Difference between revisions of "Terraform resource: aws security group rule"
Jump to navigation
Jump to search
Line 10: | Line 10: | ||
resource "aws_security_group_rule" "example" { | resource "aws_security_group_rule" "example" { | ||
type = "ingress" | type = "ingress" | ||
− | from_port = 0 | + | [[from_port]] = 0 |
to_port = 65535 | to_port = 65535 | ||
protocol = "tcp" | protocol = "tcp" |
Revision as of 14:13, 29 May 2023
aws_security_group_rule (ref)
from_port
to_port
protocol (required): icmp, icmpv6, tcp, udp, or all (or protocol = -1)
terraform import aws_ecs_service.imported cluster-name/service-name
Official example
resource "aws_security_group_rule" "example" { type = "ingress" from_port = 0 to_port = 65535 protocol = "tcp" cidr_blocks = [aws_vpc.example.cidr_block] ipv6_cidr_blocks = [aws_vpc.example.ipv6_cidr_block] security_group_id = "sg-123456" }
Related
- Security groups for your Network Load Balancer (NLB)
ingress, egress
aws ec2 authorize-security-group-ingress
aws_security_group
data.aws_subnet.all_public
- cidr_blocks
- Tags
See also
Advertising: