@pulumi/azure 6.12.0-alpha.1732774124 → 6.12.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/types/input.d.ts CHANGED
@@ -24347,7 +24347,7 @@ export declare namespace containerservice {
24347
24347
  }
24348
24348
  interface RegistryTaskAgentSetting {
24349
24349
  /**
24350
- * The number of cores required for the Container Registry Task.
24350
+ * The number of cores required for the Container Registry Task. Possible value is `2`.
24351
24351
  */
24352
24352
  cpu: pulumi.Input<number>;
24353
24353
  }
@@ -25813,6 +25813,32 @@ export declare namespace databricks {
25813
25813
  */
25814
25814
  vnetAddressPrefix?: pulumi.Input<string>;
25815
25815
  }
25816
+ interface WorkspaceEnhancedSecurityCompliance {
25817
+ /**
25818
+ * Enables automatic cluster updates for this workspace. Defaults to `false`.
25819
+ */
25820
+ automaticClusterUpdateEnabled?: pulumi.Input<boolean>;
25821
+ /**
25822
+ * Enables compliance security profile for this workspace. Defaults to `false`.
25823
+ *
25824
+ * > **Note:** Changing the value of `complianceSecurityProfileEnabled` from `true` to `false` forces a replacement of the Databricks workspace.
25825
+ *
25826
+ * > **Note:** The attributes `automaticClusterUpdateEnabled` and `enhancedSecurityMonitoringEnabled` must be set to `true` in order to set `complianceSecurityProfileEnabled` to `true`.
25827
+ */
25828
+ complianceSecurityProfileEnabled?: pulumi.Input<boolean>;
25829
+ /**
25830
+ * A list of standards to enforce on this workspace. Possible values include `HIPAA` and `PCI_DSS`.
25831
+ *
25832
+ * > **Note:** `complianceSecurityProfileEnabled` must be set to `true` in order to use `complianceSecurityProfileStandards`.
25833
+ *
25834
+ * > **Note:** Removing a standard from the `complianceSecurityProfileStandards` list forces a replacement of the Databricks workspace.
25835
+ */
25836
+ complianceSecurityProfileStandards?: pulumi.Input<pulumi.Input<string>[]>;
25837
+ /**
25838
+ * Enables enhanced security monitoring for this workspace. Defaults to `false`.
25839
+ */
25840
+ enhancedSecurityMonitoringEnabled?: pulumi.Input<boolean>;
25841
+ }
25816
25842
  interface WorkspaceManagedDiskIdentity {
25817
25843
  /**
25818
25844
  * The principal UUID for the internal databricks storage account needed to provide access to the workspace for enabling Customer Managed Keys.
@@ -35172,131 +35198,395 @@ export declare namespace logicapps {
35172
35198
  actionResult: pulumi.Input<string>;
35173
35199
  }
35174
35200
  interface GetStandardSiteConfig {
35201
+ /**
35202
+ * Should the Logic App be loaded at all times?
35203
+ */
35175
35204
  alwaysOn?: boolean;
35205
+ /**
35206
+ * The number of workers this Logic App can scale out to. Only applicable to apps on the Consumption and Premium plan.
35207
+ */
35176
35208
  appScaleLimit?: number;
35209
+ /**
35210
+ * The Auto-swap slot name.
35211
+ */
35177
35212
  autoSwapSlotName?: string;
35213
+ /**
35214
+ * A `cors` block as defined below.
35215
+ */
35178
35216
  cors?: inputs.logicapps.GetStandardSiteConfigCors;
35217
+ /**
35218
+ * The version of the .NET framework's CLR used in this Logic App.
35219
+ */
35179
35220
  dotnetFrameworkVersion?: string;
35221
+ /**
35222
+ * The number of minimum instances for this Logic App Only affects apps on the Premium plan.
35223
+ */
35180
35224
  elasticInstanceMinimum?: number;
35225
+ /**
35226
+ * The state of FTP / FTPS service for this Logic App.
35227
+ */
35181
35228
  ftpsState?: string;
35229
+ /**
35230
+ * Path which will be checked for this Logic App health.
35231
+ */
35182
35232
  healthCheckPath?: string;
35233
+ /**
35234
+ * Specifies whether the HTTP2 protocol should be enabled.
35235
+ */
35183
35236
  http2Enabled?: boolean;
35237
+ /**
35238
+ * A list of `ipRestriction` objects representing IP restrictions as defined below.
35239
+ */
35184
35240
  ipRestrictions?: inputs.logicapps.GetStandardSiteConfigIpRestriction[];
35241
+ /**
35242
+ * Linux App Framework and version for the Logic App.
35243
+ */
35185
35244
  linuxFxVersion?: string;
35245
+ /**
35246
+ * The minimum supported TLS version for the Logic App.
35247
+ */
35186
35248
  minTlsVersion?: string;
35249
+ /**
35250
+ * The number of pre-warmed instances for this Logic App Only affects apps on the Premium plan.
35251
+ */
35187
35252
  preWarmedInstanceCount?: number;
35253
+ /**
35254
+ * @deprecated the `site_config.public_network_access_enabled` property has been superseded by the `publicNetworkAccess` property and will be removed in v5.0 of the AzureRM Provider.
35255
+ */
35188
35256
  publicNetworkAccessEnabled?: boolean;
35257
+ /**
35258
+ * Should Runtime Scale Monitoring be enabled?. Only applicable to apps on the Premium plan.
35259
+ */
35189
35260
  runtimeScaleMonitoringEnabled?: boolean;
35261
+ /**
35262
+ * A list of `scmIpRestriction` objects representing SCM IP restrictions as defined below.
35263
+ */
35190
35264
  scmIpRestrictions?: inputs.logicapps.GetStandardSiteConfigScmIpRestriction[];
35265
+ /**
35266
+ * The minimum version of TLS required for SSL requests to the SCM site.
35267
+ */
35191
35268
  scmMinTlsVersion?: string;
35269
+ /**
35270
+ * The type of Source Control used by the Logic App in use by the Windows Function App.
35271
+ */
35192
35272
  scmType?: string;
35273
+ /**
35274
+ * Should the Logic App `ipRestriction` configuration be used for the SCM too.
35275
+ */
35193
35276
  scmUseMainIpRestriction?: boolean;
35277
+ /**
35278
+ * Should the Logic App run in 32 bit mode, rather than 64 bit mode?
35279
+ */
35194
35280
  use32BitWorkerProcess?: boolean;
35281
+ /**
35282
+ * Should all outbound traffic to have Virtual Network Security Groups and User Defined Routes applied.
35283
+ */
35195
35284
  vnetRouteAllEnabled?: boolean;
35285
+ /**
35286
+ * Should WebSockets be enabled?
35287
+ */
35196
35288
  websocketsEnabled?: boolean;
35197
35289
  }
35198
35290
  interface GetStandardSiteConfigArgs {
35291
+ /**
35292
+ * Should the Logic App be loaded at all times?
35293
+ */
35199
35294
  alwaysOn?: pulumi.Input<boolean>;
35295
+ /**
35296
+ * The number of workers this Logic App can scale out to. Only applicable to apps on the Consumption and Premium plan.
35297
+ */
35200
35298
  appScaleLimit?: pulumi.Input<number>;
35299
+ /**
35300
+ * The Auto-swap slot name.
35301
+ */
35201
35302
  autoSwapSlotName?: pulumi.Input<string>;
35303
+ /**
35304
+ * A `cors` block as defined below.
35305
+ */
35202
35306
  cors?: pulumi.Input<inputs.logicapps.GetStandardSiteConfigCorsArgs>;
35307
+ /**
35308
+ * The version of the .NET framework's CLR used in this Logic App.
35309
+ */
35203
35310
  dotnetFrameworkVersion?: pulumi.Input<string>;
35311
+ /**
35312
+ * The number of minimum instances for this Logic App Only affects apps on the Premium plan.
35313
+ */
35204
35314
  elasticInstanceMinimum?: pulumi.Input<number>;
35315
+ /**
35316
+ * The state of FTP / FTPS service for this Logic App.
35317
+ */
35205
35318
  ftpsState?: pulumi.Input<string>;
35319
+ /**
35320
+ * Path which will be checked for this Logic App health.
35321
+ */
35206
35322
  healthCheckPath?: pulumi.Input<string>;
35323
+ /**
35324
+ * Specifies whether the HTTP2 protocol should be enabled.
35325
+ */
35207
35326
  http2Enabled?: pulumi.Input<boolean>;
35327
+ /**
35328
+ * A list of `ipRestriction` objects representing IP restrictions as defined below.
35329
+ */
35208
35330
  ipRestrictions?: pulumi.Input<pulumi.Input<inputs.logicapps.GetStandardSiteConfigIpRestrictionArgs>[]>;
35331
+ /**
35332
+ * Linux App Framework and version for the Logic App.
35333
+ */
35209
35334
  linuxFxVersion?: pulumi.Input<string>;
35335
+ /**
35336
+ * The minimum supported TLS version for the Logic App.
35337
+ */
35210
35338
  minTlsVersion?: pulumi.Input<string>;
35339
+ /**
35340
+ * The number of pre-warmed instances for this Logic App Only affects apps on the Premium plan.
35341
+ */
35211
35342
  preWarmedInstanceCount?: pulumi.Input<number>;
35343
+ /**
35344
+ * @deprecated the `site_config.public_network_access_enabled` property has been superseded by the `publicNetworkAccess` property and will be removed in v5.0 of the AzureRM Provider.
35345
+ */
35212
35346
  publicNetworkAccessEnabled?: pulumi.Input<boolean>;
35347
+ /**
35348
+ * Should Runtime Scale Monitoring be enabled?. Only applicable to apps on the Premium plan.
35349
+ */
35213
35350
  runtimeScaleMonitoringEnabled?: pulumi.Input<boolean>;
35351
+ /**
35352
+ * A list of `scmIpRestriction` objects representing SCM IP restrictions as defined below.
35353
+ */
35214
35354
  scmIpRestrictions?: pulumi.Input<pulumi.Input<inputs.logicapps.GetStandardSiteConfigScmIpRestrictionArgs>[]>;
35355
+ /**
35356
+ * The minimum version of TLS required for SSL requests to the SCM site.
35357
+ */
35215
35358
  scmMinTlsVersion?: pulumi.Input<string>;
35359
+ /**
35360
+ * The type of Source Control used by the Logic App in use by the Windows Function App.
35361
+ */
35216
35362
  scmType?: pulumi.Input<string>;
35363
+ /**
35364
+ * Should the Logic App `ipRestriction` configuration be used for the SCM too.
35365
+ */
35217
35366
  scmUseMainIpRestriction?: pulumi.Input<boolean>;
35367
+ /**
35368
+ * Should the Logic App run in 32 bit mode, rather than 64 bit mode?
35369
+ */
35218
35370
  use32BitWorkerProcess?: pulumi.Input<boolean>;
35371
+ /**
35372
+ * Should all outbound traffic to have Virtual Network Security Groups and User Defined Routes applied.
35373
+ */
35219
35374
  vnetRouteAllEnabled?: pulumi.Input<boolean>;
35375
+ /**
35376
+ * Should WebSockets be enabled?
35377
+ */
35220
35378
  websocketsEnabled?: pulumi.Input<boolean>;
35221
35379
  }
35222
35380
  interface GetStandardSiteConfigCors {
35381
+ /**
35382
+ * A list of origins which should be able to make cross-origin calls.
35383
+ */
35223
35384
  allowedOrigins: string[];
35385
+ /**
35386
+ * Are credentials supported?
35387
+ */
35224
35388
  supportCredentials?: boolean;
35225
35389
  }
35226
35390
  interface GetStandardSiteConfigCorsArgs {
35391
+ /**
35392
+ * A list of origins which should be able to make cross-origin calls.
35393
+ */
35227
35394
  allowedOrigins: pulumi.Input<pulumi.Input<string>[]>;
35395
+ /**
35396
+ * Are credentials supported?
35397
+ */
35228
35398
  supportCredentials?: pulumi.Input<boolean>;
35229
35399
  }
35230
35400
  interface GetStandardSiteConfigIpRestriction {
35401
+ /**
35402
+ * Does this restriction `Allow` or `Deny` access for this IP range.
35403
+ */
35231
35404
  action?: string;
35405
+ /**
35406
+ * The `headers` block for this specific `ipRestriction` as defined below.
35407
+ */
35232
35408
  headers?: inputs.logicapps.GetStandardSiteConfigIpRestrictionHeaders;
35409
+ /**
35410
+ * The IP Address used for this IP Restriction in CIDR notation.
35411
+ */
35233
35412
  ipAddress?: string;
35234
35413
  /**
35235
35414
  * The name of this Logic App.
35236
35415
  */
35237
35416
  name?: string;
35417
+ /**
35418
+ * The priority for this IP Restriction. Restrictions are enforced in priority order.
35419
+ */
35238
35420
  priority?: number;
35421
+ /**
35422
+ * The Service Tag used for this IP Restriction.
35423
+ */
35239
35424
  serviceTag?: string;
35425
+ /**
35426
+ * The Virtual Network Subnet ID used for this IP Restriction.
35427
+ */
35240
35428
  virtualNetworkSubnetId?: string;
35241
35429
  }
35242
35430
  interface GetStandardSiteConfigIpRestrictionArgs {
35431
+ /**
35432
+ * Does this restriction `Allow` or `Deny` access for this IP range.
35433
+ */
35243
35434
  action?: pulumi.Input<string>;
35435
+ /**
35436
+ * The `headers` block for this specific `ipRestriction` as defined below.
35437
+ */
35244
35438
  headers?: pulumi.Input<inputs.logicapps.GetStandardSiteConfigIpRestrictionHeadersArgs>;
35439
+ /**
35440
+ * The IP Address used for this IP Restriction in CIDR notation.
35441
+ */
35245
35442
  ipAddress?: pulumi.Input<string>;
35246
35443
  /**
35247
35444
  * The name of this Logic App.
35248
35445
  */
35249
35446
  name?: pulumi.Input<string>;
35447
+ /**
35448
+ * The priority for this IP Restriction. Restrictions are enforced in priority order.
35449
+ */
35250
35450
  priority?: pulumi.Input<number>;
35451
+ /**
35452
+ * The Service Tag used for this IP Restriction.
35453
+ */
35251
35454
  serviceTag?: pulumi.Input<string>;
35455
+ /**
35456
+ * The Virtual Network Subnet ID used for this IP Restriction.
35457
+ */
35252
35458
  virtualNetworkSubnetId?: pulumi.Input<string>;
35253
35459
  }
35254
35460
  interface GetStandardSiteConfigIpRestrictionHeaders {
35461
+ /**
35462
+ * A list of allowed Azure FrontDoor IDs in UUID notation.
35463
+ */
35255
35464
  xAzureFdids?: string[];
35465
+ /**
35466
+ * A list to allow the Azure FrontDoor health probe header.
35467
+ */
35256
35468
  xFdHealthProbe?: string;
35469
+ /**
35470
+ * A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
35471
+ */
35257
35472
  xForwardedFors?: string[];
35473
+ /**
35474
+ * A list of allowed 'X-Forwarded-Host' domains.
35475
+ */
35258
35476
  xForwardedHosts?: string[];
35259
35477
  }
35260
35478
  interface GetStandardSiteConfigIpRestrictionHeadersArgs {
35479
+ /**
35480
+ * A list of allowed Azure FrontDoor IDs in UUID notation.
35481
+ */
35261
35482
  xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
35483
+ /**
35484
+ * A list to allow the Azure FrontDoor health probe header.
35485
+ */
35262
35486
  xFdHealthProbe?: pulumi.Input<string>;
35487
+ /**
35488
+ * A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
35489
+ */
35263
35490
  xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
35491
+ /**
35492
+ * A list of allowed 'X-Forwarded-Host' domains.
35493
+ */
35264
35494
  xForwardedHosts?: pulumi.Input<pulumi.Input<string>[]>;
35265
35495
  }
35266
35496
  interface GetStandardSiteConfigScmIpRestriction {
35497
+ /**
35498
+ * Does this restriction `Allow` or `Deny` access for this IP range.
35499
+ */
35267
35500
  action?: string;
35501
+ /**
35502
+ * The `headers` block for this specific `ipRestriction` as defined below.
35503
+ */
35268
35504
  headers?: inputs.logicapps.GetStandardSiteConfigScmIpRestrictionHeaders;
35505
+ /**
35506
+ * The IP Address used for this IP Restriction in CIDR notation.
35507
+ */
35269
35508
  ipAddress?: string;
35270
35509
  /**
35271
35510
  * The name of this Logic App.
35272
35511
  */
35273
35512
  name?: string;
35513
+ /**
35514
+ * The priority for this IP Restriction. Restrictions are enforced in priority order.
35515
+ */
35274
35516
  priority?: number;
35517
+ /**
35518
+ * The Service Tag used for this IP Restriction.
35519
+ */
35275
35520
  serviceTag?: string;
35521
+ /**
35522
+ * The Virtual Network Subnet ID used for this IP Restriction.
35523
+ */
35276
35524
  virtualNetworkSubnetId?: string;
35277
35525
  }
35278
35526
  interface GetStandardSiteConfigScmIpRestrictionArgs {
35527
+ /**
35528
+ * Does this restriction `Allow` or `Deny` access for this IP range.
35529
+ */
35279
35530
  action?: pulumi.Input<string>;
35531
+ /**
35532
+ * The `headers` block for this specific `ipRestriction` as defined below.
35533
+ */
35280
35534
  headers?: pulumi.Input<inputs.logicapps.GetStandardSiteConfigScmIpRestrictionHeadersArgs>;
35535
+ /**
35536
+ * The IP Address used for this IP Restriction in CIDR notation.
35537
+ */
35281
35538
  ipAddress?: pulumi.Input<string>;
35282
35539
  /**
35283
35540
  * The name of this Logic App.
35284
35541
  */
35285
35542
  name?: pulumi.Input<string>;
35543
+ /**
35544
+ * The priority for this IP Restriction. Restrictions are enforced in priority order.
35545
+ */
35286
35546
  priority?: pulumi.Input<number>;
35547
+ /**
35548
+ * The Service Tag used for this IP Restriction.
35549
+ */
35287
35550
  serviceTag?: pulumi.Input<string>;
35551
+ /**
35552
+ * The Virtual Network Subnet ID used for this IP Restriction.
35553
+ */
35288
35554
  virtualNetworkSubnetId?: pulumi.Input<string>;
35289
35555
  }
35290
35556
  interface GetStandardSiteConfigScmIpRestrictionHeaders {
35557
+ /**
35558
+ * A list of allowed Azure FrontDoor IDs in UUID notation.
35559
+ */
35291
35560
  xAzureFdids?: string[];
35561
+ /**
35562
+ * A list to allow the Azure FrontDoor health probe header.
35563
+ */
35292
35564
  xFdHealthProbe?: string;
35565
+ /**
35566
+ * A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
35567
+ */
35293
35568
  xForwardedFors?: string[];
35569
+ /**
35570
+ * A list of allowed 'X-Forwarded-Host' domains.
35571
+ */
35294
35572
  xForwardedHosts?: string[];
35295
35573
  }
35296
35574
  interface GetStandardSiteConfigScmIpRestrictionHeadersArgs {
35575
+ /**
35576
+ * A list of allowed Azure FrontDoor IDs in UUID notation.
35577
+ */
35297
35578
  xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
35579
+ /**
35580
+ * A list to allow the Azure FrontDoor health probe header.
35581
+ */
35298
35582
  xFdHealthProbe?: pulumi.Input<string>;
35583
+ /**
35584
+ * A list of allowed 'X-Forwarded-For' IPs in CIDR notation.
35585
+ */
35299
35586
  xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
35587
+ /**
35588
+ * A list of allowed 'X-Forwarded-Host' domains.
35589
+ */
35300
35590
  xForwardedHosts?: pulumi.Input<pulumi.Input<string>[]>;
35301
35591
  }
35302
35592
  interface IntegrationAccountAgreementGuestIdentity {
@@ -35477,7 +35767,7 @@ export declare namespace logicapps {
35477
35767
  */
35478
35768
  elasticInstanceMinimum?: pulumi.Input<number>;
35479
35769
  /**
35480
- * State of FTP / FTPS service for this Logic App Possible values include: `AllAllowed`, `FtpsOnly` and `Disabled`. Defaults to `AllAllowed`.
35770
+ * State of FTP / FTPS service for this Logic App. Possible values include: `AllAllowed`, `FtpsOnly` and `Disabled`. Defaults to `AllAllowed`.
35481
35771
  */
35482
35772
  ftpsState?: pulumi.Input<string>;
35483
35773
  /**
@@ -35485,7 +35775,7 @@ export declare namespace logicapps {
35485
35775
  */
35486
35776
  healthCheckPath?: pulumi.Input<string>;
35487
35777
  /**
35488
- * Specifies whether or not the HTTP2 protocol should be enabled. Defaults to `false`.
35778
+ * Specifies whether the HTTP2 protocol should be enabled. Defaults to `false`.
35489
35779
  */
35490
35780
  http2Enabled?: pulumi.Input<boolean>;
35491
35781
  /**
@@ -35495,11 +35785,11 @@ export declare namespace logicapps {
35495
35785
  */
35496
35786
  ipRestrictions?: pulumi.Input<pulumi.Input<inputs.logicapps.StandardSiteConfigIpRestriction>[]>;
35497
35787
  /**
35498
- * Linux App Framework and version for the AppService, e.g. `DOCKER|(golang:latest)`. Setting this value will also set the `kind` of application deployed to `functionapp,linux,container,workflowapp`
35788
+ * Linux App Framework and version for the App Service, e.g. `DOCKER|(golang:latest)`. Setting this value will also set the `kind` of application deployed to `functionapp,linux,container,workflowapp`
35499
35789
  */
35500
35790
  linuxFxVersion?: pulumi.Input<string>;
35501
35791
  /**
35502
- * The minimum supported TLS version for the Logic App Possible values are `1.0`, `1.1`, and `1.2`. Defaults to `1.2` for new Logic Apps.
35792
+ * The minimum supported TLS version for the Logic App. Possible values are `1.0`, `1.1`, and `1.2`. Defaults to `1.2` for new Logic Apps.
35503
35793
  */
35504
35794
  minTlsVersion?: pulumi.Input<string>;
35505
35795
  /**
@@ -35507,7 +35797,7 @@ export declare namespace logicapps {
35507
35797
  */
35508
35798
  preWarmedInstanceCount?: pulumi.Input<number>;
35509
35799
  /**
35510
- * Is public network access enabled? Defaults to `true`.
35800
+ * @deprecated the `site_config.public_network_access_enabled` property has been superseded by the `publicNetworkAccess` property and will be removed in v5.0 of the AzureRM Provider.
35511
35801
  */
35512
35802
  publicNetworkAccessEnabled?: pulumi.Input<boolean>;
35513
35803
  /**
@@ -35595,11 +35885,11 @@ export declare namespace logicapps {
35595
35885
  */
35596
35886
  xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
35597
35887
  /**
35598
- * A list to allow the Azure FrontDoor health probe header. Only allowed value is "1".
35888
+ * A list to allow the Azure FrontDoor health probe header. Only allowed value is `1`.
35599
35889
  */
35600
35890
  xFdHealthProbe?: pulumi.Input<string>;
35601
35891
  /**
35602
- * A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8
35892
+ * A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8.
35603
35893
  */
35604
35894
  xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
35605
35895
  /**
@@ -35625,7 +35915,7 @@ export declare namespace logicapps {
35625
35915
  */
35626
35916
  name?: pulumi.Input<string>;
35627
35917
  /**
35628
- * The priority for this IP Restriction. Restrictions are enforced in priority order. By default, the priority is set to 65000 if not specified.
35918
+ * The priority for this IP Restriction. Restrictions are enforced in priority order. By default, the priority is set to `65000` if not specified.
35629
35919
  */
35630
35920
  priority?: pulumi.Input<number>;
35631
35921
  /**
@@ -35645,11 +35935,11 @@ export declare namespace logicapps {
35645
35935
  */
35646
35936
  xAzureFdids?: pulumi.Input<pulumi.Input<string>[]>;
35647
35937
  /**
35648
- * A list to allow the Azure FrontDoor health probe header. Only allowed value is "1".
35938
+ * A list to allow the Azure FrontDoor health probe header. Only allowed value is `1`.
35649
35939
  */
35650
35940
  xFdHealthProbe?: pulumi.Input<string>;
35651
35941
  /**
35652
- * A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8
35942
+ * A list of allowed 'X-Forwarded-For' IPs in CIDR notation with a maximum of 8.
35653
35943
  */
35654
35944
  xForwardedFors?: pulumi.Input<pulumi.Input<string>[]>;
35655
35945
  /**
@@ -35663,7 +35953,7 @@ export declare namespace logicapps {
35663
35953
  */
35664
35954
  password?: pulumi.Input<string>;
35665
35955
  /**
35666
- * The username which can be used to publish to this App Service
35956
+ * The username which can be used to publish to this App Service.
35667
35957
  */
35668
35958
  username?: pulumi.Input<string>;
35669
35959
  }
@@ -43098,45 +43388,45 @@ export declare namespace operationalinsights {
43098
43388
  export declare namespace oracle {
43099
43389
  interface CloudVmClusterDataCollectionOptions {
43100
43390
  /**
43101
- * Indicates whether diagnostic collection is enabled for the VM Cluster/Cloud VM Cluster/VMBM DBCS. Enabling diagnostic collection allows you to receive Events service notifications for guest VM issues. Diagnostic collection also allows Oracle to provide enhanced service and proactive support for your Exadata system. You can enable diagnostic collection during VM Cluster/Cloud VM Cluster provisioning. You can also disable or enable it at any time using the `UpdateVmCluster` or `updateCloudVmCluster` API.
43391
+ * Indicates whether diagnostic collection is enabled for the VM Cluster/Cloud VM Cluster/VMBM DBCS. Enabling diagnostic collection allows you to receive Events service notifications for guest VM issues. Diagnostic collection also allows Oracle to provide enhanced service and proactive support for your Exadata system. You can enable diagnostic collection during VM Cluster/Cloud VM Cluster provisioning. You can also disable or enable it at any time using the `UpdateVmCluster` or `updateCloudVmCluster` API. Changing this forces a new Cloud VM Cluster to be created.
43102
43392
  */
43103
43393
  diagnosticsEventsEnabled?: pulumi.Input<boolean>;
43104
43394
  /**
43105
- * Indicates whether health monitoring is enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling health monitoring allows Oracle to collect diagnostic data and share it with its operations and support personnel. You may also receive notifications for some events. Collecting health diagnostics enables Oracle to provide proactive support and enhanced service for your system. Optionally enable health monitoring while provisioning a system. You can also disable or enable health monitoring anytime using the `UpdateVmCluster`, `UpdateCloudVmCluster` or `updateDbsystem` API.
43395
+ * Indicates whether health monitoring is enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling health monitoring allows Oracle to collect diagnostic data and share it with its operations and support personnel. You may also receive notifications for some events. Collecting health diagnostics enables Oracle to provide proactive support and enhanced service for your system. Optionally enable health monitoring while provisioning a system. You can also disable or enable health monitoring anytime using the `UpdateVmCluster`, `UpdateCloudVmCluster` or `updateDbsystem` API. Changing this forces a new Cloud VM Cluster to be created.
43106
43396
  */
43107
43397
  healthMonitoringEnabled?: pulumi.Input<boolean>;
43108
43398
  /**
43109
- * Indicates whether incident logs and trace collection are enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling incident logs collection allows Oracle to receive Events service notifications for guest VM issues, collect incident logs and traces, and use them to diagnose issues and resolve them. Optionally enable incident logs collection while provisioning a system. You can also disable or enable incident logs collection anytime using the `UpdateVmCluster`, `updateCloudVmCluster` or `updateDbsystem` API.
43399
+ * Indicates whether incident logs and trace collection are enabled for the VM Cluster / Cloud VM Cluster / VMBM DBCS. Enabling incident logs collection allows Oracle to receive Events service notifications for guest VM issues, collect incident logs and traces, and use them to diagnose issues and resolve them. Optionally enable incident logs collection while provisioning a system. You can also disable or enable incident logs collection anytime using the `UpdateVmCluster`, `updateCloudVmCluster` or `updateDbsystem` API. Changing this forces a new Cloud VM Cluster to be created.
43110
43400
  */
43111
43401
  incidentLogsEnabled?: pulumi.Input<boolean>;
43112
43402
  }
43113
43403
  interface ExadataInfrastructureMaintenanceWindow {
43114
43404
  /**
43115
- * Days during the week when maintenance should be performed. Valid values are: `0` - represents time slot `0:00 - 3:59 UTC - 4` - represents time slot `4:00 - 7:59 UTC - 8` - represents time slot 8:00 - 11:59 UTC - 12 - represents time slot 12:00 - 15:59 UTC - 16 - represents time slot 16:00 - 19:59 UTC - 20 - represents time slot `20:00 - 23:59 UTC`
43405
+ * Days during the week when maintenance should be performed. Valid values are: `0` - represents time slot `0:00 - 3:59 UTC - 4` - represents time slot `4:00 - 7:59 UTC - 8` - represents time slot 8:00 - 11:59 UTC - 12 - represents time slot 12:00 - 15:59 UTC - 16 - represents time slot 16:00 - 19:59 UTC - 20 - represents time slot `20:00 - 23:59 UTC`. Changing this forces a new Cloud Exadata Infrastructure to be created.
43116
43406
  */
43117
43407
  daysOfWeeks?: pulumi.Input<pulumi.Input<string>[]>;
43118
43408
  /**
43119
- * The window of hours during the day when maintenance should be performed. The window is a 4 hour slot.
43409
+ * The window of hours during the day when maintenance should be performed. The window is a 4 hour slot. Changing this forces a new Cloud Exadata Infrastructure to be created.
43120
43410
  */
43121
43411
  hoursOfDays?: pulumi.Input<pulumi.Input<number>[]>;
43122
43412
  /**
43123
- * Lead time window allows user to set a lead time to prepare for a down time. The lead time is in weeks and valid value is between `1` to `4`.
43413
+ * Lead time window allows user to set a lead time to prepare for a down time. The lead time is in weeks and valid value is between `1` to `4`. Changing this forces a new Cloud Exadata Infrastructure to be created.
43124
43414
  */
43125
43415
  leadTimeInWeeks?: pulumi.Input<number>;
43126
43416
  /**
43127
- * Months during the year when maintenance should be performed.
43417
+ * Months during the year when maintenance should be performed. Changing this forces a new Cloud Exadata Infrastructure to be created.
43128
43418
  */
43129
43419
  months?: pulumi.Input<pulumi.Input<string>[]>;
43130
43420
  /**
43131
- * Cloud Exadata Infrastructure node patching method, either `ROLLING` or `NONROLLING`. Default value is `ROLLING`. IMPORTANT: Non-rolling infrastructure patching involves system down time. See [Oracle-Managed Infrastructure Maintenance Updates](https://docs.cloud.oracle.com/iaas/Content/Database/Concepts/examaintenance.htm#Oracle) for more information.
43421
+ * Cloud Exadata Infrastructure node patching method, either `ROLLING` or `NONROLLING`. Default value is `ROLLING`. IMPORTANT: Non-rolling infrastructure patching involves system down time. See [Oracle-Managed Infrastructure Maintenance Updates](https://docs.cloud.oracle.com/iaas/Content/Database/Concepts/examaintenance.htm#Oracle) for more information. Changing this forces a new Cloud Exadata Infrastructure to be created.
43132
43422
  */
43133
43423
  patchingMode?: pulumi.Input<string>;
43134
43424
  /**
43135
- * The maintenance window scheduling preference.
43425
+ * The maintenance window scheduling preference. Changing this forces a new Cloud Exadata Infrastructure to be created.
43136
43426
  */
43137
43427
  preference?: pulumi.Input<string>;
43138
43428
  /**
43139
- * Weeks during the month when maintenance should be performed. Weeks start on the 1st, 8th, 15th, and 22nd days of the month, and have a duration of 7 days. Weeks start and end based on calendar dates, not days of the week. For example, to allow maintenance during the 2nd week of the month (from the 8th day to the 14th day of the month), use the value 2. Maintenance cannot be scheduled for the fifth week of months that contain more than 28 days. Note that this parameter works in conjunction with the daysOfWeek and hoursOfDay parameters to allow you to specify specific days of the week and hours that maintenance will be performed.
43429
+ * Weeks during the month when maintenance should be performed. Weeks start on the 1st, 8th, 15th, and 22nd days of the month, and have a duration of 7 days. Weeks start and end based on calendar dates, not days of the week. For example, to allow maintenance during the 2nd week of the month (from the 8th day to the 14th day of the month), use the value 2. Maintenance cannot be scheduled for the fifth week of months that contain more than 28 days. Note that this parameter works in conjunction with the daysOfWeek and hoursOfDay parameters to allow you to specify specific days of the week and hours that maintenance will be performed. Changing this forces a new Cloud Exadata Infrastructure to be created.
43140
43430
  */
43141
43431
  weeksOfMonths?: pulumi.Input<pulumi.Input<number>[]>;
43142
43432
  }
@@ -44724,6 +45014,10 @@ export declare namespace role {
44724
45014
  }
44725
45015
  export declare namespace search {
44726
45016
  interface ServiceIdentity {
45017
+ /**
45018
+ * Specifies the list of User Assigned Managed Service Identity IDs which should be assigned to this Search Service.
45019
+ */
45020
+ identityIds?: pulumi.Input<pulumi.Input<string>[]>;
44727
45021
  /**
44728
45022
  * The Principal ID associated with this Managed Service Identity.
44729
45023
  */
@@ -44733,7 +45027,7 @@ export declare namespace search {
44733
45027
  */
44734
45028
  tenantId?: pulumi.Input<string>;
44735
45029
  /**
44736
- * Specifies the type of Managed Service Identity that should be configured on this Search Service. The only possible value is `SystemAssigned`.
45030
+ * Specifies the type of Managed Service Identity that should be configured on this Search Service. Possible values are `SystemAssigned`, `UserAssigned`, and `SystemAssigned, UserAssigned`.
44737
45031
  */
44738
45032
  type: pulumi.Input<string>;
44739
45033
  }