awscc_ec2_security_group_ingress (Data Source)

Data Source schema for AWS::EC2::SecurityGroupIngress

Schema

Required

Read-Only

Use this for ICMP and any protocol that uses ports.

You must specify the GroupName property or the GroupId property. For security groups that are in a VPC, you must use the GroupId property.

[VPC only] Use -1 to specify all protocols. When authorizing security group rules, specifying -1 or a protocol number other than tcp, udp, icmp, or icmpv6 allows traffic on all ports, regardless of any port range you specify. For tcp, udp, and icmp, you must specify a port range. For icmpv6, the port range is optional; if you omit the port range, traffic for all types and codes is allowed.

You must specify the GroupName property or the GroupId property. For security groups that are in a VPC, you must use the GroupId property.

If you specify SourceSecurityGroupName or SourceSecurityGroupId and that security group is owned by a different account than the account creating the stack, you must specify the SourceSecurityGroupOwnerId; otherwise, this property is optional.

Use this for ICMP and any protocol that uses ports.