cribl-control-plane 0.2.1rc4__py3-none-any.whl → 0.2.1rc6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cribl-control-plane might be problematic. Click here for more details.
- cribl_control_plane/_version.py +3 -3
- cribl_control_plane/groups_sdk.py +2 -2
- cribl_control_plane/models/__init__.py +3 -99
- cribl_control_plane/models/createconfiggroupbyproductop.py +2 -2
- cribl_control_plane/models/input.py +14 -14
- cribl_control_plane/models/inputappscope.py +16 -20
- cribl_control_plane/models/inputconfluentcloud.py +0 -110
- cribl_control_plane/models/inputcriblhttp.py +16 -20
- cribl_control_plane/models/inputcribllakehttp.py +16 -20
- cribl_control_plane/models/inputcribltcp.py +16 -20
- cribl_control_plane/models/inputdatadogagent.py +16 -20
- cribl_control_plane/models/inputedgeprometheus.py +36 -44
- cribl_control_plane/models/inputelastic.py +27 -44
- cribl_control_plane/models/inputeventhub.py +0 -118
- cribl_control_plane/models/inputfirehose.py +16 -20
- cribl_control_plane/models/inputgrafana.py +31 -39
- cribl_control_plane/models/inputhttp.py +16 -20
- cribl_control_plane/models/inputhttpraw.py +16 -20
- cribl_control_plane/models/inputkafka.py +0 -108
- cribl_control_plane/models/inputloki.py +16 -20
- cribl_control_plane/models/inputmetrics.py +16 -20
- cribl_control_plane/models/inputmodeldriventelemetry.py +16 -20
- cribl_control_plane/models/inputopentelemetry.py +15 -19
- cribl_control_plane/models/inputprometheus.py +36 -44
- cribl_control_plane/models/inputprometheusrw.py +16 -20
- cribl_control_plane/models/inputsplunk.py +16 -20
- cribl_control_plane/models/inputsplunkhec.py +15 -19
- cribl_control_plane/models/inputsyslog.py +31 -39
- cribl_control_plane/models/inputsystemmetrics.py +10 -20
- cribl_control_plane/models/inputtcp.py +16 -30
- cribl_control_plane/models/inputtcpjson.py +16 -20
- cribl_control_plane/models/inputwindowsmetrics.py +10 -20
- cribl_control_plane/models/inputwineventlogs.py +0 -14
- cribl_control_plane/models/inputwizwebhook.py +16 -20
- cribl_control_plane/models/inputzscalerhec.py +15 -19
- cribl_control_plane/models/output.py +22 -22
- cribl_control_plane/models/outputazureblob.py +0 -7
- cribl_control_plane/models/outputazuredataexplorer.py +93 -283
- cribl_control_plane/models/outputazureeventhub.py +21 -169
- cribl_control_plane/models/outputazurelogs.py +21 -49
- cribl_control_plane/models/outputchronicle.py +21 -49
- cribl_control_plane/models/outputclickhouse.py +21 -49
- cribl_control_plane/models/outputcloudwatch.py +21 -49
- cribl_control_plane/models/outputconfluentcloud.py +22 -167
- cribl_control_plane/models/outputcriblhttp.py +21 -49
- cribl_control_plane/models/outputcribltcp.py +21 -49
- cribl_control_plane/models/outputcrowdstrikenextgensiem.py +22 -50
- cribl_control_plane/models/outputdatabricks.py +0 -7
- cribl_control_plane/models/outputdatadog.py +21 -49
- cribl_control_plane/models/outputdataset.py +21 -49
- cribl_control_plane/models/outputdls3.py +0 -7
- cribl_control_plane/models/outputdynatracehttp.py +21 -49
- cribl_control_plane/models/outputdynatraceotlp.py +21 -49
- cribl_control_plane/models/outputelastic.py +21 -74
- cribl_control_plane/models/outputelasticcloud.py +21 -74
- cribl_control_plane/models/outputfilesystem.py +0 -7
- cribl_control_plane/models/outputgooglechronicle.py +22 -65
- cribl_control_plane/models/outputgooglecloudlogging.py +22 -50
- cribl_control_plane/models/outputgooglecloudstorage.py +0 -7
- cribl_control_plane/models/outputgooglepubsub.py +21 -49
- cribl_control_plane/models/outputgrafanacloud.py +42 -98
- cribl_control_plane/models/outputgraphite.py +21 -49
- cribl_control_plane/models/outputhoneycomb.py +21 -49
- cribl_control_plane/models/outputhumiohec.py +21 -49
- cribl_control_plane/models/outputinfluxdb.py +21 -49
- cribl_control_plane/models/outputkafka.py +19 -162
- cribl_control_plane/models/outputkinesis.py +21 -56
- cribl_control_plane/models/outputloki.py +19 -47
- cribl_control_plane/models/outputminio.py +0 -7
- cribl_control_plane/models/outputmsk.py +19 -54
- cribl_control_plane/models/outputnewrelic.py +21 -49
- cribl_control_plane/models/outputnewrelicevents.py +22 -50
- cribl_control_plane/models/outputopentelemetry.py +21 -49
- cribl_control_plane/models/outputprometheus.py +21 -49
- cribl_control_plane/models/outputs3.py +0 -7
- cribl_control_plane/models/outputsentinel.py +21 -49
- cribl_control_plane/models/outputsentineloneaisiem.py +22 -50
- cribl_control_plane/models/outputservicenow.py +21 -49
- cribl_control_plane/models/outputsignalfx.py +21 -49
- cribl_control_plane/models/outputsns.py +19 -47
- cribl_control_plane/models/outputsplunk.py +21 -49
- cribl_control_plane/models/outputsplunkhec.py +21 -49
- cribl_control_plane/models/outputsplunklb.py +21 -49
- cribl_control_plane/models/outputsqs.py +19 -47
- cribl_control_plane/models/outputstatsd.py +21 -49
- cribl_control_plane/models/outputstatsdext.py +21 -49
- cribl_control_plane/models/outputsumologic.py +21 -49
- cribl_control_plane/models/outputsyslog.py +99 -129
- cribl_control_plane/models/outputtcpjson.py +21 -49
- cribl_control_plane/models/outputwavefront.py +21 -49
- cribl_control_plane/models/outputwebhook.py +21 -49
- cribl_control_plane/models/outputxsiam.py +19 -47
- cribl_control_plane/models/runnablejobcollection.py +8 -12
- cribl_control_plane/models/runnablejobexecutor.py +8 -12
- cribl_control_plane/models/runnablejobscheduledsearch.py +8 -12
- {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc6.dist-info}/METADATA +1 -1
- {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc6.dist-info}/RECORD +98 -98
- {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc6.dist-info}/WHEEL +0 -0
|
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
|
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
9
|
from pydantic.functional_validators import PlainValidator
|
|
10
|
-
from typing import List, Optional
|
|
10
|
+
from typing import Any, List, Optional
|
|
11
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
12
12
|
|
|
13
13
|
|
|
@@ -123,12 +123,6 @@ class InputSplunkMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
123
123
|
|
|
124
124
|
class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
|
|
125
125
|
disabled: NotRequired[bool]
|
|
126
|
-
request_cert: NotRequired[bool]
|
|
127
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
128
|
-
reject_unauthorized: NotRequired[bool]
|
|
129
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
130
|
-
common_name_regex: NotRequired[str]
|
|
131
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
132
126
|
certificate_name: NotRequired[str]
|
|
133
127
|
r"""The name of the predefined certificate"""
|
|
134
128
|
priv_key_path: NotRequired[str]
|
|
@@ -139,6 +133,10 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
139
133
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
140
134
|
ca_path: NotRequired[str]
|
|
141
135
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
136
|
+
request_cert: NotRequired[bool]
|
|
137
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
138
|
+
reject_unauthorized: NotRequired[Any]
|
|
139
|
+
common_name_regex: NotRequired[Any]
|
|
142
140
|
min_version: NotRequired[InputSplunkMinimumTLSVersion]
|
|
143
141
|
max_version: NotRequired[InputSplunkMaximumTLSVersion]
|
|
144
142
|
|
|
@@ -146,19 +144,6 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
146
144
|
class InputSplunkTLSSettingsServerSide(BaseModel):
|
|
147
145
|
disabled: Optional[bool] = True
|
|
148
146
|
|
|
149
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
150
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
151
|
-
|
|
152
|
-
reject_unauthorized: Annotated[
|
|
153
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
154
|
-
] = True
|
|
155
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
156
|
-
|
|
157
|
-
common_name_regex: Annotated[
|
|
158
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
159
|
-
] = "/.*/"
|
|
160
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
161
|
-
|
|
162
147
|
certificate_name: Annotated[
|
|
163
148
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
164
149
|
] = None
|
|
@@ -176,6 +161,17 @@ class InputSplunkTLSSettingsServerSide(BaseModel):
|
|
|
176
161
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
177
162
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
178
163
|
|
|
164
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
165
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
166
|
+
|
|
167
|
+
reject_unauthorized: Annotated[
|
|
168
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
169
|
+
] = None
|
|
170
|
+
|
|
171
|
+
common_name_regex: Annotated[
|
|
172
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
173
|
+
] = None
|
|
174
|
+
|
|
179
175
|
min_version: Annotated[
|
|
180
176
|
Annotated[
|
|
181
177
|
Optional[InputSplunkMinimumTLSVersion],
|
|
@@ -185,12 +185,6 @@ class InputSplunkHecMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
185
185
|
|
|
186
186
|
class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
|
|
187
187
|
disabled: NotRequired[bool]
|
|
188
|
-
request_cert: NotRequired[bool]
|
|
189
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
190
|
-
reject_unauthorized: NotRequired[bool]
|
|
191
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
192
|
-
common_name_regex: NotRequired[str]
|
|
193
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
194
188
|
certificate_name: NotRequired[str]
|
|
195
189
|
r"""The name of the predefined certificate"""
|
|
196
190
|
priv_key_path: NotRequired[str]
|
|
@@ -201,6 +195,10 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
201
195
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
202
196
|
ca_path: NotRequired[str]
|
|
203
197
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
198
|
+
request_cert: NotRequired[bool]
|
|
199
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
200
|
+
reject_unauthorized: NotRequired[Any]
|
|
201
|
+
common_name_regex: NotRequired[Any]
|
|
204
202
|
min_version: NotRequired[InputSplunkHecMinimumTLSVersion]
|
|
205
203
|
max_version: NotRequired[InputSplunkHecMaximumTLSVersion]
|
|
206
204
|
|
|
@@ -208,19 +206,6 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
208
206
|
class InputSplunkHecTLSSettingsServerSide(BaseModel):
|
|
209
207
|
disabled: Optional[bool] = True
|
|
210
208
|
|
|
211
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
212
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
213
|
-
|
|
214
|
-
reject_unauthorized: Annotated[
|
|
215
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
216
|
-
] = True
|
|
217
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
218
|
-
|
|
219
|
-
common_name_regex: Annotated[
|
|
220
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
221
|
-
] = "/.*/"
|
|
222
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
223
|
-
|
|
224
209
|
certificate_name: Annotated[
|
|
225
210
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
226
211
|
] = None
|
|
@@ -238,6 +223,17 @@ class InputSplunkHecTLSSettingsServerSide(BaseModel):
|
|
|
238
223
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
239
224
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
240
225
|
|
|
226
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
227
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
228
|
+
|
|
229
|
+
reject_unauthorized: Annotated[
|
|
230
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
231
|
+
] = None
|
|
232
|
+
|
|
233
|
+
common_name_regex: Annotated[
|
|
234
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
235
|
+
] = None
|
|
236
|
+
|
|
241
237
|
min_version: Annotated[
|
|
242
238
|
Annotated[
|
|
243
239
|
Optional[InputSplunkHecMinimumTLSVersion],
|
|
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
|
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
9
|
from pydantic.functional_validators import PlainValidator
|
|
10
|
-
from typing import List, Optional, Union
|
|
10
|
+
from typing import Any, List, Optional, Union
|
|
11
11
|
from typing_extensions import Annotated, NotRequired, TypeAliasType, TypedDict
|
|
12
12
|
|
|
13
13
|
|
|
@@ -123,12 +123,6 @@ class InputSyslogMaximumTLSVersion2(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
123
123
|
|
|
124
124
|
class InputSyslogTLSSettingsServerSide2TypedDict(TypedDict):
|
|
125
125
|
disabled: NotRequired[bool]
|
|
126
|
-
request_cert: NotRequired[bool]
|
|
127
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
128
|
-
reject_unauthorized: NotRequired[bool]
|
|
129
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
130
|
-
common_name_regex: NotRequired[str]
|
|
131
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
132
126
|
certificate_name: NotRequired[str]
|
|
133
127
|
r"""The name of the predefined certificate"""
|
|
134
128
|
priv_key_path: NotRequired[str]
|
|
@@ -139,6 +133,10 @@ class InputSyslogTLSSettingsServerSide2TypedDict(TypedDict):
|
|
|
139
133
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
140
134
|
ca_path: NotRequired[str]
|
|
141
135
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
136
|
+
request_cert: NotRequired[bool]
|
|
137
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
138
|
+
reject_unauthorized: NotRequired[Any]
|
|
139
|
+
common_name_regex: NotRequired[Any]
|
|
142
140
|
min_version: NotRequired[InputSyslogMinimumTLSVersion2]
|
|
143
141
|
max_version: NotRequired[InputSyslogMaximumTLSVersion2]
|
|
144
142
|
|
|
@@ -146,19 +144,6 @@ class InputSyslogTLSSettingsServerSide2TypedDict(TypedDict):
|
|
|
146
144
|
class InputSyslogTLSSettingsServerSide2(BaseModel):
|
|
147
145
|
disabled: Optional[bool] = True
|
|
148
146
|
|
|
149
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
150
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
151
|
-
|
|
152
|
-
reject_unauthorized: Annotated[
|
|
153
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
154
|
-
] = True
|
|
155
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
156
|
-
|
|
157
|
-
common_name_regex: Annotated[
|
|
158
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
159
|
-
] = "/.*/"
|
|
160
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
161
|
-
|
|
162
147
|
certificate_name: Annotated[
|
|
163
148
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
164
149
|
] = None
|
|
@@ -176,6 +161,17 @@ class InputSyslogTLSSettingsServerSide2(BaseModel):
|
|
|
176
161
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
177
162
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
178
163
|
|
|
164
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
165
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
166
|
+
|
|
167
|
+
reject_unauthorized: Annotated[
|
|
168
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
169
|
+
] = None
|
|
170
|
+
|
|
171
|
+
common_name_regex: Annotated[
|
|
172
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
173
|
+
] = None
|
|
174
|
+
|
|
179
175
|
min_version: Annotated[
|
|
180
176
|
Annotated[
|
|
181
177
|
Optional[InputSyslogMinimumTLSVersion2],
|
|
@@ -514,12 +510,6 @@ class InputSyslogMaximumTLSVersion1(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
514
510
|
|
|
515
511
|
class InputSyslogTLSSettingsServerSide1TypedDict(TypedDict):
|
|
516
512
|
disabled: NotRequired[bool]
|
|
517
|
-
request_cert: NotRequired[bool]
|
|
518
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
519
|
-
reject_unauthorized: NotRequired[bool]
|
|
520
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
521
|
-
common_name_regex: NotRequired[str]
|
|
522
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
523
513
|
certificate_name: NotRequired[str]
|
|
524
514
|
r"""The name of the predefined certificate"""
|
|
525
515
|
priv_key_path: NotRequired[str]
|
|
@@ -530,6 +520,10 @@ class InputSyslogTLSSettingsServerSide1TypedDict(TypedDict):
|
|
|
530
520
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
531
521
|
ca_path: NotRequired[str]
|
|
532
522
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
523
|
+
request_cert: NotRequired[bool]
|
|
524
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
525
|
+
reject_unauthorized: NotRequired[Any]
|
|
526
|
+
common_name_regex: NotRequired[Any]
|
|
533
527
|
min_version: NotRequired[InputSyslogMinimumTLSVersion1]
|
|
534
528
|
max_version: NotRequired[InputSyslogMaximumTLSVersion1]
|
|
535
529
|
|
|
@@ -537,19 +531,6 @@ class InputSyslogTLSSettingsServerSide1TypedDict(TypedDict):
|
|
|
537
531
|
class InputSyslogTLSSettingsServerSide1(BaseModel):
|
|
538
532
|
disabled: Optional[bool] = True
|
|
539
533
|
|
|
540
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
541
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
542
|
-
|
|
543
|
-
reject_unauthorized: Annotated[
|
|
544
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
545
|
-
] = True
|
|
546
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
547
|
-
|
|
548
|
-
common_name_regex: Annotated[
|
|
549
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
550
|
-
] = "/.*/"
|
|
551
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
552
|
-
|
|
553
534
|
certificate_name: Annotated[
|
|
554
535
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
555
536
|
] = None
|
|
@@ -567,6 +548,17 @@ class InputSyslogTLSSettingsServerSide1(BaseModel):
|
|
|
567
548
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
568
549
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
569
550
|
|
|
551
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
552
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
553
|
+
|
|
554
|
+
reject_unauthorized: Annotated[
|
|
555
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
556
|
+
] = None
|
|
557
|
+
|
|
558
|
+
common_name_regex: Annotated[
|
|
559
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
560
|
+
] = None
|
|
561
|
+
|
|
570
562
|
min_version: Annotated[
|
|
571
563
|
Annotated[
|
|
572
564
|
Optional[InputSyslogMinimumTLSVersion1],
|
|
@@ -239,14 +239,12 @@ class InputSystemMetricsNetworkMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
239
239
|
class InputSystemMetricsNetworkTypedDict(TypedDict):
|
|
240
240
|
mode: NotRequired[InputSystemMetricsNetworkMode]
|
|
241
241
|
r"""Select the level of detail for network metrics"""
|
|
242
|
-
detail: NotRequired[bool]
|
|
243
|
-
r"""Generate full network metrics"""
|
|
244
|
-
protocols: NotRequired[bool]
|
|
245
|
-
r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
|
|
246
242
|
devices: NotRequired[List[str]]
|
|
247
243
|
r"""Network interfaces to include/exclude. Examples: eth0, !lo. All interfaces are included if this list is empty."""
|
|
248
244
|
per_interface: NotRequired[bool]
|
|
249
245
|
r"""Generate separate metrics for each interface"""
|
|
246
|
+
detail: NotRequired[bool]
|
|
247
|
+
r"""Generate full network metrics"""
|
|
250
248
|
|
|
251
249
|
|
|
252
250
|
class InputSystemMetricsNetwork(BaseModel):
|
|
@@ -256,12 +254,6 @@ class InputSystemMetricsNetwork(BaseModel):
|
|
|
256
254
|
] = InputSystemMetricsNetworkMode.BASIC
|
|
257
255
|
r"""Select the level of detail for network metrics"""
|
|
258
256
|
|
|
259
|
-
detail: Optional[bool] = False
|
|
260
|
-
r"""Generate full network metrics"""
|
|
261
|
-
|
|
262
|
-
protocols: Optional[bool] = False
|
|
263
|
-
r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
|
|
264
|
-
|
|
265
257
|
devices: Optional[List[str]] = None
|
|
266
258
|
r"""Network interfaces to include/exclude. Examples: eth0, !lo. All interfaces are included if this list is empty."""
|
|
267
259
|
|
|
@@ -270,6 +262,9 @@ class InputSystemMetricsNetwork(BaseModel):
|
|
|
270
262
|
)
|
|
271
263
|
r"""Generate separate metrics for each interface"""
|
|
272
264
|
|
|
265
|
+
detail: Optional[bool] = False
|
|
266
|
+
r"""Generate full network metrics"""
|
|
267
|
+
|
|
273
268
|
|
|
274
269
|
class InputSystemMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
275
270
|
r"""Select the level of detail for disk metrics"""
|
|
@@ -287,10 +282,6 @@ class InputSystemMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
287
282
|
class InputSystemMetricsDiskTypedDict(TypedDict):
|
|
288
283
|
mode: NotRequired[InputSystemMetricsDiskMode]
|
|
289
284
|
r"""Select the level of detail for disk metrics"""
|
|
290
|
-
detail: NotRequired[bool]
|
|
291
|
-
r"""Generate full disk metrics"""
|
|
292
|
-
inodes: NotRequired[bool]
|
|
293
|
-
r"""Generate filesystem inode metrics"""
|
|
294
285
|
devices: NotRequired[List[str]]
|
|
295
286
|
r"""Block devices to include/exclude. Examples: sda*, !loop*. Wildcards and ! (not) operators are supported. All devices are included if this list is empty."""
|
|
296
287
|
mountpoints: NotRequired[List[str]]
|
|
@@ -299,6 +290,8 @@ class InputSystemMetricsDiskTypedDict(TypedDict):
|
|
|
299
290
|
r"""Filesystem types to include/exclude. Examples: ext4, !*tmpfs, !squashfs. Wildcards and ! (not) operators are supported. All types are included if this list is empty."""
|
|
300
291
|
per_device: NotRequired[bool]
|
|
301
292
|
r"""Generate separate metrics for each device"""
|
|
293
|
+
detail: NotRequired[bool]
|
|
294
|
+
r"""Generate full disk metrics"""
|
|
302
295
|
|
|
303
296
|
|
|
304
297
|
class InputSystemMetricsDisk(BaseModel):
|
|
@@ -307,12 +300,6 @@ class InputSystemMetricsDisk(BaseModel):
|
|
|
307
300
|
] = InputSystemMetricsDiskMode.BASIC
|
|
308
301
|
r"""Select the level of detail for disk metrics"""
|
|
309
302
|
|
|
310
|
-
detail: Optional[bool] = False
|
|
311
|
-
r"""Generate full disk metrics"""
|
|
312
|
-
|
|
313
|
-
inodes: Optional[bool] = False
|
|
314
|
-
r"""Generate filesystem inode metrics"""
|
|
315
|
-
|
|
316
303
|
devices: Optional[List[str]] = None
|
|
317
304
|
r"""Block devices to include/exclude. Examples: sda*, !loop*. Wildcards and ! (not) operators are supported. All devices are included if this list is empty."""
|
|
318
305
|
|
|
@@ -325,6 +312,9 @@ class InputSystemMetricsDisk(BaseModel):
|
|
|
325
312
|
per_device: Annotated[Optional[bool], pydantic.Field(alias="perDevice")] = False
|
|
326
313
|
r"""Generate separate metrics for each device"""
|
|
327
314
|
|
|
315
|
+
detail: Optional[bool] = False
|
|
316
|
+
r"""Generate full disk metrics"""
|
|
317
|
+
|
|
328
318
|
|
|
329
319
|
class InputSystemMetricsCustomTypedDict(TypedDict):
|
|
330
320
|
system: NotRequired[InputSystemMetricsSystemTypedDict]
|
|
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
|
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
9
|
from pydantic.functional_validators import PlainValidator
|
|
10
|
-
from typing import List, Optional
|
|
10
|
+
from typing import Any, List, Optional
|
|
11
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
12
12
|
|
|
13
13
|
|
|
@@ -123,12 +123,6 @@ class InputTCPMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
123
123
|
|
|
124
124
|
class InputTCPTLSSettingsServerSideTypedDict(TypedDict):
|
|
125
125
|
disabled: NotRequired[bool]
|
|
126
|
-
request_cert: NotRequired[bool]
|
|
127
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
128
|
-
reject_unauthorized: NotRequired[bool]
|
|
129
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
130
|
-
common_name_regex: NotRequired[str]
|
|
131
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
132
126
|
certificate_name: NotRequired[str]
|
|
133
127
|
r"""The name of the predefined certificate"""
|
|
134
128
|
priv_key_path: NotRequired[str]
|
|
@@ -139,6 +133,10 @@ class InputTCPTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
139
133
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
140
134
|
ca_path: NotRequired[str]
|
|
141
135
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
136
|
+
request_cert: NotRequired[bool]
|
|
137
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
138
|
+
reject_unauthorized: NotRequired[Any]
|
|
139
|
+
common_name_regex: NotRequired[Any]
|
|
142
140
|
min_version: NotRequired[InputTCPMinimumTLSVersion]
|
|
143
141
|
max_version: NotRequired[InputTCPMaximumTLSVersion]
|
|
144
142
|
|
|
@@ -146,19 +144,6 @@ class InputTCPTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
146
144
|
class InputTCPTLSSettingsServerSide(BaseModel):
|
|
147
145
|
disabled: Optional[bool] = True
|
|
148
146
|
|
|
149
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
150
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
151
|
-
|
|
152
|
-
reject_unauthorized: Annotated[
|
|
153
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
154
|
-
] = True
|
|
155
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
156
|
-
|
|
157
|
-
common_name_regex: Annotated[
|
|
158
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
159
|
-
] = "/.*/"
|
|
160
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
161
|
-
|
|
162
147
|
certificate_name: Annotated[
|
|
163
148
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
164
149
|
] = None
|
|
@@ -176,6 +161,17 @@ class InputTCPTLSSettingsServerSide(BaseModel):
|
|
|
176
161
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
177
162
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
178
163
|
|
|
164
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
165
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
166
|
+
|
|
167
|
+
reject_unauthorized: Annotated[
|
|
168
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
169
|
+
] = None
|
|
170
|
+
|
|
171
|
+
common_name_regex: Annotated[
|
|
172
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
173
|
+
] = None
|
|
174
|
+
|
|
179
175
|
min_version: Annotated[
|
|
180
176
|
Annotated[
|
|
181
177
|
Optional[InputTCPMinimumTLSVersion],
|
|
@@ -276,12 +272,8 @@ class InputTCPTypedDict(TypedDict):
|
|
|
276
272
|
r"""Client will pass the header record with every new connection. The header can contain an authToken, and an object with a list of fields and values to add to every event. These fields can be used to simplify Event Breaker selection, routing, etc. Header has this format, and must be followed by a newline: { \"authToken\" : \"myToken\", \"fields\": { \"field1\": \"value1\", \"field2\": \"value2\" } }"""
|
|
277
273
|
preprocess: NotRequired[InputTCPPreprocessTypedDict]
|
|
278
274
|
description: NotRequired[str]
|
|
279
|
-
auth_token: NotRequired[str]
|
|
280
|
-
r"""Shared secret to be provided by any client (in authToken header field). If empty, unauthorized access is permitted."""
|
|
281
275
|
auth_type: NotRequired[InputTCPAuthenticationMethod]
|
|
282
276
|
r"""Select Manual to enter an auth token directly, or select Secret to use a text secret to authenticate"""
|
|
283
|
-
text_secret: NotRequired[str]
|
|
284
|
-
r"""Select or create a stored text secret"""
|
|
285
277
|
|
|
286
278
|
|
|
287
279
|
class InputTCP(BaseModel):
|
|
@@ -374,9 +366,6 @@ class InputTCP(BaseModel):
|
|
|
374
366
|
|
|
375
367
|
description: Optional[str] = None
|
|
376
368
|
|
|
377
|
-
auth_token: Annotated[Optional[str], pydantic.Field(alias="authToken")] = ""
|
|
378
|
-
r"""Shared secret to be provided by any client (in authToken header field). If empty, unauthorized access is permitted."""
|
|
379
|
-
|
|
380
369
|
auth_type: Annotated[
|
|
381
370
|
Annotated[
|
|
382
371
|
Optional[InputTCPAuthenticationMethod],
|
|
@@ -385,6 +374,3 @@ class InputTCP(BaseModel):
|
|
|
385
374
|
pydantic.Field(alias="authType"),
|
|
386
375
|
] = InputTCPAuthenticationMethod.MANUAL
|
|
387
376
|
r"""Select Manual to enter an auth token directly, or select Secret to use a text secret to authenticate"""
|
|
388
|
-
|
|
389
|
-
text_secret: Annotated[Optional[str], pydantic.Field(alias="textSecret")] = None
|
|
390
|
-
r"""Select or create a stored text secret"""
|
|
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
|
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
9
|
from pydantic.functional_validators import PlainValidator
|
|
10
|
-
from typing import List, Optional
|
|
10
|
+
from typing import Any, List, Optional
|
|
11
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
12
12
|
|
|
13
13
|
|
|
@@ -123,12 +123,6 @@ class InputTcpjsonMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
123
123
|
|
|
124
124
|
class InputTcpjsonTLSSettingsServerSideTypedDict(TypedDict):
|
|
125
125
|
disabled: NotRequired[bool]
|
|
126
|
-
request_cert: NotRequired[bool]
|
|
127
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
128
|
-
reject_unauthorized: NotRequired[bool]
|
|
129
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
130
|
-
common_name_regex: NotRequired[str]
|
|
131
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
132
126
|
certificate_name: NotRequired[str]
|
|
133
127
|
r"""The name of the predefined certificate"""
|
|
134
128
|
priv_key_path: NotRequired[str]
|
|
@@ -139,6 +133,10 @@ class InputTcpjsonTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
139
133
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
140
134
|
ca_path: NotRequired[str]
|
|
141
135
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
136
|
+
request_cert: NotRequired[bool]
|
|
137
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
138
|
+
reject_unauthorized: NotRequired[Any]
|
|
139
|
+
common_name_regex: NotRequired[Any]
|
|
142
140
|
min_version: NotRequired[InputTcpjsonMinimumTLSVersion]
|
|
143
141
|
max_version: NotRequired[InputTcpjsonMaximumTLSVersion]
|
|
144
142
|
|
|
@@ -146,19 +144,6 @@ class InputTcpjsonTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
146
144
|
class InputTcpjsonTLSSettingsServerSide(BaseModel):
|
|
147
145
|
disabled: Optional[bool] = True
|
|
148
146
|
|
|
149
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
150
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
151
|
-
|
|
152
|
-
reject_unauthorized: Annotated[
|
|
153
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
154
|
-
] = True
|
|
155
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
156
|
-
|
|
157
|
-
common_name_regex: Annotated[
|
|
158
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
159
|
-
] = "/.*/"
|
|
160
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
161
|
-
|
|
162
147
|
certificate_name: Annotated[
|
|
163
148
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
164
149
|
] = None
|
|
@@ -176,6 +161,17 @@ class InputTcpjsonTLSSettingsServerSide(BaseModel):
|
|
|
176
161
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
177
162
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
178
163
|
|
|
164
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
165
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
166
|
+
|
|
167
|
+
reject_unauthorized: Annotated[
|
|
168
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
169
|
+
] = None
|
|
170
|
+
|
|
171
|
+
common_name_regex: Annotated[
|
|
172
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
173
|
+
] = None
|
|
174
|
+
|
|
179
175
|
min_version: Annotated[
|
|
180
176
|
Annotated[
|
|
181
177
|
Optional[InputTcpjsonMinimumTLSVersion],
|
|
@@ -239,14 +239,12 @@ class InputWindowsMetricsNetworkMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
239
239
|
class InputWindowsMetricsNetworkTypedDict(TypedDict):
|
|
240
240
|
mode: NotRequired[InputWindowsMetricsNetworkMode]
|
|
241
241
|
r"""Select the level of details for network metrics"""
|
|
242
|
-
detail: NotRequired[bool]
|
|
243
|
-
r"""Generate full network metrics"""
|
|
244
|
-
protocols: NotRequired[bool]
|
|
245
|
-
r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
|
|
246
242
|
devices: NotRequired[List[str]]
|
|
247
243
|
r"""Network interfaces to include/exclude. All interfaces are included if this list is empty."""
|
|
248
244
|
per_interface: NotRequired[bool]
|
|
249
245
|
r"""Generate separate metrics for each interface"""
|
|
246
|
+
detail: NotRequired[bool]
|
|
247
|
+
r"""Generate full network metrics"""
|
|
250
248
|
|
|
251
249
|
|
|
252
250
|
class InputWindowsMetricsNetwork(BaseModel):
|
|
@@ -256,12 +254,6 @@ class InputWindowsMetricsNetwork(BaseModel):
|
|
|
256
254
|
] = InputWindowsMetricsNetworkMode.BASIC
|
|
257
255
|
r"""Select the level of details for network metrics"""
|
|
258
256
|
|
|
259
|
-
detail: Optional[bool] = False
|
|
260
|
-
r"""Generate full network metrics"""
|
|
261
|
-
|
|
262
|
-
protocols: Optional[bool] = False
|
|
263
|
-
r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
|
|
264
|
-
|
|
265
257
|
devices: Optional[List[str]] = None
|
|
266
258
|
r"""Network interfaces to include/exclude. All interfaces are included if this list is empty."""
|
|
267
259
|
|
|
@@ -270,6 +262,9 @@ class InputWindowsMetricsNetwork(BaseModel):
|
|
|
270
262
|
)
|
|
271
263
|
r"""Generate separate metrics for each interface"""
|
|
272
264
|
|
|
265
|
+
detail: Optional[bool] = False
|
|
266
|
+
r"""Generate full network metrics"""
|
|
267
|
+
|
|
273
268
|
|
|
274
269
|
class InputWindowsMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
275
270
|
r"""Select the level of details for disk metrics"""
|
|
@@ -287,12 +282,10 @@ class InputWindowsMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
287
282
|
class InputWindowsMetricsDiskTypedDict(TypedDict):
|
|
288
283
|
mode: NotRequired[InputWindowsMetricsDiskMode]
|
|
289
284
|
r"""Select the level of details for disk metrics"""
|
|
290
|
-
per_volume: NotRequired[bool]
|
|
291
|
-
r"""Generate separate metrics for each volume"""
|
|
292
|
-
detail: NotRequired[bool]
|
|
293
|
-
r"""Generate full disk metrics"""
|
|
294
285
|
volumes: NotRequired[List[str]]
|
|
295
286
|
r"""Windows volumes to include/exclude. E.g.: C:, !E:, etc. Wildcards and ! (not) operators are supported. All volumes are included if this list is empty."""
|
|
287
|
+
per_volume: NotRequired[bool]
|
|
288
|
+
r"""Generate separate metrics for each volume"""
|
|
296
289
|
|
|
297
290
|
|
|
298
291
|
class InputWindowsMetricsDisk(BaseModel):
|
|
@@ -301,15 +294,12 @@ class InputWindowsMetricsDisk(BaseModel):
|
|
|
301
294
|
] = InputWindowsMetricsDiskMode.BASIC
|
|
302
295
|
r"""Select the level of details for disk metrics"""
|
|
303
296
|
|
|
304
|
-
per_volume: Annotated[Optional[bool], pydantic.Field(alias="perVolume")] = False
|
|
305
|
-
r"""Generate separate metrics for each volume"""
|
|
306
|
-
|
|
307
|
-
detail: Optional[bool] = False
|
|
308
|
-
r"""Generate full disk metrics"""
|
|
309
|
-
|
|
310
297
|
volumes: Optional[List[str]] = None
|
|
311
298
|
r"""Windows volumes to include/exclude. E.g.: C:, !E:, etc. Wildcards and ! (not) operators are supported. All volumes are included if this list is empty."""
|
|
312
299
|
|
|
300
|
+
per_volume: Annotated[Optional[bool], pydantic.Field(alias="perVolume")] = False
|
|
301
|
+
r"""Generate separate metrics for each volume"""
|
|
302
|
+
|
|
313
303
|
|
|
314
304
|
class InputWindowsMetricsCustomTypedDict(TypedDict):
|
|
315
305
|
system: NotRequired[InputWindowsMetricsSystemTypedDict]
|
|
@@ -174,10 +174,6 @@ class InputWinEventLogsTypedDict(TypedDict):
|
|
|
174
174
|
max_event_bytes: NotRequired[float]
|
|
175
175
|
r"""The maximum number of bytes in an event before it is flushed to the pipelines"""
|
|
176
176
|
description: NotRequired[str]
|
|
177
|
-
disable_json_rendering: NotRequired[bool]
|
|
178
|
-
r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""
|
|
179
|
-
disable_xml_rendering: NotRequired[bool]
|
|
180
|
-
r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""
|
|
181
177
|
|
|
182
178
|
|
|
183
179
|
class InputWinEventLogs(BaseModel):
|
|
@@ -245,13 +241,3 @@ class InputWinEventLogs(BaseModel):
|
|
|
245
241
|
r"""The maximum number of bytes in an event before it is flushed to the pipelines"""
|
|
246
242
|
|
|
247
243
|
description: Optional[str] = None
|
|
248
|
-
|
|
249
|
-
disable_json_rendering: Annotated[
|
|
250
|
-
Optional[bool], pydantic.Field(alias="disableJsonRendering")
|
|
251
|
-
] = False
|
|
252
|
-
r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""
|
|
253
|
-
|
|
254
|
-
disable_xml_rendering: Annotated[
|
|
255
|
-
Optional[bool], pydantic.Field(alias="disableXmlRendering")
|
|
256
|
-
] = True
|
|
257
|
-
r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""
|