diff --git a/website/source/docs/providers/aws/r/security_group.html.markdown b/website/source/docs/providers/aws/r/security_group.html.markdown index 3f8597372..5b21907be 100644 --- a/website/source/docs/providers/aws/r/security_group.html.markdown +++ b/website/source/docs/providers/aws/r/security_group.html.markdown @@ -45,7 +45,7 @@ resource "aws_security_group" "allow_all" { Basic usage with tags: -``` +```hcl resource "aws_security_group" "allow_all" { name = "allow_all" description = "Allow all inbound traffic" @@ -116,12 +116,14 @@ specifically re-create it if you desire that rule. We feel this leads to fewer surprises in terms of controlling your egress rules. If you desire this rule to be in place, you can use this `egress` block: +```hcl egress { from_port = 0 to_port = 0 protocol = "-1" cidr_blocks = ["0.0.0.0/0"] } +``` ## Usage with prefix list IDs @@ -129,7 +131,7 @@ Prefix list IDs are managed by AWS internally. Prefix list IDs are associated with a prefix list name, or service name, that is linked to a specific region. Prefix list IDs are exported on VPC Endpoints, so you can use this format: -``` +```hcl # ... egress { from_port = 0