Update Network Security Group

View as Markdown

Update a Network Security Group by ID

Org must have a Tenant entity. Instance must belong to Tenant. User must have FORGE_TENANT_ADMIN authorization role.

After a group has been created, policy updates are absolute. The complete desired policy set must be specified.

Authentication

AuthorizationBearer
``` export JWT_BEARER_TOKEN="<jwt-bearer-token>" # Example org name: "acme-inc export ORG_NAME=<org-name> # Use the JWT bearer token in your API request auth header: curl -v -X GET -H "Content-Type: application/json" -H "Authorization: Bearer $JWT_BEARER_TOKEN" https://carbide-rest-api.carbide.svc.cluster.local/v2/org/$ORG_NAME/carbide/user/current ```

Path parameters

orgstringRequired
networkSecurityGroupIdstringRequired

Request

This endpoint expects an object.
namestring or nullOptional2-256 characters
descriptionstring or nullOptional
statefulEgressbooleanOptional
Egress rules with protocol and destination ports defined but without source ports defined should automatically be made stateful.
ruleslist of objectsOptional
Update rules of the NetworkSecurityGroup. The rules will be entirely replaced by those sent in the request. Any rules not included in the request will be removed. To retain existing rules, first fetch them and include them.
labelsmap from strings to stringsOptional

Response

OK
idstring
namestring2-256 characters
descriptionstring
siteIdstringformat: "uuid"
tenantIdstringformat: "uuid"
statusenum
Status values for Network Security Group objects
Allowed values:
statusHistorylist of objects
statefulEgressboolean
ruleslist of objects
labelsmap from strings to strings
createddatetime
updateddatetime

Errors

400
Bad Request Error
403
Forbidden Error
404
Not Found Error
500
Internal Server Error
501
Not Implemented Error