cribl-control-plane 0.0.13__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cribl-control-plane might be problematic. Click here for more details.
- cribl_control_plane/__init__.py +17 -0
- cribl_control_plane/_hooks/__init__.py +5 -0
- cribl_control_plane/_hooks/clientcredentials.py +211 -0
- cribl_control_plane/_hooks/registration.py +13 -0
- cribl_control_plane/_hooks/sdkhooks.py +81 -0
- cribl_control_plane/_hooks/types.py +112 -0
- cribl_control_plane/_version.py +15 -0
- cribl_control_plane/auth_sdk.py +184 -0
- cribl_control_plane/basesdk.py +358 -0
- cribl_control_plane/errors/__init__.py +60 -0
- cribl_control_plane/errors/apierror.py +38 -0
- cribl_control_plane/errors/criblcontrolplaneerror.py +26 -0
- cribl_control_plane/errors/error.py +24 -0
- cribl_control_plane/errors/healthstatus_error.py +38 -0
- cribl_control_plane/errors/no_response_error.py +13 -0
- cribl_control_plane/errors/responsevalidationerror.py +25 -0
- cribl_control_plane/health.py +166 -0
- cribl_control_plane/httpclient.py +126 -0
- cribl_control_plane/models/__init__.py +7305 -0
- cribl_control_plane/models/addhectokenrequest.py +34 -0
- cribl_control_plane/models/authtoken.py +13 -0
- cribl_control_plane/models/createinputhectokenbyidop.py +45 -0
- cribl_control_plane/models/createinputop.py +24 -0
- cribl_control_plane/models/createoutputop.py +24 -0
- cribl_control_plane/models/createoutputtestbyidop.py +46 -0
- cribl_control_plane/models/criblevent.py +14 -0
- cribl_control_plane/models/deleteinputbyidop.py +37 -0
- cribl_control_plane/models/deleteoutputbyidop.py +37 -0
- cribl_control_plane/models/deleteoutputpqbyidop.py +36 -0
- cribl_control_plane/models/getinputbyidop.py +37 -0
- cribl_control_plane/models/getoutputbyidop.py +37 -0
- cribl_control_plane/models/getoutputpqbyidop.py +36 -0
- cribl_control_plane/models/getoutputsamplesbyidop.py +37 -0
- cribl_control_plane/models/healthstatus.py +36 -0
- cribl_control_plane/models/input.py +199 -0
- cribl_control_plane/models/inputappscope.py +448 -0
- cribl_control_plane/models/inputazureblob.py +308 -0
- cribl_control_plane/models/inputcollection.py +208 -0
- cribl_control_plane/models/inputconfluentcloud.py +585 -0
- cribl_control_plane/models/inputcribl.py +165 -0
- cribl_control_plane/models/inputcriblhttp.py +341 -0
- cribl_control_plane/models/inputcribllakehttp.py +342 -0
- cribl_control_plane/models/inputcriblmetrics.py +175 -0
- cribl_control_plane/models/inputcribltcp.py +299 -0
- cribl_control_plane/models/inputcrowdstrike.py +410 -0
- cribl_control_plane/models/inputdatadogagent.py +364 -0
- cribl_control_plane/models/inputdatagen.py +180 -0
- cribl_control_plane/models/inputedgeprometheus.py +551 -0
- cribl_control_plane/models/inputelastic.py +494 -0
- cribl_control_plane/models/inputeventhub.py +360 -0
- cribl_control_plane/models/inputexec.py +213 -0
- cribl_control_plane/models/inputfile.py +259 -0
- cribl_control_plane/models/inputfirehose.py +341 -0
- cribl_control_plane/models/inputgooglepubsub.py +247 -0
- cribl_control_plane/models/inputgrafana_union.py +1247 -0
- cribl_control_plane/models/inputhttp.py +403 -0
- cribl_control_plane/models/inputhttpraw.py +407 -0
- cribl_control_plane/models/inputjournalfiles.py +208 -0
- cribl_control_plane/models/inputkafka.py +581 -0
- cribl_control_plane/models/inputkinesis.py +363 -0
- cribl_control_plane/models/inputkubeevents.py +182 -0
- cribl_control_plane/models/inputkubelogs.py +256 -0
- cribl_control_plane/models/inputkubemetrics.py +233 -0
- cribl_control_plane/models/inputloki.py +468 -0
- cribl_control_plane/models/inputmetrics.py +290 -0
- cribl_control_plane/models/inputmodeldriventelemetry.py +274 -0
- cribl_control_plane/models/inputmsk.py +654 -0
- cribl_control_plane/models/inputnetflow.py +224 -0
- cribl_control_plane/models/inputoffice365mgmt.py +384 -0
- cribl_control_plane/models/inputoffice365msgtrace.py +449 -0
- cribl_control_plane/models/inputoffice365service.py +377 -0
- cribl_control_plane/models/inputopentelemetry.py +516 -0
- cribl_control_plane/models/inputprometheus.py +464 -0
- cribl_control_plane/models/inputprometheusrw.py +470 -0
- cribl_control_plane/models/inputrawudp.py +207 -0
- cribl_control_plane/models/inputs3.py +416 -0
- cribl_control_plane/models/inputs3inventory.py +440 -0
- cribl_control_plane/models/inputsecuritylake.py +425 -0
- cribl_control_plane/models/inputsnmp.py +274 -0
- cribl_control_plane/models/inputsplunk.py +387 -0
- cribl_control_plane/models/inputsplunkhec.py +478 -0
- cribl_control_plane/models/inputsplunksearch.py +537 -0
- cribl_control_plane/models/inputsqs.py +320 -0
- cribl_control_plane/models/inputsyslog_union.py +759 -0
- cribl_control_plane/models/inputsystemmetrics.py +533 -0
- cribl_control_plane/models/inputsystemstate.py +417 -0
- cribl_control_plane/models/inputtcp.py +359 -0
- cribl_control_plane/models/inputtcpjson.py +334 -0
- cribl_control_plane/models/inputwef.py +498 -0
- cribl_control_plane/models/inputwindowsmetrics.py +457 -0
- cribl_control_plane/models/inputwineventlogs.py +222 -0
- cribl_control_plane/models/inputwiz.py +334 -0
- cribl_control_plane/models/inputzscalerhec.py +439 -0
- cribl_control_plane/models/listinputop.py +24 -0
- cribl_control_plane/models/listoutputop.py +24 -0
- cribl_control_plane/models/logininfo.py +16 -0
- cribl_control_plane/models/output.py +229 -0
- cribl_control_plane/models/outputazureblob.py +471 -0
- cribl_control_plane/models/outputazuredataexplorer.py +660 -0
- cribl_control_plane/models/outputazureeventhub.py +321 -0
- cribl_control_plane/models/outputazurelogs.py +386 -0
- cribl_control_plane/models/outputclickhouse.py +650 -0
- cribl_control_plane/models/outputcloudwatch.py +273 -0
- cribl_control_plane/models/outputconfluentcloud.py +591 -0
- cribl_control_plane/models/outputcriblhttp.py +494 -0
- cribl_control_plane/models/outputcribllake.py +396 -0
- cribl_control_plane/models/outputcribltcp.py +387 -0
- cribl_control_plane/models/outputcrowdstrikenextgensiem.py +410 -0
- cribl_control_plane/models/outputdatadog.py +472 -0
- cribl_control_plane/models/outputdataset.py +437 -0
- cribl_control_plane/models/outputdefault.py +55 -0
- cribl_control_plane/models/outputdevnull.py +50 -0
- cribl_control_plane/models/outputdiskspool.py +89 -0
- cribl_control_plane/models/outputdls3.py +560 -0
- cribl_control_plane/models/outputdynatracehttp.py +454 -0
- cribl_control_plane/models/outputdynatraceotlp.py +486 -0
- cribl_control_plane/models/outputelastic.py +494 -0
- cribl_control_plane/models/outputelasticcloud.py +407 -0
- cribl_control_plane/models/outputexabeam.py +297 -0
- cribl_control_plane/models/outputfilesystem.py +357 -0
- cribl_control_plane/models/outputgooglechronicle.py +486 -0
- cribl_control_plane/models/outputgooglecloudlogging.py +557 -0
- cribl_control_plane/models/outputgooglecloudstorage.py +499 -0
- cribl_control_plane/models/outputgooglepubsub.py +274 -0
- cribl_control_plane/models/outputgrafanacloud_union.py +1024 -0
- cribl_control_plane/models/outputgraphite.py +225 -0
- cribl_control_plane/models/outputhoneycomb.py +369 -0
- cribl_control_plane/models/outputhumiohec.py +389 -0
- cribl_control_plane/models/outputinfluxdb.py +523 -0
- cribl_control_plane/models/outputkafka.py +581 -0
- cribl_control_plane/models/outputkinesis.py +312 -0
- cribl_control_plane/models/outputloki.py +425 -0
- cribl_control_plane/models/outputminio.py +512 -0
- cribl_control_plane/models/outputmsk.py +654 -0
- cribl_control_plane/models/outputnetflow.py +80 -0
- cribl_control_plane/models/outputnewrelic.py +424 -0
- cribl_control_plane/models/outputnewrelicevents.py +401 -0
- cribl_control_plane/models/outputopentelemetry.py +669 -0
- cribl_control_plane/models/outputprometheus.py +485 -0
- cribl_control_plane/models/outputring.py +121 -0
- cribl_control_plane/models/outputrouter.py +83 -0
- cribl_control_plane/models/outputs3.py +556 -0
- cribl_control_plane/models/outputsamplesresponse.py +14 -0
- cribl_control_plane/models/outputsecuritylake.py +505 -0
- cribl_control_plane/models/outputsentinel.py +488 -0
- cribl_control_plane/models/outputsentineloneaisiem.py +505 -0
- cribl_control_plane/models/outputservicenow.py +543 -0
- cribl_control_plane/models/outputsignalfx.py +369 -0
- cribl_control_plane/models/outputsnmp.py +80 -0
- cribl_control_plane/models/outputsns.py +274 -0
- cribl_control_plane/models/outputsplunk.py +383 -0
- cribl_control_plane/models/outputsplunkhec.py +434 -0
- cribl_control_plane/models/outputsplunklb.py +558 -0
- cribl_control_plane/models/outputsqs.py +328 -0
- cribl_control_plane/models/outputstatsd.py +224 -0
- cribl_control_plane/models/outputstatsdext.py +225 -0
- cribl_control_plane/models/outputsumologic.py +378 -0
- cribl_control_plane/models/outputsyslog.py +415 -0
- cribl_control_plane/models/outputtcpjson.py +413 -0
- cribl_control_plane/models/outputtestrequest.py +15 -0
- cribl_control_plane/models/outputtestresponse.py +29 -0
- cribl_control_plane/models/outputwavefront.py +369 -0
- cribl_control_plane/models/outputwebhook.py +689 -0
- cribl_control_plane/models/outputxsiam.py +415 -0
- cribl_control_plane/models/schemeclientoauth.py +24 -0
- cribl_control_plane/models/security.py +36 -0
- cribl_control_plane/models/updatehectokenrequest.py +31 -0
- cribl_control_plane/models/updateinputbyidop.py +44 -0
- cribl_control_plane/models/updateinputhectokenbyidandtokenop.py +52 -0
- cribl_control_plane/models/updateoutputbyidop.py +44 -0
- cribl_control_plane/outputs.py +1615 -0
- cribl_control_plane/py.typed +1 -0
- cribl_control_plane/sdk.py +164 -0
- cribl_control_plane/sdkconfiguration.py +36 -0
- cribl_control_plane/sources.py +1355 -0
- cribl_control_plane/types/__init__.py +21 -0
- cribl_control_plane/types/basemodel.py +39 -0
- cribl_control_plane/utils/__init__.py +187 -0
- cribl_control_plane/utils/annotations.py +55 -0
- cribl_control_plane/utils/datetimes.py +23 -0
- cribl_control_plane/utils/enums.py +74 -0
- cribl_control_plane/utils/eventstreaming.py +238 -0
- cribl_control_plane/utils/forms.py +223 -0
- cribl_control_plane/utils/headers.py +136 -0
- cribl_control_plane/utils/logger.py +27 -0
- cribl_control_plane/utils/metadata.py +118 -0
- cribl_control_plane/utils/queryparams.py +205 -0
- cribl_control_plane/utils/requestbodies.py +66 -0
- cribl_control_plane/utils/retries.py +217 -0
- cribl_control_plane/utils/security.py +207 -0
- cribl_control_plane/utils/serializers.py +249 -0
- cribl_control_plane/utils/unmarshal_json_response.py +24 -0
- cribl_control_plane/utils/url.py +155 -0
- cribl_control_plane/utils/values.py +137 -0
- cribl_control_plane-0.0.13.dist-info/METADATA +489 -0
- cribl_control_plane-0.0.13.dist-info/RECORD +197 -0
- cribl_control_plane-0.0.13.dist-info/WHEEL +4 -0
|
@@ -0,0 +1,581 @@
|
|
|
1
|
+
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
|
+
|
|
3
|
+
from __future__ import annotations
|
|
4
|
+
from cribl_control_plane import utils
|
|
5
|
+
from cribl_control_plane.types import BaseModel
|
|
6
|
+
from cribl_control_plane.utils import validate_open_enum
|
|
7
|
+
from enum import Enum
|
|
8
|
+
import pydantic
|
|
9
|
+
from pydantic.functional_validators import PlainValidator
|
|
10
|
+
from typing import List, Optional
|
|
11
|
+
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
12
|
+
|
|
13
|
+
|
|
14
|
+
class InputKafkaType(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
15
|
+
KAFKA = "kafka"
|
|
16
|
+
|
|
17
|
+
|
|
18
|
+
class InputKafkaConnectionTypedDict(TypedDict):
|
|
19
|
+
output: str
|
|
20
|
+
pipeline: NotRequired[str]
|
|
21
|
+
|
|
22
|
+
|
|
23
|
+
class InputKafkaConnection(BaseModel):
|
|
24
|
+
output: str
|
|
25
|
+
|
|
26
|
+
pipeline: Optional[str] = None
|
|
27
|
+
|
|
28
|
+
|
|
29
|
+
class InputKafkaMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
30
|
+
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
31
|
+
|
|
32
|
+
SMART = "smart"
|
|
33
|
+
ALWAYS = "always"
|
|
34
|
+
|
|
35
|
+
|
|
36
|
+
class InputKafkaCompression(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
37
|
+
r"""Codec to use to compress the persisted data"""
|
|
38
|
+
|
|
39
|
+
NONE = "none"
|
|
40
|
+
GZIP = "gzip"
|
|
41
|
+
|
|
42
|
+
|
|
43
|
+
class InputKafkaPqTypedDict(TypedDict):
|
|
44
|
+
mode: NotRequired[InputKafkaMode]
|
|
45
|
+
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
46
|
+
max_buffer_size: NotRequired[float]
|
|
47
|
+
r"""The maximum number of events to hold in memory before writing the events to disk"""
|
|
48
|
+
commit_frequency: NotRequired[float]
|
|
49
|
+
r"""The number of events to send downstream before committing that Stream has read them"""
|
|
50
|
+
max_file_size: NotRequired[str]
|
|
51
|
+
r"""The maximum size to store in each queue file before closing and optionally compressing. Enter a numeral with units of KB, MB, etc."""
|
|
52
|
+
max_size: NotRequired[str]
|
|
53
|
+
r"""The maximum disk space that the queue can consume (as an average per Worker Process) before queueing stops. Enter a numeral with units of KB, MB, etc."""
|
|
54
|
+
path: NotRequired[str]
|
|
55
|
+
r"""The location for the persistent queue files. To this field's value, the system will append: /<worker-id>/inputs/<input-id>"""
|
|
56
|
+
compress: NotRequired[InputKafkaCompression]
|
|
57
|
+
r"""Codec to use to compress the persisted data"""
|
|
58
|
+
|
|
59
|
+
|
|
60
|
+
class InputKafkaPq(BaseModel):
|
|
61
|
+
mode: Annotated[
|
|
62
|
+
Optional[InputKafkaMode], PlainValidator(validate_open_enum(False))
|
|
63
|
+
] = InputKafkaMode.ALWAYS
|
|
64
|
+
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
65
|
+
|
|
66
|
+
max_buffer_size: Annotated[
|
|
67
|
+
Optional[float], pydantic.Field(alias="maxBufferSize")
|
|
68
|
+
] = 1000
|
|
69
|
+
r"""The maximum number of events to hold in memory before writing the events to disk"""
|
|
70
|
+
|
|
71
|
+
commit_frequency: Annotated[
|
|
72
|
+
Optional[float], pydantic.Field(alias="commitFrequency")
|
|
73
|
+
] = 42
|
|
74
|
+
r"""The number of events to send downstream before committing that Stream has read them"""
|
|
75
|
+
|
|
76
|
+
max_file_size: Annotated[Optional[str], pydantic.Field(alias="maxFileSize")] = (
|
|
77
|
+
"1 MB"
|
|
78
|
+
)
|
|
79
|
+
r"""The maximum size to store in each queue file before closing and optionally compressing. Enter a numeral with units of KB, MB, etc."""
|
|
80
|
+
|
|
81
|
+
max_size: Annotated[Optional[str], pydantic.Field(alias="maxSize")] = "5GB"
|
|
82
|
+
r"""The maximum disk space that the queue can consume (as an average per Worker Process) before queueing stops. Enter a numeral with units of KB, MB, etc."""
|
|
83
|
+
|
|
84
|
+
path: Optional[str] = "$CRIBL_HOME/state/queues"
|
|
85
|
+
r"""The location for the persistent queue files. To this field's value, the system will append: /<worker-id>/inputs/<input-id>"""
|
|
86
|
+
|
|
87
|
+
compress: Annotated[
|
|
88
|
+
Optional[InputKafkaCompression], PlainValidator(validate_open_enum(False))
|
|
89
|
+
] = InputKafkaCompression.NONE
|
|
90
|
+
r"""Codec to use to compress the persisted data"""
|
|
91
|
+
|
|
92
|
+
|
|
93
|
+
class InputKafkaAuthTypedDict(TypedDict):
|
|
94
|
+
r"""Credentials to use when authenticating with the schema registry using basic HTTP authentication"""
|
|
95
|
+
|
|
96
|
+
disabled: NotRequired[bool]
|
|
97
|
+
credentials_secret: NotRequired[str]
|
|
98
|
+
r"""Select or create a secret that references your credentials"""
|
|
99
|
+
|
|
100
|
+
|
|
101
|
+
class InputKafkaAuth(BaseModel):
|
|
102
|
+
r"""Credentials to use when authenticating with the schema registry using basic HTTP authentication"""
|
|
103
|
+
|
|
104
|
+
disabled: Optional[bool] = True
|
|
105
|
+
|
|
106
|
+
credentials_secret: Annotated[
|
|
107
|
+
Optional[str], pydantic.Field(alias="credentialsSecret")
|
|
108
|
+
] = None
|
|
109
|
+
r"""Select or create a secret that references your credentials"""
|
|
110
|
+
|
|
111
|
+
|
|
112
|
+
class InputKafkaKafkaSchemaRegistryMinimumTLSVersion(
|
|
113
|
+
str, Enum, metaclass=utils.OpenEnumMeta
|
|
114
|
+
):
|
|
115
|
+
TL_SV1 = "TLSv1"
|
|
116
|
+
TL_SV1_1 = "TLSv1.1"
|
|
117
|
+
TL_SV1_2 = "TLSv1.2"
|
|
118
|
+
TL_SV1_3 = "TLSv1.3"
|
|
119
|
+
|
|
120
|
+
|
|
121
|
+
class InputKafkaKafkaSchemaRegistryMaximumTLSVersion(
|
|
122
|
+
str, Enum, metaclass=utils.OpenEnumMeta
|
|
123
|
+
):
|
|
124
|
+
TL_SV1 = "TLSv1"
|
|
125
|
+
TL_SV1_1 = "TLSv1.1"
|
|
126
|
+
TL_SV1_2 = "TLSv1.2"
|
|
127
|
+
TL_SV1_3 = "TLSv1.3"
|
|
128
|
+
|
|
129
|
+
|
|
130
|
+
class InputKafkaKafkaSchemaRegistryTLSSettingsClientSideTypedDict(TypedDict):
|
|
131
|
+
disabled: NotRequired[bool]
|
|
132
|
+
reject_unauthorized: NotRequired[bool]
|
|
133
|
+
r"""Reject certificates that are not authorized by a CA in the CA certificate path, or by another
|
|
134
|
+
trusted CA (such as the system's). Defaults to Enabled. Overrides the toggle from Advanced Settings, when also present.
|
|
135
|
+
"""
|
|
136
|
+
servername: NotRequired[str]
|
|
137
|
+
r"""Server name for the SNI (Server Name Indication) TLS extension. It must be a host name, and not an IP address."""
|
|
138
|
+
certificate_name: NotRequired[str]
|
|
139
|
+
r"""The name of the predefined certificate"""
|
|
140
|
+
ca_path: NotRequired[str]
|
|
141
|
+
r"""Path on client in which to find CA certificates to verify the server's cert. PEM format. Can reference $ENV_VARS."""
|
|
142
|
+
priv_key_path: NotRequired[str]
|
|
143
|
+
r"""Path on client in which to find the private key to use. PEM format. Can reference $ENV_VARS."""
|
|
144
|
+
cert_path: NotRequired[str]
|
|
145
|
+
r"""Path on client in which to find certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
146
|
+
passphrase: NotRequired[str]
|
|
147
|
+
r"""Passphrase to use to decrypt private key"""
|
|
148
|
+
min_version: NotRequired[InputKafkaKafkaSchemaRegistryMinimumTLSVersion]
|
|
149
|
+
max_version: NotRequired[InputKafkaKafkaSchemaRegistryMaximumTLSVersion]
|
|
150
|
+
|
|
151
|
+
|
|
152
|
+
class InputKafkaKafkaSchemaRegistryTLSSettingsClientSide(BaseModel):
|
|
153
|
+
disabled: Optional[bool] = True
|
|
154
|
+
|
|
155
|
+
reject_unauthorized: Annotated[
|
|
156
|
+
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
157
|
+
] = True
|
|
158
|
+
r"""Reject certificates that are not authorized by a CA in the CA certificate path, or by another
|
|
159
|
+
trusted CA (such as the system's). Defaults to Enabled. Overrides the toggle from Advanced Settings, when also present.
|
|
160
|
+
"""
|
|
161
|
+
|
|
162
|
+
servername: Optional[str] = None
|
|
163
|
+
r"""Server name for the SNI (Server Name Indication) TLS extension. It must be a host name, and not an IP address."""
|
|
164
|
+
|
|
165
|
+
certificate_name: Annotated[
|
|
166
|
+
Optional[str], pydantic.Field(alias="certificateName")
|
|
167
|
+
] = None
|
|
168
|
+
r"""The name of the predefined certificate"""
|
|
169
|
+
|
|
170
|
+
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
171
|
+
r"""Path on client in which to find CA certificates to verify the server's cert. PEM format. Can reference $ENV_VARS."""
|
|
172
|
+
|
|
173
|
+
priv_key_path: Annotated[Optional[str], pydantic.Field(alias="privKeyPath")] = None
|
|
174
|
+
r"""Path on client in which to find the private key to use. PEM format. Can reference $ENV_VARS."""
|
|
175
|
+
|
|
176
|
+
cert_path: Annotated[Optional[str], pydantic.Field(alias="certPath")] = None
|
|
177
|
+
r"""Path on client in which to find certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
178
|
+
|
|
179
|
+
passphrase: Optional[str] = None
|
|
180
|
+
r"""Passphrase to use to decrypt private key"""
|
|
181
|
+
|
|
182
|
+
min_version: Annotated[
|
|
183
|
+
Annotated[
|
|
184
|
+
Optional[InputKafkaKafkaSchemaRegistryMinimumTLSVersion],
|
|
185
|
+
PlainValidator(validate_open_enum(False)),
|
|
186
|
+
],
|
|
187
|
+
pydantic.Field(alias="minVersion"),
|
|
188
|
+
] = None
|
|
189
|
+
|
|
190
|
+
max_version: Annotated[
|
|
191
|
+
Annotated[
|
|
192
|
+
Optional[InputKafkaKafkaSchemaRegistryMaximumTLSVersion],
|
|
193
|
+
PlainValidator(validate_open_enum(False)),
|
|
194
|
+
],
|
|
195
|
+
pydantic.Field(alias="maxVersion"),
|
|
196
|
+
] = None
|
|
197
|
+
|
|
198
|
+
|
|
199
|
+
class InputKafkaKafkaSchemaRegistryAuthenticationTypedDict(TypedDict):
|
|
200
|
+
disabled: NotRequired[bool]
|
|
201
|
+
schema_registry_url: NotRequired[str]
|
|
202
|
+
r"""URL for accessing the Confluent Schema Registry. Example: http://localhost:8081. To connect over TLS, use https instead of http."""
|
|
203
|
+
connection_timeout: NotRequired[float]
|
|
204
|
+
r"""Maximum time to wait for a Schema Registry connection to complete successfully"""
|
|
205
|
+
request_timeout: NotRequired[float]
|
|
206
|
+
r"""Maximum time to wait for the Schema Registry to respond to a request"""
|
|
207
|
+
max_retries: NotRequired[float]
|
|
208
|
+
r"""Maximum number of times to try fetching schemas from the Schema Registry"""
|
|
209
|
+
auth: NotRequired[InputKafkaAuthTypedDict]
|
|
210
|
+
r"""Credentials to use when authenticating with the schema registry using basic HTTP authentication"""
|
|
211
|
+
tls: NotRequired[InputKafkaKafkaSchemaRegistryTLSSettingsClientSideTypedDict]
|
|
212
|
+
|
|
213
|
+
|
|
214
|
+
class InputKafkaKafkaSchemaRegistryAuthentication(BaseModel):
|
|
215
|
+
disabled: Optional[bool] = True
|
|
216
|
+
|
|
217
|
+
schema_registry_url: Annotated[
|
|
218
|
+
Optional[str], pydantic.Field(alias="schemaRegistryURL")
|
|
219
|
+
] = "http://localhost:8081"
|
|
220
|
+
r"""URL for accessing the Confluent Schema Registry. Example: http://localhost:8081. To connect over TLS, use https instead of http."""
|
|
221
|
+
|
|
222
|
+
connection_timeout: Annotated[
|
|
223
|
+
Optional[float], pydantic.Field(alias="connectionTimeout")
|
|
224
|
+
] = 30000
|
|
225
|
+
r"""Maximum time to wait for a Schema Registry connection to complete successfully"""
|
|
226
|
+
|
|
227
|
+
request_timeout: Annotated[
|
|
228
|
+
Optional[float], pydantic.Field(alias="requestTimeout")
|
|
229
|
+
] = 30000
|
|
230
|
+
r"""Maximum time to wait for the Schema Registry to respond to a request"""
|
|
231
|
+
|
|
232
|
+
max_retries: Annotated[Optional[float], pydantic.Field(alias="maxRetries")] = 1
|
|
233
|
+
r"""Maximum number of times to try fetching schemas from the Schema Registry"""
|
|
234
|
+
|
|
235
|
+
auth: Optional[InputKafkaAuth] = None
|
|
236
|
+
r"""Credentials to use when authenticating with the schema registry using basic HTTP authentication"""
|
|
237
|
+
|
|
238
|
+
tls: Optional[InputKafkaKafkaSchemaRegistryTLSSettingsClientSide] = None
|
|
239
|
+
|
|
240
|
+
|
|
241
|
+
class InputKafkaSASLMechanism(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
242
|
+
PLAIN = "plain"
|
|
243
|
+
SCRAM_SHA_256 = "scram-sha-256"
|
|
244
|
+
SCRAM_SHA_512 = "scram-sha-512"
|
|
245
|
+
KERBEROS = "kerberos"
|
|
246
|
+
|
|
247
|
+
|
|
248
|
+
class InputKafkaAuthenticationTypedDict(TypedDict):
|
|
249
|
+
r"""Authentication parameters to use when connecting to brokers. Using TLS is highly recommended."""
|
|
250
|
+
|
|
251
|
+
disabled: NotRequired[bool]
|
|
252
|
+
mechanism: NotRequired[InputKafkaSASLMechanism]
|
|
253
|
+
|
|
254
|
+
|
|
255
|
+
class InputKafkaAuthentication(BaseModel):
|
|
256
|
+
r"""Authentication parameters to use when connecting to brokers. Using TLS is highly recommended."""
|
|
257
|
+
|
|
258
|
+
disabled: Optional[bool] = True
|
|
259
|
+
|
|
260
|
+
mechanism: Annotated[
|
|
261
|
+
Optional[InputKafkaSASLMechanism], PlainValidator(validate_open_enum(False))
|
|
262
|
+
] = InputKafkaSASLMechanism.PLAIN
|
|
263
|
+
|
|
264
|
+
|
|
265
|
+
class InputKafkaMinimumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
266
|
+
TL_SV1 = "TLSv1"
|
|
267
|
+
TL_SV1_1 = "TLSv1.1"
|
|
268
|
+
TL_SV1_2 = "TLSv1.2"
|
|
269
|
+
TL_SV1_3 = "TLSv1.3"
|
|
270
|
+
|
|
271
|
+
|
|
272
|
+
class InputKafkaMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
273
|
+
TL_SV1 = "TLSv1"
|
|
274
|
+
TL_SV1_1 = "TLSv1.1"
|
|
275
|
+
TL_SV1_2 = "TLSv1.2"
|
|
276
|
+
TL_SV1_3 = "TLSv1.3"
|
|
277
|
+
|
|
278
|
+
|
|
279
|
+
class InputKafkaTLSSettingsClientSideTypedDict(TypedDict):
|
|
280
|
+
disabled: NotRequired[bool]
|
|
281
|
+
reject_unauthorized: NotRequired[bool]
|
|
282
|
+
r"""Reject certificates that are not authorized by a CA in the CA certificate path, or by another
|
|
283
|
+
trusted CA (such as the system's). Defaults to Enabled. Overrides the toggle from Advanced Settings, when also present.
|
|
284
|
+
"""
|
|
285
|
+
servername: NotRequired[str]
|
|
286
|
+
r"""Server name for the SNI (Server Name Indication) TLS extension. It must be a host name, and not an IP address."""
|
|
287
|
+
certificate_name: NotRequired[str]
|
|
288
|
+
r"""The name of the predefined certificate"""
|
|
289
|
+
ca_path: NotRequired[str]
|
|
290
|
+
r"""Path on client in which to find CA certificates to verify the server's cert. PEM format. Can reference $ENV_VARS."""
|
|
291
|
+
priv_key_path: NotRequired[str]
|
|
292
|
+
r"""Path on client in which to find the private key to use. PEM format. Can reference $ENV_VARS."""
|
|
293
|
+
cert_path: NotRequired[str]
|
|
294
|
+
r"""Path on client in which to find certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
295
|
+
passphrase: NotRequired[str]
|
|
296
|
+
r"""Passphrase to use to decrypt private key"""
|
|
297
|
+
min_version: NotRequired[InputKafkaMinimumTLSVersion]
|
|
298
|
+
max_version: NotRequired[InputKafkaMaximumTLSVersion]
|
|
299
|
+
|
|
300
|
+
|
|
301
|
+
class InputKafkaTLSSettingsClientSide(BaseModel):
|
|
302
|
+
disabled: Optional[bool] = True
|
|
303
|
+
|
|
304
|
+
reject_unauthorized: Annotated[
|
|
305
|
+
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
306
|
+
] = True
|
|
307
|
+
r"""Reject certificates that are not authorized by a CA in the CA certificate path, or by another
|
|
308
|
+
trusted CA (such as the system's). Defaults to Enabled. Overrides the toggle from Advanced Settings, when also present.
|
|
309
|
+
"""
|
|
310
|
+
|
|
311
|
+
servername: Optional[str] = None
|
|
312
|
+
r"""Server name for the SNI (Server Name Indication) TLS extension. It must be a host name, and not an IP address."""
|
|
313
|
+
|
|
314
|
+
certificate_name: Annotated[
|
|
315
|
+
Optional[str], pydantic.Field(alias="certificateName")
|
|
316
|
+
] = None
|
|
317
|
+
r"""The name of the predefined certificate"""
|
|
318
|
+
|
|
319
|
+
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
320
|
+
r"""Path on client in which to find CA certificates to verify the server's cert. PEM format. Can reference $ENV_VARS."""
|
|
321
|
+
|
|
322
|
+
priv_key_path: Annotated[Optional[str], pydantic.Field(alias="privKeyPath")] = None
|
|
323
|
+
r"""Path on client in which to find the private key to use. PEM format. Can reference $ENV_VARS."""
|
|
324
|
+
|
|
325
|
+
cert_path: Annotated[Optional[str], pydantic.Field(alias="certPath")] = None
|
|
326
|
+
r"""Path on client in which to find certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
327
|
+
|
|
328
|
+
passphrase: Optional[str] = None
|
|
329
|
+
r"""Passphrase to use to decrypt private key"""
|
|
330
|
+
|
|
331
|
+
min_version: Annotated[
|
|
332
|
+
Annotated[
|
|
333
|
+
Optional[InputKafkaMinimumTLSVersion],
|
|
334
|
+
PlainValidator(validate_open_enum(False)),
|
|
335
|
+
],
|
|
336
|
+
pydantic.Field(alias="minVersion"),
|
|
337
|
+
] = None
|
|
338
|
+
|
|
339
|
+
max_version: Annotated[
|
|
340
|
+
Annotated[
|
|
341
|
+
Optional[InputKafkaMaximumTLSVersion],
|
|
342
|
+
PlainValidator(validate_open_enum(False)),
|
|
343
|
+
],
|
|
344
|
+
pydantic.Field(alias="maxVersion"),
|
|
345
|
+
] = None
|
|
346
|
+
|
|
347
|
+
|
|
348
|
+
class InputKafkaMetadatumTypedDict(TypedDict):
|
|
349
|
+
name: str
|
|
350
|
+
value: str
|
|
351
|
+
r"""JavaScript expression to compute field's value, enclosed in quotes or backticks. (Can evaluate to a constant.)"""
|
|
352
|
+
|
|
353
|
+
|
|
354
|
+
class InputKafkaMetadatum(BaseModel):
|
|
355
|
+
name: str
|
|
356
|
+
|
|
357
|
+
value: str
|
|
358
|
+
r"""JavaScript expression to compute field's value, enclosed in quotes or backticks. (Can evaluate to a constant.)"""
|
|
359
|
+
|
|
360
|
+
|
|
361
|
+
class InputKafkaTypedDict(TypedDict):
|
|
362
|
+
type: InputKafkaType
|
|
363
|
+
brokers: List[str]
|
|
364
|
+
r"""Enter each Kafka bootstrap server you want to use. Specify the hostname and port (such as mykafkabroker:9092) or just the hostname (in which case @{product} will assign port 9092)."""
|
|
365
|
+
topics: List[str]
|
|
366
|
+
r"""Topic to subscribe to. Warning: To optimize performance, Cribl suggests subscribing each Kafka Source to a single topic only."""
|
|
367
|
+
id: NotRequired[str]
|
|
368
|
+
r"""Unique ID for this input"""
|
|
369
|
+
disabled: NotRequired[bool]
|
|
370
|
+
pipeline: NotRequired[str]
|
|
371
|
+
r"""Pipeline to process data from this Source before sending it through the Routes"""
|
|
372
|
+
send_to_routes: NotRequired[bool]
|
|
373
|
+
r"""Select whether to send data to Routes, or directly to Destinations."""
|
|
374
|
+
environment: NotRequired[str]
|
|
375
|
+
r"""Optionally, enable this config only on a specified Git branch. If empty, will be enabled everywhere."""
|
|
376
|
+
pq_enabled: NotRequired[bool]
|
|
377
|
+
r"""Use a disk queue to minimize data loss when connected services block. See [Cribl Docs](https://docs.cribl.io/stream/persistent-queues) for PQ defaults (Cribl-managed Cloud Workers) and configuration options (on-prem and hybrid Workers)."""
|
|
378
|
+
streamtags: NotRequired[List[str]]
|
|
379
|
+
r"""Tags for filtering and grouping in @{product}"""
|
|
380
|
+
connections: NotRequired[List[InputKafkaConnectionTypedDict]]
|
|
381
|
+
r"""Direct connections to Destinations, and optionally via a Pipeline or a Pack"""
|
|
382
|
+
pq: NotRequired[InputKafkaPqTypedDict]
|
|
383
|
+
group_id: NotRequired[str]
|
|
384
|
+
r"""The consumer group to which this instance belongs. Defaults to 'Cribl'."""
|
|
385
|
+
from_beginning: NotRequired[bool]
|
|
386
|
+
r"""Leave enabled if you want the Source, upon first subscribing to a topic, to read starting with the earliest available message"""
|
|
387
|
+
kafka_schema_registry: NotRequired[
|
|
388
|
+
InputKafkaKafkaSchemaRegistryAuthenticationTypedDict
|
|
389
|
+
]
|
|
390
|
+
connection_timeout: NotRequired[float]
|
|
391
|
+
r"""Maximum time to wait for a connection to complete successfully"""
|
|
392
|
+
request_timeout: NotRequired[float]
|
|
393
|
+
r"""Maximum time to wait for Kafka to respond to a request"""
|
|
394
|
+
max_retries: NotRequired[float]
|
|
395
|
+
r"""If messages are failing, you can set the maximum number of retries as high as 100 to prevent loss of data"""
|
|
396
|
+
max_back_off: NotRequired[float]
|
|
397
|
+
r"""The maximum wait time for a retry, in milliseconds. Default (and minimum) is 30,000 ms (30 seconds); maximum is 180,000 ms (180 seconds)."""
|
|
398
|
+
initial_backoff: NotRequired[float]
|
|
399
|
+
r"""Initial value used to calculate the retry, in milliseconds. Maximum is 600,000 ms (10 minutes)."""
|
|
400
|
+
backoff_rate: NotRequired[float]
|
|
401
|
+
r"""Set the backoff multiplier (2-20) to control the retry frequency for failed messages. For faster retries, use a lower multiplier. For slower retries with more delay between attempts, use a higher multiplier. The multiplier is used in an exponential backoff formula; see the Kafka [documentation](https://kafka.js.org/docs/retry-detailed) for details."""
|
|
402
|
+
authentication_timeout: NotRequired[float]
|
|
403
|
+
r"""Maximum time to wait for Kafka to respond to an authentication request"""
|
|
404
|
+
reauthentication_threshold: NotRequired[float]
|
|
405
|
+
r"""Specifies a time window during which @{product} can reauthenticate if needed. Creates the window measuring backward from the moment when credentials are set to expire."""
|
|
406
|
+
sasl: NotRequired[InputKafkaAuthenticationTypedDict]
|
|
407
|
+
r"""Authentication parameters to use when connecting to brokers. Using TLS is highly recommended."""
|
|
408
|
+
tls: NotRequired[InputKafkaTLSSettingsClientSideTypedDict]
|
|
409
|
+
session_timeout: NotRequired[float]
|
|
410
|
+
r"""Timeout used to detect client failures when using Kafka's group-management facilities.
|
|
411
|
+
If the client sends no heartbeats to the broker before the timeout expires,
|
|
412
|
+
the broker will remove the client from the group and initiate a rebalance.
|
|
413
|
+
Value must be between the broker's configured group.min.session.timeout.ms and group.max.session.timeout.ms.
|
|
414
|
+
See [Kafka's documentation](https://kafka.apache.org/documentation/#consumerconfigs_session.timeout.ms) for details.
|
|
415
|
+
"""
|
|
416
|
+
rebalance_timeout: NotRequired[float]
|
|
417
|
+
r"""Maximum allowed time for each worker to join the group after a rebalance begins.
|
|
418
|
+
If the timeout is exceeded, the coordinator broker will remove the worker from the group.
|
|
419
|
+
See [Kafka's documentation](https://kafka.apache.org/documentation/#connectconfigs_rebalance.timeout.ms) for details.
|
|
420
|
+
"""
|
|
421
|
+
heartbeat_interval: NotRequired[float]
|
|
422
|
+
r"""Expected time between heartbeats to the consumer coordinator when using Kafka's group-management facilities.
|
|
423
|
+
Value must be lower than sessionTimeout and typically should not exceed 1/3 of the sessionTimeout value.
|
|
424
|
+
See [Kafka's documentation](https://kafka.apache.org/documentation/#consumerconfigs_heartbeat.interval.ms) for details.
|
|
425
|
+
"""
|
|
426
|
+
auto_commit_interval: NotRequired[float]
|
|
427
|
+
r"""How often to commit offsets. If both this and Offset commit threshold are set, @{product} commits offsets when either condition is met. If both are empty, @{product} commits offsets after each batch."""
|
|
428
|
+
auto_commit_threshold: NotRequired[float]
|
|
429
|
+
r"""How many events are needed to trigger an offset commit. If both this and Offset commit interval are set, @{product} commits offsets when either condition is met. If both are empty, @{product} commits offsets after each batch."""
|
|
430
|
+
max_bytes_per_partition: NotRequired[float]
|
|
431
|
+
r"""Maximum amount of data that Kafka will return per partition, per fetch request. Must equal or exceed the maximum message size (maxBytesPerPartition) that Kafka is configured to allow. Otherwise, @{product} can get stuck trying to retrieve messages. Defaults to 1048576 (1 MB)."""
|
|
432
|
+
max_bytes: NotRequired[float]
|
|
433
|
+
r"""Maximum number of bytes that Kafka will return per fetch request. Defaults to 10485760 (10 MB)."""
|
|
434
|
+
max_socket_errors: NotRequired[float]
|
|
435
|
+
r"""Maximum number of network errors before the consumer re-creates a socket"""
|
|
436
|
+
metadata: NotRequired[List[InputKafkaMetadatumTypedDict]]
|
|
437
|
+
r"""Fields to add to events from this input"""
|
|
438
|
+
description: NotRequired[str]
|
|
439
|
+
|
|
440
|
+
|
|
441
|
+
class InputKafka(BaseModel):
|
|
442
|
+
type: Annotated[InputKafkaType, PlainValidator(validate_open_enum(False))]
|
|
443
|
+
|
|
444
|
+
brokers: List[str]
|
|
445
|
+
r"""Enter each Kafka bootstrap server you want to use. Specify the hostname and port (such as mykafkabroker:9092) or just the hostname (in which case @{product} will assign port 9092)."""
|
|
446
|
+
|
|
447
|
+
topics: List[str]
|
|
448
|
+
r"""Topic to subscribe to. Warning: To optimize performance, Cribl suggests subscribing each Kafka Source to a single topic only."""
|
|
449
|
+
|
|
450
|
+
id: Optional[str] = None
|
|
451
|
+
r"""Unique ID for this input"""
|
|
452
|
+
|
|
453
|
+
disabled: Optional[bool] = False
|
|
454
|
+
|
|
455
|
+
pipeline: Optional[str] = None
|
|
456
|
+
r"""Pipeline to process data from this Source before sending it through the Routes"""
|
|
457
|
+
|
|
458
|
+
send_to_routes: Annotated[Optional[bool], pydantic.Field(alias="sendToRoutes")] = (
|
|
459
|
+
True
|
|
460
|
+
)
|
|
461
|
+
r"""Select whether to send data to Routes, or directly to Destinations."""
|
|
462
|
+
|
|
463
|
+
environment: Optional[str] = None
|
|
464
|
+
r"""Optionally, enable this config only on a specified Git branch. If empty, will be enabled everywhere."""
|
|
465
|
+
|
|
466
|
+
pq_enabled: Annotated[Optional[bool], pydantic.Field(alias="pqEnabled")] = False
|
|
467
|
+
r"""Use a disk queue to minimize data loss when connected services block. See [Cribl Docs](https://docs.cribl.io/stream/persistent-queues) for PQ defaults (Cribl-managed Cloud Workers) and configuration options (on-prem and hybrid Workers)."""
|
|
468
|
+
|
|
469
|
+
streamtags: Optional[List[str]] = None
|
|
470
|
+
r"""Tags for filtering and grouping in @{product}"""
|
|
471
|
+
|
|
472
|
+
connections: Optional[List[InputKafkaConnection]] = None
|
|
473
|
+
r"""Direct connections to Destinations, and optionally via a Pipeline or a Pack"""
|
|
474
|
+
|
|
475
|
+
pq: Optional[InputKafkaPq] = None
|
|
476
|
+
|
|
477
|
+
group_id: Annotated[Optional[str], pydantic.Field(alias="groupId")] = "Cribl"
|
|
478
|
+
r"""The consumer group to which this instance belongs. Defaults to 'Cribl'."""
|
|
479
|
+
|
|
480
|
+
from_beginning: Annotated[Optional[bool], pydantic.Field(alias="fromBeginning")] = (
|
|
481
|
+
True
|
|
482
|
+
)
|
|
483
|
+
r"""Leave enabled if you want the Source, upon first subscribing to a topic, to read starting with the earliest available message"""
|
|
484
|
+
|
|
485
|
+
kafka_schema_registry: Annotated[
|
|
486
|
+
Optional[InputKafkaKafkaSchemaRegistryAuthentication],
|
|
487
|
+
pydantic.Field(alias="kafkaSchemaRegistry"),
|
|
488
|
+
] = None
|
|
489
|
+
|
|
490
|
+
connection_timeout: Annotated[
|
|
491
|
+
Optional[float], pydantic.Field(alias="connectionTimeout")
|
|
492
|
+
] = 10000
|
|
493
|
+
r"""Maximum time to wait for a connection to complete successfully"""
|
|
494
|
+
|
|
495
|
+
request_timeout: Annotated[
|
|
496
|
+
Optional[float], pydantic.Field(alias="requestTimeout")
|
|
497
|
+
] = 60000
|
|
498
|
+
r"""Maximum time to wait for Kafka to respond to a request"""
|
|
499
|
+
|
|
500
|
+
max_retries: Annotated[Optional[float], pydantic.Field(alias="maxRetries")] = 5
|
|
501
|
+
r"""If messages are failing, you can set the maximum number of retries as high as 100 to prevent loss of data"""
|
|
502
|
+
|
|
503
|
+
max_back_off: Annotated[Optional[float], pydantic.Field(alias="maxBackOff")] = 30000
|
|
504
|
+
r"""The maximum wait time for a retry, in milliseconds. Default (and minimum) is 30,000 ms (30 seconds); maximum is 180,000 ms (180 seconds)."""
|
|
505
|
+
|
|
506
|
+
initial_backoff: Annotated[
|
|
507
|
+
Optional[float], pydantic.Field(alias="initialBackoff")
|
|
508
|
+
] = 300
|
|
509
|
+
r"""Initial value used to calculate the retry, in milliseconds. Maximum is 600,000 ms (10 minutes)."""
|
|
510
|
+
|
|
511
|
+
backoff_rate: Annotated[Optional[float], pydantic.Field(alias="backoffRate")] = 2
|
|
512
|
+
r"""Set the backoff multiplier (2-20) to control the retry frequency for failed messages. For faster retries, use a lower multiplier. For slower retries with more delay between attempts, use a higher multiplier. The multiplier is used in an exponential backoff formula; see the Kafka [documentation](https://kafka.js.org/docs/retry-detailed) for details."""
|
|
513
|
+
|
|
514
|
+
authentication_timeout: Annotated[
|
|
515
|
+
Optional[float], pydantic.Field(alias="authenticationTimeout")
|
|
516
|
+
] = 10000
|
|
517
|
+
r"""Maximum time to wait for Kafka to respond to an authentication request"""
|
|
518
|
+
|
|
519
|
+
reauthentication_threshold: Annotated[
|
|
520
|
+
Optional[float], pydantic.Field(alias="reauthenticationThreshold")
|
|
521
|
+
] = 10000
|
|
522
|
+
r"""Specifies a time window during which @{product} can reauthenticate if needed. Creates the window measuring backward from the moment when credentials are set to expire."""
|
|
523
|
+
|
|
524
|
+
sasl: Optional[InputKafkaAuthentication] = None
|
|
525
|
+
r"""Authentication parameters to use when connecting to brokers. Using TLS is highly recommended."""
|
|
526
|
+
|
|
527
|
+
tls: Optional[InputKafkaTLSSettingsClientSide] = None
|
|
528
|
+
|
|
529
|
+
session_timeout: Annotated[
|
|
530
|
+
Optional[float], pydantic.Field(alias="sessionTimeout")
|
|
531
|
+
] = 30000
|
|
532
|
+
r"""Timeout used to detect client failures when using Kafka's group-management facilities.
|
|
533
|
+
If the client sends no heartbeats to the broker before the timeout expires,
|
|
534
|
+
the broker will remove the client from the group and initiate a rebalance.
|
|
535
|
+
Value must be between the broker's configured group.min.session.timeout.ms and group.max.session.timeout.ms.
|
|
536
|
+
See [Kafka's documentation](https://kafka.apache.org/documentation/#consumerconfigs_session.timeout.ms) for details.
|
|
537
|
+
"""
|
|
538
|
+
|
|
539
|
+
rebalance_timeout: Annotated[
|
|
540
|
+
Optional[float], pydantic.Field(alias="rebalanceTimeout")
|
|
541
|
+
] = 60000
|
|
542
|
+
r"""Maximum allowed time for each worker to join the group after a rebalance begins.
|
|
543
|
+
If the timeout is exceeded, the coordinator broker will remove the worker from the group.
|
|
544
|
+
See [Kafka's documentation](https://kafka.apache.org/documentation/#connectconfigs_rebalance.timeout.ms) for details.
|
|
545
|
+
"""
|
|
546
|
+
|
|
547
|
+
heartbeat_interval: Annotated[
|
|
548
|
+
Optional[float], pydantic.Field(alias="heartbeatInterval")
|
|
549
|
+
] = 3000
|
|
550
|
+
r"""Expected time between heartbeats to the consumer coordinator when using Kafka's group-management facilities.
|
|
551
|
+
Value must be lower than sessionTimeout and typically should not exceed 1/3 of the sessionTimeout value.
|
|
552
|
+
See [Kafka's documentation](https://kafka.apache.org/documentation/#consumerconfigs_heartbeat.interval.ms) for details.
|
|
553
|
+
"""
|
|
554
|
+
|
|
555
|
+
auto_commit_interval: Annotated[
|
|
556
|
+
Optional[float], pydantic.Field(alias="autoCommitInterval")
|
|
557
|
+
] = None
|
|
558
|
+
r"""How often to commit offsets. If both this and Offset commit threshold are set, @{product} commits offsets when either condition is met. If both are empty, @{product} commits offsets after each batch."""
|
|
559
|
+
|
|
560
|
+
auto_commit_threshold: Annotated[
|
|
561
|
+
Optional[float], pydantic.Field(alias="autoCommitThreshold")
|
|
562
|
+
] = None
|
|
563
|
+
r"""How many events are needed to trigger an offset commit. If both this and Offset commit interval are set, @{product} commits offsets when either condition is met. If both are empty, @{product} commits offsets after each batch."""
|
|
564
|
+
|
|
565
|
+
max_bytes_per_partition: Annotated[
|
|
566
|
+
Optional[float], pydantic.Field(alias="maxBytesPerPartition")
|
|
567
|
+
] = 1048576
|
|
568
|
+
r"""Maximum amount of data that Kafka will return per partition, per fetch request. Must equal or exceed the maximum message size (maxBytesPerPartition) that Kafka is configured to allow. Otherwise, @{product} can get stuck trying to retrieve messages. Defaults to 1048576 (1 MB)."""
|
|
569
|
+
|
|
570
|
+
max_bytes: Annotated[Optional[float], pydantic.Field(alias="maxBytes")] = 10485760
|
|
571
|
+
r"""Maximum number of bytes that Kafka will return per fetch request. Defaults to 10485760 (10 MB)."""
|
|
572
|
+
|
|
573
|
+
max_socket_errors: Annotated[
|
|
574
|
+
Optional[float], pydantic.Field(alias="maxSocketErrors")
|
|
575
|
+
] = 0
|
|
576
|
+
r"""Maximum number of network errors before the consumer re-creates a socket"""
|
|
577
|
+
|
|
578
|
+
metadata: Optional[List[InputKafkaMetadatum]] = None
|
|
579
|
+
r"""Fields to add to events from this input"""
|
|
580
|
+
|
|
581
|
+
description: Optional[str] = None
|