sec group and sec group rule docs

This commit is contained in:
Jon Perritt 2015-01-08 14:11:58 -07:00
parent d7560de2dd
commit fc344e9060
3 changed files with 106 additions and 0 deletions

View File

@ -0,0 +1,37 @@
---
layout: "openstack"
page_title: "OpenStack: openstack_compute_secgroup"
sidebar_current: "docs-openstack-resource-compute-secgroup"
description: |-
Manages a security group resource within OpenStack.
---
# openstack\_compute\_secgroup
Manages a security group resource within OpenStack.
## Example Usage
```
resource "openstack_compute_secgroup" "secgroup_1" {
name = "my_secgroup"
description = "my security group"
}
```
## Argument Reference
The following arguments are supported:
* `name` - (Required) A unique name for the security group. Changing this
updates the `name` of an existing security group.
* `description` - (Required) A description for the security group. Changing this
updates the `description` of an existing security group.
## Attributes Reference
The following attributes are exported:
* `name` - See Argument Reference above.
* `description` - See Argument Reference above.

View File

@ -0,0 +1,63 @@
---
layout: "openstack"
page_title: "OpenStack: openstack_compute_secgrouprule"
sidebar_current: "docs-openstack-resource-compute-secgrouprule"
description: |-
Manages a security group rule resource within OpenStack.
---
# openstack\_compute\_secgrouprule
Manages a security group rule resource within OpenStack.
## Example Usage
```
resource "openstack_compute_secgroup" "secgroup_1" {
name = "my_secgroup"
description = "my security group"
}
resource "openstack_compute_secgrouprule" "secgrouprule_1" {
group_id = "${openstack_compute_secgroup.secgroup_1.id}"
from_port = 22
to_port = 22
ip_protocol = "TCP"
cidr = "0.0.0.0/0"
}
```
## Argument Reference
The following arguments are supported:
* `group_id` - (Required) The ID of the group to which this rule will be added.
Changing this creates a new security group rule.
* `from_port` - (Required) An integer representing the lower bound of the port
range to open. Changing this creates a new security group rule.
* `to_port` - (Required) An integer representing the upper bound of the port
range to open. Changing this creates a new security group rule.
* `ip_protocol` - (Required) The protocol type that will be allowed. Changing
this creates a new security group rule.
* `cidr` - (Optional) Required is `from_group_id` is empty. The IP range that
will be the source of network traffic to the security group. Use 0.0.0.0./0
to allow all IP addresses. Changing this creates a new security group rule.
* `from_group_id - (Optional) Required is `cidr` is empty. The ID of a group
from which to forward traffic to the parent group. Changing
this creates a new security group rule.
## Attributes Reference
The following attributes are exported:
* `group_id` - See Argument Reference above.
* `from_port` - See Argument Reference above.
* `to_port` - See Argument Reference above.
* `ip_protocol` - See Argument Reference above.
* `cidr` - See Argument Reference above.
* `from_group_id` - See Argument Reference above.

View File

@ -19,6 +19,12 @@
<li<%= sidebar_current("docs-openstack-resource-compute-keypair") %>> <li<%= sidebar_current("docs-openstack-resource-compute-keypair") %>>
<a href="/docs/providers/openstack/r/compute_keypair.html">openstack_compute_keypair</a> <a href="/docs/providers/openstack/r/compute_keypair.html">openstack_compute_keypair</a>
</li> </li>
<li<%= sidebar_current("docs-openstack-resource-compute-secgroup") %>>
<a href="/docs/providers/openstack/r/compute_secgroup.html">openstack_compute_keypair</a>
</li>
<li<%= sidebar_current("docs-openstack-resource-compute-secgrouprule") %>>
<a href="/docs/providers/openstack/r/compute_secgrouprule.html">openstack_compute_keypair</a>
</li>
</ul> </ul>
</li> </li>
</ul> </ul>