salt.states.neutron_secgroup_rule

Management of OpenStack Neutron Security Group Rules

New in version 2018.3.0.

depends

shade

configuration

see salt.modules.neutronng for setup instructions

Example States

create security group rule:
  neutron_secgroup_rule.present:
    - name: security_group1
    - project_name: Project1
    - protocol: icmp

delete security group:
  neutron_secgroup_rule.absent:
    - name_or_id: security_group1

create security group with optional params:
  neutron_secgroup_rule.present:
    - name: security_group1
    - description: "Very Secure Security Group"
    - project_id: 1dcac318a83b4610b7a7f7ba01465548
salt.states.neutron_secgroup_rule.absent(name, auth=None, **kwargs)

Ensure a security group rule does not exist

name

name or id of the security group rule to delete

rule_id

uuid of the rule to delete

project_id

id of project to delete rule from

salt.states.neutron_secgroup_rule.present(name, auth=None, **kwargs)

Ensure a security group rule exists

defaults: port_range_min=None, port_range_max=None, protocol=None,

remote_ip_prefix=None, remote_group_id=None, direction='ingress', ethertype='IPv4', project_id=None

name

Name of the security group to associate with this rule

project_name

Name of the project associated with the security group

protocol

The protocol that is matched by the security group rule. Valid values are None, tcp, udp, and icmp.

Docs for previous releases are available on readthedocs.org.

Latest Salt release: 3004

Table of Contents

Previous topic

salt.states.neutron_secgroup

Next topic

salt.states.neutron_subnet