Skip to main content

security_group_egresses

Creates, updates, deletes or gets a security_group_egress resource or lists security_group_egresses in a region

Overview

Namesecurity_group_egresses
TypeResource
DescriptionAdds the specified outbound (egress) rule to a security group.
An outbound rule permits instances to send traffic to the specified IPv4 or IPv6 address range, the IP addresses that are specified by a prefix list, or the instances that are associated with a destination security group. For more information, see [Security group rules](https://docs.aws.amazon.com/vpc/latest/userguide/security-group-rules.html).
You must specify exactly one of the following destinations: an IPv4 address range, an IPv6 address range, a prefix list, or a security group.
You must specify a protocol for each rule (for example, TCP). If the protocol is TCP or UDP, you must also specify a port or port range. If the protocol is ICMP or ICMPv6, you must also specify the ICMP/ICMPv6 type and code. To specify all types or all codes, use -1.
Rule changes are propagated to instances associated with the security group as quickly as possible. However, a small delay might occur.
Idawscc.ec2.security_group_egresses

Fields

NameDatatypeDescription
cidr_ipstringThe IPv4 address range, in CIDR format.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.<br />For examples of rules that you can add to security groups for specific access scenarios, see &#91;Security group rules for different use cases&#93;(https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html) in the &#42;User Guide&#42;.
cidr_ipv6stringThe IPv6 address range, in CIDR format.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.<br />For examples of rules that you can add to security groups for specific access scenarios, see &#91;Security group rules for different use cases&#93;(https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html) in the &#42;User Guide&#42;.
descriptionstringThe description of an egress (outbound) security group rule.<br />Constraints: Up to 255 characters in length. Allowed characters are a-z, A-Z, 0-9, spaces, and .&#95;-:/()#,@&#91;&#93;+=;&#123;&#125;!$&#42;
from_portintegerIf the protocol is TCP or UDP, this is the start of the port range. If the protocol is ICMP or ICMPv6, this is the ICMP type or -1 (all ICMP types).
to_portintegerIf the protocol is TCP or UDP, this is the end of the port range. If the protocol is ICMP or ICMPv6, this is the ICMP code or -1 (all ICMP codes). If the start port is -1 (all ICMP types), then the end port must be -1 (all ICMP codes).
ip_protocolstringThe IP protocol name (&#96;&#96;tcp&#96;&#96;, &#96;&#96;udp&#96;&#96;, &#96;&#96;icmp&#96;&#96;, &#96;&#96;icmpv6&#96;&#96;) or number (see &#91;Protocol Numbers&#93;(https://docs.aws.amazon.com/http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)).<br />Use &#96;&#96;-1&#96;&#96; to specify all protocols. When authorizing security group rules, specifying &#96;&#96;-1&#96;&#96; or a protocol number other than &#96;&#96;tcp&#96;&#96;, &#96;&#96;udp&#96;&#96;, &#96;&#96;icmp&#96;&#96;, or &#96;&#96;icmpv6&#96;&#96; allows traffic on all ports, regardless of any port range you specify. For &#96;&#96;tcp&#96;&#96;, &#96;&#96;udp&#96;&#96;, and &#96;&#96;icmp&#96;&#96;, you must specify a port range. For &#96;&#96;icmpv6&#96;&#96;, the port range is optional; if you omit the port range, traffic for all types and codes is allowed.
destination_security_group_idstringThe ID of the security group.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.
idstring
destination_prefix_list_idstringThe prefix list IDs for an AWS service. This is the AWS service to access through a VPC endpoint from instances associated with the security group.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.
group_idstringThe ID of the security group. You must specify either the security group ID or the security group name in the request. For security groups in a nondefault VPC, you must specify the security group ID.
regionstringAWS region.

For more information, see AWS::EC2::SecurityGroupEgress.

Methods

NameAccessible byRequired Params
create_resourceINSERTIpProtocol, GroupId, region
delete_resourceDELETEdata__Identifier, region
update_resourceUPDATEdata__Identifier, data__PatchDocument, region
list_resourcesSELECTregion
get_resourceSELECTdata__Identifier, region

SELECT examples

Gets all properties from an individual security_group_egress.

SELECT
region,
cidr_ip,
cidr_ipv6,
description,
from_port,
to_port,
ip_protocol,
destination_security_group_id,
id,
destination_prefix_list_id,
group_id
FROM awscc.ec2.security_group_egresses
WHERE region = 'us-east-1' AND data__Identifier = '<Id>';

INSERT example

Use the following StackQL query and manifest file to create a new security_group_egress resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.ec2.security_group_egresses (
IpProtocol,
GroupId,
region
)
SELECT
'{{ IpProtocol }}',
'{{ GroupId }}',
'{{ region }}';

DELETE example

/*+ delete */
DELETE FROM awscc.ec2.security_group_egresses
WHERE data__Identifier = '<Id>'
AND region = 'us-east-1';

Permissions

To operate on the security_group_egresses resource, the following permissions are required:

Read

ec2:DescribeSecurityGroupRules

Create

ec2:AuthorizeSecurityGroupEgress,
ec2:RevokeSecurityGroupEgress,
ec2:DescribeSecurityGroupRules

Update

ec2:UpdateSecurityGroupRuleDescriptionsEgress

List

ec2:DescribeSecurityGroupRules

Delete

ec2:RevokeSecurityGroupEgress,
ec2:DescribeSecurityGroupRules