OVHCloud v0.45.0 published on Tuesday, Jun 4, 2024 by OVHcloud
ovh.Ip.FirewallRule
Explore with Pulumi AI
Use this resource to manage a rule on an IP firewall.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as ovh from "@ovhcloud/pulumi-ovh";
const myfirewallrule = new ovh.ip.FirewallRule("myfirewallrule", {
action: "deny",
ip: "XXXXXX",
ipOnFirewall: "XXXXXX",
protocol: "tcp",
sequence: 0,
});
import pulumi
import pulumi_ovh as ovh
myfirewallrule = ovh.ip.FirewallRule("myfirewallrule",
action="deny",
ip="XXXXXX",
ip_on_firewall="XXXXXX",
protocol="tcp",
sequence=0)
package main
import (
"github.com/ovh/pulumi-ovh/sdk/go/ovh/Ip"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Ip.NewFirewallRule(ctx, "myfirewallrule", &Ip.FirewallRuleArgs{
Action: pulumi.String("deny"),
Ip: pulumi.String("XXXXXX"),
IpOnFirewall: pulumi.String("XXXXXX"),
Protocol: pulumi.String("tcp"),
Sequence: pulumi.Float64(0),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ovh = Pulumi.Ovh;
return await Deployment.RunAsync(() =>
{
var myfirewallrule = new Ovh.Ip.FirewallRule("myfirewallrule", new()
{
Action = "deny",
Ip = "XXXXXX",
IpOnFirewall = "XXXXXX",
Protocol = "tcp",
Sequence = 0,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ovh.Ip.FirewallRule;
import com.pulumi.ovh.Ip.FirewallRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myfirewallrule = new FirewallRule("myfirewallrule", FirewallRuleArgs.builder()
.action("deny")
.ip("XXXXXX")
.ipOnFirewall("XXXXXX")
.protocol("tcp")
.sequence(0)
.build());
}
}
resources:
myfirewallrule:
type: ovh:Ip:FirewallRule
properties:
action: deny
ip: XXXXXX
ipOnFirewall: XXXXXX
protocol: tcp
sequence: 0
Create FirewallRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new FirewallRule(name: string, args: FirewallRuleArgs, opts?: CustomResourceOptions);
@overload
def FirewallRule(resource_name: str,
args: FirewallRuleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def FirewallRule(resource_name: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
ip: Optional[str] = None,
ip_on_firewall: Optional[str] = None,
protocol: Optional[str] = None,
sequence: Optional[float] = None,
destination_port: Optional[float] = None,
fragments: Optional[bool] = None,
source: Optional[str] = None,
source_port: Optional[float] = None,
tcp_option: Optional[str] = None)
func NewFirewallRule(ctx *Context, name string, args FirewallRuleArgs, opts ...ResourceOption) (*FirewallRule, error)
public FirewallRule(string name, FirewallRuleArgs args, CustomResourceOptions? opts = null)
public FirewallRule(String name, FirewallRuleArgs args)
public FirewallRule(String name, FirewallRuleArgs args, CustomResourceOptions options)
type: ovh:Ip:FirewallRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args FirewallRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args FirewallRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args FirewallRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args FirewallRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var firewallRuleResource = new Ovh.Ip.FirewallRule("firewallRuleResource", new()
{
Action = "string",
Ip = "string",
IpOnFirewall = "string",
Protocol = "string",
Sequence = 0,
DestinationPort = 0,
Fragments = false,
Source = "string",
SourcePort = 0,
TcpOption = "string",
});
example, err := Ip.NewFirewallRule(ctx, "firewallRuleResource", &Ip.FirewallRuleArgs{
Action: pulumi.String("string"),
Ip: pulumi.String("string"),
IpOnFirewall: pulumi.String("string"),
Protocol: pulumi.String("string"),
Sequence: pulumi.Float64(0),
DestinationPort: pulumi.Float64(0),
Fragments: pulumi.Bool(false),
Source: pulumi.String("string"),
SourcePort: pulumi.Float64(0),
TcpOption: pulumi.String("string"),
})
var firewallRuleResource = new FirewallRule("firewallRuleResource", FirewallRuleArgs.builder()
.action("string")
.ip("string")
.ipOnFirewall("string")
.protocol("string")
.sequence(0)
.destinationPort(0)
.fragments(false)
.source("string")
.sourcePort(0)
.tcpOption("string")
.build());
firewall_rule_resource = ovh.ip.FirewallRule("firewallRuleResource",
action="string",
ip="string",
ip_on_firewall="string",
protocol="string",
sequence=0,
destination_port=0,
fragments=False,
source="string",
source_port=0,
tcp_option="string")
const firewallRuleResource = new ovh.ip.FirewallRule("firewallRuleResource", {
action: "string",
ip: "string",
ipOnFirewall: "string",
protocol: "string",
sequence: 0,
destinationPort: 0,
fragments: false,
source: "string",
sourcePort: 0,
tcpOption: "string",
});
type: ovh:Ip:FirewallRule
properties:
action: string
destinationPort: 0
fragments: false
ip: string
ipOnFirewall: string
protocol: string
sequence: 0
source: string
sourcePort: 0
tcpOption: string
FirewallRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The FirewallRule resource accepts the following input properties:
- Action string
- Possible values for action (deny|permit)
- Ip string
- The IP or the CIDR
- Ip
On stringFirewall - IPv4 address
- Protocol string
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- Sequence double
- Rule position in the rules array
- Destination
Port double - Destination port for your rule. Only with TCP/UDP protocol
- Fragments bool
- Fragments option
- Source string
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- Source
Port double - Source port for your rule. Only with TCP/UDP protocol
- Tcp
Option string - TCP option on your rule (syn|established)
- Action string
- Possible values for action (deny|permit)
- Ip string
- The IP or the CIDR
- Ip
On stringFirewall - IPv4 address
- Protocol string
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- Sequence float64
- Rule position in the rules array
- Destination
Port float64 - Destination port for your rule. Only with TCP/UDP protocol
- Fragments bool
- Fragments option
- Source string
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- Source
Port float64 - Source port for your rule. Only with TCP/UDP protocol
- Tcp
Option string - TCP option on your rule (syn|established)
- action String
- Possible values for action (deny|permit)
- ip String
- The IP or the CIDR
- ip
On StringFirewall - IPv4 address
- protocol String
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- sequence Double
- Rule position in the rules array
- destination
Port Double - Destination port for your rule. Only with TCP/UDP protocol
- fragments Boolean
- Fragments option
- source String
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source
Port Double - Source port for your rule. Only with TCP/UDP protocol
- tcp
Option String - TCP option on your rule (syn|established)
- action string
- Possible values for action (deny|permit)
- ip string
- The IP or the CIDR
- ip
On stringFirewall - IPv4 address
- protocol string
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- sequence number
- Rule position in the rules array
- destination
Port number - Destination port for your rule. Only with TCP/UDP protocol
- fragments boolean
- Fragments option
- source string
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source
Port number - Source port for your rule. Only with TCP/UDP protocol
- tcp
Option string - TCP option on your rule (syn|established)
- action str
- Possible values for action (deny|permit)
- ip str
- The IP or the CIDR
- ip_
on_ strfirewall - IPv4 address
- protocol str
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- sequence float
- Rule position in the rules array
- destination_
port float - Destination port for your rule. Only with TCP/UDP protocol
- fragments bool
- Fragments option
- source str
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source_
port float - Source port for your rule. Only with TCP/UDP protocol
- tcp_
option str - TCP option on your rule (syn|established)
- action String
- Possible values for action (deny|permit)
- ip String
- The IP or the CIDR
- ip
On StringFirewall - IPv4 address
- protocol String
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- sequence Number
- Rule position in the rules array
- destination
Port Number - Destination port for your rule. Only with TCP/UDP protocol
- fragments Boolean
- Fragments option
- source String
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source
Port Number - Source port for your rule. Only with TCP/UDP protocol
- tcp
Option String - TCP option on your rule (syn|established)
Outputs
All input properties are implicitly available as output properties. Additionally, the FirewallRule resource produces the following output properties:
- Creation
Date string - Creation date of the rule
- Destination string
- Destination IP for your rule
- Destination
Port stringDesc - String description of field
destination_port
- Id string
- The provider-assigned unique ID for this managed resource.
- Rule string
- Description of the rule
- Source
Port stringDesc - String description of field
source_port
- State string
- Current state of your rule
- Creation
Date string - Creation date of the rule
- Destination string
- Destination IP for your rule
- Destination
Port stringDesc - String description of field
destination_port
- Id string
- The provider-assigned unique ID for this managed resource.
- Rule string
- Description of the rule
- Source
Port stringDesc - String description of field
source_port
- State string
- Current state of your rule
- creation
Date String - Creation date of the rule
- destination String
- Destination IP for your rule
- destination
Port StringDesc - String description of field
destination_port
- id String
- The provider-assigned unique ID for this managed resource.
- rule String
- Description of the rule
- source
Port StringDesc - String description of field
source_port
- state String
- Current state of your rule
- creation
Date string - Creation date of the rule
- destination string
- Destination IP for your rule
- destination
Port stringDesc - String description of field
destination_port
- id string
- The provider-assigned unique ID for this managed resource.
- rule string
- Description of the rule
- source
Port stringDesc - String description of field
source_port
- state string
- Current state of your rule
- creation_
date str - Creation date of the rule
- destination str
- Destination IP for your rule
- destination_
port_ strdesc - String description of field
destination_port
- id str
- The provider-assigned unique ID for this managed resource.
- rule str
- Description of the rule
- source_
port_ strdesc - String description of field
source_port
- state str
- Current state of your rule
- creation
Date String - Creation date of the rule
- destination String
- Destination IP for your rule
- destination
Port StringDesc - String description of field
destination_port
- id String
- The provider-assigned unique ID for this managed resource.
- rule String
- Description of the rule
- source
Port StringDesc - String description of field
source_port
- state String
- Current state of your rule
Look up Existing FirewallRule Resource
Get an existing FirewallRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: FirewallRuleState, opts?: CustomResourceOptions): FirewallRule
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
creation_date: Optional[str] = None,
destination: Optional[str] = None,
destination_port: Optional[float] = None,
destination_port_desc: Optional[str] = None,
fragments: Optional[bool] = None,
ip: Optional[str] = None,
ip_on_firewall: Optional[str] = None,
protocol: Optional[str] = None,
rule: Optional[str] = None,
sequence: Optional[float] = None,
source: Optional[str] = None,
source_port: Optional[float] = None,
source_port_desc: Optional[str] = None,
state: Optional[str] = None,
tcp_option: Optional[str] = None) -> FirewallRule
func GetFirewallRule(ctx *Context, name string, id IDInput, state *FirewallRuleState, opts ...ResourceOption) (*FirewallRule, error)
public static FirewallRule Get(string name, Input<string> id, FirewallRuleState? state, CustomResourceOptions? opts = null)
public static FirewallRule get(String name, Output<String> id, FirewallRuleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- Possible values for action (deny|permit)
- Creation
Date string - Creation date of the rule
- Destination string
- Destination IP for your rule
- Destination
Port double - Destination port for your rule. Only with TCP/UDP protocol
- Destination
Port stringDesc - String description of field
destination_port
- Fragments bool
- Fragments option
- Ip string
- The IP or the CIDR
- Ip
On stringFirewall - IPv4 address
- Protocol string
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- Rule string
- Description of the rule
- Sequence double
- Rule position in the rules array
- Source string
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- Source
Port double - Source port for your rule. Only with TCP/UDP protocol
- Source
Port stringDesc - String description of field
source_port
- State string
- Current state of your rule
- Tcp
Option string - TCP option on your rule (syn|established)
- Action string
- Possible values for action (deny|permit)
- Creation
Date string - Creation date of the rule
- Destination string
- Destination IP for your rule
- Destination
Port float64 - Destination port for your rule. Only with TCP/UDP protocol
- Destination
Port stringDesc - String description of field
destination_port
- Fragments bool
- Fragments option
- Ip string
- The IP or the CIDR
- Ip
On stringFirewall - IPv4 address
- Protocol string
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- Rule string
- Description of the rule
- Sequence float64
- Rule position in the rules array
- Source string
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- Source
Port float64 - Source port for your rule. Only with TCP/UDP protocol
- Source
Port stringDesc - String description of field
source_port
- State string
- Current state of your rule
- Tcp
Option string - TCP option on your rule (syn|established)
- action String
- Possible values for action (deny|permit)
- creation
Date String - Creation date of the rule
- destination String
- Destination IP for your rule
- destination
Port Double - Destination port for your rule. Only with TCP/UDP protocol
- destination
Port StringDesc - String description of field
destination_port
- fragments Boolean
- Fragments option
- ip String
- The IP or the CIDR
- ip
On StringFirewall - IPv4 address
- protocol String
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- rule String
- Description of the rule
- sequence Double
- Rule position in the rules array
- source String
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source
Port Double - Source port for your rule. Only with TCP/UDP protocol
- source
Port StringDesc - String description of field
source_port
- state String
- Current state of your rule
- tcp
Option String - TCP option on your rule (syn|established)
- action string
- Possible values for action (deny|permit)
- creation
Date string - Creation date of the rule
- destination string
- Destination IP for your rule
- destination
Port number - Destination port for your rule. Only with TCP/UDP protocol
- destination
Port stringDesc - String description of field
destination_port
- fragments boolean
- Fragments option
- ip string
- The IP or the CIDR
- ip
On stringFirewall - IPv4 address
- protocol string
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- rule string
- Description of the rule
- sequence number
- Rule position in the rules array
- source string
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source
Port number - Source port for your rule. Only with TCP/UDP protocol
- source
Port stringDesc - String description of field
source_port
- state string
- Current state of your rule
- tcp
Option string - TCP option on your rule (syn|established)
- action str
- Possible values for action (deny|permit)
- creation_
date str - Creation date of the rule
- destination str
- Destination IP for your rule
- destination_
port float - Destination port for your rule. Only with TCP/UDP protocol
- destination_
port_ strdesc - String description of field
destination_port
- fragments bool
- Fragments option
- ip str
- The IP or the CIDR
- ip_
on_ strfirewall - IPv4 address
- protocol str
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- rule str
- Description of the rule
- sequence float
- Rule position in the rules array
- source str
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source_
port float - Source port for your rule. Only with TCP/UDP protocol
- source_
port_ strdesc - String description of field
source_port
- state str
- Current state of your rule
- tcp_
option str - TCP option on your rule (syn|established)
- action String
- Possible values for action (deny|permit)
- creation
Date String - Creation date of the rule
- destination String
- Destination IP for your rule
- destination
Port Number - Destination port for your rule. Only with TCP/UDP protocol
- destination
Port StringDesc - String description of field
destination_port
- fragments Boolean
- Fragments option
- ip String
- The IP or the CIDR
- ip
On StringFirewall - IPv4 address
- protocol String
- Possible values for protocol (ah|esp|gre|icmp|ipv4|tcp|udp)
- rule String
- Description of the rule
- sequence Number
- Rule position in the rules array
- source String
- IPv4 CIDR notation (e.g., 192.0.2.0/24)
- source
Port Number - Source port for your rule. Only with TCP/UDP protocol
- source
Port StringDesc - String description of field
source_port
- state String
- Current state of your rule
- tcp
Option String - TCP option on your rule (syn|established)
Package Details
- Repository
- ovh ovh/pulumi-ovh
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
ovh
Terraform Provider.