ngine_io.cloudstack.cs_firewall – Manages firewall rules on Apache CloudStack based clouds.
Note
This plugin is part of the ngine_io.cloudstack collection (version 2.2.2).
You might already have this collection installed if you are using the ansible package. It is not included in ansible-core. To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install ngine_io.cloudstack.
To use it in a playbook, specify: ngine_io.cloudstack.cs_firewall.
New in version 0.1.0: of ngine_io.cloudstack
Synopsis
- Creates and removes firewall rules.
Requirements
The below requirements are needed on the host that executes this module.
- python >= 2.6
- cs >= 0.9.0
Parameters
| Parameter | Choices/Defaults | Comments |
|---|---|---|
| account string | Account the firewall rule is related to. | |
| api_http_method string |
| HTTP method used to query the API endpoint. If not given, the CLOUDSTACK_METHOD env variable is considered. |
| api_key string / required | API key of the CloudStack API. If not given, the CLOUDSTACK_KEY env variable is considered. | |
| api_secret string / required | Secret key of the CloudStack API. If not set, the CLOUDSTACK_SECRET env variable is considered. | |
| api_timeout integer | Default: 10 | HTTP timeout in seconds. If not given, the CLOUDSTACK_TIMEOUT env variable is considered. |
| api_url string / required | URL of the CloudStack API e.g. https://cloud.example.com/client/api. If not given, the CLOUDSTACK_ENDPOINT env variable is considered. | |
| api_verify_ssl_cert string | Verify CA authority cert file. If not given, the CLOUDSTACK_VERIFY env variable is considered. | |
| cidrs list / elements=string | Default: "0.0.0.0/0" | List of CIDRs (full notation) to be used for firewall rule. Since version 2.5, it is a list of CIDR. aliases: cidr |
| domain string | Domain the firewall rule is related to. | |
| end_port integer | End port for this rule. Considered if protocol=tcp or protocol=udp. If not specified, equal start_port. | |
| icmp_code integer | Error code for this icmp message. Considered if protocol=icmp. | |
| icmp_type integer | Type of the icmp message being sent. Considered if protocol=icmp. | |
| ip_address string | Public IP address the ingress rule is assigned to. Required if type=ingress. | |
| network string | Network the egress rule is related to. Required if type=egress. | |
| poll_async boolean |
| Poll async jobs until job has finished. |
| project string | Name of the project the firewall rule is related to. | |
| protocol string |
| Protocol of the firewall rule. all is only available if type=egress. |
| start_port integer | Start port for this rule. Considered if protocol=tcp or protocol=udp. aliases: port | |
| state string |
| State of the firewall rule. |
| tags list / elements=dictionary | List of tags. Tags are a list of dictionaries having keys key and value. To delete all tags, set an empty list e.g. tags: []. aliases: tag | |
| type string |
| Type of the firewall rule. |
| zone string / required | Name of the zone in which the virtual machine is in. |
Notes
Note
- A detailed guide about cloudstack modules can be found in the CloudStack Cloud Guide.
- This module supports check mode.
Examples
- name: Allow inbound port 80/tcp from 1.2.3.4 to 4.3.2.1
ngine_io.cloudstack.cs_firewall:
ip_address: 4.3.2.1
zone: zone01
port: 80
cidr: 1.2.3.4/32
- name: Allow inbound tcp/udp port 53 to 4.3.2.1
ngine_io.cloudstack.cs_firewall:
ip_address: 4.3.2.1
zone: zone01
port: 53
protocol: '{{ item }}'
with_items:
- tcp
- udp
- name: Ensure firewall rule is removed
ngine_io.cloudstack.cs_firewall:
ip_address: 4.3.2.1
zone: zone01
start_port: 8000
end_port: 8888
cidr: 17.0.0.0/8
state: absent
- name: Allow all outbound traffic
ngine_io.cloudstack.cs_firewall:
network: my_network
zone: zone01
type: egress
protocol: all
- name: Allow only HTTP outbound traffic for an IP
ngine_io.cloudstack.cs_firewall:
network: my_network
zone: zone01
type: egress
port: 80
cidr: 10.101.1.20
Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Returned | Description |
|---|---|---|
| cidr string | success | CIDR string of the rule. Sample: 0.0.0.0/0 |
| cidrs list / elements=string | success | CIDR list of the rule. Sample: ['0.0.0.0/0'] |
| end_port integer | success | End port of the rule. Sample: 80 |
| icmp_code integer | success | ICMP code of the rule. Sample: 1 |
| icmp_type integer | success | ICMP type of the rule. Sample: 1 |
| id string | success | UUID of the rule. Sample: 04589590-ac63-4ffc-93f5-b698b8ac38b6 |
| ip_address string | success | IP address of the rule if type=ingress
Sample: 10.100.212.10 |
| network string | success | Name of the network if type=egress
Sample: my_network |
| protocol string | success | Protocol of the rule. Sample: tcp |
| start_port integer | success | Start port of the rule. Sample: 80 |
| type string | success | Type of the rule. Sample: ingress |
Authors
- René Moser (@resmo)
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/ngine_io/cloudstack/cs_firewall_module.html