On this page
ngine_io.cloudstack.cs_network_acl_rule – Manages network access control list (ACL) rules on Apache CloudStack based clouds.
Note
This plugin is part of the ngine_io.cloudstack collection (version 2.2.2).
You might already have this collection installed if you are using the ansible
package. It is not included in ansible-core
. To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install ngine_io.cloudstack
.
To use it in a playbook, specify: ngine_io.cloudstack.cs_network_acl_rule
.
New in version 0.1.0: of ngine_io.cloudstack
Synopsis
- Add, update and remove network ACL rules.
Requirements
The below requirements are needed on the host that executes this module.
- python >= 2.6
- cs >= 0.9.0
Parameters
Parameter | Choices/Defaults | Comments |
---|---|---|
account
string
|
Account the VPC is related to.
|
|
action_policy
string
|
|
Action policy of the rule.
aliases: action |
api_http_method
string
|
|
HTTP method used to query the API endpoint.
If not given, the CLOUDSTACK_METHOD env variable is considered.
|
api_key
string / required
|
API key of the CloudStack API.
If not given, the CLOUDSTACK_KEY env variable is considered.
|
|
api_secret
string / required
|
Secret key of the CloudStack API.
If not set, the CLOUDSTACK_SECRET env variable is considered.
|
|
api_timeout
integer
|
Default:
10
|
HTTP timeout in seconds.
If not given, the CLOUDSTACK_TIMEOUT env variable is considered.
|
api_url
string / required
|
URL of the CloudStack API e.g. https://cloud.example.com/client/api.
If not given, the CLOUDSTACK_ENDPOINT env variable is considered.
|
|
api_verify_ssl_cert
string
|
Verify CA authority cert file.
If not given, the CLOUDSTACK_VERIFY env variable is considered.
|
|
cidrs
list / elements=string
|
Default:
["0.0.0.0/0"]
|
CIDRs of the rule.
aliases: cidr |
domain
string
|
Domain the VPC is related to.
|
|
end_port
integer
|
End port for this rule.
Considered if protocol=tcp or protocol=udp.
If not specified, equal start_port.
|
|
icmp_code
integer
|
Error code for this icmp message.
Considered if protocol=icmp.
|
|
icmp_type
integer
|
Type of the icmp message being sent.
Considered if protocol=icmp.
|
|
network_acl
string / required
|
Name of the network ACL.
aliases: acl |
|
poll_async
boolean
|
|
Poll async jobs until job has finished.
|
project
string
|
Name of the project the VPC is related to.
|
|
protocol
string
|
|
Protocol of the rule
|
protocol_number
integer
|
Protocol number from 1 to 256 required if protocol=by_number.
|
|
rule_position
integer / required
|
The position of the network ACL rule.
aliases: number |
|
start_port
integer
|
Start port for this rule.
Considered if protocol=tcp or protocol=udp.
aliases: port |
|
state
string
|
|
State of the network ACL rule.
|
tags
list / elements=dictionary
|
List of tags. Tags are a list of dictionaries having keys key and value.
If you want to delete all tags, set a empty list e.g. tags: [].
aliases: tag |
|
traffic_type
string
|
|
Traffic type of the rule.
aliases: type |
vpc
string / required
|
VPC the network ACL is related to.
|
|
zone
string / required
|
Name of the zone the VPC related to.
|
Notes
Note
- A detailed guide about cloudstack modules can be found in the CloudStack Cloud Guide.
- This module supports check mode.
Examples
- name: create a network ACL rule, allow port 80 ingress
ngine_io.cloudstack.cs_network_acl_rule:
network_acl: web
rule_position: 1
vpc: my vpc
zone: zone01
traffic_type: ingress
action_policy: allow
port: 80
cidr: 0.0.0.0/0
- name: create a network ACL rule, deny port range 8000-9000 ingress for 10.20.0.0/16 and 10.22.0.0/16
ngine_io.cloudstack.cs_network_acl_rule:
network_acl: web
rule_position: 1
vpc: my vpc
zone: zone01
traffic_type: ingress
action_policy: deny
start_port: 8000
end_port: 9000
cidrs:
- 10.20.0.0/16
- 10.22.0.0/16
- name: remove a network ACL rule
ngine_io.cloudstack.cs_network_acl_rule:
network_acl: web
rule_position: 1
vpc: my vpc
zone: zone01
state: absent
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
account
string
|
success |
Account the network ACL rule is related to.
Sample:
example account
|
action_policy
string
|
success |
Action policy of the network ACL rule.
Sample:
deny
|
cidr
string
|
success |
CIDR of the network ACL rule.
Sample:
0.0.0.0/0
|
cidrs
list / elements=string
|
success |
CIDRs of the network ACL rule.
Sample:
['0.0.0.0/0']
|
domain
string
|
success |
Domain the network ACL rule is related to.
Sample:
example domain
|
end_port
integer
|
success |
End port of the network ACL rule.
Sample:
80
|
icmp_code
integer
|
success |
ICMP code of the network ACL rule.
Sample:
8
|
icmp_type
integer
|
success |
ICMP type of the network ACL rule.
|
network_acl
string
|
success |
Name of the network ACL.
Sample:
customer acl
|
project
string
|
success |
Name of project the network ACL rule is related to.
Sample:
Production
|
protocol
string
|
success |
Protocol of the network ACL rule.
Sample:
tcp
|
protocol_number
integer
|
success |
Protocol number in case protocol is by number.
Sample:
8
|
rule_position
integer
|
success |
Position of the network ACL rule.
Sample:
1
|
start_port
integer
|
success |
Start port of the network ACL rule.
Sample:
80
|
state
string
|
success |
State of the network ACL rule.
Sample:
Active
|
tags
list / elements=string
|
success |
List of resource tags associated with the network ACL rule.
Sample:
[ { "key": "foo", "value": "bar" } ]
|
traffic_type
string
|
success |
Traffic type of the network ACL rule.
Sample:
ingress
|
vpc
string
|
success |
VPC of the network ACL.
Sample:
customer vpc
|
zone
string
|
success |
Zone the VPC is related to.
Sample:
ch-gva-2
|
Authors
- René Moser (@resmo)
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/ngine_io/cloudstack/cs_network_acl_rule_module.html