ngine_io.cloudstack.cs_firewall module – Manages firewall rules on Apache CloudStack based clouds.
Note
This module is part of the ngine_io.cloudstack collection (version 2.5.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install ngine_io.cloudstack
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: ngine_io.cloudstack.cs_firewall
.
New in ngine_io.cloudstack 0.1.0
Synopsis
Creates and removes firewall rules.
Requirements
The below requirements are needed on the host that executes this module.
python >= 2.6
cs >= 0.9.0
Parameters
Parameter |
Comments |
---|---|
Account the firewall rule is related to. |
|
HTTP method used to query the API endpoint. If not given, the Choices:
|
|
API key of the CloudStack API. If not given, the |
|
Secret key of the CloudStack API. If not set, the |
|
HTTP timeout in seconds. If not given, the Default: |
|
URL of the CloudStack API e.g. https://cloud.example.com/client/api. If not given, the |
|
Verify CA authority cert file. If not given, the |
|
List of CIDRs (full notation) to be used for firewall rule. Since version 2.5, it is a list of CIDR. Default: |
|
Domain the firewall rule is related to. |
|
End port for this rule. Considered if protocol=tcp or protocol=udp. If not specified, equal start_port. |
|
Error code for this icmp message. Considered if protocol=icmp. |
|
Type of the icmp message being sent. Considered if protocol=icmp. |
|
Public IP address the ingress rule is assigned to. Required if type=ingress. |
|
Network the egress rule is related to. Required if type=egress. |
|
Poll async jobs until job has finished. Choices:
|
|
Name of the project the firewall rule is related to. |
|
Protocol of the firewall rule.
Choices:
|
|
Start port for this rule. Considered if protocol=tcp or protocol=udp. |
|
State of the firewall rule. Choices:
|
|
List of tags. Tags are a list of dictionaries having keys key and value. To delete all tags, set an empty list e.g. tags: []. |
|
Type of the firewall rule. Choices:
|
|
If If not given, the This should only be used on personally controlled sites using self-signed certificates. Choices:
|
|
Name of the zone in which the virtual machine is in. |
Notes
Note
A detailed guide about cloudstack modules can be found in the CloudStack Cloud Guide.
This module supports check mode.
Examples
- name: Allow inbound port 80/tcp from 1.2.3.4 to 4.3.2.1
ngine_io.cloudstack.cs_firewall:
ip_address: 4.3.2.1
zone: zone01
port: 80
cidr: 1.2.3.4/32
- name: Allow inbound tcp/udp port 53 to 4.3.2.1
ngine_io.cloudstack.cs_firewall:
ip_address: 4.3.2.1
zone: zone01
port: 53
protocol: '{{ item }}'
with_items:
- tcp
- udp
- name: Ensure firewall rule is removed
ngine_io.cloudstack.cs_firewall:
ip_address: 4.3.2.1
zone: zone01
start_port: 8000
end_port: 8888
cidr: 17.0.0.0/8
state: absent
- name: Allow all outbound traffic
ngine_io.cloudstack.cs_firewall:
network: my_network
zone: zone01
type: egress
protocol: all
- name: Allow only HTTP outbound traffic for an IP
ngine_io.cloudstack.cs_firewall:
network: my_network
zone: zone01
type: egress
port: 80
cidr: 10.101.1.20
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
CIDR string of the rule. Returned: success Sample: |
|
CIDR list of the rule. Returned: success Sample: |
|
End port of the rule. Returned: success Sample: |
|
ICMP code of the rule. Returned: success Sample: |
|
ICMP type of the rule. Returned: success Sample: |
|
UUID of the rule. Returned: success Sample: |
|
IP address of the rule if Returned: success Sample: |
|
Name of the network if Returned: success Sample: |
|
Protocol of the rule. Returned: success Sample: |
|
Start port of the rule. Returned: success Sample: |
|
Type of the rule. Returned: success Sample: |