@pulumi/confluentcloud 2.27.0-alpha.1746733902 → 2.27.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/apiKey.d.ts +21 -21
- package/apiKey.js +21 -21
- package/clusterLink.d.ts +4 -4
- package/clusterLink.js +4 -4
- package/connector.d.ts +14 -14
- package/connector.js +14 -14
- package/environment.d.ts +21 -21
- package/environment.js +21 -21
- package/getPrivateLinkAttachment.d.ts +4 -4
- package/getPrivateLinkAttachment.js +4 -4
- package/getPrivateLinkAttachmentConnection.d.ts +4 -4
- package/getPrivateLinkAttachmentConnection.js +4 -4
- package/getProviderIntegration.d.ts +2 -2
- package/getProviderIntegration.js +2 -2
- package/kafkaAcl.d.ts +14 -14
- package/kafkaAcl.js +14 -14
- package/kafkaCluster.d.ts +22 -22
- package/kafkaCluster.js +22 -22
- package/kafkaMirrorTopic.d.ts +2 -2
- package/kafkaMirrorTopic.js +2 -2
- package/kafkaTopic.d.ts +21 -21
- package/kafkaTopic.js +21 -21
- package/network.d.ts +15 -15
- package/network.js +15 -15
- package/package.json +2 -2
- package/peering.d.ts +9 -9
- package/peering.js +9 -9
- package/privateLinkAccess.d.ts +6 -6
- package/privateLinkAccess.js +6 -6
- package/privateLinkAttachment.d.ts +2 -2
- package/privateLinkAttachment.js +2 -2
- package/privateLinkAttachmentConnection.d.ts +2 -2
- package/privateLinkAttachmentConnection.js +2 -2
- package/providerIntegration.d.ts +1 -1
- package/providerIntegration.js +1 -1
- package/serviceAccount.d.ts +21 -21
- package/serviceAccount.js +21 -21
- package/tableflowTopic.d.ts +4 -4
- package/tableflowTopic.js +4 -4
- package/transitGatewayAttachment.d.ts +1 -1
- package/transitGatewayAttachment.js +1 -1
package/kafkaCluster.d.ts
CHANGED
|
@@ -160,28 +160,28 @@ import * as outputs from "./types/output";
|
|
|
160
160
|
* ## Getting Started
|
|
161
161
|
*
|
|
162
162
|
* The following end-to-end examples might help to get started with `confluentcloud.KafkaCluster` resource:
|
|
163
|
-
* *
|
|
164
|
-
* *
|
|
165
|
-
* *
|
|
166
|
-
* *
|
|
167
|
-
* *
|
|
168
|
-
* *
|
|
169
|
-
* *
|
|
170
|
-
* *
|
|
171
|
-
* *
|
|
172
|
-
* *
|
|
173
|
-
* *
|
|
174
|
-
* *
|
|
175
|
-
* *
|
|
176
|
-
* *
|
|
177
|
-
* *
|
|
178
|
-
* *
|
|
179
|
-
* *
|
|
180
|
-
* *
|
|
181
|
-
* *
|
|
182
|
-
* *
|
|
183
|
-
* *
|
|
184
|
-
* *
|
|
163
|
+
* * basic-kafka-acls: _Basic_ Kafka cluster with authorization using ACLs
|
|
164
|
+
* * basic-kafka-acls-with-alias: _Basic_ Kafka cluster with authorization using ACLs
|
|
165
|
+
* * standard-kafka-acls: _Standard_ Kafka cluster with authorization using ACLs
|
|
166
|
+
* * standard-kafka-rbac: _Standard_ Kafka cluster with authorization using RBAC
|
|
167
|
+
* * dedicated-public-kafka-acls: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using ACLs
|
|
168
|
+
* * dedicated-public-kafka-rbac: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using RBAC
|
|
169
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
170
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
171
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
172
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
173
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
174
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
175
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
176
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
177
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
178
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
179
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
180
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
181
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
182
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
183
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
184
|
+
* * enterprise-privatelinkattachment-azure-kafka-acls: _Enterprise_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
185
185
|
*
|
|
186
186
|
* ## Import
|
|
187
187
|
*
|
package/kafkaCluster.js
CHANGED
|
@@ -164,28 +164,28 @@ const utilities = require("./utilities");
|
|
|
164
164
|
* ## Getting Started
|
|
165
165
|
*
|
|
166
166
|
* The following end-to-end examples might help to get started with `confluentcloud.KafkaCluster` resource:
|
|
167
|
-
* *
|
|
168
|
-
* *
|
|
169
|
-
* *
|
|
170
|
-
* *
|
|
171
|
-
* *
|
|
172
|
-
* *
|
|
173
|
-
* *
|
|
174
|
-
* *
|
|
175
|
-
* *
|
|
176
|
-
* *
|
|
177
|
-
* *
|
|
178
|
-
* *
|
|
179
|
-
* *
|
|
180
|
-
* *
|
|
181
|
-
* *
|
|
182
|
-
* *
|
|
183
|
-
* *
|
|
184
|
-
* *
|
|
185
|
-
* *
|
|
186
|
-
* *
|
|
187
|
-
* *
|
|
188
|
-
* *
|
|
167
|
+
* * basic-kafka-acls: _Basic_ Kafka cluster with authorization using ACLs
|
|
168
|
+
* * basic-kafka-acls-with-alias: _Basic_ Kafka cluster with authorization using ACLs
|
|
169
|
+
* * standard-kafka-acls: _Standard_ Kafka cluster with authorization using ACLs
|
|
170
|
+
* * standard-kafka-rbac: _Standard_ Kafka cluster with authorization using RBAC
|
|
171
|
+
* * dedicated-public-kafka-acls: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using ACLs
|
|
172
|
+
* * dedicated-public-kafka-rbac: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using RBAC
|
|
173
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
174
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
175
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
176
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
177
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
178
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
179
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
180
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
181
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
182
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
183
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
184
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
185
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
186
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
187
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
188
|
+
* * enterprise-privatelinkattachment-azure-kafka-acls: _Enterprise_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
189
189
|
*
|
|
190
190
|
* ## Import
|
|
191
191
|
*
|
package/kafkaMirrorTopic.d.ts
CHANGED
|
@@ -29,8 +29,8 @@ import * as outputs from "./types/output";
|
|
|
29
29
|
* ## Getting Started
|
|
30
30
|
*
|
|
31
31
|
* The following end-to-end examples might help to get started with `confluentcloud.KafkaMirrorTopic` resource:
|
|
32
|
-
* *
|
|
33
|
-
* *
|
|
32
|
+
* * destination-initiated-cluster-link-rbac: An example of setting up a _destination_ initiated cluster link with a mirror topic
|
|
33
|
+
* * source-initiated-cluster-link-rbac: An example of setting up a _source_ initiated cluster link with a mirror topic
|
|
34
34
|
*
|
|
35
35
|
* See [Mirror Topics on Confluent Cloud](https://docs.confluent.io/cloud/current/multi-cloud/cluster-linking/mirror-topics-cc.html) to learn more about Mirror Topics on Confluent Cloud.
|
|
36
36
|
*
|
package/kafkaMirrorTopic.js
CHANGED
|
@@ -33,8 +33,8 @@ const utilities = require("./utilities");
|
|
|
33
33
|
* ## Getting Started
|
|
34
34
|
*
|
|
35
35
|
* The following end-to-end examples might help to get started with `confluentcloud.KafkaMirrorTopic` resource:
|
|
36
|
-
* *
|
|
37
|
-
* *
|
|
36
|
+
* * destination-initiated-cluster-link-rbac: An example of setting up a _destination_ initiated cluster link with a mirror topic
|
|
37
|
+
* * source-initiated-cluster-link-rbac: An example of setting up a _source_ initiated cluster link with a mirror topic
|
|
38
38
|
*
|
|
39
39
|
* See [Mirror Topics on Confluent Cloud](https://docs.confluent.io/cloud/current/multi-cloud/cluster-linking/mirror-topics-cc.html) to learn more about Mirror Topics on Confluent Cloud.
|
|
40
40
|
*
|
package/kafkaTopic.d.ts
CHANGED
|
@@ -35,27 +35,27 @@ import * as outputs from "./types/output";
|
|
|
35
35
|
* ## Getting Started
|
|
36
36
|
*
|
|
37
37
|
* The following end-to-end examples might help to get started with `confluentcloud.KafkaTopic` resource:
|
|
38
|
-
* *
|
|
39
|
-
* *
|
|
40
|
-
* *
|
|
41
|
-
* *
|
|
42
|
-
* *
|
|
43
|
-
* *
|
|
44
|
-
* *
|
|
45
|
-
* *
|
|
46
|
-
* *
|
|
47
|
-
* *
|
|
48
|
-
* *
|
|
49
|
-
* *
|
|
50
|
-
* *
|
|
51
|
-
* *
|
|
52
|
-
* *
|
|
53
|
-
* *
|
|
54
|
-
* *
|
|
55
|
-
* *
|
|
56
|
-
* *
|
|
57
|
-
* *
|
|
58
|
-
* *
|
|
38
|
+
* * basic-kafka-acls: _Basic_ Kafka cluster with authorization using ACLs
|
|
39
|
+
* * basic-kafka-acls-with-alias: _Basic_ Kafka cluster with authorization using ACLs
|
|
40
|
+
* * standard-kafka-acls: _Standard_ Kafka cluster with authorization using ACLs
|
|
41
|
+
* * standard-kafka-rbac: _Standard_ Kafka cluster with authorization using RBAC
|
|
42
|
+
* * dedicated-public-kafka-acls: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using ACLs
|
|
43
|
+
* * dedicated-public-kafka-rbac: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using RBAC
|
|
44
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
45
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
46
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
47
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
48
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
49
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
50
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
51
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
52
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
53
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
54
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
55
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
56
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
57
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
58
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
59
59
|
*
|
|
60
60
|
* ## Import
|
|
61
61
|
*
|
package/kafkaTopic.js
CHANGED
|
@@ -39,27 +39,27 @@ const utilities = require("./utilities");
|
|
|
39
39
|
* ## Getting Started
|
|
40
40
|
*
|
|
41
41
|
* The following end-to-end examples might help to get started with `confluentcloud.KafkaTopic` resource:
|
|
42
|
-
* *
|
|
43
|
-
* *
|
|
44
|
-
* *
|
|
45
|
-
* *
|
|
46
|
-
* *
|
|
47
|
-
* *
|
|
48
|
-
* *
|
|
49
|
-
* *
|
|
50
|
-
* *
|
|
51
|
-
* *
|
|
52
|
-
* *
|
|
53
|
-
* *
|
|
54
|
-
* *
|
|
55
|
-
* *
|
|
56
|
-
* *
|
|
57
|
-
* *
|
|
58
|
-
* *
|
|
59
|
-
* *
|
|
60
|
-
* *
|
|
61
|
-
* *
|
|
62
|
-
* *
|
|
42
|
+
* * basic-kafka-acls: _Basic_ Kafka cluster with authorization using ACLs
|
|
43
|
+
* * basic-kafka-acls-with-alias: _Basic_ Kafka cluster with authorization using ACLs
|
|
44
|
+
* * standard-kafka-acls: _Standard_ Kafka cluster with authorization using ACLs
|
|
45
|
+
* * standard-kafka-rbac: _Standard_ Kafka cluster with authorization using RBAC
|
|
46
|
+
* * dedicated-public-kafka-acls: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using ACLs
|
|
47
|
+
* * dedicated-public-kafka-rbac: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using RBAC
|
|
48
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
49
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
50
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
51
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
52
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
53
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
54
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
55
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
56
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
57
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
58
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
59
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
60
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
61
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
62
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
63
63
|
*
|
|
64
64
|
* ## Import
|
|
65
65
|
*
|
package/network.d.ts
CHANGED
|
@@ -90,21 +90,21 @@ import * as outputs from "./types/output";
|
|
|
90
90
|
* ## Getting Started
|
|
91
91
|
*
|
|
92
92
|
* The following end-to-end examples might help to get started with `confluentcloud.Network` resource:
|
|
93
|
-
* *
|
|
94
|
-
* *
|
|
95
|
-
* *
|
|
96
|
-
* *
|
|
97
|
-
* *
|
|
98
|
-
* *
|
|
99
|
-
* *
|
|
100
|
-
* *
|
|
101
|
-
* *
|
|
102
|
-
* *
|
|
103
|
-
* *
|
|
104
|
-
* *
|
|
105
|
-
* *
|
|
106
|
-
* *
|
|
107
|
-
* *
|
|
93
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
94
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
95
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
96
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
97
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
98
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
99
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
100
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
101
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
102
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
103
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
104
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
105
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
106
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
107
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
108
108
|
*
|
|
109
109
|
* ## Import
|
|
110
110
|
*
|
package/network.js
CHANGED
|
@@ -94,21 +94,21 @@ const utilities = require("./utilities");
|
|
|
94
94
|
* ## Getting Started
|
|
95
95
|
*
|
|
96
96
|
* The following end-to-end examples might help to get started with `confluentcloud.Network` resource:
|
|
97
|
-
* *
|
|
98
|
-
* *
|
|
99
|
-
* *
|
|
100
|
-
* *
|
|
101
|
-
* *
|
|
102
|
-
* *
|
|
103
|
-
* *
|
|
104
|
-
* *
|
|
105
|
-
* *
|
|
106
|
-
* *
|
|
107
|
-
* *
|
|
108
|
-
* *
|
|
109
|
-
* *
|
|
110
|
-
* *
|
|
111
|
-
* *
|
|
97
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
98
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
99
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
100
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
101
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
102
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
103
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
104
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
105
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
106
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
107
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
108
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
109
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
110
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
111
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
112
112
|
*
|
|
113
113
|
* ## Import
|
|
114
114
|
*
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/confluentcloud",
|
|
3
|
-
"version": "2.27.0
|
|
3
|
+
"version": "2.27.0",
|
|
4
4
|
"description": "A Pulumi package for creating and managing Confluent cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -24,6 +24,6 @@
|
|
|
24
24
|
"pulumi": {
|
|
25
25
|
"resource": true,
|
|
26
26
|
"name": "confluentcloud",
|
|
27
|
-
"version": "2.27.0
|
|
27
|
+
"version": "2.27.0"
|
|
28
28
|
}
|
|
29
29
|
}
|
package/peering.d.ts
CHANGED
|
@@ -106,15 +106,15 @@ import * as outputs from "./types/output";
|
|
|
106
106
|
* ## Getting Started
|
|
107
107
|
*
|
|
108
108
|
* The following end-to-end examples might help to get started with `confluentcloud.Peering` resource:
|
|
109
|
-
* *
|
|
110
|
-
* *
|
|
111
|
-
* *
|
|
112
|
-
* *
|
|
113
|
-
* *
|
|
114
|
-
* *
|
|
115
|
-
* *
|
|
116
|
-
* *
|
|
117
|
-
* *
|
|
109
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
110
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
111
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
112
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
113
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
114
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
115
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
116
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
117
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
118
118
|
*
|
|
119
119
|
* ## Import
|
|
120
120
|
*
|
package/peering.js
CHANGED
|
@@ -110,15 +110,15 @@ const utilities = require("./utilities");
|
|
|
110
110
|
* ## Getting Started
|
|
111
111
|
*
|
|
112
112
|
* The following end-to-end examples might help to get started with `confluentcloud.Peering` resource:
|
|
113
|
-
* *
|
|
114
|
-
* *
|
|
115
|
-
* *
|
|
116
|
-
* *
|
|
117
|
-
* *
|
|
118
|
-
* *
|
|
119
|
-
* *
|
|
120
|
-
* *
|
|
121
|
-
* *
|
|
113
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
114
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
115
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
116
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
117
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
118
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
119
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
120
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
121
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
122
122
|
*
|
|
123
123
|
* ## Import
|
|
124
124
|
*
|
package/privateLinkAccess.d.ts
CHANGED
|
@@ -107,12 +107,12 @@ import * as outputs from "./types/output";
|
|
|
107
107
|
* ## Getting Started
|
|
108
108
|
*
|
|
109
109
|
* The following end-to-end examples might help to get started with `confluentcloud.PrivateLinkAccess` resource:
|
|
110
|
-
* *
|
|
111
|
-
* *
|
|
112
|
-
* *
|
|
113
|
-
* *
|
|
114
|
-
* *
|
|
115
|
-
* *
|
|
110
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
111
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
112
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
113
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
114
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
115
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
116
116
|
*
|
|
117
117
|
* ## Import
|
|
118
118
|
*
|
package/privateLinkAccess.js
CHANGED
|
@@ -111,12 +111,12 @@ const utilities = require("./utilities");
|
|
|
111
111
|
* ## Getting Started
|
|
112
112
|
*
|
|
113
113
|
* The following end-to-end examples might help to get started with `confluentcloud.PrivateLinkAccess` resource:
|
|
114
|
-
* *
|
|
115
|
-
* *
|
|
116
|
-
* *
|
|
117
|
-
* *
|
|
118
|
-
* *
|
|
119
|
-
* *
|
|
114
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
115
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
116
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
117
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
118
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
119
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
120
120
|
*
|
|
121
121
|
* ## Import
|
|
122
122
|
*
|
|
@@ -26,8 +26,8 @@ import * as outputs from "./types/output";
|
|
|
26
26
|
* ## Getting Started
|
|
27
27
|
*
|
|
28
28
|
* The following end-to-end examples might help to get started with `confluentcloud.PrivateLinkAttachment` resource:
|
|
29
|
-
* *
|
|
30
|
-
* *
|
|
29
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
30
|
+
* * enterprise-privatelinkattachment-azure-kafka-acls: _Enterprise_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
31
31
|
*
|
|
32
32
|
* ## Import
|
|
33
33
|
*
|
package/privateLinkAttachment.js
CHANGED
|
@@ -30,8 +30,8 @@ const utilities = require("./utilities");
|
|
|
30
30
|
* ## Getting Started
|
|
31
31
|
*
|
|
32
32
|
* The following end-to-end examples might help to get started with `confluentcloud.PrivateLinkAttachment` resource:
|
|
33
|
-
* *
|
|
34
|
-
* *
|
|
33
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
34
|
+
* * enterprise-privatelinkattachment-azure-kafka-acls: _Enterprise_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
35
35
|
*
|
|
36
36
|
* ## Import
|
|
37
37
|
*
|
|
@@ -54,8 +54,8 @@ import * as outputs from "./types/output";
|
|
|
54
54
|
* ## Getting Started
|
|
55
55
|
*
|
|
56
56
|
* The following end-to-end examples might help to get started with `confluentcloud.PrivateLinkAttachmentConnection` resource:
|
|
57
|
-
* *
|
|
58
|
-
* *
|
|
57
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
58
|
+
* * enterprise-privatelinkattachment-azure-kafka-acls: _Enterprise_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
59
59
|
*
|
|
60
60
|
* ## Import
|
|
61
61
|
*
|
|
@@ -58,8 +58,8 @@ const utilities = require("./utilities");
|
|
|
58
58
|
* ## Getting Started
|
|
59
59
|
*
|
|
60
60
|
* The following end-to-end examples might help to get started with `confluentcloud.PrivateLinkAttachmentConnection` resource:
|
|
61
|
-
* *
|
|
62
|
-
* *
|
|
61
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
62
|
+
* * enterprise-privatelinkattachment-azure-kafka-acls: _Enterprise_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
63
63
|
*
|
|
64
64
|
* ## Import
|
|
65
65
|
*
|
package/providerIntegration.d.ts
CHANGED
|
@@ -28,7 +28,7 @@ import * as outputs from "./types/output";
|
|
|
28
28
|
* ## Getting Started
|
|
29
29
|
*
|
|
30
30
|
* The following end-to-end examples might help to get started with `confluentcloud.ProviderIntegration` resource:
|
|
31
|
-
* *
|
|
31
|
+
* * s3-sink-connector-assume-role: Amazon S3 Sink Connector with IAM role-based authorization using a Provider Integration
|
|
32
32
|
*
|
|
33
33
|
* ## Import
|
|
34
34
|
*
|
package/providerIntegration.js
CHANGED
|
@@ -32,7 +32,7 @@ const utilities = require("./utilities");
|
|
|
32
32
|
* ## Getting Started
|
|
33
33
|
*
|
|
34
34
|
* The following end-to-end examples might help to get started with `confluentcloud.ProviderIntegration` resource:
|
|
35
|
-
* *
|
|
35
|
+
* * s3-sink-connector-assume-role: Amazon S3 Sink Connector with IAM role-based authorization using a Provider Integration
|
|
36
36
|
*
|
|
37
37
|
* ## Import
|
|
38
38
|
*
|
package/serviceAccount.d.ts
CHANGED
|
@@ -19,27 +19,27 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
* ## Getting Started
|
|
20
20
|
*
|
|
21
21
|
* The following end-to-end examples might help to get started with `confluentcloud.ServiceAccount` resource:
|
|
22
|
-
* *
|
|
23
|
-
* *
|
|
24
|
-
* *
|
|
25
|
-
* *
|
|
26
|
-
* *
|
|
27
|
-
* *
|
|
28
|
-
* *
|
|
29
|
-
* *
|
|
30
|
-
* *
|
|
31
|
-
* *
|
|
32
|
-
* *
|
|
33
|
-
* *
|
|
34
|
-
* *
|
|
35
|
-
* *
|
|
36
|
-
* *
|
|
37
|
-
* *
|
|
38
|
-
* *
|
|
39
|
-
* *
|
|
40
|
-
* *
|
|
41
|
-
* *
|
|
42
|
-
* *
|
|
22
|
+
* * basic-kafka-acls: _Basic_ Kafka cluster with authorization using ACLs
|
|
23
|
+
* * basic-kafka-acls-with-alias: _Basic_ Kafka cluster with authorization using ACLs
|
|
24
|
+
* * standard-kafka-acls: _Standard_ Kafka cluster with authorization using ACLs
|
|
25
|
+
* * standard-kafka-rbac: _Standard_ Kafka cluster with authorization using RBAC
|
|
26
|
+
* * dedicated-public-kafka-acls: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using ACLs
|
|
27
|
+
* * dedicated-public-kafka-rbac: _Dedicated_ Kafka cluster that is accessible over the public internet with authorization using RBAC
|
|
28
|
+
* * dedicated-privatelink-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
29
|
+
* * dedicated-privatelink-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using RBAC
|
|
30
|
+
* * dedicated-privatelink-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using RBAC
|
|
31
|
+
* * dedicated-privatelink-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via PrivateLink connections with authorization using ACLs
|
|
32
|
+
* * dedicated-private-service-connect-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using ACLs
|
|
33
|
+
* * dedicated-private-service-connect-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via Private Service Connect connections with authorization using RBAC
|
|
34
|
+
* * dedicated-vnet-peering-azure-kafka-acls: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using ACLs
|
|
35
|
+
* * dedicated-vnet-peering-azure-kafka-rbac: _Dedicated_ Kafka cluster on Azure that is accessible via VPC Peering connections with authorization using RBAC
|
|
36
|
+
* * dedicated-vpc-peering-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using ACLs
|
|
37
|
+
* * dedicated-vpc-peering-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via VPC Peering connections with authorization using RBAC
|
|
38
|
+
* * dedicated-vpc-peering-gcp-kafka-acls: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using ACLs
|
|
39
|
+
* * dedicated-vpc-peering-gcp-kafka-rbac: _Dedicated_ Kafka cluster on GCP that is accessible via VPC Peering connections with authorization using RBAC
|
|
40
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-acls: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using ACLs
|
|
41
|
+
* * dedicated-transit-gateway-attachment-aws-kafka-rbac: _Dedicated_ Kafka cluster on AWS that is accessible via Transit Gateway Endpoint with authorization using RBAC
|
|
42
|
+
* * enterprise-privatelinkattachment-aws-kafka-acls: _Enterprise_ Kafka cluster on AWS that is accessible via PrivateLink connections with authorization using ACLs
|
|
43
43
|
*
|
|
44
44
|
* ## Import
|
|
45
45
|
*
|