressEnd:   pulumi.String("string"),
    			DestinationPortEnd:      pulumi.String("string"),
    			DestinationPortStart:    pulumi.String("string"),
    			Comment:                 pulumi.String("string"),
    			Family:                  pulumi.String("string"),
    			IcmpType:                pulumi.String("string"),
    			Protocol:                pulumi.String("string"),
    			SourceAddressEnd:        pulumi.String("string"),
    			SourceAddressStart:      pulumi.String("string"),
    			SourcePortEnd:           pulumi.String("string"),
    			SourcePortStart:         pulumi.String("string"),
    		},
    	},
    	ServerId: pulumi.String("string"),
    })
    
    var serverFirewallRulesResource = new ServerFirewallRules("serverFirewallRulesResource", ServerFirewallRulesArgs.builder()
        .firewallRules(ServerFirewallRulesFirewallRuleArgs.builder()
            .action("string")
            .direction("string")
            .destinationAddressStart("string")
            .destinationAddressEnd("string")
            .destinationPortEnd("string")
            .destinationPortStart("string")
            .comment("string")
            .family("string")
            .icmpType("string")
            .protocol("string")
            .sourceAddressEnd("string")
            .sourceAddressStart("string")
            .sourcePortEnd("string")
            .sourcePortStart("string")
            .build())
        .serverId("string")
        .build());
    
    server_firewall_rules_resource = upcloud.ServerFirewallRules("serverFirewallRulesResource",
        firewall_rules=[{
            "action": "string",
            "direction": "string",
            "destination_address_start": "string",
            "destination_address_end": "string",
            "destination_port_end": "string",
            "destination_port_start": "string",
            "comment": "string",
            "family": "string",
            "icmp_type": "string",
            "protocol": "string",
            "source_address_end": "string",
            "source_address_start": "string",
            "source_port_end": "string",
            "source_port_start": "string",
        }],
        server_id="string")
    
    const serverFirewallRulesResource = new upcloud.ServerFirewallRules("serverFirewallRulesResource", {
        firewallRules: [{
            action: "string",
            direction: "string",
            destinationAddressStart: "string",
            destinationAddressEnd: "string",
            destinationPortEnd: "string",
            destinationPortStart: "string",
            comment: "string",
            family: "string",
            icmpType: "string",
            protocol: "string",
            sourceAddressEnd: "string",
            sourceAddressStart: "string",
            sourcePortEnd: "string",
            sourcePortStart: "string",
        }],
        serverId: "string",
    });
    
    type: upcloud:ServerFirewallRules
    properties:
        firewallRules:
            - action: string
              comment: string
              destinationAddressEnd: string
              destinationAddressStart: string
              destinationPortEnd: string
              destinationPortStart: string
              direction: string
              family: string
              icmpType: string
              protocol: string
              sourceAddressEnd: string
              sourceAddressStart: string
              sourcePortEnd: string
              sourcePortStart: string
        serverId: string
    

    ServerFirewallRules Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ServerFirewallRules resource accepts the following input properties:

    FirewallRules List<UpCloud.Pulumi.UpCloud.Inputs.ServerFirewallRulesFirewallRule>
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    ServerId string
    The unique id of the server to be protected the firewall rules
    FirewallRules []ServerFirewallRulesFirewallRuleArgs
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    ServerId string
    The unique id of the server to be protected the firewall rules
    firewallRules List<ServerFirewallRulesFirewallRule>
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    serverId String
    The unique id of the server to be protected the firewall rules
    firewallRules ServerFirewallRulesFirewallRule[]
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    serverId string
    The unique id of the server to be protected the firewall rules
    firewall_rules Sequence[ServerFirewallRulesFirewallRuleArgs]
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    server_id str
    The unique id of the server to be protected the firewall rules
    firewallRules List<Property Map>
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    serverId String
    The unique id of the server to be protected the firewall rules

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ServerFirewallRules resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ServerFirewallRules Resource

    Get an existing ServerFirewallRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ServerFirewallRulesState, opts?: CustomResourceOptions): ServerFirewallRules
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            firewall_rules: Optional[Sequence[ServerFirewallRulesFirewallRuleArgs]] = None,
            server_id: Optional[str] = None) -> ServerFirewallRules
    func GetServerFirewallRules(ctx *Context, name string, id IDInput, state *ServerFirewallRulesState, opts ...ResourceOption) (*ServerFirewallRules, error)
    public static ServerFirewallRules Get(string name, Input<string> id, ServerFirewallRulesState? state, CustomResourceOptions? opts = null)
    public static ServerFirewallRules get(String name, Output<String> id, ServerFirewallRulesState state, CustomResourceOptions options)
    resources:  _:    type: upcloud:ServerFirewallRules    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    FirewallRules List<UpCloud.Pulumi.UpCloud.Inputs.ServerFirewallRulesFirewallRule>
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    ServerId string
    The unique id of the server to be protected the firewall rules
    FirewallRules []ServerFirewallRulesFirewallRuleArgs
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    ServerId string
    The unique id of the server to be protected the firewall rules
    firewallRules List<ServerFirewallRulesFirewallRule>
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    serverId String
    The unique id of the server to be protected the firewall rules
    firewallRules ServerFirewallRulesFirewallRule[]
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    serverId string
    The unique id of the server to be protected the firewall rules
    firewall_rules Sequence[ServerFirewallRulesFirewallRuleArgs]
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    server_id str
    The unique id of the server to be protected the firewall rules
    firewallRules List<Property Map>
    A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000. Typical firewall rule should have action, direction, protocol, family and at least one destination/source-address/port range. A default rule can be created by providing only action and direction attributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
    serverId String
    The unique id of the server to be protected the firewall rules

    Supporting Types

    ServerFirewallRulesFirewallRule, ServerFirewallRulesFirewallRuleArgs

    Action string
    Action to take if the rule conditions are met. Valid values accept | drop
    Direction string
    The direction of network traffic this rule will be applied to
    Comment string
    Freeform comment string for the rule
    DestinationAddressEnd string
    The destination address range ends from this address
    DestinationAddressStart string
    The destination address range starts from this address
    DestinationPortEnd string
    The destination port range ends from this port number
    DestinationPortStart string
    The destination port range starts from this port number
    Family string
    The address family of new firewall rule
    IcmpType string
    The ICMP type
    Protocol string
    The protocol this rule will be applied to
    SourceAddressEnd string
    The source address range ends from this address
    SourceAddressStart string
    The source address range starts from this address
    SourcePortEnd string
    The source port range ends from this port number
    SourcePortStart string
    The source port range starts from this port number
    Action string
    Action to take if the rule conditions are met. Valid values accept | drop
    Direction string
    The direction of network traffic this rule will be applied to
    Comment string
    Freeform comment string for the rule
    DestinationAddressEnd string
    The destination address range ends from this address
    DestinationAddressStart string
    The destination address range starts from this address
    DestinationPortEnd string
    The destination port range ends from this port number
    DestinationPortStart string
    The destination port range starts from this port number
    Family string
    The address family of new firewall rule
    IcmpType string
    The ICMP type
    Protocol string
    The protocol this rule will be applied to
    SourceAddressEnd string
    The source address range ends from this address
    SourceAddressStart string
    The source address range starts from this address
    SourcePortEnd string
    The source port range ends from this port number
    SourcePortStart string
    The source port range starts from this port number
    action String
    Action to take if the rule conditions are met. Valid values accept | drop
    direction String
    The direction of network traffic this rule will be applied to
    comment String
    Freeform comment string for the rule
    destinationAddressEnd String
    The destination address range ends from this address
    destinationAddressStart String
    The destination address range starts from this address
    destinationPortEnd String
    The destination port range ends from this port number
    destinationPortStart String
    The destination port range starts from this port number
    family String
    The address family of new firewall rule
    icmpType String
    The ICMP type
    protocol String
    The protocol this rule will be applied to
    sourceAddressEnd String
    The source address range ends from this address
    sourceAddressStart String
    The source address range starts from this address
    sourcePortEnd String
    The source port range ends from this port number
    sourcePortStart String
    The source port range starts from this port number
    action string
    Action to take if the rule conditions are met. Valid values accept | drop
    direction string
    The direction of network traffic this rule will be applied to
    comment string
    Freeform comment string for the rule
    destinationAddressEnd string
    The destination address range ends from this address
    destinationAddressStart string
    The destination address range starts from this address
    destinationPortEnd string
    The destination port range ends from this port number
    destinationPortStart string
    The destination port range starts from this port number
    family string
    The address family of new firewall rule
    icmpType string
    The ICMP type
    protocol string
    The protocol this rule will be applied to
    sourceAddressEnd string
    The source address range ends from this address
    sourceAddressStart string
    The source address range starts from this address
    sourcePortEnd string
    The source port range ends from this port number
    sourcePortStart string
    The source port range starts from this port number
    action str
    Action to take if the rule conditions are met. Valid values accept | drop
    direction str
    The direction of network traffic this rule will be applied to
    comment str
    Freeform comment string for the rule
    destination_address_end str
    The destination address range ends from this address
    destination_address_start str
    The destination address range starts from this address
    destination_port_end str
    The destination port range ends from this port number
    destination_port_start str
    The destination port range starts from this port number
    family str
    The address family of new firewall rule
    icmp_type str
    The ICMP type
    protocol str
    The protocol this rule will be applied to
    source_address_end str
    The source address range ends from this address
    source_address_start str
    The source address range starts from this address
    source_port_end str
    The source port range ends from this port number
    source_port_start str
    The source port range starts from this port number
    action String
    Action to take if the rule conditions are met. Valid values accept | drop
    direction String
    The direction of network traffic this rule will be applied to
    comment String
    Freeform comment string for the rule
    destinationAddressEnd String
    The destination address range ends from this address
    destinationAddressStart String
    The destination address range starts from this address
    destinationPortEnd String
    The destination port range ends from this port number
    destinationPortStart String
    The destination port range starts from this port number
    family String
    The address family of new firewall rule
    icmpType String
    The ICMP type
    protocol String
    The protocol this rule will be applied to
    sourceAddressEnd String
    The source address range ends from this address
    sourceAddressStart String
    The source address range starts from this address
    sourcePortEnd String
    The source port range ends from this port number
    sourcePortStart String
    The source port range starts from this port number

    Import

    $ pulumi import upcloud:index/serverFirewallRules:ServerFirewallRules my_example_rules 049d7ca2-757e-4fb1-a833-f87ee056547a
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    upcloud UpCloudLtd/pulumi-upcloud
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the upcloud Terraform Provider.
    upcloud logo
    UpCloud v0.1.0 published on Friday, Mar 14, 2025 by UpCloudLtd