@@ -29,41 +29,41 @@ resource "aquasec_service" "example_service" {
2929 name = "policy1"
3030 type = "access.control"
3131 description = "Local policy 1 for inbound and outbound control"
32-
32+
3333 inbound_networks {
34- port_range = "22/22" # Allow SSH traffic
35- resource_type = "anywhere" # Allow from any source
36- allow = true # Permit traffic
34+ port_range = "22/22" # Allow SSH traffic
35+ resource_type = "anywhere" # Allow from any source
36+ allow = true # Permit traffic
3737 }
38-
38+
3939 outbound_networks {
40- port_range = "80/80" # Allow HTTP traffic
41- resource_type = "anywhere" # Allow to any destination
42- allow = true # Permit traffic
40+ port_range = "80/80" # Allow HTTP traffic
41+ resource_type = "anywhere" # Allow to any destination
42+ allow = true # Permit traffic
4343 }
4444
45- block_metadata_service = false # Do not block metadata service
45+ block_metadata_service = false # Do not block metadata service
4646 }
4747
4848 // Local policy 2
4949 local_policies {
5050 name = "policy2"
5151 type = "access.control"
5252 description = "Local policy 2 with stricter outbound control"
53-
53+
5454 inbound_networks {
55- port_range = "443/443" # Allow HTTPS traffic
56- resource_type = "anywhere" # Allow from any source
57- allow = true # Permit traffic
55+ port_range = "443/443" # Allow HTTPS traffic
56+ resource_type = "anywhere" # Allow from any source
57+ allow = true # Permit traffic
5858 }
5959
6060 outbound_networks {
61- port_range = "8080/8080" # Allow specific application traffic
62- resource_type = "specific" # Allow only to specific destinations
63- allow = false # Block traffic to unspecified destinations
61+ port_range = "8080/8080" # Allow specific application traffic
62+ resource_type = "specific" # Allow only to specific destinations
63+ allow = false # Block traffic to unspecified destinations
6464 }
6565
66- block_metadata_service = true # Block metadata service access for security
66+ block_metadata_service = true # Block metadata service access for security
6767 }
6868}
6969```
@@ -129,8 +129,11 @@ Required:
129129
130130- ` allow ` (Boolean) Whether the inbound network rule is allowed.
131131- ` port_range ` (String) The port range for the inbound network rule.
132+ - ` resource ` (String) Custom ip for the inbound network rule (e.g., 190.1.2.3/12).
132133- ` resource_type ` (String) The resource type for the inbound network rule (e.g., anywhere).
133-
134+ * "anywhere" (equivalent to Anywhere in the UI)
135+ * "custom" (equivalent to Custom IP in the UI)
136+ * "application" (equivalent to Service in the UI)
134137
135138<a id =" nestedblock--local_policies--outbound_networks " ></a >
136139### Nested Schema for ` local_policies.outbound_networks `
@@ -139,9 +142,12 @@ Required:
139142
140143- ` allow ` (Boolean) Whether the outbound network rule is allowed.
141144- ` port_range ` (String) The port range for the outbound network rule.
145+ - ` resource ` (String) Custom ip for the outbound network rule (e.g., 190.1.2.3/12).
142146- ` resource_type ` (String) The resource type for the outbound network rule (e.g., anywhere).
143-
144-
147+ * "anywhere" (equivalent to Anywhere in the UI)
148+ * "custom" (equivalent to Custom IP in the UI)
149+ * "application" (equivalent to Service in the UI)
150+ * "domain" (equivalent to Domain in the UI)
145151
146152<a id =" nestedblock--scope_variables " ></a >
147153### Nested Schema for ` scope_variables `
0 commit comments