{"width":"100%","type":"rich","blog_url":"https://www.shigemk2.com/","title":"aws_security_group_rule\u306eterraform import","image_url":null,"author_name":"shigemk2","version":"1.0","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fwww.shigemk2.com%2Fentry%2F2024%2F02%2F14%2F192712\" title=\"aws_security_group_rule\u306eterraform import - by shigemk2\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["AWS","Terraform"],"blog_title":"by shigemk2","url":"https://www.shigemk2.com/entry/2024/02/14/192712","provider_url":"https://hatena.blog","description":"Using terraform import to import Security Group Rules using the security_group_id, type, protocol, from_port, to_port, and source(s)/destination(s) (such as a cidr_block) separated by underscores (_). All parts are required. \u3063\u3066\u66f8\u3044\u3066\u3042\u308a SG\u306eID ingress or egress \u30d7\u30ed\u30c8\u30b3\u30eb from port to port destination \u3092_\u3067\u533a\u5207\u3063\u3066\u2026","published":"2024-02-14 19:27:12","provider_name":"Hatena Blog","height":"190","author_url":"https://blog.hatena.ne.jp/shigemk2/"}