layout | page_title | sidebar_current | description |
---|---|---|---|
telefonicaopencloud |
TelefonicaOpenCloud: telefonicaopencloud_networking_secgroup_v2 |
docs-telefonicaopencloud-resource-networking-secgroup-v2 |
Manages a V2 Neutron security group resource within TelefonicaOpenCloud. |
Manages a V2 neutron security group resource within TelefonicaOpenCloud. Unlike Nova security groups, neutron separates the group from the rules and also allows an admin to target a specific tenant_id.
resource "telefonicaopencloud_networking_secgroup_v2" "secgroup_1" {
name = "secgroup_1"
description = "My neutron security group"
}
The following arguments are supported:
-
region
- (Optional) The region in which to obtain the V2 networking client. A networking client is needed to create a port. If omitted, theregion
argument of the provider is used. Changing this creates a new security group. -
name
- (Required) A unique name for the security group. -
description
- (Optional) A unique name for the security group. -
tenant_id
- (Optional) The owner of the security group. Required if admin wants to create a port for another tenant. Changing this creates a new security group. -
delete_default_rules
- (Optional) Whether or not to delete the default egress security rules. This isfalse
by default. See the below note for more information.
The following attributes are exported:
region
- See Argument Reference above.name
- See Argument Reference above.description
- See Argument Reference above.tenant_id
- See Argument Reference above.
In most cases, TelefonicaOpenCloud will create some egress security group rules for each
new security group. These security group rules will not be managed by
Terraform, so if you prefer to have all aspects of your infrastructure
managed by Terraform, set delete_default_rules
to true
and then create
separate security group rules such as the following:
resource "telefonicaopencloud_networking_secgroup_rule_v2" "secgroup_rule_v4" {
direction = "egress"
ethertype = "IPv4"
security_group_id = "${telefonicaopencloud_networking_secgroup_v2.secgroup.id}"
}
resource "telefonicaopencloud_networking_secgroup_rule_v2" "secgroup_rule_v6" {
direction = "egress"
ethertype = "IPv6"
security_group_id = "${telefonicaopencloud_networking_secgroup_v2.secgroup.id}"
}
Please note that this behavior may differ depending on the configuration of
the TelefonicaOpenCloud cloud. The above illustrates the current default Neutron
behavior. Some TelefonicaOpenCloud clouds might provide additional rules and some might
not provide any rules at all (in which case the delete_default_rules
setting
is moot).
Security Groups can be imported using the id
, e.g.
$ terraform import telefonicaopencloud_networking_secgroup_v2.secgroup_1 38809219-5e8a-4852-9139-6f461c90e8bc