Add a new rule to an existing security group.
API key for authentication. Make sure to include the word apikey, followed by a single space and then your token.
Example: apikey 1234$abcdef
Project ID
Region ID
Security group ID
Rule description
255Ingress or egress, which is the direction in which the security group is applied
egress, ingress Ether type
IPv4, IPv6 The maximum port number in the range that is matched by the security group rule
0 <= x <= 6553580
The minimum port number in the range that is matched by the security group rule
0 <= x <= 6553580
Protocol
ah, any, dccp, egp, esp, gre, icmp, igmp, ipencap, ipip, ipv6-encap, ipv6-frag, ipv6-icmp, ipv6-nonxt, ipv6-opts, ipv6-route, ospf, pgm, rsvp, sctp, tcp, udp, udplite, vrrp The remote group UUID to associate with this security group
The remote IP prefix that is matched by this security group rule
"10.0.0.0/8"
Created rule details
Datetime when the rule was created
Ingress or egress, which is the direction in which the security group rule is applied
egress, ingress The ID of the security group rule
The revision number of the resource
The security group ID to associate with this security group rule
Datetime when the rule was last updated
Rule description
"Some description"
Must be IPv4 or IPv6, and addresses represented in CIDR must match the ingress or egress rules.
IPv4, IPv6 "IPv4"
The maximum port number in the range that is matched by the security group rule
0 <= x <= 6553580
The minimum port number in the range that is matched by the security group rule
0 <= x <= 6553580
Protocol
ah, any, dccp, egp, esp, gre, icmp, igmp, ipencap, ipip, ipv6-encap, ipv6-frag, ipv6-icmp, ipv6-nonxt, ipv6-opts, ipv6-route, ospf, pgm, rsvp, sctp, tcp, udp, udplite, vrrp "tcp"
The remote group UUID to associate with this security group rule
The remote IP prefix that is matched by this security group rule
"10.0.0.0/8"