FirewallPolicyRuleGroup

Rule Group resource. API Version: 2020-04-01.

Example Usage

Create FirewallPolicyRuleGroup

using System.Collections.Generic;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var firewallPolicyRuleGroup = new AzureNative.Network.FirewallPolicyRuleGroup("firewallPolicyRuleGroup", new()
{
FirewallPolicyName = "firewallPolicy",
Priority = 110,
ResourceGroupName = "rg1",
RuleGroupName = "ruleGroup1",
Rules = new[]
{
new AzureNative.Network.Inputs.FirewallPolicyFilterRuleArgs
{
Action = new AzureNative.Network.Inputs.FirewallPolicyFilterRuleActionArgs
{
Type = "Deny",
},
Name = "Example-Filter-Rule",
RuleConditions = new[]
{
new AzureNative.Network.Inputs.NetworkRuleConditionArgs
{
DestinationAddresses = new[]
{
"*",
},
DestinationPorts = new[]
{
"*",
},
IpProtocols = new[]
{
"TCP",
},
Name = "network-condition1",
RuleConditionType = "NetworkRuleCondition",
SourceAddresses = new[]
{
"10.1.25.0/24",
},
},
},
RuleType = "FirewallPolicyFilterRule",
},
},
});
});
package main
import (
network "github.com/pulumi/pulumi-azure-native/sdk/go/azure/network"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := network.NewFirewallPolicyRuleGroup(ctx, "firewallPolicyRuleGroup", &network.FirewallPolicyRuleGroupArgs{
FirewallPolicyName: pulumi.String("firewallPolicy"),
Priority: pulumi.Int(110),
ResourceGroupName: pulumi.String("rg1"),
RuleGroupName: pulumi.String("ruleGroup1"),
Rules: pulumi.AnyArray{
network.FirewallPolicyFilterRule{
Action: network.FirewallPolicyFilterRuleAction{
Type: "Deny",
},
Name: "Example-Filter-Rule",
RuleConditions: []interface{}{
network.NetworkRuleCondition{
DestinationAddresses: []string{
"*",
},
DestinationPorts: []string{
"*",
},
IpProtocols: []network.FirewallPolicyRuleConditionNetworkProtocol{
"TCP",
},
Name: "network-condition1",
RuleConditionType: "NetworkRuleCondition",
SourceAddresses: []string{
"10.1.25.0/24",
},
},
},
RuleType: "FirewallPolicyFilterRule",
},
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.network.FirewallPolicyRuleGroup;
import com.pulumi.azurenative.network.FirewallPolicyRuleGroupArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var firewallPolicyRuleGroup = new FirewallPolicyRuleGroup("firewallPolicyRuleGroup", FirewallPolicyRuleGroupArgs.builder()
.firewallPolicyName("firewallPolicy")
.priority(110)
.resourceGroupName("rg1")
.ruleGroupName("ruleGroup1")
.rules(Map.ofEntries(
Map.entry("action", Map.of("type", "Deny")),
Map.entry("name", "Example-Filter-Rule"),
Map.entry("ruleConditions", Map.ofEntries(
Map.entry("destinationAddresses", "*"),
Map.entry("destinationPorts", "*"),
Map.entry("ipProtocols", "TCP"),
Map.entry("name", "network-condition1"),
Map.entry("ruleConditionType", "NetworkRuleCondition"),
Map.entry("sourceAddresses", "10.1.25.0/24")
)),
Map.entry("ruleType", "FirewallPolicyFilterRule")
))
.build());
}
}

Create FirewallPolicyRuleGroup With IpGroups

using System.Collections.Generic;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var firewallPolicyRuleGroup = new AzureNative.Network.FirewallPolicyRuleGroup("firewallPolicyRuleGroup", new()
{
FirewallPolicyName = "firewallPolicy",
Priority = 110,
ResourceGroupName = "rg1",
RuleGroupName = "ruleGroup1",
Rules = new[]
{
new AzureNative.Network.Inputs.FirewallPolicyFilterRuleArgs
{
Action = new AzureNative.Network.Inputs.FirewallPolicyFilterRuleActionArgs
{
Type = "Deny",
},
Name = "Example-Filter-Rule",
RuleConditions = new[]
{
new AzureNative.Network.Inputs.NetworkRuleConditionArgs
{
DestinationIpGroups = new[]
{
"/subscriptions/subid/providers/Microsoft.Network/resourceGroup/rg1/ipGroups/ipGroups2",
},
DestinationPorts = new[]
{
"*",
},
IpProtocols = new[]
{
"TCP",
},
Name = "network-condition1",
RuleConditionType = "NetworkRuleCondition",
SourceIpGroups = new[]
{
"/subscriptions/subid/providers/Microsoft.Network/resourceGroup/rg1/ipGroups/ipGroups1",
},
},
},
RuleType = "FirewallPolicyFilterRule",
},
},
});
});
package main
import (
network "github.com/pulumi/pulumi-azure-native/sdk/go/azure/network"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := network.NewFirewallPolicyRuleGroup(ctx, "firewallPolicyRuleGroup", &network.FirewallPolicyRuleGroupArgs{
FirewallPolicyName: pulumi.String("firewallPolicy"),
Priority: pulumi.Int(110),
ResourceGroupName: pulumi.String("rg1"),
RuleGroupName: pulumi.String("ruleGroup1"),
Rules: pulumi.AnyArray{
network.FirewallPolicyFilterRule{
Action: network.FirewallPolicyFilterRuleAction{
Type: "Deny",
},
Name: "Example-Filter-Rule",
RuleConditions: []interface{}{
network.NetworkRuleCondition{
DestinationIpGroups: []string{
"/subscriptions/subid/providers/Microsoft.Network/resourceGroup/rg1/ipGroups/ipGroups2",
},
DestinationPorts: []string{
"*",
},
IpProtocols: []network.FirewallPolicyRuleConditionNetworkProtocol{
"TCP",
},
Name: "network-condition1",
RuleConditionType: "NetworkRuleCondition",
SourceIpGroups: []string{
"/subscriptions/subid/providers/Microsoft.Network/resourceGroup/rg1/ipGroups/ipGroups1",
},
},
},
RuleType: "FirewallPolicyFilterRule",
},
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.network.FirewallPolicyRuleGroup;
import com.pulumi.azurenative.network.FirewallPolicyRuleGroupArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var firewallPolicyRuleGroup = new FirewallPolicyRuleGroup("firewallPolicyRuleGroup", FirewallPolicyRuleGroupArgs.builder()
.firewallPolicyName("firewallPolicy")
.priority(110)
.resourceGroupName("rg1")
.ruleGroupName("ruleGroup1")
.rules(Map.ofEntries(
Map.entry("action", Map.of("type", "Deny")),
Map.entry("name", "Example-Filter-Rule"),
Map.entry("ruleConditions", Map.ofEntries(
Map.entry("destinationIpGroups", "/subscriptions/subid/providers/Microsoft.Network/resourceGroup/rg1/ipGroups/ipGroups2"),
Map.entry("destinationPorts", "*"),
Map.entry("ipProtocols", "TCP"),
Map.entry("name", "network-condition1"),
Map.entry("ruleConditionType", "NetworkRuleCondition"),
Map.entry("sourceIpGroups", "/subscriptions/subid/providers/Microsoft.Network/resourceGroup/rg1/ipGroups/ipGroups1")
)),
Map.entry("ruleType", "FirewallPolicyFilterRule")
))
.build());
}
}

Import

An existing resource can be imported using its type token, name, and identifier, e.g.

$ pulumi import azure-native:network:FirewallPolicyRuleGroup ruleGroup1 /subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/firewallPolicies/firewallPolicy/ruleGroups/ruleGroup1

Properties

Link copied to clipboard
val etag: Output<String>

A unique read-only string that changes whenever the resource is updated.

Link copied to clipboard
val id: Output<String>
Link copied to clipboard
val name: Output<String>?

The name of the resource that is unique within a resource group. This name can be used to access the resource.

Link copied to clipboard
val priority: Output<Int>?

Priority of the Firewall Policy Rule Group resource.

Link copied to clipboard

The provisioning state of the firewall policy rule group resource.

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard

Group of Firewall Policy rules.

Link copied to clipboard
val type: Output<String>

Rule Group type.

Link copied to clipboard
val urn: Output<String>