cribl-control-plane 0.2.1rc4__py3-none-any.whl → 0.2.1rc6__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cribl-control-plane might be problematic. Click here for more details.

Files changed (98) hide show
  1. cribl_control_plane/_version.py +3 -3
  2. cribl_control_plane/groups_sdk.py +2 -2
  3. cribl_control_plane/models/__init__.py +3 -99
  4. cribl_control_plane/models/createconfiggroupbyproductop.py +2 -2
  5. cribl_control_plane/models/input.py +14 -14
  6. cribl_control_plane/models/inputappscope.py +16 -20
  7. cribl_control_plane/models/inputconfluentcloud.py +0 -110
  8. cribl_control_plane/models/inputcriblhttp.py +16 -20
  9. cribl_control_plane/models/inputcribllakehttp.py +16 -20
  10. cribl_control_plane/models/inputcribltcp.py +16 -20
  11. cribl_control_plane/models/inputdatadogagent.py +16 -20
  12. cribl_control_plane/models/inputedgeprometheus.py +36 -44
  13. cribl_control_plane/models/inputelastic.py +27 -44
  14. cribl_control_plane/models/inputeventhub.py +0 -118
  15. cribl_control_plane/models/inputfirehose.py +16 -20
  16. cribl_control_plane/models/inputgrafana.py +31 -39
  17. cribl_control_plane/models/inputhttp.py +16 -20
  18. cribl_control_plane/models/inputhttpraw.py +16 -20
  19. cribl_control_plane/models/inputkafka.py +0 -108
  20. cribl_control_plane/models/inputloki.py +16 -20
  21. cribl_control_plane/models/inputmetrics.py +16 -20
  22. cribl_control_plane/models/inputmodeldriventelemetry.py +16 -20
  23. cribl_control_plane/models/inputopentelemetry.py +15 -19
  24. cribl_control_plane/models/inputprometheus.py +36 -44
  25. cribl_control_plane/models/inputprometheusrw.py +16 -20
  26. cribl_control_plane/models/inputsplunk.py +16 -20
  27. cribl_control_plane/models/inputsplunkhec.py +15 -19
  28. cribl_control_plane/models/inputsyslog.py +31 -39
  29. cribl_control_plane/models/inputsystemmetrics.py +10 -20
  30. cribl_control_plane/models/inputtcp.py +16 -30
  31. cribl_control_plane/models/inputtcpjson.py +16 -20
  32. cribl_control_plane/models/inputwindowsmetrics.py +10 -20
  33. cribl_control_plane/models/inputwineventlogs.py +0 -14
  34. cribl_control_plane/models/inputwizwebhook.py +16 -20
  35. cribl_control_plane/models/inputzscalerhec.py +15 -19
  36. cribl_control_plane/models/output.py +22 -22
  37. cribl_control_plane/models/outputazureblob.py +0 -7
  38. cribl_control_plane/models/outputazuredataexplorer.py +93 -283
  39. cribl_control_plane/models/outputazureeventhub.py +21 -169
  40. cribl_control_plane/models/outputazurelogs.py +21 -49
  41. cribl_control_plane/models/outputchronicle.py +21 -49
  42. cribl_control_plane/models/outputclickhouse.py +21 -49
  43. cribl_control_plane/models/outputcloudwatch.py +21 -49
  44. cribl_control_plane/models/outputconfluentcloud.py +22 -167
  45. cribl_control_plane/models/outputcriblhttp.py +21 -49
  46. cribl_control_plane/models/outputcribltcp.py +21 -49
  47. cribl_control_plane/models/outputcrowdstrikenextgensiem.py +22 -50
  48. cribl_control_plane/models/outputdatabricks.py +0 -7
  49. cribl_control_plane/models/outputdatadog.py +21 -49
  50. cribl_control_plane/models/outputdataset.py +21 -49
  51. cribl_control_plane/models/outputdls3.py +0 -7
  52. cribl_control_plane/models/outputdynatracehttp.py +21 -49
  53. cribl_control_plane/models/outputdynatraceotlp.py +21 -49
  54. cribl_control_plane/models/outputelastic.py +21 -74
  55. cribl_control_plane/models/outputelasticcloud.py +21 -74
  56. cribl_control_plane/models/outputfilesystem.py +0 -7
  57. cribl_control_plane/models/outputgooglechronicle.py +22 -65
  58. cribl_control_plane/models/outputgooglecloudlogging.py +22 -50
  59. cribl_control_plane/models/outputgooglecloudstorage.py +0 -7
  60. cribl_control_plane/models/outputgooglepubsub.py +21 -49
  61. cribl_control_plane/models/outputgrafanacloud.py +42 -98
  62. cribl_control_plane/models/outputgraphite.py +21 -49
  63. cribl_control_plane/models/outputhoneycomb.py +21 -49
  64. cribl_control_plane/models/outputhumiohec.py +21 -49
  65. cribl_control_plane/models/outputinfluxdb.py +21 -49
  66. cribl_control_plane/models/outputkafka.py +19 -162
  67. cribl_control_plane/models/outputkinesis.py +21 -56
  68. cribl_control_plane/models/outputloki.py +19 -47
  69. cribl_control_plane/models/outputminio.py +0 -7
  70. cribl_control_plane/models/outputmsk.py +19 -54
  71. cribl_control_plane/models/outputnewrelic.py +21 -49
  72. cribl_control_plane/models/outputnewrelicevents.py +22 -50
  73. cribl_control_plane/models/outputopentelemetry.py +21 -49
  74. cribl_control_plane/models/outputprometheus.py +21 -49
  75. cribl_control_plane/models/outputs3.py +0 -7
  76. cribl_control_plane/models/outputsentinel.py +21 -49
  77. cribl_control_plane/models/outputsentineloneaisiem.py +22 -50
  78. cribl_control_plane/models/outputservicenow.py +21 -49
  79. cribl_control_plane/models/outputsignalfx.py +21 -49
  80. cribl_control_plane/models/outputsns.py +19 -47
  81. cribl_control_plane/models/outputsplunk.py +21 -49
  82. cribl_control_plane/models/outputsplunkhec.py +21 -49
  83. cribl_control_plane/models/outputsplunklb.py +21 -49
  84. cribl_control_plane/models/outputsqs.py +19 -47
  85. cribl_control_plane/models/outputstatsd.py +21 -49
  86. cribl_control_plane/models/outputstatsdext.py +21 -49
  87. cribl_control_plane/models/outputsumologic.py +21 -49
  88. cribl_control_plane/models/outputsyslog.py +99 -129
  89. cribl_control_plane/models/outputtcpjson.py +21 -49
  90. cribl_control_plane/models/outputwavefront.py +21 -49
  91. cribl_control_plane/models/outputwebhook.py +21 -49
  92. cribl_control_plane/models/outputxsiam.py +19 -47
  93. cribl_control_plane/models/runnablejobcollection.py +8 -12
  94. cribl_control_plane/models/runnablejobexecutor.py +8 -12
  95. cribl_control_plane/models/runnablejobscheduledsearch.py +8 -12
  96. {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc6.dist-info}/METADATA +1 -1
  97. {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc6.dist-info}/RECORD +98 -98
  98. {cribl_control_plane-0.2.1rc4.dist-info → cribl_control_plane-0.2.1rc6.dist-info}/WHEEL +0 -0
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
9
  from pydantic.functional_validators import PlainValidator
10
- from typing import List, Optional
10
+ from typing import Any, List, Optional
11
11
  from typing_extensions import Annotated, NotRequired, TypedDict
12
12
 
13
13
 
@@ -123,12 +123,6 @@ class InputSplunkMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
123
123
 
124
124
  class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
125
125
  disabled: NotRequired[bool]
126
- request_cert: NotRequired[bool]
127
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
128
- reject_unauthorized: NotRequired[bool]
129
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
130
- common_name_regex: NotRequired[str]
131
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
132
126
  certificate_name: NotRequired[str]
133
127
  r"""The name of the predefined certificate"""
134
128
  priv_key_path: NotRequired[str]
@@ -139,6 +133,10 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
139
133
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
140
134
  ca_path: NotRequired[str]
141
135
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
136
+ request_cert: NotRequired[bool]
137
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
138
+ reject_unauthorized: NotRequired[Any]
139
+ common_name_regex: NotRequired[Any]
142
140
  min_version: NotRequired[InputSplunkMinimumTLSVersion]
143
141
  max_version: NotRequired[InputSplunkMaximumTLSVersion]
144
142
 
@@ -146,19 +144,6 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
146
144
  class InputSplunkTLSSettingsServerSide(BaseModel):
147
145
  disabled: Optional[bool] = True
148
146
 
149
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
150
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
151
-
152
- reject_unauthorized: Annotated[
153
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
154
- ] = True
155
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
156
-
157
- common_name_regex: Annotated[
158
- Optional[str], pydantic.Field(alias="commonNameRegex")
159
- ] = "/.*/"
160
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
161
-
162
147
  certificate_name: Annotated[
163
148
  Optional[str], pydantic.Field(alias="certificateName")
164
149
  ] = None
@@ -176,6 +161,17 @@ class InputSplunkTLSSettingsServerSide(BaseModel):
176
161
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
177
162
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
178
163
 
164
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
165
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
166
+
167
+ reject_unauthorized: Annotated[
168
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
169
+ ] = None
170
+
171
+ common_name_regex: Annotated[
172
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
173
+ ] = None
174
+
179
175
  min_version: Annotated[
180
176
  Annotated[
181
177
  Optional[InputSplunkMinimumTLSVersion],
@@ -185,12 +185,6 @@ class InputSplunkHecMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
185
185
 
186
186
  class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
187
187
  disabled: NotRequired[bool]
188
- request_cert: NotRequired[bool]
189
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
190
- reject_unauthorized: NotRequired[bool]
191
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
192
- common_name_regex: NotRequired[str]
193
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
194
188
  certificate_name: NotRequired[str]
195
189
  r"""The name of the predefined certificate"""
196
190
  priv_key_path: NotRequired[str]
@@ -201,6 +195,10 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
201
195
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
202
196
  ca_path: NotRequired[str]
203
197
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
198
+ request_cert: NotRequired[bool]
199
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
200
+ reject_unauthorized: NotRequired[Any]
201
+ common_name_regex: NotRequired[Any]
204
202
  min_version: NotRequired[InputSplunkHecMinimumTLSVersion]
205
203
  max_version: NotRequired[InputSplunkHecMaximumTLSVersion]
206
204
 
@@ -208,19 +206,6 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
208
206
  class InputSplunkHecTLSSettingsServerSide(BaseModel):
209
207
  disabled: Optional[bool] = True
210
208
 
211
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
212
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
213
-
214
- reject_unauthorized: Annotated[
215
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
216
- ] = True
217
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
218
-
219
- common_name_regex: Annotated[
220
- Optional[str], pydantic.Field(alias="commonNameRegex")
221
- ] = "/.*/"
222
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
223
-
224
209
  certificate_name: Annotated[
225
210
  Optional[str], pydantic.Field(alias="certificateName")
226
211
  ] = None
@@ -238,6 +223,17 @@ class InputSplunkHecTLSSettingsServerSide(BaseModel):
238
223
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
239
224
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
240
225
 
226
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
227
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
228
+
229
+ reject_unauthorized: Annotated[
230
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
231
+ ] = None
232
+
233
+ common_name_regex: Annotated[
234
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
235
+ ] = None
236
+
241
237
  min_version: Annotated[
242
238
  Annotated[
243
239
  Optional[InputSplunkHecMinimumTLSVersion],
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
9
  from pydantic.functional_validators import PlainValidator
10
- from typing import List, Optional, Union
10
+ from typing import Any, List, Optional, Union
11
11
  from typing_extensions import Annotated, NotRequired, TypeAliasType, TypedDict
12
12
 
13
13
 
@@ -123,12 +123,6 @@ class InputSyslogMaximumTLSVersion2(str, Enum, metaclass=utils.OpenEnumMeta):
123
123
 
124
124
  class InputSyslogTLSSettingsServerSide2TypedDict(TypedDict):
125
125
  disabled: NotRequired[bool]
126
- request_cert: NotRequired[bool]
127
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
128
- reject_unauthorized: NotRequired[bool]
129
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
130
- common_name_regex: NotRequired[str]
131
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
132
126
  certificate_name: NotRequired[str]
133
127
  r"""The name of the predefined certificate"""
134
128
  priv_key_path: NotRequired[str]
@@ -139,6 +133,10 @@ class InputSyslogTLSSettingsServerSide2TypedDict(TypedDict):
139
133
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
140
134
  ca_path: NotRequired[str]
141
135
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
136
+ request_cert: NotRequired[bool]
137
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
138
+ reject_unauthorized: NotRequired[Any]
139
+ common_name_regex: NotRequired[Any]
142
140
  min_version: NotRequired[InputSyslogMinimumTLSVersion2]
143
141
  max_version: NotRequired[InputSyslogMaximumTLSVersion2]
144
142
 
@@ -146,19 +144,6 @@ class InputSyslogTLSSettingsServerSide2TypedDict(TypedDict):
146
144
  class InputSyslogTLSSettingsServerSide2(BaseModel):
147
145
  disabled: Optional[bool] = True
148
146
 
149
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
150
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
151
-
152
- reject_unauthorized: Annotated[
153
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
154
- ] = True
155
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
156
-
157
- common_name_regex: Annotated[
158
- Optional[str], pydantic.Field(alias="commonNameRegex")
159
- ] = "/.*/"
160
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
161
-
162
147
  certificate_name: Annotated[
163
148
  Optional[str], pydantic.Field(alias="certificateName")
164
149
  ] = None
@@ -176,6 +161,17 @@ class InputSyslogTLSSettingsServerSide2(BaseModel):
176
161
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
177
162
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
178
163
 
164
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
165
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
166
+
167
+ reject_unauthorized: Annotated[
168
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
169
+ ] = None
170
+
171
+ common_name_regex: Annotated[
172
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
173
+ ] = None
174
+
179
175
  min_version: Annotated[
180
176
  Annotated[
181
177
  Optional[InputSyslogMinimumTLSVersion2],
@@ -514,12 +510,6 @@ class InputSyslogMaximumTLSVersion1(str, Enum, metaclass=utils.OpenEnumMeta):
514
510
 
515
511
  class InputSyslogTLSSettingsServerSide1TypedDict(TypedDict):
516
512
  disabled: NotRequired[bool]
517
- request_cert: NotRequired[bool]
518
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
519
- reject_unauthorized: NotRequired[bool]
520
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
521
- common_name_regex: NotRequired[str]
522
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
523
513
  certificate_name: NotRequired[str]
524
514
  r"""The name of the predefined certificate"""
525
515
  priv_key_path: NotRequired[str]
@@ -530,6 +520,10 @@ class InputSyslogTLSSettingsServerSide1TypedDict(TypedDict):
530
520
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
531
521
  ca_path: NotRequired[str]
532
522
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
523
+ request_cert: NotRequired[bool]
524
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
525
+ reject_unauthorized: NotRequired[Any]
526
+ common_name_regex: NotRequired[Any]
533
527
  min_version: NotRequired[InputSyslogMinimumTLSVersion1]
534
528
  max_version: NotRequired[InputSyslogMaximumTLSVersion1]
535
529
 
@@ -537,19 +531,6 @@ class InputSyslogTLSSettingsServerSide1TypedDict(TypedDict):
537
531
  class InputSyslogTLSSettingsServerSide1(BaseModel):
538
532
  disabled: Optional[bool] = True
539
533
 
540
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
541
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
542
-
543
- reject_unauthorized: Annotated[
544
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
545
- ] = True
546
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
547
-
548
- common_name_regex: Annotated[
549
- Optional[str], pydantic.Field(alias="commonNameRegex")
550
- ] = "/.*/"
551
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
552
-
553
534
  certificate_name: Annotated[
554
535
  Optional[str], pydantic.Field(alias="certificateName")
555
536
  ] = None
@@ -567,6 +548,17 @@ class InputSyslogTLSSettingsServerSide1(BaseModel):
567
548
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
568
549
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
569
550
 
551
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
552
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
553
+
554
+ reject_unauthorized: Annotated[
555
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
556
+ ] = None
557
+
558
+ common_name_regex: Annotated[
559
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
560
+ ] = None
561
+
570
562
  min_version: Annotated[
571
563
  Annotated[
572
564
  Optional[InputSyslogMinimumTLSVersion1],
@@ -239,14 +239,12 @@ class InputSystemMetricsNetworkMode(str, Enum, metaclass=utils.OpenEnumMeta):
239
239
  class InputSystemMetricsNetworkTypedDict(TypedDict):
240
240
  mode: NotRequired[InputSystemMetricsNetworkMode]
241
241
  r"""Select the level of detail for network metrics"""
242
- detail: NotRequired[bool]
243
- r"""Generate full network metrics"""
244
- protocols: NotRequired[bool]
245
- r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
246
242
  devices: NotRequired[List[str]]
247
243
  r"""Network interfaces to include/exclude. Examples: eth0, !lo. All interfaces are included if this list is empty."""
248
244
  per_interface: NotRequired[bool]
249
245
  r"""Generate separate metrics for each interface"""
246
+ detail: NotRequired[bool]
247
+ r"""Generate full network metrics"""
250
248
 
251
249
 
252
250
  class InputSystemMetricsNetwork(BaseModel):
@@ -256,12 +254,6 @@ class InputSystemMetricsNetwork(BaseModel):
256
254
  ] = InputSystemMetricsNetworkMode.BASIC
257
255
  r"""Select the level of detail for network metrics"""
258
256
 
259
- detail: Optional[bool] = False
260
- r"""Generate full network metrics"""
261
-
262
- protocols: Optional[bool] = False
263
- r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
264
-
265
257
  devices: Optional[List[str]] = None
266
258
  r"""Network interfaces to include/exclude. Examples: eth0, !lo. All interfaces are included if this list is empty."""
267
259
 
@@ -270,6 +262,9 @@ class InputSystemMetricsNetwork(BaseModel):
270
262
  )
271
263
  r"""Generate separate metrics for each interface"""
272
264
 
265
+ detail: Optional[bool] = False
266
+ r"""Generate full network metrics"""
267
+
273
268
 
274
269
  class InputSystemMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
275
270
  r"""Select the level of detail for disk metrics"""
@@ -287,10 +282,6 @@ class InputSystemMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
287
282
  class InputSystemMetricsDiskTypedDict(TypedDict):
288
283
  mode: NotRequired[InputSystemMetricsDiskMode]
289
284
  r"""Select the level of detail for disk metrics"""
290
- detail: NotRequired[bool]
291
- r"""Generate full disk metrics"""
292
- inodes: NotRequired[bool]
293
- r"""Generate filesystem inode metrics"""
294
285
  devices: NotRequired[List[str]]
295
286
  r"""Block devices to include/exclude. Examples: sda*, !loop*. Wildcards and ! (not) operators are supported. All devices are included if this list is empty."""
296
287
  mountpoints: NotRequired[List[str]]
@@ -299,6 +290,8 @@ class InputSystemMetricsDiskTypedDict(TypedDict):
299
290
  r"""Filesystem types to include/exclude. Examples: ext4, !*tmpfs, !squashfs. Wildcards and ! (not) operators are supported. All types are included if this list is empty."""
300
291
  per_device: NotRequired[bool]
301
292
  r"""Generate separate metrics for each device"""
293
+ detail: NotRequired[bool]
294
+ r"""Generate full disk metrics"""
302
295
 
303
296
 
304
297
  class InputSystemMetricsDisk(BaseModel):
@@ -307,12 +300,6 @@ class InputSystemMetricsDisk(BaseModel):
307
300
  ] = InputSystemMetricsDiskMode.BASIC
308
301
  r"""Select the level of detail for disk metrics"""
309
302
 
310
- detail: Optional[bool] = False
311
- r"""Generate full disk metrics"""
312
-
313
- inodes: Optional[bool] = False
314
- r"""Generate filesystem inode metrics"""
315
-
316
303
  devices: Optional[List[str]] = None
317
304
  r"""Block devices to include/exclude. Examples: sda*, !loop*. Wildcards and ! (not) operators are supported. All devices are included if this list is empty."""
318
305
 
@@ -325,6 +312,9 @@ class InputSystemMetricsDisk(BaseModel):
325
312
  per_device: Annotated[Optional[bool], pydantic.Field(alias="perDevice")] = False
326
313
  r"""Generate separate metrics for each device"""
327
314
 
315
+ detail: Optional[bool] = False
316
+ r"""Generate full disk metrics"""
317
+
328
318
 
329
319
  class InputSystemMetricsCustomTypedDict(TypedDict):
330
320
  system: NotRequired[InputSystemMetricsSystemTypedDict]
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
9
  from pydantic.functional_validators import PlainValidator
10
- from typing import List, Optional
10
+ from typing import Any, List, Optional
11
11
  from typing_extensions import Annotated, NotRequired, TypedDict
12
12
 
13
13
 
@@ -123,12 +123,6 @@ class InputTCPMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
123
123
 
124
124
  class InputTCPTLSSettingsServerSideTypedDict(TypedDict):
125
125
  disabled: NotRequired[bool]
126
- request_cert: NotRequired[bool]
127
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
128
- reject_unauthorized: NotRequired[bool]
129
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
130
- common_name_regex: NotRequired[str]
131
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
132
126
  certificate_name: NotRequired[str]
133
127
  r"""The name of the predefined certificate"""
134
128
  priv_key_path: NotRequired[str]
@@ -139,6 +133,10 @@ class InputTCPTLSSettingsServerSideTypedDict(TypedDict):
139
133
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
140
134
  ca_path: NotRequired[str]
141
135
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
136
+ request_cert: NotRequired[bool]
137
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
138
+ reject_unauthorized: NotRequired[Any]
139
+ common_name_regex: NotRequired[Any]
142
140
  min_version: NotRequired[InputTCPMinimumTLSVersion]
143
141
  max_version: NotRequired[InputTCPMaximumTLSVersion]
144
142
 
@@ -146,19 +144,6 @@ class InputTCPTLSSettingsServerSideTypedDict(TypedDict):
146
144
  class InputTCPTLSSettingsServerSide(BaseModel):
147
145
  disabled: Optional[bool] = True
148
146
 
149
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
150
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
151
-
152
- reject_unauthorized: Annotated[
153
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
154
- ] = True
155
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
156
-
157
- common_name_regex: Annotated[
158
- Optional[str], pydantic.Field(alias="commonNameRegex")
159
- ] = "/.*/"
160
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
161
-
162
147
  certificate_name: Annotated[
163
148
  Optional[str], pydantic.Field(alias="certificateName")
164
149
  ] = None
@@ -176,6 +161,17 @@ class InputTCPTLSSettingsServerSide(BaseModel):
176
161
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
177
162
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
178
163
 
164
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
165
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
166
+
167
+ reject_unauthorized: Annotated[
168
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
169
+ ] = None
170
+
171
+ common_name_regex: Annotated[
172
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
173
+ ] = None
174
+
179
175
  min_version: Annotated[
180
176
  Annotated[
181
177
  Optional[InputTCPMinimumTLSVersion],
@@ -276,12 +272,8 @@ class InputTCPTypedDict(TypedDict):
276
272
  r"""Client will pass the header record with every new connection. The header can contain an authToken, and an object with a list of fields and values to add to every event. These fields can be used to simplify Event Breaker selection, routing, etc. Header has this format, and must be followed by a newline: { \"authToken\" : \"myToken\", \"fields\": { \"field1\": \"value1\", \"field2\": \"value2\" } }"""
277
273
  preprocess: NotRequired[InputTCPPreprocessTypedDict]
278
274
  description: NotRequired[str]
279
- auth_token: NotRequired[str]
280
- r"""Shared secret to be provided by any client (in authToken header field). If empty, unauthorized access is permitted."""
281
275
  auth_type: NotRequired[InputTCPAuthenticationMethod]
282
276
  r"""Select Manual to enter an auth token directly, or select Secret to use a text secret to authenticate"""
283
- text_secret: NotRequired[str]
284
- r"""Select or create a stored text secret"""
285
277
 
286
278
 
287
279
  class InputTCP(BaseModel):
@@ -374,9 +366,6 @@ class InputTCP(BaseModel):
374
366
 
375
367
  description: Optional[str] = None
376
368
 
377
- auth_token: Annotated[Optional[str], pydantic.Field(alias="authToken")] = ""
378
- r"""Shared secret to be provided by any client (in authToken header field). If empty, unauthorized access is permitted."""
379
-
380
369
  auth_type: Annotated[
381
370
  Annotated[
382
371
  Optional[InputTCPAuthenticationMethod],
@@ -385,6 +374,3 @@ class InputTCP(BaseModel):
385
374
  pydantic.Field(alias="authType"),
386
375
  ] = InputTCPAuthenticationMethod.MANUAL
387
376
  r"""Select Manual to enter an auth token directly, or select Secret to use a text secret to authenticate"""
388
-
389
- text_secret: Annotated[Optional[str], pydantic.Field(alias="textSecret")] = None
390
- r"""Select or create a stored text secret"""
@@ -7,7 +7,7 @@ from cribl_control_plane.utils import validate_open_enum
7
7
  from enum import Enum
8
8
  import pydantic
9
9
  from pydantic.functional_validators import PlainValidator
10
- from typing import List, Optional
10
+ from typing import Any, List, Optional
11
11
  from typing_extensions import Annotated, NotRequired, TypedDict
12
12
 
13
13
 
@@ -123,12 +123,6 @@ class InputTcpjsonMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
123
123
 
124
124
  class InputTcpjsonTLSSettingsServerSideTypedDict(TypedDict):
125
125
  disabled: NotRequired[bool]
126
- request_cert: NotRequired[bool]
127
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
128
- reject_unauthorized: NotRequired[bool]
129
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
130
- common_name_regex: NotRequired[str]
131
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
132
126
  certificate_name: NotRequired[str]
133
127
  r"""The name of the predefined certificate"""
134
128
  priv_key_path: NotRequired[str]
@@ -139,6 +133,10 @@ class InputTcpjsonTLSSettingsServerSideTypedDict(TypedDict):
139
133
  r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
140
134
  ca_path: NotRequired[str]
141
135
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
136
+ request_cert: NotRequired[bool]
137
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
138
+ reject_unauthorized: NotRequired[Any]
139
+ common_name_regex: NotRequired[Any]
142
140
  min_version: NotRequired[InputTcpjsonMinimumTLSVersion]
143
141
  max_version: NotRequired[InputTcpjsonMaximumTLSVersion]
144
142
 
@@ -146,19 +144,6 @@ class InputTcpjsonTLSSettingsServerSideTypedDict(TypedDict):
146
144
  class InputTcpjsonTLSSettingsServerSide(BaseModel):
147
145
  disabled: Optional[bool] = True
148
146
 
149
- request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
150
- r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
151
-
152
- reject_unauthorized: Annotated[
153
- Optional[bool], pydantic.Field(alias="rejectUnauthorized")
154
- ] = True
155
- r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
156
-
157
- common_name_regex: Annotated[
158
- Optional[str], pydantic.Field(alias="commonNameRegex")
159
- ] = "/.*/"
160
- r"""Regex matching allowable common names in peer certificates' subject attribute"""
161
-
162
147
  certificate_name: Annotated[
163
148
  Optional[str], pydantic.Field(alias="certificateName")
164
149
  ] = None
@@ -176,6 +161,17 @@ class InputTcpjsonTLSSettingsServerSide(BaseModel):
176
161
  ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
177
162
  r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
178
163
 
164
+ request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
165
+ r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
166
+
167
+ reject_unauthorized: Annotated[
168
+ Optional[Any], pydantic.Field(alias="rejectUnauthorized")
169
+ ] = None
170
+
171
+ common_name_regex: Annotated[
172
+ Optional[Any], pydantic.Field(alias="commonNameRegex")
173
+ ] = None
174
+
179
175
  min_version: Annotated[
180
176
  Annotated[
181
177
  Optional[InputTcpjsonMinimumTLSVersion],
@@ -239,14 +239,12 @@ class InputWindowsMetricsNetworkMode(str, Enum, metaclass=utils.OpenEnumMeta):
239
239
  class InputWindowsMetricsNetworkTypedDict(TypedDict):
240
240
  mode: NotRequired[InputWindowsMetricsNetworkMode]
241
241
  r"""Select the level of details for network metrics"""
242
- detail: NotRequired[bool]
243
- r"""Generate full network metrics"""
244
- protocols: NotRequired[bool]
245
- r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
246
242
  devices: NotRequired[List[str]]
247
243
  r"""Network interfaces to include/exclude. All interfaces are included if this list is empty."""
248
244
  per_interface: NotRequired[bool]
249
245
  r"""Generate separate metrics for each interface"""
246
+ detail: NotRequired[bool]
247
+ r"""Generate full network metrics"""
250
248
 
251
249
 
252
250
  class InputWindowsMetricsNetwork(BaseModel):
@@ -256,12 +254,6 @@ class InputWindowsMetricsNetwork(BaseModel):
256
254
  ] = InputWindowsMetricsNetworkMode.BASIC
257
255
  r"""Select the level of details for network metrics"""
258
256
 
259
- detail: Optional[bool] = False
260
- r"""Generate full network metrics"""
261
-
262
- protocols: Optional[bool] = False
263
- r"""Generate protocol metrics for ICMP, ICMPMsg, IP, TCP, UDP and UDPLite"""
264
-
265
257
  devices: Optional[List[str]] = None
266
258
  r"""Network interfaces to include/exclude. All interfaces are included if this list is empty."""
267
259
 
@@ -270,6 +262,9 @@ class InputWindowsMetricsNetwork(BaseModel):
270
262
  )
271
263
  r"""Generate separate metrics for each interface"""
272
264
 
265
+ detail: Optional[bool] = False
266
+ r"""Generate full network metrics"""
267
+
273
268
 
274
269
  class InputWindowsMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
275
270
  r"""Select the level of details for disk metrics"""
@@ -287,12 +282,10 @@ class InputWindowsMetricsDiskMode(str, Enum, metaclass=utils.OpenEnumMeta):
287
282
  class InputWindowsMetricsDiskTypedDict(TypedDict):
288
283
  mode: NotRequired[InputWindowsMetricsDiskMode]
289
284
  r"""Select the level of details for disk metrics"""
290
- per_volume: NotRequired[bool]
291
- r"""Generate separate metrics for each volume"""
292
- detail: NotRequired[bool]
293
- r"""Generate full disk metrics"""
294
285
  volumes: NotRequired[List[str]]
295
286
  r"""Windows volumes to include/exclude. E.g.: C:, !E:, etc. Wildcards and ! (not) operators are supported. All volumes are included if this list is empty."""
287
+ per_volume: NotRequired[bool]
288
+ r"""Generate separate metrics for each volume"""
296
289
 
297
290
 
298
291
  class InputWindowsMetricsDisk(BaseModel):
@@ -301,15 +294,12 @@ class InputWindowsMetricsDisk(BaseModel):
301
294
  ] = InputWindowsMetricsDiskMode.BASIC
302
295
  r"""Select the level of details for disk metrics"""
303
296
 
304
- per_volume: Annotated[Optional[bool], pydantic.Field(alias="perVolume")] = False
305
- r"""Generate separate metrics for each volume"""
306
-
307
- detail: Optional[bool] = False
308
- r"""Generate full disk metrics"""
309
-
310
297
  volumes: Optional[List[str]] = None
311
298
  r"""Windows volumes to include/exclude. E.g.: C:, !E:, etc. Wildcards and ! (not) operators are supported. All volumes are included if this list is empty."""
312
299
 
300
+ per_volume: Annotated[Optional[bool], pydantic.Field(alias="perVolume")] = False
301
+ r"""Generate separate metrics for each volume"""
302
+
313
303
 
314
304
  class InputWindowsMetricsCustomTypedDict(TypedDict):
315
305
  system: NotRequired[InputWindowsMetricsSystemTypedDict]
@@ -174,10 +174,6 @@ class InputWinEventLogsTypedDict(TypedDict):
174
174
  max_event_bytes: NotRequired[float]
175
175
  r"""The maximum number of bytes in an event before it is flushed to the pipelines"""
176
176
  description: NotRequired[str]
177
- disable_json_rendering: NotRequired[bool]
178
- r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""
179
- disable_xml_rendering: NotRequired[bool]
180
- r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""
181
177
 
182
178
 
183
179
  class InputWinEventLogs(BaseModel):
@@ -245,13 +241,3 @@ class InputWinEventLogs(BaseModel):
245
241
  r"""The maximum number of bytes in an event before it is flushed to the pipelines"""
246
242
 
247
243
  description: Optional[str] = None
248
-
249
- disable_json_rendering: Annotated[
250
- Optional[bool], pydantic.Field(alias="disableJsonRendering")
251
- ] = False
252
- r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""
253
-
254
- disable_xml_rendering: Annotated[
255
- Optional[bool], pydantic.Field(alias="disableXmlRendering")
256
- ] = True
257
- r"""Enable/disable the rendering of localized event message strings (Applicable for 4.8.0 nodes and newer that use the Native API)"""