diff --git a/website/source/docs/providers/aws/r/security_group_rule.html.markdown b/website/source/docs/providers/aws/r/security_group_rule.html.markdown index 76b4db2ba..dd36c0731 100644 --- a/website/source/docs/providers/aws/r/security_group_rule.html.markdown +++ b/website/source/docs/providers/aws/r/security_group_rule.html.markdown @@ -31,7 +31,6 @@ resource "aws_security_group_rule" "allow_all" { cidr_blocks = ["0.0.0.0/0"] security_group_id = "sg-123456" - source_security_group_id = "sg-654321" } ``` @@ -41,12 +40,12 @@ The following arguments are supported: * `type` - (Required) The type of rule being created. Valid options are `ingress` (inbound) or `egress` (outbound). -* `cidr_blocks` - (Optional) List of CIDR blocks. +* `cidr_blocks` - (Optional) List of CIDR blocks. Cannot be specified with `source_security_group_id`. * `from_port` - (Required) The start port (or ICMP type number if protocol is "icmp"). * `protocol` - (Required) The protocol. * `security_group_id` - (Required) The security group to apply this rule to. * `source_security_group_id` - (Optional) The security group id to allow access to/from, - depending on the `type`. + depending on the `type`. Cannot be specified with `cidr_blocks`. * `self` - (Optional) If true, the security group itself will be added as a source to this ingress rule. * `to_port` - (Required) The end range port.