Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi
oci.NetworkFirewall.getNetworkFirewallPolicySecurityRule
Explore with Pulumi AI
Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi
This data source provides details about a specific Network Firewall Policy Security Rule resource in Oracle Cloud Infrastructure Network Firewall service.
Get Security Rule by the given name in the context of network firewall policy.
Example Usage
Coming soon!
Coming soon!
Coming soon!
Coming soon!
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallFunctions;
import com.pulumi.oci.NetworkFirewall.inputs.GetNetworkFirewallPolicySecurityRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var testNetworkFirewallPolicySecurityRule = NetworkFirewallFunctions.getNetworkFirewallPolicySecurityRule(GetNetworkFirewallPolicySecurityRuleArgs.builder()
.networkFirewallPolicyId(testNetworkFirewallPolicy.id())
.securityRuleName(ociNetworkFirewallNetworkFirewallPolicySecurityRuleName)
.build());
}
}
variables:
testNetworkFirewallPolicySecurityRule:
fn::invoke:
Function: oci:NetworkFirewall:getNetworkFirewallPolicySecurityRule
Arguments:
networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
securityRuleName: ${ociNetworkFirewallNetworkFirewallPolicySecurityRuleName}
Using getNetworkFirewallPolicySecurityRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getNetworkFirewallPolicySecurityRule(args: GetNetworkFirewallPolicySecurityRuleArgs, opts?: InvokeOptions): Promise<GetNetworkFirewallPolicySecurityRuleResult>
function getNetworkFirewallPolicySecurityRuleOutput(args: GetNetworkFirewallPolicySecurityRuleOutputArgs, opts?: InvokeOptions): Output<GetNetworkFirewallPolicySecurityRuleResult>
def get_network_firewall_policy_security_rule(name: Optional[str] = None,
network_firewall_policy_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetNetworkFirewallPolicySecurityRuleResult
def get_network_firewall_policy_security_rule_output(name: Optional[pulumi.Input[str]] = None,
network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetNetworkFirewallPolicySecurityRuleResult]
func GetNetworkFirewallPolicySecurityRule(ctx *Context, args *GetNetworkFirewallPolicySecurityRuleArgs, opts ...InvokeOption) (*GetNetworkFirewallPolicySecurityRuleResult, error)
func GetNetworkFirewallPolicySecurityRuleOutput(ctx *Context, args *GetNetworkFirewallPolicySecurityRuleOutputArgs, opts ...InvokeOption) GetNetworkFirewallPolicySecurityRuleResultOutput
> Note: This function is named GetNetworkFirewallPolicySecurityRule
in the Go SDK.
public static class GetNetworkFirewallPolicySecurityRule
{
public static Task<GetNetworkFirewallPolicySecurityRuleResult> InvokeAsync(GetNetworkFirewallPolicySecurityRuleArgs args, InvokeOptions? opts = null)
public static Output<GetNetworkFirewallPolicySecurityRuleResult> Invoke(GetNetworkFirewallPolicySecurityRuleInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetNetworkFirewallPolicySecurityRuleResult> getNetworkFirewallPolicySecurityRule(GetNetworkFirewallPolicySecurityRuleArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: oci:NetworkFirewall/getNetworkFirewallPolicySecurityRule:getNetworkFirewallPolicySecurityRule
arguments:
# arguments dictionary
The following arguments are supported:
- Name string
- Name for the Security rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Name string
- Name for the Security rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- name String
- Name for the Security rule, must be unique within the policy.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- name string
- Name for the Security rule, must be unique within the policy.
- network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- name str
- Name for the Security rule, must be unique within the policy.
- network_
firewall_ strpolicy_ id - Unique Network Firewall Policy identifier
- name String
- Name for the Security rule, must be unique within the policy.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
getNetworkFirewallPolicySecurityRule Result
The following output properties are available:
- Action string
- Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- Conditions
List<Get
Network Firewall Policy Security Rule Condition> - Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Id string
- Inspection string
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- Name string
- Name for the Security rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- Positions
List<Get
Network Firewall Policy Security Rule Position> - An object which defines the position of the rule.
- Priority
Order string
- Action string
- Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- Conditions
[]Get
Network Firewall Policy Security Rule Condition - Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- Id string
- Inspection string
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- Name string
- Name for the Security rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- Positions
[]Get
Network Firewall Policy Security Rule Position - An object which defines the position of the rule.
- Priority
Order string
- action String
- Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- conditions
List<Get
Policy Security Rule Condition> - Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id String
- inspection String
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name String
- Name for the Security rule, must be unique within the policy.
- network
Firewall StringPolicy Id - parent
Resource StringId - OCID of the Network Firewall Policy this security rule belongs to.
- positions
List<Get
Policy Security Rule Position> - An object which defines the position of the rule.
- priority
Order String
- action string
- Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- conditions
Get
Network Firewall Policy Security Rule Condition[] - Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id string
- inspection string
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name string
- Name for the Security rule, must be unique within the policy.
- network
Firewall stringPolicy Id - parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- positions
Get
Network Firewall Policy Security Rule Position[] - An object which defines the position of the rule.
- priority
Order string
- action str
- Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- conditions
Sequence[networkfirewall.
Get Network Firewall Policy Security Rule Condition] - Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id str
- inspection str
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name str
- Name for the Security rule, must be unique within the policy.
- network_
firewall_ strpolicy_ id - parent_
resource_ strid - OCID of the Network Firewall Policy this security rule belongs to.
- positions
Sequence[networkfirewall.
Get Network Firewall Policy Security Rule Position] - An object which defines the position of the rule.
- priority_
order str
- action String
- Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- conditions List<Property Map>
- Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
- id String
- inspection String
- Type of inspection to affect the Traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name String
- Name for the Security rule, must be unique within the policy.
- network
Firewall StringPolicy Id - parent
Resource StringId - OCID of the Network Firewall Policy this security rule belongs to.
- positions List<Property Map>
- An object which defines the position of the rule.
- priority
Order String
Supporting Types
GetNetworkFirewallPolicySecurityRuleCondition
- Applications List<string>
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- Destination
Addresses List<string> - An array of IP address list names to be evaluated against the traffic destination address.
- Services List<string>
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- Source
Addresses List<string> - An array of IP address list names to be evaluated against the traffic source address.
- Urls List<string>
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- Applications []string
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- Destination
Addresses []string - An array of IP address list names to be evaluated against the traffic destination address.
- Services []string
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- Source
Addresses []string - An array of IP address list names to be evaluated against the traffic source address.
- Urls []string
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination
Addresses List<String> - An array of IP address list names to be evaluated against the traffic destination address.
- services List<String>
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source
Addresses List<String> - An array of IP address list names to be evaluated against the traffic source address.
- urls List<String>
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications string[]
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination
Addresses string[] - An array of IP address list names to be evaluated against the traffic destination address.
- services string[]
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source
Addresses string[] - An array of IP address list names to be evaluated against the traffic source address.
- urls string[]
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications Sequence[str]
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination_
addresses Sequence[str] - An array of IP address list names to be evaluated against the traffic destination address.
- services Sequence[str]
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source_
addresses Sequence[str] - An array of IP address list names to be evaluated against the traffic source address.
- urls Sequence[str]
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- An array of application list names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination
Addresses List<String> - An array of IP address list names to be evaluated against the traffic destination address.
- services List<String>
- An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source
Addresses List<String> - An array of IP address list names to be evaluated against the traffic source address.
- urls List<String>
- An array of URL pattern list names to be evaluated against the HTTP(S) request target.
GetNetworkFirewallPolicySecurityRulePosition
- After
Rule string - Identifier for rule after which this rule lies.
- Before
Rule string - Identifier for rule before which this rule lies.
- After
Rule string - Identifier for rule after which this rule lies.
- Before
Rule string - Identifier for rule before which this rule lies.
- after
Rule String - Identifier for rule after which this rule lies.
- before
Rule String - Identifier for rule before which this rule lies.
- after
Rule string - Identifier for rule after which this rule lies.
- before
Rule string - Identifier for rule before which this rule lies.
- after_
rule str - Identifier for rule after which this rule lies.
- before_
rule str - Identifier for rule before which this rule lies.
- after
Rule String - Identifier for rule after which this rule lies.
- before
Rule String - Identifier for rule before which this rule lies.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.
Oracle Cloud Infrastructure v1.41.0 published on Wednesday, Jun 19, 2024 by Pulumi