salt.states.neutron_secgroup_rule

Management of OpenStack Neutron Security Group Rules

New in version 2018.3.0.

depends:shade
configuration:see salt.modules.neutronng for setup instructions

Example States

create security group rule:
  neutron_secgroup_rule.present:
    - name: security_group1
    - project_name: Project1
    - protocol: icmp

delete security group:
  neutron_secgroup_rule.absent:
    - name_or_id: security_group1

create security group with optional params:
  neutron_secgroup_rule.present:
    - name: security_group1
    - description: "Very Secure Security Group"
    - project_id: 1dcac318a83b4610b7a7f7ba01465548
salt.states.neutron_secgroup_rule.absent(name, auth=None, **kwargs)

Ensure a security group rule does not exist

name
name or id of the security group rule to delete
rule_id
uuid of the rule to delete
project_id
id of project to delete rule from
salt.states.neutron_secgroup_rule.present(name, auth=None, **kwargs)

Ensure a security group rule exists

defaults: port_range_min=None, port_range_max=None, protocol=None,
remote_ip_prefix=None, remote_group_id=None, direction=’ingress’, ethertype=’IPv4’, project_id=None
name
Name of the security group to associate with this rule
project_name
Name of the project associated with the security group
protocol
The protocol that is matched by the security group rule. Valid values are None, tcp, udp, and icmp.

Docs for previous releases are available on readthedocs.org.

Latest Salt release: 2018.3.3

Table of Contents

Previous topic

salt.states.neutron_secgroup

Next topic

salt.states.neutron_subnet