@robinmordasiewicz/f5xc-terraform-mcp 2.4.8 → 2.6.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (290) hide show
  1. package/dist/docs/data-sources/addon_subscription.md +85 -2
  2. package/dist/docs/data-sources/address_allocator.md +85 -2
  3. package/dist/docs/data-sources/advertise_policy.md +85 -2
  4. package/dist/docs/data-sources/alert_policy.md +85 -2
  5. package/dist/docs/data-sources/alert_receiver.md +85 -2
  6. package/dist/docs/data-sources/allowed_tenant.md +85 -2
  7. package/dist/docs/data-sources/api_crawler.md +85 -2
  8. package/dist/docs/data-sources/api_credential.md +85 -2
  9. package/dist/docs/data-sources/api_definition.md +85 -2
  10. package/dist/docs/data-sources/api_discovery.md +85 -2
  11. package/dist/docs/data-sources/api_testing.md +85 -2
  12. package/dist/docs/data-sources/apm.md +85 -2
  13. package/dist/docs/data-sources/app_api_group.md +85 -2
  14. package/dist/docs/data-sources/app_firewall.md +85 -2
  15. package/dist/docs/data-sources/app_setting.md +85 -2
  16. package/dist/docs/data-sources/app_type.md +85 -2
  17. package/dist/docs/data-sources/authentication.md +85 -2
  18. package/dist/docs/data-sources/aws_tgw_site.md +85 -2
  19. package/dist/docs/data-sources/aws_vpc_site.md +85 -2
  20. package/dist/docs/data-sources/azure_vnet_site.md +85 -2
  21. package/dist/docs/data-sources/bgp.md +85 -2
  22. package/dist/docs/data-sources/bgp_asn_set.md +85 -2
  23. package/dist/docs/data-sources/bgp_routing_policy.md +85 -2
  24. package/dist/docs/data-sources/bigip_irule.md +85 -2
  25. package/dist/docs/data-sources/bot_defense_app_infrastructure.md +85 -2
  26. package/dist/docs/data-sources/cdn_cache_rule.md +85 -2
  27. package/dist/docs/data-sources/cdn_loadbalancer.md +85 -2
  28. package/dist/docs/data-sources/certificate.md +85 -2
  29. package/dist/docs/data-sources/certificate_chain.md +85 -2
  30. package/dist/docs/data-sources/child_tenant.md +85 -2
  31. package/dist/docs/data-sources/child_tenant_manager.md +85 -2
  32. package/dist/docs/data-sources/cloud_connect.md +85 -2
  33. package/dist/docs/data-sources/cloud_credentials.md +85 -2
  34. package/dist/docs/data-sources/cloud_elastic_ip.md +85 -2
  35. package/dist/docs/data-sources/cloud_link.md +85 -2
  36. package/dist/docs/data-sources/cluster.md +85 -2
  37. package/dist/docs/data-sources/cminstance.md +85 -2
  38. package/dist/docs/data-sources/code_base_integration.md +85 -2
  39. package/dist/docs/data-sources/contact.md +85 -2
  40. package/dist/docs/data-sources/container_registry.md +85 -2
  41. package/dist/docs/data-sources/crl.md +85 -2
  42. package/dist/docs/data-sources/customer_support.md +85 -2
  43. package/dist/docs/data-sources/data_group.md +85 -2
  44. package/dist/docs/data-sources/data_type.md +85 -2
  45. package/dist/docs/data-sources/dc_cluster_group.md +85 -2
  46. package/dist/docs/data-sources/discovery.md +85 -2
  47. package/dist/docs/data-sources/dns_compliance_checks.md +85 -2
  48. package/dist/docs/data-sources/dns_domain.md +85 -2
  49. package/dist/docs/data-sources/dns_lb_health_check.md +85 -2
  50. package/dist/docs/data-sources/dns_lb_pool.md +85 -2
  51. package/dist/docs/data-sources/dns_load_balancer.md +85 -2
  52. package/dist/docs/data-sources/dns_zone.md +85 -2
  53. package/dist/docs/data-sources/endpoint.md +85 -2
  54. package/dist/docs/data-sources/enhanced_firewall_policy.md +85 -2
  55. package/dist/docs/data-sources/external_connector.md +85 -2
  56. package/dist/docs/data-sources/fast_acl.md +85 -2
  57. package/dist/docs/data-sources/fast_acl_rule.md +85 -2
  58. package/dist/docs/data-sources/filter_set.md +85 -2
  59. package/dist/docs/data-sources/fleet.md +85 -2
  60. package/dist/docs/data-sources/forward_proxy_policy.md +85 -2
  61. package/dist/docs/data-sources/forwarding_class.md +85 -2
  62. package/dist/docs/data-sources/gcp_vpc_site.md +85 -2
  63. package/dist/docs/data-sources/geo_location_set.md +85 -2
  64. package/dist/docs/data-sources/global_log_receiver.md +85 -2
  65. package/dist/docs/data-sources/healthcheck.md +85 -2
  66. package/dist/docs/data-sources/http_loadbalancer.md +85 -2
  67. package/dist/docs/data-sources/ike1.md +85 -2
  68. package/dist/docs/data-sources/ike2.md +85 -2
  69. package/dist/docs/data-sources/ike_phase1_profile.md +85 -2
  70. package/dist/docs/data-sources/ike_phase2_profile.md +85 -2
  71. package/dist/docs/data-sources/infraprotect_asn.md +85 -2
  72. package/dist/docs/data-sources/infraprotect_asn_prefix.md +85 -2
  73. package/dist/docs/data-sources/infraprotect_deny_list_rule.md +85 -2
  74. package/dist/docs/data-sources/infraprotect_firewall_rule.md +85 -2
  75. package/dist/docs/data-sources/infraprotect_firewall_rule_group.md +85 -2
  76. package/dist/docs/data-sources/infraprotect_internet_prefix_advertisement.md +85 -2
  77. package/dist/docs/data-sources/infraprotect_tunnel.md +85 -2
  78. package/dist/docs/data-sources/ip_prefix_set.md +85 -2
  79. package/dist/docs/data-sources/irule.md +85 -2
  80. package/dist/docs/data-sources/k8s_cluster.md +85 -2
  81. package/dist/docs/data-sources/k8s_cluster_role.md +85 -2
  82. package/dist/docs/data-sources/k8s_cluster_role_binding.md +85 -2
  83. package/dist/docs/data-sources/k8s_pod_security_admission.md +85 -2
  84. package/dist/docs/data-sources/k8s_pod_security_policy.md +85 -2
  85. package/dist/docs/data-sources/log_receiver.md +85 -2
  86. package/dist/docs/data-sources/malicious_user_mitigation.md +85 -2
  87. package/dist/docs/data-sources/managed_tenant.md +85 -2
  88. package/dist/docs/data-sources/namespace.md +85 -2
  89. package/dist/docs/data-sources/nat_policy.md +85 -2
  90. package/dist/docs/data-sources/network_connector.md +85 -2
  91. package/dist/docs/data-sources/network_firewall.md +85 -2
  92. package/dist/docs/data-sources/network_interface.md +85 -2
  93. package/dist/docs/data-sources/network_policy.md +85 -2
  94. package/dist/docs/data-sources/network_policy_rule.md +85 -2
  95. package/dist/docs/data-sources/network_policy_view.md +85 -2
  96. package/dist/docs/data-sources/nfv_service.md +85 -2
  97. package/dist/docs/data-sources/oidc_provider.md +85 -2
  98. package/dist/docs/data-sources/origin_pool.md +85 -2
  99. package/dist/docs/data-sources/policer.md +85 -2
  100. package/dist/docs/data-sources/policy_based_routing.md +85 -2
  101. package/dist/docs/data-sources/protocol_inspection.md +85 -2
  102. package/dist/docs/data-sources/protocol_policer.md +85 -2
  103. package/dist/docs/data-sources/proxy.md +85 -2
  104. package/dist/docs/data-sources/quota.md +85 -2
  105. package/dist/docs/data-sources/rate_limiter.md +85 -2
  106. package/dist/docs/data-sources/rate_limiter_policy.md +85 -2
  107. package/dist/docs/data-sources/registration.md +85 -2
  108. package/dist/docs/data-sources/report_config.md +85 -2
  109. package/dist/docs/data-sources/role.md +85 -2
  110. package/dist/docs/data-sources/route.md +85 -2
  111. package/dist/docs/data-sources/secret_management_access.md +85 -2
  112. package/dist/docs/data-sources/secret_policy.md +85 -2
  113. package/dist/docs/data-sources/secret_policy_rule.md +85 -2
  114. package/dist/docs/data-sources/securemesh_site.md +85 -2
  115. package/dist/docs/data-sources/securemesh_site_v2.md +85 -2
  116. package/dist/docs/data-sources/segment.md +85 -2
  117. package/dist/docs/data-sources/sensitive_data_policy.md +85 -2
  118. package/dist/docs/data-sources/service_policy.md +85 -2
  119. package/dist/docs/data-sources/service_policy_rule.md +85 -2
  120. package/dist/docs/data-sources/site_mesh_group.md +85 -2
  121. package/dist/docs/data-sources/srv6_network_slice.md +85 -2
  122. package/dist/docs/data-sources/subnet.md +85 -2
  123. package/dist/docs/data-sources/tcp_loadbalancer.md +85 -2
  124. package/dist/docs/data-sources/tenant_configuration.md +85 -2
  125. package/dist/docs/data-sources/tenant_profile.md +85 -2
  126. package/dist/docs/data-sources/ticket_tracking_system.md +85 -2
  127. package/dist/docs/data-sources/token.md +85 -2
  128. package/dist/docs/data-sources/tpm_api_key.md +85 -2
  129. package/dist/docs/data-sources/tpm_category.md +85 -2
  130. package/dist/docs/data-sources/tpm_manager.md +85 -2
  131. package/dist/docs/data-sources/trusted_ca_list.md +85 -2
  132. package/dist/docs/data-sources/tunnel.md +85 -2
  133. package/dist/docs/data-sources/udp_loadbalancer.md +85 -2
  134. package/dist/docs/data-sources/usb_policy.md +85 -2
  135. package/dist/docs/data-sources/user_identification.md +85 -2
  136. package/dist/docs/data-sources/virtual_host.md +85 -2
  137. package/dist/docs/data-sources/virtual_k8s.md +85 -2
  138. package/dist/docs/data-sources/virtual_network.md +85 -2
  139. package/dist/docs/data-sources/virtual_site.md +85 -2
  140. package/dist/docs/data-sources/voltshare_admin_policy.md +85 -2
  141. package/dist/docs/data-sources/voltstack_site.md +85 -2
  142. package/dist/docs/data-sources/waf_exclusion_policy.md +85 -2
  143. package/dist/docs/data-sources/workload.md +85 -2
  144. package/dist/docs/data-sources/workload_flavor.md +85 -2
  145. package/dist/docs/guides/advanced-http-loadbalancer.md +569 -0
  146. package/dist/docs/resources/addon_subscription.md +87 -10
  147. package/dist/docs/resources/address_allocator.md +86 -3
  148. package/dist/docs/resources/advertise_policy.md +112 -57
  149. package/dist/docs/resources/alert_policy.md +91 -8
  150. package/dist/docs/resources/alert_receiver.md +94 -55
  151. package/dist/docs/resources/allowed_tenant.md +87 -10
  152. package/dist/docs/resources/api_crawler.md +86 -3
  153. package/dist/docs/resources/api_credential.md +86 -3
  154. package/dist/docs/resources/api_definition.md +89 -6
  155. package/dist/docs/resources/api_discovery.md +86 -3
  156. package/dist/docs/resources/api_testing.md +95 -52
  157. package/dist/docs/resources/apm.md +156 -519
  158. package/dist/docs/resources/app_api_group.md +90 -25
  159. package/dist/docs/resources/app_firewall.md +87 -6
  160. package/dist/docs/resources/app_setting.md +97 -66
  161. package/dist/docs/resources/app_type.md +86 -3
  162. package/dist/docs/resources/authentication.md +90 -27
  163. package/dist/docs/resources/aws_tgw_site.md +125 -222
  164. package/dist/docs/resources/aws_vpc_site.md +149 -352
  165. package/dist/docs/resources/azure_vnet_site.md +233 -860
  166. package/dist/docs/resources/bgp.md +103 -32
  167. package/dist/docs/resources/bgp_asn_set.md +86 -3
  168. package/dist/docs/resources/bgp_routing_policy.md +86 -3
  169. package/dist/docs/resources/bigip_irule.md +86 -3
  170. package/dist/docs/resources/bot_defense_app_infrastructure.md +86 -3
  171. package/dist/docs/resources/cdn_cache_rule.md +97 -120
  172. package/dist/docs/resources/cdn_loadbalancer.md +325 -1620
  173. package/dist/docs/resources/certificate.md +87 -10
  174. package/dist/docs/resources/certificate_chain.md +86 -3
  175. package/dist/docs/resources/child_tenant.md +88 -17
  176. package/dist/docs/resources/child_tenant_manager.md +88 -17
  177. package/dist/docs/resources/cloud_connect.md +98 -63
  178. package/dist/docs/resources/cloud_credentials.md +92 -39
  179. package/dist/docs/resources/cloud_elastic_ip.md +91 -8
  180. package/dist/docs/resources/cloud_link.md +90 -29
  181. package/dist/docs/resources/cluster.md +109 -66
  182. package/dist/docs/resources/cminstance.md +86 -3
  183. package/dist/docs/resources/code_base_integration.md +100 -87
  184. package/dist/docs/resources/contact.md +86 -3
  185. package/dist/docs/resources/container_registry.md +86 -3
  186. package/dist/docs/resources/crl.md +86 -3
  187. package/dist/docs/resources/customer_support.md +91 -8
  188. package/dist/docs/resources/data_group.md +86 -3
  189. package/dist/docs/resources/data_type.md +88 -9
  190. package/dist/docs/resources/dc_cluster_group.md +86 -3
  191. package/dist/docs/resources/discovery.md +115 -104
  192. package/dist/docs/resources/dns_compliance_checks.md +86 -3
  193. package/dist/docs/resources/dns_domain.md +86 -3
  194. package/dist/docs/resources/dns_lb_health_check.md +86 -3
  195. package/dist/docs/resources/dns_lb_pool.md +87 -10
  196. package/dist/docs/resources/dns_load_balancer.md +95 -40
  197. package/dist/docs/resources/dns_zone.md +86 -3
  198. package/dist/docs/resources/endpoint.md +101 -18
  199. package/dist/docs/resources/enhanced_firewall_policy.md +89 -32
  200. package/dist/docs/resources/external_connector.md +94 -29
  201. package/dist/docs/resources/fast_acl.md +100 -101
  202. package/dist/docs/resources/fast_acl_rule.md +101 -18
  203. package/dist/docs/resources/filter_set.md +86 -3
  204. package/dist/docs/resources/fleet.md +170 -541
  205. package/dist/docs/resources/forward_proxy_policy.md +90 -31
  206. package/dist/docs/resources/forwarding_class.md +87 -10
  207. package/dist/docs/resources/gcp_vpc_site.md +141 -328
  208. package/dist/docs/resources/geo_location_set.md +86 -3
  209. package/dist/docs/resources/global_log_receiver.md +116 -181
  210. package/dist/docs/resources/healthcheck.md +86 -3
  211. package/dist/docs/resources/http_loadbalancer.md +523 -2778
  212. package/dist/docs/resources/ike1.md +86 -3
  213. package/dist/docs/resources/ike2.md +86 -3
  214. package/dist/docs/resources/ike_phase1_profile.md +86 -3
  215. package/dist/docs/resources/ike_phase2_profile.md +86 -3
  216. package/dist/docs/resources/infraprotect_asn.md +86 -3
  217. package/dist/docs/resources/infraprotect_asn_prefix.md +87 -10
  218. package/dist/docs/resources/infraprotect_deny_list_rule.md +86 -3
  219. package/dist/docs/resources/infraprotect_firewall_rule.md +86 -3
  220. package/dist/docs/resources/infraprotect_firewall_rule_group.md +86 -3
  221. package/dist/docs/resources/infraprotect_internet_prefix_advertisement.md +86 -3
  222. package/dist/docs/resources/infraprotect_tunnel.md +90 -29
  223. package/dist/docs/resources/ip_prefix_set.md +86 -3
  224. package/dist/docs/resources/irule.md +86 -3
  225. package/dist/docs/resources/k8s_cluster.md +93 -58
  226. package/dist/docs/resources/k8s_cluster_role.md +87 -8
  227. package/dist/docs/resources/k8s_cluster_role_binding.md +87 -10
  228. package/dist/docs/resources/k8s_pod_security_admission.md +86 -3
  229. package/dist/docs/resources/k8s_pod_security_policy.md +87 -8
  230. package/dist/docs/resources/log_receiver.md +88 -15
  231. package/dist/docs/resources/malicious_user_mitigation.md +86 -3
  232. package/dist/docs/resources/managed_tenant.md +89 -12
  233. package/dist/docs/resources/namespace.md +86 -3
  234. package/dist/docs/resources/nat_policy.md +126 -43
  235. package/dist/docs/resources/network_connector.md +94 -51
  236. package/dist/docs/resources/network_firewall.md +90 -31
  237. package/dist/docs/resources/network_interface.md +93 -46
  238. package/dist/docs/resources/network_policy.md +96 -13
  239. package/dist/docs/resources/network_policy_rule.md +91 -8
  240. package/dist/docs/resources/network_policy_view.md +96 -13
  241. package/dist/docs/resources/nfv_service.md +153 -446
  242. package/dist/docs/resources/oidc_provider.md +86 -3
  243. package/dist/docs/resources/origin_pool.md +108 -145
  244. package/dist/docs/resources/policer.md +86 -3
  245. package/dist/docs/resources/policy_based_routing.md +100 -89
  246. package/dist/docs/resources/protocol_inspection.md +87 -10
  247. package/dist/docs/resources/protocol_policer.md +91 -8
  248. package/dist/docs/resources/proxy.md +154 -571
  249. package/dist/docs/resources/quota.md +86 -3
  250. package/dist/docs/resources/rate_limiter.md +91 -8
  251. package/dist/docs/resources/rate_limiter_policy.md +100 -23
  252. package/dist/docs/resources/registration.md +86 -3
  253. package/dist/docs/resources/report_config.md +87 -10
  254. package/dist/docs/resources/role.md +86 -3
  255. package/dist/docs/resources/route.md +113 -82
  256. package/dist/docs/resources/secret_management_access.md +127 -156
  257. package/dist/docs/resources/secret_policy.md +87 -4
  258. package/dist/docs/resources/secret_policy_rule.md +86 -3
  259. package/dist/docs/resources/securemesh_site.md +137 -380
  260. package/dist/docs/resources/securemesh_site_v2.md +289 -1204
  261. package/dist/docs/resources/segment.md +86 -3
  262. package/dist/docs/resources/sensitive_data_policy.md +87 -10
  263. package/dist/docs/resources/service_policy.md +115 -122
  264. package/dist/docs/resources/service_policy_rule.md +110 -59
  265. package/dist/docs/resources/site_mesh_group.md +92 -15
  266. package/dist/docs/resources/srv6_network_slice.md +86 -3
  267. package/dist/docs/resources/subnet.md +89 -20
  268. package/dist/docs/resources/tcp_loadbalancer.md +114 -185
  269. package/dist/docs/resources/tenant_configuration.md +86 -3
  270. package/dist/docs/resources/tenant_profile.md +87 -10
  271. package/dist/docs/resources/ticket_tracking_system.md +86 -3
  272. package/dist/docs/resources/token.md +86 -3
  273. package/dist/docs/resources/tpm_api_key.md +91 -8
  274. package/dist/docs/resources/tpm_category.md +91 -8
  275. package/dist/docs/resources/tpm_manager.md +86 -3
  276. package/dist/docs/resources/trusted_ca_list.md +86 -3
  277. package/dist/docs/resources/tunnel.md +91 -8
  278. package/dist/docs/resources/udp_loadbalancer.md +97 -80
  279. package/dist/docs/resources/usb_policy.md +86 -3
  280. package/dist/docs/resources/user_identification.md +86 -3
  281. package/dist/docs/resources/virtual_host.md +152 -177
  282. package/dist/docs/resources/virtual_k8s.md +92 -15
  283. package/dist/docs/resources/virtual_network.md +91 -8
  284. package/dist/docs/resources/virtual_site.md +86 -3
  285. package/dist/docs/resources/voltshare_admin_policy.md +86 -11
  286. package/dist/docs/resources/voltstack_site.md +380 -1365
  287. package/dist/docs/resources/waf_exclusion_policy.md +91 -28
  288. package/dist/docs/resources/workload.md +1189 -4148
  289. package/dist/docs/resources/workload_flavor.md +86 -3
  290. package/package.json +1 -1
@@ -2,12 +2,12 @@
2
2
  page_title: "f5xc_geo_location_set Resource - terraform-provider-f5xc"
3
3
  subcategory: "Cloud Resources"
4
4
  description: |-
5
- [Namespace: required] Manages Geolocation Set in F5 Distributed Cloud.
5
+ Manages Geolocation Set in F5 Distributed Cloud.
6
6
  ---
7
7
 
8
8
  # f5xc_geo_location_set (Resource)
9
9
 
10
- [Namespace: required] Manages Geolocation Set in F5 Distributed Cloud.
10
+ Manages Geolocation Set in F5 Distributed Cloud.
11
11
 
12
12
  ~> **Note** Please refer to [Geo Location Set API docs](https://docs.cloud.f5.com/docs-v2/api/geo-location-set) to learn more.
13
13
 
@@ -15,7 +15,7 @@ description: |-
15
15
 
16
16
  ```terraform
17
17
  # Geo Location Set Resource Example
18
- # [Namespace: required] Manages Geolocation Set in F5 Distributed Cloud.
18
+ # Manages Geolocation Set in F5 Distributed Cloud.
19
19
 
20
20
  # Basic Geo Location Set configuration
21
21
  resource "f5xc_geo_location_set" "example" {
@@ -87,6 +87,89 @@ A [`timeouts`](#timeouts) block supports the following:
87
87
 
88
88
  <a id="timeouts-update"></a>&#x2022; [`update`](#timeouts-update) - Optional String (Defaults to `10 minutes`)<br>Used when updating the resource
89
89
 
90
+ ---
91
+
92
+ ## Common Types
93
+
94
+ The following type definitions are used throughout this resource. See the full definition here rather than repeated inline.
95
+
96
+ ### Object Reference {#common-object-reference}
97
+
98
+ Object references establish a direct reference from one configuration object to another in F5 Distributed Cloud. References use the format `tenant/namespace/name`.
99
+
100
+ | Field | Type | Description |
101
+ | ----- | ---- | ----------- |
102
+ | `name` | String | Name of the referenced object |
103
+ | `namespace` | String | Namespace containing the referenced object |
104
+ | `tenant` | String | Tenant of the referenced object (system-managed) |
105
+
106
+ ### Transformers {#common-transformers}
107
+
108
+ Transformers apply transformations to input values before matching. Multiple transformers can be applied in order.
109
+
110
+ | Value | Description |
111
+ | ----- | ----------- |
112
+ | `LOWER_CASE` | Convert to lowercase |
113
+ | `UPPER_CASE` | Convert to uppercase |
114
+ | `BASE64_DECODE` | Decode base64 content |
115
+ | `NORMALIZE_PATH` | Normalize URL path |
116
+ | `REMOVE_WHITESPACE` | Remove whitespace characters |
117
+ | `URL_DECODE` | Decode URL-encoded characters |
118
+ | `TRIM_LEFT` | Trim leading whitespace |
119
+ | `TRIM_RIGHT` | Trim trailing whitespace |
120
+ | `TRIM` | Trim both leading and trailing whitespace |
121
+
122
+ ### HTTP Methods {#common-http-methods}
123
+
124
+ HTTP methods used for request matching.
125
+
126
+ | Value | Description |
127
+ | ----- | ----------- |
128
+ | `ANY` | Match any HTTP method |
129
+ | `GET` | HTTP GET request |
130
+ | `HEAD` | HTTP HEAD request |
131
+ | `POST` | HTTP POST request |
132
+ | `PUT` | HTTP PUT request |
133
+ | `DELETE` | HTTP DELETE request |
134
+ | `CONNECT` | HTTP CONNECT request |
135
+ | `OPTIONS` | HTTP OPTIONS request |
136
+ | `TRACE` | HTTP TRACE request |
137
+ | `PATCH` | HTTP PATCH request |
138
+ | `COPY` | HTTP COPY request (WebDAV) |
139
+
140
+ ### TLS Fingerprints {#common-tls-fingerprints}
141
+
142
+ TLS fingerprint categories for malicious client detection.
143
+
144
+ | Value | Description |
145
+ | ----- | ----------- |
146
+ | `TLS_FINGERPRINT_NONE` | No fingerprint matching |
147
+ | `ANY_MALICIOUS_FINGERPRINT` | Match any known malicious fingerprint |
148
+ | `ADWARE` | Adware-associated fingerprints |
149
+ | `DRIDEX` | Dridex malware fingerprints |
150
+ | `GOOTKIT` | Gootkit malware fingerprints |
151
+ | `RANSOMWARE` | Ransomware-associated fingerprints |
152
+ | `TRICKBOT` | Trickbot malware fingerprints |
153
+
154
+ ### IP Threat Categories {#common-ip-threat-categories}
155
+
156
+ IP address threat categories for security filtering.
157
+
158
+ | Value | Description |
159
+ | ----- | ----------- |
160
+ | `SPAM_SOURCES` | Known spam sources |
161
+ | `WINDOWS_EXPLOITS` | Windows exploit sources |
162
+ | `WEB_ATTACKS` | Web attack sources |
163
+ | `BOTNETS` | Known botnet IPs |
164
+ | `SCANNERS` | Network scanner IPs |
165
+ | `REPUTATION` | Poor reputation IPs |
166
+ | `PHISHING` | Phishing-related IPs |
167
+ | `PROXY` | Anonymous proxy IPs |
168
+ | `MOBILE_THREATS` | Mobile threat sources |
169
+ | `TOR_PROXY` | Tor exit nodes |
170
+ | `DENIAL_OF_SERVICE` | DoS attack sources |
171
+ | `NETWORK` | Known bad network ranges |
172
+
90
173
  ## Import
91
174
 
92
175
  Import is supported using the following syntax:
@@ -2,12 +2,12 @@
2
2
  page_title: "f5xc_global_log_receiver Resource - terraform-provider-f5xc"
3
3
  subcategory: "Monitoring"
4
4
  description: |-
5
- [Category: Monitoring] [Namespace: required] Manages a Global Log Receiver resource in F5 Distributed Cloud for global log aggregation settings.
5
+ Manages a Global Log Receiver resource in F5 Distributed Cloud for global log aggregation settings.
6
6
  ---
7
7
 
8
8
  # f5xc_global_log_receiver (Resource)
9
9
 
10
- [Category: Monitoring] [Namespace: required] Manages a Global Log Receiver resource in F5 Distributed Cloud for global log aggregation settings.
10
+ Manages a Global Log Receiver resource in F5 Distributed Cloud for global log aggregation settings.
11
11
 
12
12
  ~> **Note** Please refer to [Global Log Receiver API docs](https://docs.cloud.f5.com/docs-v2/api/global-log-receiver) to learn more.
13
13
 
@@ -15,7 +15,7 @@ description: |-
15
15
 
16
16
  ```terraform
17
17
  # Global Log Receiver Resource Example
18
- # [Category: Monitoring] [Namespace: required] Manages a Global Log Receiver resource in F5 Distributed Cloud for global log aggregation settings.
18
+ # Manages a Global Log Receiver resource in F5 Distributed Cloud for global log aggregation settings.
19
19
 
20
20
  # Basic Global Log Receiver configuration
21
21
  resource "f5xc_global_log_receiver" "example" {
@@ -119,13 +119,7 @@ An [`aws_cloud_watch_receiver`](#aws-cloud-watch-receiver) block supports the fo
119
119
 
120
120
  #### AWS Cloud Watch Receiver AWS Cred
121
121
 
122
- An [`aws_cred`](#aws-cloud-watch-receiver-aws-cred) block (within [`aws_cloud_watch_receiver`](#aws-cloud-watch-receiver)) supports the following:
123
-
124
- <a id="aws-cloud-watch-receiver-aws-cred-name"></a>&#x2022; [`name`](#aws-cloud-watch-receiver-aws-cred-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
125
-
126
- <a id="namespace-b9cb40"></a>&#x2022; [`namespace`](#namespace-b9cb40) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
127
-
128
- <a id="tenant-fc3ba9"></a>&#x2022; [`tenant`](#tenant-fc3ba9) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
122
+ <a id="objref-39c988"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
129
123
 
130
124
  #### AWS Cloud Watch Receiver Batch
131
125
 
@@ -173,21 +167,11 @@ A [`connection_string`](#string-b729f9) block (within [`azure_event_hubs_receive
173
167
 
174
168
  #### Azure Event Hubs Receiver Connection String Blindfold Secret Info
175
169
 
176
- A [`blindfold_secret_info`](#info-0b01ca) block (within [`azure_event_hubs_receiver.connection_string`](#string-b729f9)) supports the following:
177
-
178
- <a id="provider-9b65ec"></a>&#x2022; [`decryption_provider`](#provider-9b65ec) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
179
-
180
- <a id="location-44aff0"></a>&#x2022; [`location`](#location-44aff0) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
181
-
182
- <a id="provider-5ab1d8"></a>&#x2022; [`store_provider`](#provider-5ab1d8) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
170
+ <a id="deep-93e549"></a>Deeply nested **Info** block collapsed for readability.
183
171
 
184
172
  #### Azure Event Hubs Receiver Connection String Clear Secret Info
185
173
 
186
- A [`clear_secret_info`](#info-a586ad) block (within [`azure_event_hubs_receiver.connection_string`](#string-b729f9)) supports the following:
187
-
188
- <a id="ref-8b7732"></a>&#x2022; [`provider_ref`](#ref-8b7732) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
189
-
190
- <a id="url-70e945"></a>&#x2022; [`url`](#url-70e945) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
174
+ <a id="deep-2ae3ac"></a>Deeply nested **Info** block collapsed for readability.
191
175
 
192
176
  #### Azure Receiver
193
177
 
@@ -319,21 +303,11 @@ A [`datadog_api_key`](#datadog-receiver-datadog-api-key) block (within [`datadog
319
303
 
320
304
  #### Datadog Receiver Datadog API Key Blindfold Secret Info
321
305
 
322
- A [`blindfold_secret_info`](#info-c8197d) block (within [`datadog_receiver.datadog_api_key`](#datadog-receiver-datadog-api-key)) supports the following:
323
-
324
- <a id="provider-476ad5"></a>&#x2022; [`decryption_provider`](#provider-476ad5) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
325
-
326
- <a id="location-e0276e"></a>&#x2022; [`location`](#location-e0276e) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
327
-
328
- <a id="provider-41aa89"></a>&#x2022; [`store_provider`](#provider-41aa89) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
306
+ <a id="deep-c2b922"></a>Deeply nested **Info** block collapsed for readability.
329
307
 
330
308
  #### Datadog Receiver Datadog API Key Clear Secret Info
331
309
 
332
- A [`clear_secret_info`](#info-400d24) block (within [`datadog_receiver.datadog_api_key`](#datadog-receiver-datadog-api-key)) supports the following:
333
-
334
- <a id="ref-6ec775"></a>&#x2022; [`provider_ref`](#ref-6ec775) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
335
-
336
- <a id="url-744ac8"></a>&#x2022; [`url`](#url-744ac8) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
310
+ <a id="deep-e21218"></a>Deeply nested **Info** block collapsed for readability.
337
311
 
338
312
  #### Datadog Receiver Use TLS
339
313
 
@@ -365,29 +339,15 @@ A [`mtls_enable`](#datadog-receiver-use-tls-mtls-enable) block (within [`datadog
365
339
 
366
340
  #### Datadog Receiver Use TLS mTLS Enable Key URL
367
341
 
368
- A [`key_url`](#url-266095) block (within [`datadog_receiver.use_tls.mtls_enable`](#datadog-receiver-use-tls-mtls-enable)) supports the following:
369
-
370
- <a id="info-c88ca3"></a>&#x2022; [`blindfold_secret_info`](#info-c88ca3) - Optional Block<br>Blindfold Secret. BlindfoldSecretInfoType specifies information about the Secret managed by F5XC Secret Management<br>See [Blindfold Secret Info](#info-c88ca3) below.
371
-
372
- <a id="info-dca784"></a>&#x2022; [`clear_secret_info`](#info-dca784) - Optional Block<br>In-Clear Secret. ClearSecretInfoType specifies information about the Secret that is not encrypted<br>See [Clear Secret Info](#info-dca784) below.
342
+ <a id="deep-fe94b6"></a>Deeply nested **URL** block collapsed for readability.
373
343
 
374
344
  #### Datadog Receiver Use TLS mTLS Enable Key URL Blindfold Secret Info
375
345
 
376
- A [`blindfold_secret_info`](#info-c88ca3) block (within [`datadog_receiver.use_tls.mtls_enable.key_url`](#url-266095)) supports the following:
377
-
378
- <a id="provider-ef2180"></a>&#x2022; [`decryption_provider`](#provider-ef2180) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
379
-
380
- <a id="location-f6ec2e"></a>&#x2022; [`location`](#location-f6ec2e) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
381
-
382
- <a id="provider-ee5a93"></a>&#x2022; [`store_provider`](#provider-ee5a93) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
346
+ <a id="deep-5cf738"></a>Deeply nested **Info** block collapsed for readability.
383
347
 
384
348
  #### Datadog Receiver Use TLS mTLS Enable Key URL Clear Secret Info
385
349
 
386
- A [`clear_secret_info`](#info-dca784) block (within [`datadog_receiver.use_tls.mtls_enable.key_url`](#url-266095)) supports the following:
387
-
388
- <a id="ref-88b7a5"></a>&#x2022; [`provider_ref`](#ref-88b7a5) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
389
-
390
- <a id="url-b8d364"></a>&#x2022; [`url`](#url-b8d364) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
350
+ <a id="deep-3705c0"></a>Deeply nested **Info** block collapsed for readability.
391
351
 
392
352
  #### GCP Bucket Receiver
393
353
 
@@ -441,13 +401,7 @@ A [`filename_options`](#gcp-bucket-receiver-filename-options) block (within [`gc
441
401
 
442
402
  #### GCP Bucket Receiver GCP Cred
443
403
 
444
- A [`gcp_cred`](#gcp-bucket-receiver-gcp-cred) block (within [`gcp_bucket_receiver`](#gcp-bucket-receiver)) supports the following:
445
-
446
- <a id="gcp-bucket-receiver-gcp-cred-name"></a>&#x2022; [`name`](#gcp-bucket-receiver-gcp-cred-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
447
-
448
- <a id="gcp-bucket-receiver-gcp-cred-namespace"></a>&#x2022; [`namespace`](#gcp-bucket-receiver-gcp-cred-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
449
-
450
- <a id="gcp-bucket-receiver-gcp-cred-tenant"></a>&#x2022; [`tenant`](#gcp-bucket-receiver-gcp-cred-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
404
+ <a id="objref-9c508f"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
451
405
 
452
406
  #### HTTP Receiver
453
407
 
@@ -487,21 +441,11 @@ A [`password`](#http-receiver-auth-basic-password) block (within [`http_receiver
487
441
 
488
442
  #### HTTP Receiver Auth Basic Password Blindfold Secret Info
489
443
 
490
- A [`blindfold_secret_info`](#info-265ff8) block (within [`http_receiver.auth_basic.password`](#http-receiver-auth-basic-password)) supports the following:
491
-
492
- <a id="provider-fdc07f"></a>&#x2022; [`decryption_provider`](#provider-fdc07f) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
493
-
494
- <a id="location-6186b7"></a>&#x2022; [`location`](#location-6186b7) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
495
-
496
- <a id="provider-0b42a0"></a>&#x2022; [`store_provider`](#provider-0b42a0) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
444
+ <a id="deep-b0986f"></a>Deeply nested **Info** block collapsed for readability.
497
445
 
498
446
  #### HTTP Receiver Auth Basic Password Clear Secret Info
499
447
 
500
- A [`clear_secret_info`](#info-b23662) block (within [`http_receiver.auth_basic.password`](#http-receiver-auth-basic-password)) supports the following:
501
-
502
- <a id="ref-9763da"></a>&#x2022; [`provider_ref`](#ref-9763da) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
503
-
504
- <a id="url-579bb2"></a>&#x2022; [`url`](#url-579bb2) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
448
+ <a id="deep-7ce803"></a>Deeply nested **Info** block collapsed for readability.
505
449
 
506
450
  #### HTTP Receiver Auth Token
507
451
 
@@ -519,21 +463,11 @@ A [`token`](#http-receiver-auth-token-token) block (within [`http_receiver.auth_
519
463
 
520
464
  #### HTTP Receiver Auth Token Token Blindfold Secret Info
521
465
 
522
- A [`blindfold_secret_info`](#info-5dfb53) block (within [`http_receiver.auth_token.token`](#http-receiver-auth-token-token)) supports the following:
523
-
524
- <a id="provider-81048b"></a>&#x2022; [`decryption_provider`](#provider-81048b) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
525
-
526
- <a id="location-5f4c4b"></a>&#x2022; [`location`](#location-5f4c4b) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
527
-
528
- <a id="provider-efd8bc"></a>&#x2022; [`store_provider`](#provider-efd8bc) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
466
+ <a id="deep-8c7fd3"></a>Deeply nested **Info** block collapsed for readability.
529
467
 
530
468
  #### HTTP Receiver Auth Token Token Clear Secret Info
531
469
 
532
- A [`clear_secret_info`](#info-f68d67) block (within [`http_receiver.auth_token.token`](#http-receiver-auth-token-token)) supports the following:
533
-
534
- <a id="ref-3278a3"></a>&#x2022; [`provider_ref`](#ref-3278a3) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
535
-
536
- <a id="url-72879f"></a>&#x2022; [`url`](#url-72879f) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
470
+ <a id="deep-99cc0d"></a>Deeply nested **Info** block collapsed for readability.
537
471
 
538
472
  #### HTTP Receiver Batch
539
473
 
@@ -591,29 +525,15 @@ A [`mtls_enable`](#http-receiver-use-tls-mtls-enable) block (within [`http_recei
591
525
 
592
526
  #### HTTP Receiver Use TLS mTLS Enable Key URL
593
527
 
594
- A [`key_url`](#url-12d8b8) block (within [`http_receiver.use_tls.mtls_enable`](#http-receiver-use-tls-mtls-enable)) supports the following:
595
-
596
- <a id="info-e6a85d"></a>&#x2022; [`blindfold_secret_info`](#info-e6a85d) - Optional Block<br>Blindfold Secret. BlindfoldSecretInfoType specifies information about the Secret managed by F5XC Secret Management<br>See [Blindfold Secret Info](#info-e6a85d) below.
597
-
598
- <a id="info-45b078"></a>&#x2022; [`clear_secret_info`](#info-45b078) - Optional Block<br>In-Clear Secret. ClearSecretInfoType specifies information about the Secret that is not encrypted<br>See [Clear Secret Info](#info-45b078) below.
528
+ <a id="deep-905126"></a>Deeply nested **URL** block collapsed for readability.
599
529
 
600
530
  #### HTTP Receiver Use TLS mTLS Enable Key URL Blindfold Secret Info
601
531
 
602
- A [`blindfold_secret_info`](#info-e6a85d) block (within [`http_receiver.use_tls.mtls_enable.key_url`](#url-12d8b8)) supports the following:
603
-
604
- <a id="provider-aacbf7"></a>&#x2022; [`decryption_provider`](#provider-aacbf7) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
605
-
606
- <a id="location-54b8ed"></a>&#x2022; [`location`](#location-54b8ed) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
607
-
608
- <a id="provider-573c3b"></a>&#x2022; [`store_provider`](#provider-573c3b) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
532
+ <a id="deep-3f60c5"></a>Deeply nested **Info** block collapsed for readability.
609
533
 
610
534
  #### HTTP Receiver Use TLS mTLS Enable Key URL Clear Secret Info
611
535
 
612
- A [`clear_secret_info`](#info-45b078) block (within [`http_receiver.use_tls.mtls_enable.key_url`](#url-12d8b8)) supports the following:
613
-
614
- <a id="ref-00a2ea"></a>&#x2022; [`provider_ref`](#ref-00a2ea) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
615
-
616
- <a id="url-47a3bc"></a>&#x2022; [`url`](#url-47a3bc) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
536
+ <a id="deep-0d953c"></a>Deeply nested **Info** block collapsed for readability.
617
537
 
618
538
  #### Kafka Receiver
619
539
 
@@ -687,29 +607,15 @@ A [`mtls_enable`](#kafka-receiver-use-tls-mtls-enable) block (within [`kafka_rec
687
607
 
688
608
  #### Kafka Receiver Use TLS mTLS Enable Key URL
689
609
 
690
- A [`key_url`](#url-27a26d) block (within [`kafka_receiver.use_tls.mtls_enable`](#kafka-receiver-use-tls-mtls-enable)) supports the following:
691
-
692
- <a id="info-883e9f"></a>&#x2022; [`blindfold_secret_info`](#info-883e9f) - Optional Block<br>Blindfold Secret. BlindfoldSecretInfoType specifies information about the Secret managed by F5XC Secret Management<br>See [Blindfold Secret Info](#info-883e9f) below.
693
-
694
- <a id="info-6fa295"></a>&#x2022; [`clear_secret_info`](#info-6fa295) - Optional Block<br>In-Clear Secret. ClearSecretInfoType specifies information about the Secret that is not encrypted<br>See [Clear Secret Info](#info-6fa295) below.
610
+ <a id="deep-6a8d7d"></a>Deeply nested **URL** block collapsed for readability.
695
611
 
696
612
  #### Kafka Receiver Use TLS mTLS Enable Key URL Blindfold Secret Info
697
613
 
698
- A [`blindfold_secret_info`](#info-883e9f) block (within [`kafka_receiver.use_tls.mtls_enable.key_url`](#url-27a26d)) supports the following:
699
-
700
- <a id="provider-e30698"></a>&#x2022; [`decryption_provider`](#provider-e30698) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
701
-
702
- <a id="location-9e7b8a"></a>&#x2022; [`location`](#location-9e7b8a) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
703
-
704
- <a id="provider-4c39fb"></a>&#x2022; [`store_provider`](#provider-4c39fb) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
614
+ <a id="deep-f04153"></a>Deeply nested **Info** block collapsed for readability.
705
615
 
706
616
  #### Kafka Receiver Use TLS mTLS Enable Key URL Clear Secret Info
707
617
 
708
- A [`clear_secret_info`](#info-6fa295) block (within [`kafka_receiver.use_tls.mtls_enable.key_url`](#url-27a26d)) supports the following:
709
-
710
- <a id="ref-a5f55b"></a>&#x2022; [`provider_ref`](#ref-a5f55b) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
711
-
712
- <a id="url-2a65ad"></a>&#x2022; [`url`](#url-2a65ad) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
618
+ <a id="deep-95b0cb"></a>Deeply nested **Info** block collapsed for readability.
713
619
 
714
620
  #### New Relic Receiver
715
621
 
@@ -731,21 +637,11 @@ An [`api_key`](#new-relic-receiver-api-key) block (within [`new_relic_receiver`]
731
637
 
732
638
  #### New Relic Receiver API Key Blindfold Secret Info
733
639
 
734
- A [`blindfold_secret_info`](#info-262674) block (within [`new_relic_receiver.api_key`](#new-relic-receiver-api-key)) supports the following:
735
-
736
- <a id="provider-5ff769"></a>&#x2022; [`decryption_provider`](#provider-5ff769) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
737
-
738
- <a id="location-1de208"></a>&#x2022; [`location`](#location-1de208) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
739
-
740
- <a id="provider-e1f9b6"></a>&#x2022; [`store_provider`](#provider-e1f9b6) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
640
+ <a id="deep-f36179"></a>Deeply nested **Info** block collapsed for readability.
741
641
 
742
642
  #### New Relic Receiver API Key Clear Secret Info
743
643
 
744
- A [`clear_secret_info`](#info-6a5234) block (within [`new_relic_receiver.api_key`](#new-relic-receiver-api-key)) supports the following:
745
-
746
- <a id="ref-7c2f92"></a>&#x2022; [`provider_ref`](#ref-7c2f92) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
747
-
748
- <a id="url-370d40"></a>&#x2022; [`url`](#url-370d40) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
644
+ <a id="deep-48a9d0"></a>Deeply nested **Info** block collapsed for readability.
749
645
 
750
646
  #### Ns List
751
647
 
@@ -823,29 +719,15 @@ A [`mtls_enable`](#qradar-receiver-use-tls-mtls-enable) block (within [`qradar_r
823
719
 
824
720
  #### Qradar Receiver Use TLS mTLS Enable Key URL
825
721
 
826
- A [`key_url`](#url-b85773) block (within [`qradar_receiver.use_tls.mtls_enable`](#qradar-receiver-use-tls-mtls-enable)) supports the following:
827
-
828
- <a id="info-851e2b"></a>&#x2022; [`blindfold_secret_info`](#info-851e2b) - Optional Block<br>Blindfold Secret. BlindfoldSecretInfoType specifies information about the Secret managed by F5XC Secret Management<br>See [Blindfold Secret Info](#info-851e2b) below.
829
-
830
- <a id="info-885da4"></a>&#x2022; [`clear_secret_info`](#info-885da4) - Optional Block<br>In-Clear Secret. ClearSecretInfoType specifies information about the Secret that is not encrypted<br>See [Clear Secret Info](#info-885da4) below.
722
+ <a id="deep-ebd591"></a>Deeply nested **URL** block collapsed for readability.
831
723
 
832
724
  #### Qradar Receiver Use TLS mTLS Enable Key URL Blindfold Secret Info
833
725
 
834
- A [`blindfold_secret_info`](#info-851e2b) block (within [`qradar_receiver.use_tls.mtls_enable.key_url`](#url-b85773)) supports the following:
835
-
836
- <a id="provider-b7b9fd"></a>&#x2022; [`decryption_provider`](#provider-b7b9fd) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
837
-
838
- <a id="location-b94fb0"></a>&#x2022; [`location`](#location-b94fb0) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
839
-
840
- <a id="provider-893bbf"></a>&#x2022; [`store_provider`](#provider-893bbf) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
726
+ <a id="deep-272547"></a>Deeply nested **Info** block collapsed for readability.
841
727
 
842
728
  #### Qradar Receiver Use TLS mTLS Enable Key URL Clear Secret Info
843
729
 
844
- A [`clear_secret_info`](#info-885da4) block (within [`qradar_receiver.use_tls.mtls_enable.key_url`](#url-b85773)) supports the following:
845
-
846
- <a id="ref-abbb53"></a>&#x2022; [`provider_ref`](#ref-abbb53) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
847
-
848
- <a id="url-f261a8"></a>&#x2022; [`url`](#url-f261a8) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
730
+ <a id="deep-7c4a8f"></a>Deeply nested **Info** block collapsed for readability.
849
731
 
850
732
  #### S3 Receiver
851
733
 
@@ -865,13 +747,7 @@ A [`s3_receiver`](#s3-receiver) block supports the following:
865
747
 
866
748
  #### S3 Receiver AWS Cred
867
749
 
868
- An [`aws_cred`](#s3-receiver-aws-cred) block (within [`s3_receiver`](#s3-receiver)) supports the following:
869
-
870
- <a id="s3-receiver-aws-cred-name"></a>&#x2022; [`name`](#s3-receiver-aws-cred-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
871
-
872
- <a id="s3-receiver-aws-cred-namespace"></a>&#x2022; [`namespace`](#s3-receiver-aws-cred-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
873
-
874
- <a id="s3-receiver-aws-cred-tenant"></a>&#x2022; [`tenant`](#s3-receiver-aws-cred-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
750
+ <a id="objref-910957"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
875
751
 
876
752
  #### S3 Receiver Batch
877
753
 
@@ -961,21 +837,11 @@ A [`splunk_hec_token`](#splunk-receiver-splunk-hec-token) block (within [`splunk
961
837
 
962
838
  #### Splunk Receiver Splunk Hec Token Blindfold Secret Info
963
839
 
964
- A [`blindfold_secret_info`](#info-2c09a2) block (within [`splunk_receiver.splunk_hec_token`](#splunk-receiver-splunk-hec-token)) supports the following:
965
-
966
- <a id="provider-2db5ec"></a>&#x2022; [`decryption_provider`](#provider-2db5ec) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
967
-
968
- <a id="location-c834c3"></a>&#x2022; [`location`](#location-c834c3) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
969
-
970
- <a id="provider-54f419"></a>&#x2022; [`store_provider`](#provider-54f419) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
840
+ <a id="deep-6ec437"></a>Deeply nested **Info** block collapsed for readability.
971
841
 
972
842
  #### Splunk Receiver Splunk Hec Token Clear Secret Info
973
843
 
974
- A [`clear_secret_info`](#info-08aaec) block (within [`splunk_receiver.splunk_hec_token`](#splunk-receiver-splunk-hec-token)) supports the following:
975
-
976
- <a id="ref-a5a9ad"></a>&#x2022; [`provider_ref`](#ref-a5a9ad) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
977
-
978
- <a id="url-79ea29"></a>&#x2022; [`url`](#url-79ea29) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
844
+ <a id="deep-546f66"></a>Deeply nested **Info** block collapsed for readability.
979
845
 
980
846
  #### Splunk Receiver Use TLS
981
847
 
@@ -1007,29 +873,15 @@ A [`mtls_enable`](#splunk-receiver-use-tls-mtls-enable) block (within [`splunk_r
1007
873
 
1008
874
  #### Splunk Receiver Use TLS mTLS Enable Key URL
1009
875
 
1010
- A [`key_url`](#url-04f122) block (within [`splunk_receiver.use_tls.mtls_enable`](#splunk-receiver-use-tls-mtls-enable)) supports the following:
1011
-
1012
- <a id="info-e6bdf7"></a>&#x2022; [`blindfold_secret_info`](#info-e6bdf7) - Optional Block<br>Blindfold Secret. BlindfoldSecretInfoType specifies information about the Secret managed by F5XC Secret Management<br>See [Blindfold Secret Info](#info-e6bdf7) below.
1013
-
1014
- <a id="info-72a8f2"></a>&#x2022; [`clear_secret_info`](#info-72a8f2) - Optional Block<br>In-Clear Secret. ClearSecretInfoType specifies information about the Secret that is not encrypted<br>See [Clear Secret Info](#info-72a8f2) below.
876
+ <a id="deep-9e0e9c"></a>Deeply nested **URL** block collapsed for readability.
1015
877
 
1016
878
  #### Splunk Receiver Use TLS mTLS Enable Key URL Blindfold Secret Info
1017
879
 
1018
- A [`blindfold_secret_info`](#info-e6bdf7) block (within [`splunk_receiver.use_tls.mtls_enable.key_url`](#url-04f122)) supports the following:
1019
-
1020
- <a id="provider-12370d"></a>&#x2022; [`decryption_provider`](#provider-12370d) - Optional String<br>Decryption Provider. Name of the Secret Management Access object that contains information about the backend Secret Management service
1021
-
1022
- <a id="location-8e22e7"></a>&#x2022; [`location`](#location-8e22e7) - Optional String<br>Location. Location is the uri_ref. It could be in URL format for string:/// Or it could be a path if the store provider is an HTTP/HTTPS location
1023
-
1024
- <a id="provider-3723d8"></a>&#x2022; [`store_provider`](#provider-3723d8) - Optional String<br>Store Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
880
+ <a id="deep-4bbc82"></a>Deeply nested **Info** block collapsed for readability.
1025
881
 
1026
882
  #### Splunk Receiver Use TLS mTLS Enable Key URL Clear Secret Info
1027
883
 
1028
- A [`clear_secret_info`](#info-72a8f2) block (within [`splunk_receiver.use_tls.mtls_enable.key_url`](#url-04f122)) supports the following:
1029
-
1030
- <a id="ref-895ddc"></a>&#x2022; [`provider_ref`](#ref-895ddc) - Optional String<br>Provider. Name of the Secret Management Access object that contains information about the store to get encrypted bytes This field needs to be provided only if the URL scheme is not string:///
1031
-
1032
- <a id="url-aff9f7"></a>&#x2022; [`url`](#url-aff9f7) - Optional String<br>URL. URL of the secret. Currently supported URL schemes is string:///. For string:/// scheme, Secret needs to be encoded Base64 format. When asked for this secret, caller will get Secret bytes after Base64 decoding
884
+ <a id="deep-f64deb"></a>Deeply nested **Info** block collapsed for readability.
1033
885
 
1034
886
  #### Sumo Logic Receiver
1035
887
 
@@ -1075,6 +927,89 @@ A [`timeouts`](#timeouts) block supports the following:
1075
927
 
1076
928
  <a id="timeouts-update"></a>&#x2022; [`update`](#timeouts-update) - Optional String (Defaults to `10 minutes`)<br>Used when updating the resource
1077
929
 
930
+ ---
931
+
932
+ ## Common Types
933
+
934
+ The following type definitions are used throughout this resource. See the full definition here rather than repeated inline.
935
+
936
+ ### Object Reference {#common-object-reference}
937
+
938
+ Object references establish a direct reference from one configuration object to another in F5 Distributed Cloud. References use the format `tenant/namespace/name`.
939
+
940
+ | Field | Type | Description |
941
+ | ----- | ---- | ----------- |
942
+ | `name` | String | Name of the referenced object |
943
+ | `namespace` | String | Namespace containing the referenced object |
944
+ | `tenant` | String | Tenant of the referenced object (system-managed) |
945
+
946
+ ### Transformers {#common-transformers}
947
+
948
+ Transformers apply transformations to input values before matching. Multiple transformers can be applied in order.
949
+
950
+ | Value | Description |
951
+ | ----- | ----------- |
952
+ | `LOWER_CASE` | Convert to lowercase |
953
+ | `UPPER_CASE` | Convert to uppercase |
954
+ | `BASE64_DECODE` | Decode base64 content |
955
+ | `NORMALIZE_PATH` | Normalize URL path |
956
+ | `REMOVE_WHITESPACE` | Remove whitespace characters |
957
+ | `URL_DECODE` | Decode URL-encoded characters |
958
+ | `TRIM_LEFT` | Trim leading whitespace |
959
+ | `TRIM_RIGHT` | Trim trailing whitespace |
960
+ | `TRIM` | Trim both leading and trailing whitespace |
961
+
962
+ ### HTTP Methods {#common-http-methods}
963
+
964
+ HTTP methods used for request matching.
965
+
966
+ | Value | Description |
967
+ | ----- | ----------- |
968
+ | `ANY` | Match any HTTP method |
969
+ | `GET` | HTTP GET request |
970
+ | `HEAD` | HTTP HEAD request |
971
+ | `POST` | HTTP POST request |
972
+ | `PUT` | HTTP PUT request |
973
+ | `DELETE` | HTTP DELETE request |
974
+ | `CONNECT` | HTTP CONNECT request |
975
+ | `OPTIONS` | HTTP OPTIONS request |
976
+ | `TRACE` | HTTP TRACE request |
977
+ | `PATCH` | HTTP PATCH request |
978
+ | `COPY` | HTTP COPY request (WebDAV) |
979
+
980
+ ### TLS Fingerprints {#common-tls-fingerprints}
981
+
982
+ TLS fingerprint categories for malicious client detection.
983
+
984
+ | Value | Description |
985
+ | ----- | ----------- |
986
+ | `TLS_FINGERPRINT_NONE` | No fingerprint matching |
987
+ | `ANY_MALICIOUS_FINGERPRINT` | Match any known malicious fingerprint |
988
+ | `ADWARE` | Adware-associated fingerprints |
989
+ | `DRIDEX` | Dridex malware fingerprints |
990
+ | `GOOTKIT` | Gootkit malware fingerprints |
991
+ | `RANSOMWARE` | Ransomware-associated fingerprints |
992
+ | `TRICKBOT` | Trickbot malware fingerprints |
993
+
994
+ ### IP Threat Categories {#common-ip-threat-categories}
995
+
996
+ IP address threat categories for security filtering.
997
+
998
+ | Value | Description |
999
+ | ----- | ----------- |
1000
+ | `SPAM_SOURCES` | Known spam sources |
1001
+ | `WINDOWS_EXPLOITS` | Windows exploit sources |
1002
+ | `WEB_ATTACKS` | Web attack sources |
1003
+ | `BOTNETS` | Known botnet IPs |
1004
+ | `SCANNERS` | Network scanner IPs |
1005
+ | `REPUTATION` | Poor reputation IPs |
1006
+ | `PHISHING` | Phishing-related IPs |
1007
+ | `PROXY` | Anonymous proxy IPs |
1008
+ | `MOBILE_THREATS` | Mobile threat sources |
1009
+ | `TOR_PROXY` | Tor exit nodes |
1010
+ | `DENIAL_OF_SERVICE` | DoS attack sources |
1011
+ | `NETWORK` | Known bad network ranges |
1012
+
1078
1013
  ## Import
1079
1014
 
1080
1015
  Import is supported using the following syntax: