Skip to main content

security_group_egresses

Creates, updates, deletes or gets a security_group_egress resource or lists security_group_egresses in a region

Overview

Namesecurity_group_egresses
TypeResource
DescriptionAdds the specified outbound (egress) rule to a security group.
An outbound rule permits instances to send traffic to the specified IPv4 or IPv6 address range, the IP addresses that are specified by a prefix list, or the instances that are associated with a destination security group. For more information, see [Security group rules](https://docs.aws.amazon.com/vpc/latest/userguide/security-group-rules.html).
You must specify exactly one of the following destinations: an IPv4 address range, an IPv6 address range, a prefix list, or a security group.
You must specify a protocol for each rule (for example, TCP). If the protocol is TCP or UDP, you must also specify a port or port range. If the protocol is ICMP or ICMPv6, you must also specify the ICMP/ICMPv6 type and code. To specify all types or all codes, use -1.
Rule changes are propagated to instances associated with the security group as quickly as possible. However, a small delay might occur.
Idawscc.ec2.security_group_egresses

Fields

NameDatatypeDescription
cidr_ipstringThe IPv4 address range, in CIDR format.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.<br />For examples of rules that you can add to security groups for specific access scenarios, see &#91;Security group rules for different use cases&#93;(https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html) in the &#42;User Guide&#42;.
cidr_ipv6stringThe IPv6 address range, in CIDR format.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.<br />For examples of rules that you can add to security groups for specific access scenarios, see &#91;Security group rules for different use cases&#93;(https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html) in the &#42;User Guide&#42;.
descriptionstringThe description of an egress (outbound) security group rule.<br />Constraints: Up to 255 characters in length. Allowed characters are a-z, A-Z, 0-9, spaces, and .&#95;-:/()#,@&#91;&#93;+=;&#123;&#125;!$&#42;
from_portintegerIf the protocol is TCP or UDP, this is the start of the port range. If the protocol is ICMP or ICMPv6, this is the ICMP type or -1 (all ICMP types).
to_portintegerIf the protocol is TCP or UDP, this is the end of the port range. If the protocol is ICMP or ICMPv6, this is the ICMP code or -1 (all ICMP codes). If the start port is -1 (all ICMP types), then the end port must be -1 (all ICMP codes).
ip_protocolstringThe IP protocol name (&#96;&#96;tcp&#96;&#96;, &#96;&#96;udp&#96;&#96;, &#96;&#96;icmp&#96;&#96;, &#96;&#96;icmpv6&#96;&#96;) or number (see &#91;Protocol Numbers&#93;(https://docs.aws.amazon.com/http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml)).<br />Use &#96;&#96;-1&#96;&#96; to specify all protocols. When authorizing security group rules, specifying &#96;&#96;-1&#96;&#96; or a protocol number other than &#96;&#96;tcp&#96;&#96;, &#96;&#96;udp&#96;&#96;, &#96;&#96;icmp&#96;&#96;, or &#96;&#96;icmpv6&#96;&#96; allows traffic on all ports, regardless of any port range you specify. For &#96;&#96;tcp&#96;&#96;, &#96;&#96;udp&#96;&#96;, and &#96;&#96;icmp&#96;&#96;, you must specify a port range. For &#96;&#96;icmpv6&#96;&#96;, the port range is optional; if you omit the port range, traffic for all types and codes is allowed.
destination_security_group_idstringThe ID of the security group.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.
idstring
destination_prefix_list_idstringThe prefix list IDs for an AWS service. This is the AWS service to access through a VPC endpoint from instances associated with the security group.<br />You must specify exactly one of the following: &#96;&#96;CidrIp&#96;&#96;, &#96;&#96;CidrIpv6&#96;&#96;, &#96;&#96;DestinationPrefixListId&#96;&#96;, or &#96;&#96;DestinationSecurityGroupId&#96;&#96;.
group_idstringThe ID of the security group. You must specify either the security group ID or the security group name in the request. For security groups in a nondefault VPC, you must specify the security group ID.
regionstringAWS region.

For more information, see AWS::EC2::SecurityGroupEgress.

Methods

NameResourceAccessible byRequired Params
create_resourcesecurity_group_egressesINSERTIpProtocol, GroupId, region
delete_resourcesecurity_group_egressesDELETEIdentifier, region
update_resourcesecurity_group_egressesUPDATEIdentifier, PatchDocument, region
list_resourcessecurity_group_egresses_list_onlySELECTregion
get_resourcesecurity_group_egressesSELECTIdentifier, region

SELECT examples

Gets all properties from an individual security_group_egress.

SELECT
region,
cidr_ip,
cidr_ipv6,
description,
from_port,
to_port,
ip_protocol,
destination_security_group_id,
id,
destination_prefix_list_id,
group_id
FROM awscc.ec2.security_group_egresses
WHERE
region = 'us-east-1' AND
Identifier = '{{ id }}';

INSERT example

Use the following StackQL query and manifest file to create a new security_group_egress resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.ec2.security_group_egresses (
IpProtocol,
GroupId,
region
)
SELECT
'{{ ip_protocol }}',
'{{ group_id }}',
'{{ region }}';

UPDATE example

Use the following StackQL query and manifest file to update a security_group_egress resource, using stack-deploy.

/*+ update */
UPDATE awscc.ec2.security_group_egresses
SET PatchDocument = string('{{ {
"Description": description
} | generate_patch_document }}')
WHERE
region = '{{ region }}' AND
Identifier = '{{ id }}';

DELETE example

/*+ delete */
DELETE FROM awscc.ec2.security_group_egresses
WHERE
Identifier = '{{ id }}' AND
region = 'us-east-1';

Permissions

To operate on the security_group_egresses resource, the following permissions are required:

ec2:DescribeSecurityGroupRules