Skip to content

/AWS1/IF_RSH=>REVOKECLUSTERSECGROUPINGRESS()

About RevokeClusterSecurityGroupIngress

Revokes an ingress rule in an Amazon Redshift security group for a previously authorized IP range or Amazon EC2 security group. To add an ingress rule, see AuthorizeClusterSecurityGroupIngress. For information about managing security groups, go to Amazon Redshift Cluster Security Groups in the Amazon Redshift Cluster Management Guide.

Method Signature

IMPORTING

Required arguments:

iv_clustersecuritygroupname TYPE /AWS1/RSHSTRING /AWS1/RSHSTRING

The name of the security Group from which to revoke the ingress rule.

Optional arguments:

iv_cidrip TYPE /AWS1/RSHSTRING /AWS1/RSHSTRING

The IP range for which to revoke access. This range must be a valid Classless Inter-Domain Routing (CIDR) block of IP addresses. If CIDRIP is specified, EC2SecurityGroupName and EC2SecurityGroupOwnerId cannot be provided.

iv_ec2securitygroupname TYPE /AWS1/RSHSTRING /AWS1/RSHSTRING

The name of the EC2 Security Group whose access is to be revoked. If EC2SecurityGroupName is specified, EC2SecurityGroupOwnerId must also be provided and CIDRIP cannot be provided.

iv_ec2securitygroupownerid TYPE /AWS1/RSHSTRING /AWS1/RSHSTRING

The Amazon Web Services account number of the owner of the security group specified in the EC2SecurityGroupName parameter. The Amazon Web Services access key ID is not an acceptable value. If EC2SecurityGroupOwnerId is specified, EC2SecurityGroupName must also be provided. and CIDRIP cannot be provided.

Example: 111122223333

RETURNING

oo_output TYPE REF TO /aws1/cl_rshrvkclstsecgringrs /AWS1/CL_RSHRVKCLSTSECGRINGRS

Domain /AWS1/RT_ACCOUNT_ID
Primitive Type NUMC

Examples

Syntax Example

This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.

DATA(lo_result) = lo_client->/aws1/if_rsh~revokeclustersecgroupingress(
  iv_cidrip = |string|
  iv_clustersecuritygroupname = |string|
  iv_ec2securitygroupname = |string|
  iv_ec2securitygroupownerid = |string|
).

This is an example of reading all possible response values

lo_result = lo_result.
IF lo_result IS NOT INITIAL.
  lo_clustersecuritygroup = lo_result->get_clustersecuritygroup( ).
  IF lo_clustersecuritygroup IS NOT INITIAL.
    lv_string = lo_clustersecuritygroup->get_clustersecuritygroupname( ).
    lv_string = lo_clustersecuritygroup->get_description( ).
    LOOP AT lo_clustersecuritygroup->get_ec2securitygroups( ) into lo_row.
      lo_row_1 = lo_row.
      IF lo_row_1 IS NOT INITIAL.
        lv_string = lo_row_1->get_status( ).
        lv_string = lo_row_1->get_ec2securitygroupname( ).
        lv_string = lo_row_1->get_ec2securitygroupownerid( ).
        LOOP AT lo_row_1->get_tags( ) into lo_row_2.
          lo_row_3 = lo_row_2.
          IF lo_row_3 IS NOT INITIAL.
            lv_string = lo_row_3->get_key( ).
            lv_string = lo_row_3->get_value( ).
          ENDIF.
        ENDLOOP.
      ENDIF.
    ENDLOOP.
    LOOP AT lo_clustersecuritygroup->get_ipranges( ) into lo_row_4.
      lo_row_5 = lo_row_4.
      IF lo_row_5 IS NOT INITIAL.
        lv_string = lo_row_5->get_status( ).
        lv_string = lo_row_5->get_cidrip( ).
        LOOP AT lo_row_5->get_tags( ) into lo_row_2.
          lo_row_3 = lo_row_2.
          IF lo_row_3 IS NOT INITIAL.
            lv_string = lo_row_3->get_key( ).
            lv_string = lo_row_3->get_value( ).
          ENDIF.
        ENDLOOP.
      ENDIF.
    ENDLOOP.
    LOOP AT lo_clustersecuritygroup->get_tags( ) into lo_row_2.
      lo_row_3 = lo_row_2.
      IF lo_row_3 IS NOT INITIAL.
        lv_string = lo_row_3->get_key( ).
        lv_string = lo_row_3->get_value( ).
      ENDIF.
    ENDLOOP.
  ENDIF.
ENDIF.