upcloud.ServerFirewallRules
Explore with Pulumi AI
Firewall rules are used to control network access of UpCloud servers. Each server has its own firewall rules and there should be only one upcloud.ServerFirewallRules resource per server.
The firewall is enabled on public and utility network interfaces.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as upcloud from "@upcloud/pulumi-upcloud";
// The following example defines a server and then links the server to a single firewall rule. 
// The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
const example = new upcloud.Server("example", {
    firewall: true,
    hostname: "terraform.example.tld",
    zone: "de-fra1",
    plan: "1xCPU-1GB",
    template: {
        storage: "Ubuntu Server 20.04 LTS (Focal Fossa)",
        size: 25,
    },
    networkInterfaces: [{
        type: "utility",
    }],
});
const exampleServerFirewallRules = new upcloud.ServerFirewallRules("example", {
    serverId: example.id,
    firewallRules: [{
        action: "accept",
        comment: "Allow SSH from this network",
        destinationPortEnd: "22",
        destinationPortStart: "22",
        direction: "in",
        family: "IPv4",
        protocol: "tcp",
        sourceAddressEnd: "192.168.1.255",
        sourceAddressStart: "192.168.1.1",
    }],
});
import pulumi
import pulumi_upcloud as upcloud
# The following example defines a server and then links the server to a single firewall rule. 
# The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
example = upcloud.Server("example",
    firewall=True,
    hostname="terraform.example.tld",
    zone="de-fra1",
    plan="1xCPU-1GB",
    template={
        "storage": "Ubuntu Server 20.04 LTS (Focal Fossa)",
        "size": 25,
    },
    network_interfaces=[{
        "type": "utility",
    }])
example_server_firewall_rules = upcloud.ServerFirewallRules("example",
    server_id=example.id,
    firewall_rules=[{
        "action": "accept",
        "comment": "Allow SSH from this network",
        "destination_port_end": "22",
        "destination_port_start": "22",
        "direction": "in",
        "family": "IPv4",
        "protocol": "tcp",
        "source_address_end": "192.168.1.255",
        "source_address_start": "192.168.1.1",
    }])
package main
import (
	"github.com/UpCloudLtd/pulumi-upcloud/sdk/go/upcloud"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		// The following example defines a server and then links the server to a single firewall rule.
		// The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
		example, err := upcloud.NewServer(ctx, "example", &upcloud.ServerArgs{
			Firewall: pulumi.Bool(true),
			Hostname: pulumi.String("terraform.example.tld"),
			Zone:     pulumi.String("de-fra1"),
			Plan:     pulumi.String("1xCPU-1GB"),
			Template: &upcloud.ServerTemplateArgs{
				Storage: pulumi.String("Ubuntu Server 20.04 LTS (Focal Fossa)"),
				Size:    pulumi.Int(25),
			},
			NetworkInterfaces: upcloud.ServerNetworkInterfaceArray{
				&upcloud.ServerNetworkInterfaceArgs{
					Type: pulumi.String("utility"),
				},
			},
		})
		if err != nil {
			return err
		}
		_, err = upcloud.NewServerFirewallRules(ctx, "example", &upcloud.ServerFirewallRulesArgs{
			ServerId: example.ID(),
			FirewallRules: upcloud.ServerFirewallRulesFirewallRuleArray{
				&upcloud.ServerFirewallRulesFirewallRuleArgs{
					Action:               pulumi.String("accept"),
					Comment:              pulumi.String("Allow SSH from this network"),
					DestinationPortEnd:   pulumi.String("22"),
					DestinationPortStart: pulumi.String("22"),
					Direction:            pulumi.String("in"),
					Family:               pulumi.String("IPv4"),
					Protocol:             pulumi.String("tcp"),
					SourceAddressEnd:     pulumi.String("192.168.1.255"),
					SourceAddressStart:   pulumi.String("192.168.1.1"),
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using UpCloud = UpCloud.Pulumi.UpCloud;
return await Deployment.RunAsync(() => 
{
    // The following example defines a server and then links the server to a single firewall rule. 
    // The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
    var example = new UpCloud.Server("example", new()
    {
        Firewall = true,
        Hostname = "terraform.example.tld",
        Zone = "de-fra1",
        Plan = "1xCPU-1GB",
        Template = new UpCloud.Inputs.ServerTemplateArgs
        {
            Storage = "Ubuntu Server 20.04 LTS (Focal Fossa)",
            Size = 25,
        },
        NetworkInterfaces = new[]
        {
            new UpCloud.Inputs.ServerNetworkInterfaceArgs
            {
                Type = "utility",
            },
        },
    });
    var exampleServerFirewallRules = new UpCloud.ServerFirewallRules("example", new()
    {
        ServerId = example.Id,
        FirewallRules = new[]
        {
            new UpCloud.Inputs.ServerFirewallRulesFirewallRuleArgs
            {
                Action = "accept",
                Comment = "Allow SSH from this network",
                DestinationPortEnd = "22",
                DestinationPortStart = "22",
                Direction = "in",
                Family = "IPv4",
                Protocol = "tcp",
                SourceAddressEnd = "192.168.1.255",
                SourceAddressStart = "192.168.1.1",
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.upcloud.Server;
import com.pulumi.upcloud.ServerArgs;
import com.pulumi.upcloud.inputs.ServerTemplateArgs;
import com.pulumi.upcloud.inputs.ServerNetworkInterfaceArgs;
import com.pulumi.upcloud.ServerFirewallRules;
import com.pulumi.upcloud.ServerFirewallRulesArgs;
import com.pulumi.upcloud.inputs.ServerFirewallRulesFirewallRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        // The following example defines a server and then links the server to a single firewall rule. 
        // The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
        var example = new Server("example", ServerArgs.builder()
            .firewall(true)
            .hostname("terraform.example.tld")
            .zone("de-fra1")
            .plan("1xCPU-1GB")
            .template(ServerTemplateArgs.builder()
                .storage("Ubuntu Server 20.04 LTS (Focal Fossa)")
                .size(25)
                .build())
            .networkInterfaces(ServerNetworkInterfaceArgs.builder()
                .type("utility")
                .build())
            .build());
        var exampleServerFirewallRules = new ServerFirewallRules("exampleServerFirewallRules", ServerFirewallRulesArgs.builder()
            .serverId(example.id())
            .firewallRules(ServerFirewallRulesFirewallRuleArgs.builder()
                .action("accept")
                .comment("Allow SSH from this network")
                .destinationPortEnd("22")
                .destinationPortStart("22")
                .direction("in")
                .family("IPv4")
                .protocol("tcp")
                .sourceAddressEnd("192.168.1.255")
                .sourceAddressStart("192.168.1.1")
                .build())
            .build());
    }
}
resources:
  # The following example defines a server and then links the server to a single firewall rule. 
  # The list of firewall rules applied to the server can be expanded by providing additional server_firewall_rules blocks.
  example:
    type: upcloud:Server
    properties:
      firewall: true
      hostname: terraform.example.tld
      zone: de-fra1
      plan: 1xCPU-1GB
      template:
        storage: Ubuntu Server 20.04 LTS (Focal Fossa)
        size: 25
      networkInterfaces:
        - type: utility
  exampleServerFirewallRules:
    type: upcloud:ServerFirewallRules
    name: example
    properties:
      serverId: ${example.id}
      firewallRules:
        - action: accept
          comment: Allow SSH from this network
          destinationPortEnd: '22'
          destinationPortStart: '22'
          direction: in
          family: IPv4
          protocol: tcp
          sourceAddressEnd: 192.168.1.255
          sourceAddressStart: 192.168.1.1
Create ServerFirewallRules Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ServerFirewallRules(name: string, args: ServerFirewallRulesArgs, opts?: CustomResourceOptions);@overload
def ServerFirewallRules(resource_name: str,
                        args: ServerFirewallRulesArgs,
                        opts: Optional[ResourceOptions] = None)
@overload
def ServerFirewallRules(resource_name: str,
                        opts: Optional[ResourceOptions] = None,
                        firewall_rules: Optional[Sequence[ServerFirewallRulesFirewallRuleArgs]] = None,
                        server_id: Optional[str] = None)func NewServerFirewallRules(ctx *Context, name string, args ServerFirewallRulesArgs, opts ...ResourceOption) (*ServerFirewallRules, error)public ServerFirewallRules(string name, ServerFirewallRulesArgs args, CustomResourceOptions? opts = null)
public ServerFirewallRules(String name, ServerFirewallRulesArgs args)
public ServerFirewallRules(String name, ServerFirewallRulesArgs args, CustomResourceOptions options)
type: upcloud:ServerFirewallRules
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ServerFirewallRulesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var serverFirewallRulesResource = new UpCloud.ServerFirewallRules("serverFirewallRulesResource", new()
{
    FirewallRules = new[]
    {
        new UpCloud.Inputs.ServerFirewallRulesFirewallRuleArgs
        {
            Action = "string",
            Direction = "string",
            DestinationAddressStart = "string",
            DestinationAddressEnd = "string",
            DestinationPortEnd = "string",
            DestinationPortStart = "string",
            Comment = "string",
            Family = "string",
            IcmpType = "string",
            Protocol = "string",
            SourceAddressEnd = "string",
            SourceAddressStart = "string",
            SourcePortEnd = "string",
            SourcePortStart = "string",
        },
    },
    ServerId = "string",
});
example, err := upcloud.NewServerFirewallRules(ctx, "serverFirewallRulesResource", &upcloud.ServerFirewallRulesArgs{
	FirewallRules: upcloud.ServerFirewallRulesFirewallRuleArray{
		&upcloud.ServerFirewallRulesFirewallRuleArgs{
			Action:                  pulumi.String("string"),
			Direction:               pulumi.String("string"),
			DestinationAddressStart: pulumi.String("string"),
			DestinationAddressEnd:   pulumi.String("string"),
			DestinationPortEnd:      pulumi.String("string"),
			DestinationPortStart:    pulumi.String("string"),
			Comment:                 pulumi.String("string"),
			Family:                  pulumi.String("string"),
			IcmpType:                pulumi.String("string"),
			Protocol:                pulumi.String("string"),
			SourceAddressEnd:        pulumi.String("string"),
			SourceAddressStart:      pulumi.String("string"),
			SourcePortEnd:           pulumi.String("string"),
			SourcePortStart:         pulumi.String("string"),
		},
	},
	ServerId: pulumi.String("string"),
})
var serverFirewallRulesResource = new ServerFirewallRules("serverFirewallRulesResource", ServerFirewallRulesArgs.builder()
    .firewallRules(ServerFirewallRulesFirewallRuleArgs.builder()
        .action("string")
        .direction("string")
        .destinationAddressStart("string")
        .destinationAddressEnd("string")
        .destinationPortEnd("string")
        .destinationPortStart("string")
        .comment("string")
        .family("string")
        .icmpType("string")
        .protocol("string")
        .sourceAddressEnd("string")
        .sourceAddressStart("string")
        .sourcePortEnd("string")
        .sourcePortStart("string")
        .build())
    .serverId("string")
    .build());
server_firewall_rules_resource = upcloud.ServerFirewallRules("serverFirewallRulesResource",
    firewall_rules=[{
        "action": "string",
        "direction": "string",
        "destination_address_start": "string",
        "destination_address_end": "string",
        "destination_port_end": "string",
        "destination_port_start": "string",
        "comment": "string",
        "family": "string",
        "icmp_type": "string",
        "protocol": "string",
        "source_address_end": "string",
        "source_address_start": "string",
        "source_port_end": "string",
        "source_port_start": "string",
    }],
    server_id="string")
const serverFirewallRulesResource = new upcloud.ServerFirewallRules("serverFirewallRulesResource", {
    firewallRules: [{
        action: "string",
        direction: "string",
        destinationAddressStart: "string",
        destinationAddressEnd: "string",
        destinationPortEnd: "string",
        destinationPortStart: "string",
        comment: "string",
        family: "string",
        icmpType: "string",
        protocol: "string",
        sourceAddressEnd: "string",
        sourceAddressStart: "string",
        sourcePortEnd: "string",
        sourcePortStart: "string",
    }],
    serverId: "string",
});
type: upcloud:ServerFirewallRules
properties:
    firewallRules:
        - action: string
          comment: string
          destinationAddressEnd: string
          destinationAddressStart: string
          destinationPortEnd: string
          destinationPortStart: string
          direction: string
          family: string
          icmpType: string
          protocol: string
          sourceAddressEnd: string
          sourceAddressStart: string
          sourcePortEnd: string
          sourcePortStart: string
    serverId: string
ServerFirewallRules Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ServerFirewallRules resource accepts the following input properties:
- FirewallRules List<UpCloud. Pulumi. Up Cloud. Inputs. Server Firewall Rules Firewall Rule> 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- ServerId string
- The unique id of the server to be protected the firewall rules
- FirewallRules []ServerFirewall Rules Firewall Rule Args 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- ServerId string
- The unique id of the server to be protected the firewall rules
- firewallRules List<ServerFirewall Rules Firewall Rule> 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- serverId String
- The unique id of the server to be protected the firewall rules
- firewallRules ServerFirewall Rules Firewall Rule[] 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- serverId string
- The unique id of the server to be protected the firewall rules
- firewall_rules Sequence[ServerFirewall Rules Firewall Rule Args] 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- server_id str
- The unique id of the server to be protected the firewall rules
- firewallRules List<Property Map>
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- serverId String
- The unique id of the server to be protected the firewall rules
Outputs
All input properties are implicitly available as output properties. Additionally, the ServerFirewallRules resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ServerFirewallRules Resource
Get an existing ServerFirewallRules resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ServerFirewallRulesState, opts?: CustomResourceOptions): ServerFirewallRules@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        firewall_rules: Optional[Sequence[ServerFirewallRulesFirewallRuleArgs]] = None,
        server_id: Optional[str] = None) -> ServerFirewallRulesfunc GetServerFirewallRules(ctx *Context, name string, id IDInput, state *ServerFirewallRulesState, opts ...ResourceOption) (*ServerFirewallRules, error)public static ServerFirewallRules Get(string name, Input<string> id, ServerFirewallRulesState? state, CustomResourceOptions? opts = null)public static ServerFirewallRules get(String name, Output<String> id, ServerFirewallRulesState state, CustomResourceOptions options)resources:  _:    type: upcloud:ServerFirewallRules    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- FirewallRules List<UpCloud. Pulumi. Up Cloud. Inputs. Server Firewall Rules Firewall Rule> 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- ServerId string
- The unique id of the server to be protected the firewall rules
- FirewallRules []ServerFirewall Rules Firewall Rule Args 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- ServerId string
- The unique id of the server to be protected the firewall rules
- firewallRules List<ServerFirewall Rules Firewall Rule> 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- serverId String
- The unique id of the server to be protected the firewall rules
- firewallRules ServerFirewall Rules Firewall Rule[] 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- serverId string
- The unique id of the server to be protected the firewall rules
- firewall_rules Sequence[ServerFirewall Rules Firewall Rule Args] 
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- server_id str
- The unique id of the server to be protected the firewall rules
- firewallRules List<Property Map>
- A single firewall rule. The rules are evaluated in order. The maximum number of firewall rules per server is 1000.
Typical firewall rule should have action,direction,protocol,familyand at least one destination/source-address/port range. A default rule can be created by providing onlyactionanddirectionattributes. Default rule should be defined last. If used, IP address and port ranges must have both start and end values specified. These can be the same value if only one IP address or port number is specified. Source and destination port numbers can only be set if the protocol is TCP or UDP. The ICMP type may only be set if the protocol is ICMP.
- serverId String
- The unique id of the server to be protected the firewall rules
Supporting Types
ServerFirewallRulesFirewallRule, ServerFirewallRulesFirewallRuleArgs          
- Action string
- Action to take if the rule conditions are met. Valid values accept | drop
- Direction string
- The direction of network traffic this rule will be applied to
- Comment string
- Freeform comment string for the rule
- DestinationAddress stringEnd 
- The destination address range ends from this address
- DestinationAddress stringStart 
- The destination address range starts from this address
- DestinationPort stringEnd 
- The destination port range ends from this port number
- DestinationPort stringStart 
- The destination port range starts from this port number
- Family string
- The address family of new firewall rule
- IcmpType string
- The ICMP type
- Protocol string
- The protocol this rule will be applied to
- SourceAddress stringEnd 
- The source address range ends from this address
- SourceAddress stringStart 
- The source address range starts from this address
- SourcePort stringEnd 
- The source port range ends from this port number
- SourcePort stringStart 
- The source port range starts from this port number
- Action string
- Action to take if the rule conditions are met. Valid values accept | drop
- Direction string
- The direction of network traffic this rule will be applied to
- Comment string
- Freeform comment string for the rule
- DestinationAddress stringEnd 
- The destination address range ends from this address
- DestinationAddress stringStart 
- The destination address range starts from this address
- DestinationPort stringEnd 
- The destination port range ends from this port number
- DestinationPort stringStart 
- The destination port range starts from this port number
- Family string
- The address family of new firewall rule
- IcmpType string
- The ICMP type
- Protocol string
- The protocol this rule will be applied to
- SourceAddress stringEnd 
- The source address range ends from this address
- SourceAddress stringStart 
- The source address range starts from this address
- SourcePort stringEnd 
- The source port range ends from this port number
- SourcePort stringStart 
- The source port range starts from this port number
- action String
- Action to take if the rule conditions are met. Valid values accept | drop
- direction String
- The direction of network traffic this rule will be applied to
- comment String
- Freeform comment string for the rule
- destinationAddress StringEnd 
- The destination address range ends from this address
- destinationAddress StringStart 
- The destination address range starts from this address
- destinationPort StringEnd 
- The destination port range ends from this port number
- destinationPort StringStart 
- The destination port range starts from this port number
- family String
- The address family of new firewall rule
- icmpType String
- The ICMP type
- protocol String
- The protocol this rule will be applied to
- sourceAddress StringEnd 
- The source address range ends from this address
- sourceAddress StringStart 
- The source address range starts from this address
- sourcePort StringEnd 
- The source port range ends from this port number
- sourcePort StringStart 
- The source port range starts from this port number
- action string
- Action to take if the rule conditions are met. Valid values accept | drop
- direction string
- The direction of network traffic this rule will be applied to
- comment string
- Freeform comment string for the rule
- destinationAddress stringEnd 
- The destination address range ends from this address
- destinationAddress stringStart 
- The destination address range starts from this address
- destinationPort stringEnd 
- The destination port range ends from this port number
- destinationPort stringStart 
- The destination port range starts from this port number
- family string
- The address family of new firewall rule
- icmpType string
- The ICMP type
- protocol string
- The protocol this rule will be applied to
- sourceAddress stringEnd 
- The source address range ends from this address
- sourceAddress stringStart 
- The source address range starts from this address
- sourcePort stringEnd 
- The source port range ends from this port number
- sourcePort stringStart 
- The source port range starts from this port number
- action str
- Action to take if the rule conditions are met. Valid values accept | drop
- direction str
- The direction of network traffic this rule will be applied to
- comment str
- Freeform comment string for the rule
- destination_address_ strend 
- The destination address range ends from this address
- destination_address_ strstart 
- The destination address range starts from this address
- destination_port_ strend 
- The destination port range ends from this port number
- destination_port_ strstart 
- The destination port range starts from this port number
- family str
- The address family of new firewall rule
- icmp_type str
- The ICMP type
- protocol str
- The protocol this rule will be applied to
- source_address_ strend 
- The source address range ends from this address
- source_address_ strstart 
- The source address range starts from this address
- source_port_ strend 
- The source port range ends from this port number
- source_port_ strstart 
- The source port range starts from this port number
- action String
- Action to take if the rule conditions are met. Valid values accept | drop
- direction String
- The direction of network traffic this rule will be applied to
- comment String
- Freeform comment string for the rule
- destinationAddress StringEnd 
- The destination address range ends from this address
- destinationAddress StringStart 
- The destination address range starts from this address
- destinationPort StringEnd 
- The destination port range ends from this port number
- destinationPort StringStart 
- The destination port range starts from this port number
- family String
- The address family of new firewall rule
- icmpType String
- The ICMP type
- protocol String
- The protocol this rule will be applied to
- sourceAddress StringEnd 
- The source address range ends from this address
- sourceAddress StringStart 
- The source address range starts from this address
- sourcePort StringEnd 
- The source port range ends from this port number
- sourcePort StringStart 
- The source port range starts from this port number
Import
$ pulumi import upcloud:index/serverFirewallRules:ServerFirewallRules my_example_rules 049d7ca2-757e-4fb1-a833-f87ee056547a
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- upcloud UpCloudLtd/pulumi-upcloud
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the upcloudTerraform Provider.
