@@ -335,7 +335,7 @@ resource "oci_core_network_security_group" "pods" {
335
335
}
336
336
337
337
resource "oci_core_network_security_group_security_rule" "pods_egress" {
338
- network_security_group_id = oci_core_network_security_group. pods . id
338
+ network_security_group_id = oci_core_network_security_group. pods [ 0 ] . id
339
339
description = local. pods_egress [count . index ]. description
340
340
destination = local. pods_egress [count . index ]. destination
341
341
destination_type = local. pods_egress [count . index ]. destination_type
@@ -366,7 +366,7 @@ resource "oci_core_network_security_group_security_rule" "pods_egress" {
366
366
}
367
367
368
368
resource "oci_core_network_security_group_security_rule" "pods_ingress" {
369
- network_security_group_id = oci_core_network_security_group. pods . id
369
+ network_security_group_id = oci_core_network_security_group. pods [ 0 ] . id
370
370
description = local. pods_ingress [count . index ]. description
371
371
source = local. pods_ingress [count . index ]. source
372
372
source_type = local. pods_ingress [count . index ]. source_type
@@ -378,7 +378,7 @@ resource "oci_core_network_security_group_security_rule" "pods_ingress" {
378
378
379
379
# add this rule separately so it can be controlled independently
380
380
resource "oci_core_network_security_group_security_rule" "pods_egress_internet" {
381
- network_security_group_id = oci_core_network_security_group. pods . id
381
+ network_security_group_id = oci_core_network_security_group. pods [ 0 ] . id
382
382
description = " Allow pods access to Internet"
383
383
destination = local. anywhere
384
384
destination_type = " CIDR_BLOCK"
0 commit comments