cribl-control-plane 0.2.1rc7__py3-none-any.whl → 0.3.0a1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cribl-control-plane might be problematic. Click here for more details.
- cribl_control_plane/_version.py +4 -4
- cribl_control_plane/errors/__init__.py +5 -8
- cribl_control_plane/errors/{healthserverstatus_error.py → healthstatus_error.py} +9 -10
- cribl_control_plane/groups_sdk.py +28 -52
- cribl_control_plane/health.py +16 -22
- cribl_control_plane/models/__init__.py +54 -217
- cribl_control_plane/models/appmode.py +14 -0
- cribl_control_plane/models/authtoken.py +1 -5
- cribl_control_plane/models/cacheconnection.py +0 -20
- cribl_control_plane/models/configgroup.py +7 -55
- cribl_control_plane/models/configgroupcloud.py +1 -11
- cribl_control_plane/models/createconfiggroupbyproductop.py +5 -17
- cribl_control_plane/models/createroutesappendbyidop.py +2 -2
- cribl_control_plane/models/createversionundoop.py +3 -3
- cribl_control_plane/models/cribllakedataset.py +1 -11
- cribl_control_plane/models/cribllakedatasetupdate.py +1 -11
- cribl_control_plane/models/datasetmetadata.py +1 -11
- cribl_control_plane/models/deleteconfiggroupbyproductandidop.py +0 -11
- cribl_control_plane/models/deleteoutputpqbyidop.py +2 -2
- cribl_control_plane/models/distributedsummary.py +0 -6
- cribl_control_plane/models/error.py +16 -0
- cribl_control_plane/models/getconfiggroupaclbyproductandidop.py +0 -20
- cribl_control_plane/models/getconfiggroupaclteamsbyproductandidop.py +0 -20
- cribl_control_plane/models/getconfiggroupbyproductandidop.py +0 -11
- cribl_control_plane/models/getconfiggroupconfigversionbyproductandidop.py +0 -11
- cribl_control_plane/models/gethealthinfoop.py +17 -0
- cribl_control_plane/models/getsummaryop.py +0 -11
- cribl_control_plane/models/hbcriblinfo.py +3 -24
- cribl_control_plane/models/{healthserverstatus.py → healthstatus.py} +8 -27
- cribl_control_plane/models/heartbeatmetadata.py +0 -3
- cribl_control_plane/models/input.py +78 -80
- cribl_control_plane/models/inputappscope.py +17 -80
- cribl_control_plane/models/inputazureblob.py +1 -33
- cribl_control_plane/models/inputcollection.py +1 -24
- cribl_control_plane/models/inputconfluentcloud.py +18 -195
- cribl_control_plane/models/inputcribl.py +1 -24
- cribl_control_plane/models/inputcriblhttp.py +17 -62
- cribl_control_plane/models/inputcribllakehttp.py +17 -62
- cribl_control_plane/models/inputcriblmetrics.py +1 -24
- cribl_control_plane/models/inputcribltcp.py +17 -62
- cribl_control_plane/models/inputcrowdstrike.py +1 -54
- cribl_control_plane/models/inputdatadogagent.py +17 -62
- cribl_control_plane/models/inputdatagen.py +1 -24
- cribl_control_plane/models/inputedgeprometheus.py +34 -147
- cribl_control_plane/models/inputelastic.py +27 -119
- cribl_control_plane/models/inputeventhub.py +1 -182
- cribl_control_plane/models/inputexec.py +1 -33
- cribl_control_plane/models/inputfile.py +3 -42
- cribl_control_plane/models/inputfirehose.py +17 -62
- cribl_control_plane/models/inputgooglepubsub.py +1 -36
- cribl_control_plane/models/inputgrafana.py +32 -157
- cribl_control_plane/models/inputhttp.py +17 -62
- cribl_control_plane/models/inputhttpraw.py +17 -62
- cribl_control_plane/models/inputjournalfiles.py +1 -24
- cribl_control_plane/models/inputkafka.py +17 -189
- cribl_control_plane/models/inputkinesis.py +1 -80
- cribl_control_plane/models/inputkubeevents.py +1 -24
- cribl_control_plane/models/inputkubelogs.py +1 -33
- cribl_control_plane/models/inputkubemetrics.py +1 -33
- cribl_control_plane/models/inputloki.py +17 -71
- cribl_control_plane/models/inputmetrics.py +17 -62
- cribl_control_plane/models/inputmodeldriventelemetry.py +17 -62
- cribl_control_plane/models/inputmsk.py +18 -81
- cribl_control_plane/models/inputnetflow.py +1 -24
- cribl_control_plane/models/inputoffice365mgmt.py +1 -67
- cribl_control_plane/models/inputoffice365msgtrace.py +1 -67
- cribl_control_plane/models/inputoffice365service.py +1 -67
- cribl_control_plane/models/inputopentelemetry.py +16 -92
- cribl_control_plane/models/inputprometheus.py +34 -138
- cribl_control_plane/models/inputprometheusrw.py +17 -71
- cribl_control_plane/models/inputrawudp.py +1 -24
- cribl_control_plane/models/inputs3.py +1 -45
- cribl_control_plane/models/inputs3inventory.py +1 -54
- cribl_control_plane/models/inputsecuritylake.py +1 -54
- cribl_control_plane/models/inputsnmp.py +1 -40
- cribl_control_plane/models/inputsplunk.py +17 -85
- cribl_control_plane/models/inputsplunkhec.py +16 -70
- cribl_control_plane/models/inputsplunksearch.py +1 -63
- cribl_control_plane/models/inputsqs.py +1 -56
- cribl_control_plane/models/inputsyslog.py +32 -121
- cribl_control_plane/models/inputsystemmetrics.py +9 -142
- cribl_control_plane/models/inputsystemstate.py +1 -33
- cribl_control_plane/models/inputtcp.py +17 -81
- cribl_control_plane/models/inputtcpjson.py +17 -71
- cribl_control_plane/models/inputwef.py +1 -71
- cribl_control_plane/models/inputwindowsmetrics.py +9 -129
- cribl_control_plane/models/inputwineventlogs.py +1 -60
- cribl_control_plane/models/inputwiz.py +1 -45
- cribl_control_plane/models/inputwizwebhook.py +17 -62
- cribl_control_plane/models/inputzscalerhec.py +16 -70
- cribl_control_plane/models/jobinfo.py +1 -4
- cribl_control_plane/models/jobstatus.py +3 -34
- cribl_control_plane/models/listconfiggroupbyproductop.py +0 -11
- cribl_control_plane/models/logininfo.py +3 -3
- cribl_control_plane/models/masterworkerentry.py +1 -11
- cribl_control_plane/models/nodeprovidedinfo.py +1 -11
- cribl_control_plane/models/nodeupgradestatus.py +0 -38
- cribl_control_plane/models/output.py +88 -93
- cribl_control_plane/models/outputazureblob.py +1 -110
- cribl_control_plane/models/outputazuredataexplorer.py +87 -452
- cribl_control_plane/models/outputazureeventhub.py +19 -281
- cribl_control_plane/models/outputazurelogs.py +19 -115
- cribl_control_plane/models/outputchronicle.py +19 -115
- cribl_control_plane/models/outputclickhouse.py +19 -155
- cribl_control_plane/models/outputcloudwatch.py +19 -106
- cribl_control_plane/models/outputconfluentcloud.py +38 -311
- cribl_control_plane/models/outputcriblhttp.py +19 -135
- cribl_control_plane/models/outputcribllake.py +1 -97
- cribl_control_plane/models/outputcribltcp.py +19 -132
- cribl_control_plane/models/outputcrowdstrikenextgensiem.py +20 -129
- cribl_control_plane/models/outputdatadog.py +19 -159
- cribl_control_plane/models/outputdataset.py +19 -143
- cribl_control_plane/models/outputdiskspool.py +1 -11
- cribl_control_plane/models/outputdls3.py +1 -152
- cribl_control_plane/models/outputdynatracehttp.py +19 -160
- cribl_control_plane/models/outputdynatraceotlp.py +19 -160
- cribl_control_plane/models/outputelastic.py +19 -163
- cribl_control_plane/models/outputelasticcloud.py +19 -140
- cribl_control_plane/models/outputexabeam.py +1 -61
- cribl_control_plane/models/outputfilesystem.py +1 -87
- cribl_control_plane/models/outputgooglechronicle.py +20 -166
- cribl_control_plane/models/outputgooglecloudlogging.py +20 -131
- cribl_control_plane/models/outputgooglecloudstorage.py +1 -136
- cribl_control_plane/models/outputgooglepubsub.py +19 -106
- cribl_control_plane/models/outputgrafanacloud.py +37 -288
- cribl_control_plane/models/outputgraphite.py +19 -105
- cribl_control_plane/models/outputhoneycomb.py +19 -115
- cribl_control_plane/models/outputhumiohec.py +19 -126
- cribl_control_plane/models/outputinfluxdb.py +19 -130
- cribl_control_plane/models/outputkafka.py +34 -302
- cribl_control_plane/models/outputkinesis.py +19 -133
- cribl_control_plane/models/outputloki.py +17 -129
- cribl_control_plane/models/outputminio.py +1 -145
- cribl_control_plane/models/outputmsk.py +34 -193
- cribl_control_plane/models/outputnewrelic.py +19 -136
- cribl_control_plane/models/outputnewrelicevents.py +20 -128
- cribl_control_plane/models/outputopentelemetry.py +19 -178
- cribl_control_plane/models/outputprometheus.py +19 -115
- cribl_control_plane/models/outputring.py +1 -31
- cribl_control_plane/models/outputs3.py +1 -152
- cribl_control_plane/models/outputsecuritylake.py +1 -114
- cribl_control_plane/models/outputsentinel.py +19 -135
- cribl_control_plane/models/outputsentineloneaisiem.py +20 -134
- cribl_control_plane/models/outputservicenow.py +19 -168
- cribl_control_plane/models/outputsignalfx.py +19 -115
- cribl_control_plane/models/outputsns.py +17 -113
- cribl_control_plane/models/outputsplunk.py +19 -153
- cribl_control_plane/models/outputsplunkhec.py +19 -208
- cribl_control_plane/models/outputsplunklb.py +19 -182
- cribl_control_plane/models/outputsqs.py +17 -124
- cribl_control_plane/models/outputstatsd.py +19 -105
- cribl_control_plane/models/outputstatsdext.py +19 -105
- cribl_control_plane/models/outputsumologic.py +19 -117
- cribl_control_plane/models/outputsyslog.py +96 -259
- cribl_control_plane/models/outputtcpjson.py +19 -141
- cribl_control_plane/models/outputwavefront.py +19 -115
- cribl_control_plane/models/outputwebhook.py +19 -161
- cribl_control_plane/models/outputxsiam.py +17 -113
- cribl_control_plane/models/packinfo.py +5 -8
- cribl_control_plane/models/packinstallinfo.py +5 -8
- cribl_control_plane/models/resourcepolicy.py +0 -11
- cribl_control_plane/models/{uploadpackresponse.py → routecloneconf.py} +4 -4
- cribl_control_plane/models/routeconf.py +4 -3
- cribl_control_plane/models/runnablejobcollection.py +9 -72
- cribl_control_plane/models/runnablejobexecutor.py +9 -32
- cribl_control_plane/models/runnablejobscheduledsearch.py +9 -23
- cribl_control_plane/models/updateconfiggroupbyproductandidop.py +0 -11
- cribl_control_plane/models/updateconfiggroupdeploybyproductandidop.py +0 -11
- cribl_control_plane/packs.py +7 -202
- cribl_control_plane/routes_sdk.py +6 -6
- cribl_control_plane/tokens.py +15 -23
- {cribl_control_plane-0.2.1rc7.dist-info → cribl_control_plane-0.3.0a1.dist-info}/METADATA +9 -50
- cribl_control_plane-0.3.0a1.dist-info/RECORD +330 -0
- cribl_control_plane/models/groupcreaterequest.py +0 -171
- cribl_control_plane/models/outpostnodeinfo.py +0 -16
- cribl_control_plane/models/outputdatabricks.py +0 -482
- cribl_control_plane/models/updatepacksop.py +0 -25
- cribl_control_plane-0.2.1rc7.dist-info/RECORD +0 -331
- {cribl_control_plane-0.2.1rc7.dist-info → cribl_control_plane-0.3.0a1.dist-info}/WHEEL +0 -0
|
@@ -1,12 +1,11 @@
|
|
|
1
1
|
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
2
|
|
|
3
3
|
from __future__ import annotations
|
|
4
|
-
from cribl_control_plane import
|
|
4
|
+
from cribl_control_plane import utils
|
|
5
5
|
from cribl_control_plane.types import BaseModel
|
|
6
6
|
from cribl_control_plane.utils import validate_open_enum
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
|
-
from pydantic import field_serializer
|
|
10
9
|
from pydantic.functional_validators import PlainValidator
|
|
11
10
|
from typing import List, Optional
|
|
12
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
@@ -30,18 +29,14 @@ class InputSecurityLakeConnection(BaseModel):
|
|
|
30
29
|
class InputSecurityLakeMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
31
30
|
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
32
31
|
|
|
33
|
-
# Smart
|
|
34
32
|
SMART = "smart"
|
|
35
|
-
# Always On
|
|
36
33
|
ALWAYS = "always"
|
|
37
34
|
|
|
38
35
|
|
|
39
36
|
class InputSecurityLakeCompression(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
40
37
|
r"""Codec to use to compress the persisted data"""
|
|
41
38
|
|
|
42
|
-
# None
|
|
43
39
|
NONE = "none"
|
|
44
|
-
# Gzip
|
|
45
40
|
GZIP = "gzip"
|
|
46
41
|
|
|
47
42
|
|
|
@@ -108,33 +103,12 @@ class InputSecurityLakePq(BaseModel):
|
|
|
108
103
|
Optional[InputSecurityLakePqControls], pydantic.Field(alias="pqControls")
|
|
109
104
|
] = None
|
|
110
105
|
|
|
111
|
-
@field_serializer("mode")
|
|
112
|
-
def serialize_mode(self, value):
|
|
113
|
-
if isinstance(value, str):
|
|
114
|
-
try:
|
|
115
|
-
return models.InputSecurityLakeMode(value)
|
|
116
|
-
except ValueError:
|
|
117
|
-
return value
|
|
118
|
-
return value
|
|
119
|
-
|
|
120
|
-
@field_serializer("compress")
|
|
121
|
-
def serialize_compress(self, value):
|
|
122
|
-
if isinstance(value, str):
|
|
123
|
-
try:
|
|
124
|
-
return models.InputSecurityLakeCompression(value)
|
|
125
|
-
except ValueError:
|
|
126
|
-
return value
|
|
127
|
-
return value
|
|
128
|
-
|
|
129
106
|
|
|
130
107
|
class InputSecurityLakeAuthenticationMethod(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
131
108
|
r"""AWS authentication method. Choose Auto to use IAM roles."""
|
|
132
109
|
|
|
133
|
-
# Auto
|
|
134
110
|
AUTO = "auto"
|
|
135
|
-
# Manual
|
|
136
111
|
MANUAL = "manual"
|
|
137
|
-
# Secret Key pair
|
|
138
112
|
SECRET = "secret"
|
|
139
113
|
|
|
140
114
|
|
|
@@ -469,30 +443,3 @@ class InputSecurityLake(BaseModel):
|
|
|
469
443
|
Optional[str], pydantic.Field(alias="processedTagValue")
|
|
470
444
|
] = None
|
|
471
445
|
r"""The value for the S3 object tag applied after processing. This field accepts an expression for dynamic generation."""
|
|
472
|
-
|
|
473
|
-
@field_serializer("aws_authentication_method")
|
|
474
|
-
def serialize_aws_authentication_method(self, value):
|
|
475
|
-
if isinstance(value, str):
|
|
476
|
-
try:
|
|
477
|
-
return models.InputSecurityLakeAuthenticationMethod(value)
|
|
478
|
-
except ValueError:
|
|
479
|
-
return value
|
|
480
|
-
return value
|
|
481
|
-
|
|
482
|
-
@field_serializer("signature_version")
|
|
483
|
-
def serialize_signature_version(self, value):
|
|
484
|
-
if isinstance(value, str):
|
|
485
|
-
try:
|
|
486
|
-
return models.InputSecurityLakeSignatureVersion(value)
|
|
487
|
-
except ValueError:
|
|
488
|
-
return value
|
|
489
|
-
return value
|
|
490
|
-
|
|
491
|
-
@field_serializer("tag_after_processing")
|
|
492
|
-
def serialize_tag_after_processing(self, value):
|
|
493
|
-
if isinstance(value, str):
|
|
494
|
-
try:
|
|
495
|
-
return models.InputSecurityLakeTagAfterProcessing(value)
|
|
496
|
-
except ValueError:
|
|
497
|
-
return value
|
|
498
|
-
return value
|
|
@@ -1,12 +1,11 @@
|
|
|
1
1
|
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
2
|
|
|
3
3
|
from __future__ import annotations
|
|
4
|
-
from cribl_control_plane import
|
|
4
|
+
from cribl_control_plane import utils
|
|
5
5
|
from cribl_control_plane.types import BaseModel
|
|
6
6
|
from cribl_control_plane.utils import validate_open_enum
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
|
-
from pydantic import field_serializer
|
|
10
9
|
from pydantic.functional_validators import PlainValidator
|
|
11
10
|
from typing import Any, List, Optional
|
|
12
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
@@ -30,18 +29,14 @@ class InputSnmpConnection(BaseModel):
|
|
|
30
29
|
class InputSnmpMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
31
30
|
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
32
31
|
|
|
33
|
-
# Smart
|
|
34
32
|
SMART = "smart"
|
|
35
|
-
# Always On
|
|
36
33
|
ALWAYS = "always"
|
|
37
34
|
|
|
38
35
|
|
|
39
36
|
class InputSnmpCompression(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
40
37
|
r"""Codec to use to compress the persisted data"""
|
|
41
38
|
|
|
42
|
-
# None
|
|
43
39
|
NONE = "none"
|
|
44
|
-
# Gzip
|
|
45
40
|
GZIP = "gzip"
|
|
46
41
|
|
|
47
42
|
|
|
@@ -107,39 +102,14 @@ class InputSnmpPq(BaseModel):
|
|
|
107
102
|
Optional[InputSnmpPqControls], pydantic.Field(alias="pqControls")
|
|
108
103
|
] = None
|
|
109
104
|
|
|
110
|
-
@field_serializer("mode")
|
|
111
|
-
def serialize_mode(self, value):
|
|
112
|
-
if isinstance(value, str):
|
|
113
|
-
try:
|
|
114
|
-
return models.InputSnmpMode(value)
|
|
115
|
-
except ValueError:
|
|
116
|
-
return value
|
|
117
|
-
return value
|
|
118
|
-
|
|
119
|
-
@field_serializer("compress")
|
|
120
|
-
def serialize_compress(self, value):
|
|
121
|
-
if isinstance(value, str):
|
|
122
|
-
try:
|
|
123
|
-
return models.InputSnmpCompression(value)
|
|
124
|
-
except ValueError:
|
|
125
|
-
return value
|
|
126
|
-
return value
|
|
127
|
-
|
|
128
105
|
|
|
129
106
|
class AuthenticationProtocol(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
130
|
-
# None
|
|
131
107
|
NONE = "none"
|
|
132
|
-
# MD5
|
|
133
108
|
MD5 = "md5"
|
|
134
|
-
# SHA1
|
|
135
109
|
SHA = "sha"
|
|
136
|
-
# SHA224
|
|
137
110
|
SHA224 = "sha224"
|
|
138
|
-
# SHA256
|
|
139
111
|
SHA256 = "sha256"
|
|
140
|
-
# SHA384
|
|
141
112
|
SHA384 = "sha384"
|
|
142
|
-
# SHA512
|
|
143
113
|
SHA512 = "sha512"
|
|
144
114
|
|
|
145
115
|
|
|
@@ -166,15 +136,6 @@ class V3User(BaseModel):
|
|
|
166
136
|
"none"
|
|
167
137
|
)
|
|
168
138
|
|
|
169
|
-
@field_serializer("auth_protocol")
|
|
170
|
-
def serialize_auth_protocol(self, value):
|
|
171
|
-
if isinstance(value, str):
|
|
172
|
-
try:
|
|
173
|
-
return models.AuthenticationProtocol(value)
|
|
174
|
-
except ValueError:
|
|
175
|
-
return value
|
|
176
|
-
return value
|
|
177
|
-
|
|
178
139
|
|
|
179
140
|
class SNMPv3AuthenticationTypedDict(TypedDict):
|
|
180
141
|
r"""Authentication parameters for SNMPv3 trap. Set the log level to debug if you are experiencing authentication or decryption issues."""
|
|
@@ -1,14 +1,13 @@
|
|
|
1
1
|
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
2
|
|
|
3
3
|
from __future__ import annotations
|
|
4
|
-
from cribl_control_plane import
|
|
4
|
+
from cribl_control_plane import utils
|
|
5
5
|
from cribl_control_plane.types import BaseModel
|
|
6
6
|
from cribl_control_plane.utils import validate_open_enum
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
|
-
from pydantic import field_serializer
|
|
10
9
|
from pydantic.functional_validators import PlainValidator
|
|
11
|
-
from typing import List, Optional
|
|
10
|
+
from typing import Any, List, Optional
|
|
12
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
13
12
|
|
|
14
13
|
|
|
@@ -30,18 +29,14 @@ class InputSplunkConnection(BaseModel):
|
|
|
30
29
|
class InputSplunkMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
31
30
|
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
32
31
|
|
|
33
|
-
# Smart
|
|
34
32
|
SMART = "smart"
|
|
35
|
-
# Always On
|
|
36
33
|
ALWAYS = "always"
|
|
37
34
|
|
|
38
35
|
|
|
39
36
|
class InputSplunkPqCompression(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
40
37
|
r"""Codec to use to compress the persisted data"""
|
|
41
38
|
|
|
42
|
-
# None
|
|
43
39
|
NONE = "none"
|
|
44
|
-
# Gzip
|
|
45
40
|
GZIP = "gzip"
|
|
46
41
|
|
|
47
42
|
|
|
@@ -107,24 +102,6 @@ class InputSplunkPq(BaseModel):
|
|
|
107
102
|
Optional[InputSplunkPqControls], pydantic.Field(alias="pqControls")
|
|
108
103
|
] = None
|
|
109
104
|
|
|
110
|
-
@field_serializer("mode")
|
|
111
|
-
def serialize_mode(self, value):
|
|
112
|
-
if isinstance(value, str):
|
|
113
|
-
try:
|
|
114
|
-
return models.InputSplunkMode(value)
|
|
115
|
-
except ValueError:
|
|
116
|
-
return value
|
|
117
|
-
return value
|
|
118
|
-
|
|
119
|
-
@field_serializer("compress")
|
|
120
|
-
def serialize_compress(self, value):
|
|
121
|
-
if isinstance(value, str):
|
|
122
|
-
try:
|
|
123
|
-
return models.InputSplunkPqCompression(value)
|
|
124
|
-
except ValueError:
|
|
125
|
-
return value
|
|
126
|
-
return value
|
|
127
|
-
|
|
128
105
|
|
|
129
106
|
class InputSplunkMinimumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
130
107
|
TL_SV1 = "TLSv1"
|
|
@@ -142,12 +119,6 @@ class InputSplunkMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
142
119
|
|
|
143
120
|
class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
|
|
144
121
|
disabled: NotRequired[bool]
|
|
145
|
-
request_cert: NotRequired[bool]
|
|
146
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
147
|
-
reject_unauthorized: NotRequired[bool]
|
|
148
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
149
|
-
common_name_regex: NotRequired[str]
|
|
150
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
151
122
|
certificate_name: NotRequired[str]
|
|
152
123
|
r"""The name of the predefined certificate"""
|
|
153
124
|
priv_key_path: NotRequired[str]
|
|
@@ -158,6 +129,10 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
158
129
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
159
130
|
ca_path: NotRequired[str]
|
|
160
131
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
132
|
+
request_cert: NotRequired[bool]
|
|
133
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
134
|
+
reject_unauthorized: NotRequired[Any]
|
|
135
|
+
common_name_regex: NotRequired[Any]
|
|
161
136
|
min_version: NotRequired[InputSplunkMinimumTLSVersion]
|
|
162
137
|
max_version: NotRequired[InputSplunkMaximumTLSVersion]
|
|
163
138
|
|
|
@@ -165,19 +140,6 @@ class InputSplunkTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
165
140
|
class InputSplunkTLSSettingsServerSide(BaseModel):
|
|
166
141
|
disabled: Optional[bool] = True
|
|
167
142
|
|
|
168
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
169
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
170
|
-
|
|
171
|
-
reject_unauthorized: Annotated[
|
|
172
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
173
|
-
] = True
|
|
174
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
175
|
-
|
|
176
|
-
common_name_regex: Annotated[
|
|
177
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
178
|
-
] = "/.*/"
|
|
179
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
180
|
-
|
|
181
143
|
certificate_name: Annotated[
|
|
182
144
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
183
145
|
] = None
|
|
@@ -195,6 +157,17 @@ class InputSplunkTLSSettingsServerSide(BaseModel):
|
|
|
195
157
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
196
158
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
197
159
|
|
|
160
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
161
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
162
|
+
|
|
163
|
+
reject_unauthorized: Annotated[
|
|
164
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
165
|
+
] = None
|
|
166
|
+
|
|
167
|
+
common_name_regex: Annotated[
|
|
168
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
169
|
+
] = None
|
|
170
|
+
|
|
198
171
|
min_version: Annotated[
|
|
199
172
|
Annotated[
|
|
200
173
|
Optional[InputSplunkMinimumTLSVersion],
|
|
@@ -211,24 +184,6 @@ class InputSplunkTLSSettingsServerSide(BaseModel):
|
|
|
211
184
|
pydantic.Field(alias="maxVersion"),
|
|
212
185
|
] = None
|
|
213
186
|
|
|
214
|
-
@field_serializer("min_version")
|
|
215
|
-
def serialize_min_version(self, value):
|
|
216
|
-
if isinstance(value, str):
|
|
217
|
-
try:
|
|
218
|
-
return models.InputSplunkMinimumTLSVersion(value)
|
|
219
|
-
except ValueError:
|
|
220
|
-
return value
|
|
221
|
-
return value
|
|
222
|
-
|
|
223
|
-
@field_serializer("max_version")
|
|
224
|
-
def serialize_max_version(self, value):
|
|
225
|
-
if isinstance(value, str):
|
|
226
|
-
try:
|
|
227
|
-
return models.InputSplunkMaximumTLSVersion(value)
|
|
228
|
-
except ValueError:
|
|
229
|
-
return value
|
|
230
|
-
return value
|
|
231
|
-
|
|
232
187
|
|
|
233
188
|
class InputSplunkMetadatumTypedDict(TypedDict):
|
|
234
189
|
name: str
|
|
@@ -259,20 +214,15 @@ class InputSplunkAuthToken(BaseModel):
|
|
|
259
214
|
class InputSplunkMaxS2SVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
260
215
|
r"""The highest S2S protocol version to advertise during handshake"""
|
|
261
216
|
|
|
262
|
-
# v3
|
|
263
217
|
V3 = "v3"
|
|
264
|
-
# v4
|
|
265
218
|
V4 = "v4"
|
|
266
219
|
|
|
267
220
|
|
|
268
221
|
class InputSplunkCompression(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
269
222
|
r"""Controls whether to support reading compressed data from a forwarder. Select 'Automatic' to match the forwarder's configuration, or 'Disabled' to reject compressed connections."""
|
|
270
223
|
|
|
271
|
-
# Disabled
|
|
272
224
|
DISABLED = "disabled"
|
|
273
|
-
# Automatic
|
|
274
225
|
AUTO = "auto"
|
|
275
|
-
# Always
|
|
276
226
|
ALWAYS = "always"
|
|
277
227
|
|
|
278
228
|
|
|
@@ -448,21 +398,3 @@ class InputSplunk(BaseModel):
|
|
|
448
398
|
Optional[InputSplunkCompression], PlainValidator(validate_open_enum(False))
|
|
449
399
|
] = InputSplunkCompression.DISABLED
|
|
450
400
|
r"""Controls whether to support reading compressed data from a forwarder. Select 'Automatic' to match the forwarder's configuration, or 'Disabled' to reject compressed connections."""
|
|
451
|
-
|
|
452
|
-
@field_serializer("max_s2_sversion")
|
|
453
|
-
def serialize_max_s2_sversion(self, value):
|
|
454
|
-
if isinstance(value, str):
|
|
455
|
-
try:
|
|
456
|
-
return models.InputSplunkMaxS2SVersion(value)
|
|
457
|
-
except ValueError:
|
|
458
|
-
return value
|
|
459
|
-
return value
|
|
460
|
-
|
|
461
|
-
@field_serializer("compress")
|
|
462
|
-
def serialize_compress(self, value):
|
|
463
|
-
if isinstance(value, str):
|
|
464
|
-
try:
|
|
465
|
-
return models.InputSplunkCompression(value)
|
|
466
|
-
except ValueError:
|
|
467
|
-
return value
|
|
468
|
-
return value
|
|
@@ -1,12 +1,11 @@
|
|
|
1
1
|
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
2
|
|
|
3
3
|
from __future__ import annotations
|
|
4
|
-
from cribl_control_plane import
|
|
4
|
+
from cribl_control_plane import utils
|
|
5
5
|
from cribl_control_plane.types import BaseModel
|
|
6
6
|
from cribl_control_plane.utils import validate_open_enum
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
|
-
from pydantic import field_serializer
|
|
10
9
|
from pydantic.functional_validators import PlainValidator
|
|
11
10
|
from typing import Any, List, Optional
|
|
12
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
@@ -30,18 +29,14 @@ class InputSplunkHecConnection(BaseModel):
|
|
|
30
29
|
class InputSplunkHecMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
31
30
|
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
32
31
|
|
|
33
|
-
# Smart
|
|
34
32
|
SMART = "smart"
|
|
35
|
-
# Always On
|
|
36
33
|
ALWAYS = "always"
|
|
37
34
|
|
|
38
35
|
|
|
39
36
|
class InputSplunkHecCompression(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
40
37
|
r"""Codec to use to compress the persisted data"""
|
|
41
38
|
|
|
42
|
-
# None
|
|
43
39
|
NONE = "none"
|
|
44
|
-
# Gzip
|
|
45
40
|
GZIP = "gzip"
|
|
46
41
|
|
|
47
42
|
|
|
@@ -107,24 +102,6 @@ class InputSplunkHecPq(BaseModel):
|
|
|
107
102
|
Optional[InputSplunkHecPqControls], pydantic.Field(alias="pqControls")
|
|
108
103
|
] = None
|
|
109
104
|
|
|
110
|
-
@field_serializer("mode")
|
|
111
|
-
def serialize_mode(self, value):
|
|
112
|
-
if isinstance(value, str):
|
|
113
|
-
try:
|
|
114
|
-
return models.InputSplunkHecMode(value)
|
|
115
|
-
except ValueError:
|
|
116
|
-
return value
|
|
117
|
-
return value
|
|
118
|
-
|
|
119
|
-
@field_serializer("compress")
|
|
120
|
-
def serialize_compress(self, value):
|
|
121
|
-
if isinstance(value, str):
|
|
122
|
-
try:
|
|
123
|
-
return models.InputSplunkHecCompression(value)
|
|
124
|
-
except ValueError:
|
|
125
|
-
return value
|
|
126
|
-
return value
|
|
127
|
-
|
|
128
105
|
|
|
129
106
|
class InputSplunkHecAuthenticationMethod(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
130
107
|
r"""Select Manual to enter an auth token directly, or select Secret to use a text secret to authenticate"""
|
|
@@ -187,15 +164,6 @@ class InputSplunkHecAuthToken(BaseModel):
|
|
|
187
164
|
metadata: Optional[List[InputSplunkHecAuthTokenMetadatum]] = None
|
|
188
165
|
r"""Fields to add to events referencing this token"""
|
|
189
166
|
|
|
190
|
-
@field_serializer("auth_type")
|
|
191
|
-
def serialize_auth_type(self, value):
|
|
192
|
-
if isinstance(value, str):
|
|
193
|
-
try:
|
|
194
|
-
return models.InputSplunkHecAuthenticationMethod(value)
|
|
195
|
-
except ValueError:
|
|
196
|
-
return value
|
|
197
|
-
return value
|
|
198
|
-
|
|
199
167
|
|
|
200
168
|
class InputSplunkHecMinimumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
201
169
|
TL_SV1 = "TLSv1"
|
|
@@ -213,12 +181,6 @@ class InputSplunkHecMaximumTLSVersion(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
|
213
181
|
|
|
214
182
|
class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
|
|
215
183
|
disabled: NotRequired[bool]
|
|
216
|
-
request_cert: NotRequired[bool]
|
|
217
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
218
|
-
reject_unauthorized: NotRequired[bool]
|
|
219
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
220
|
-
common_name_regex: NotRequired[str]
|
|
221
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
222
184
|
certificate_name: NotRequired[str]
|
|
223
185
|
r"""The name of the predefined certificate"""
|
|
224
186
|
priv_key_path: NotRequired[str]
|
|
@@ -229,6 +191,10 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
229
191
|
r"""Path on server containing certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
230
192
|
ca_path: NotRequired[str]
|
|
231
193
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
194
|
+
request_cert: NotRequired[bool]
|
|
195
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
196
|
+
reject_unauthorized: NotRequired[Any]
|
|
197
|
+
common_name_regex: NotRequired[Any]
|
|
232
198
|
min_version: NotRequired[InputSplunkHecMinimumTLSVersion]
|
|
233
199
|
max_version: NotRequired[InputSplunkHecMaximumTLSVersion]
|
|
234
200
|
|
|
@@ -236,19 +202,6 @@ class InputSplunkHecTLSSettingsServerSideTypedDict(TypedDict):
|
|
|
236
202
|
class InputSplunkHecTLSSettingsServerSide(BaseModel):
|
|
237
203
|
disabled: Optional[bool] = True
|
|
238
204
|
|
|
239
|
-
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
240
|
-
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
241
|
-
|
|
242
|
-
reject_unauthorized: Annotated[
|
|
243
|
-
Optional[bool], pydantic.Field(alias="rejectUnauthorized")
|
|
244
|
-
] = True
|
|
245
|
-
r"""Reject certificates not authorized by a CA in the CA certificate path or by another trusted CA (such as the system's)"""
|
|
246
|
-
|
|
247
|
-
common_name_regex: Annotated[
|
|
248
|
-
Optional[str], pydantic.Field(alias="commonNameRegex")
|
|
249
|
-
] = "/.*/"
|
|
250
|
-
r"""Regex matching allowable common names in peer certificates' subject attribute"""
|
|
251
|
-
|
|
252
205
|
certificate_name: Annotated[
|
|
253
206
|
Optional[str], pydantic.Field(alias="certificateName")
|
|
254
207
|
] = None
|
|
@@ -266,6 +219,17 @@ class InputSplunkHecTLSSettingsServerSide(BaseModel):
|
|
|
266
219
|
ca_path: Annotated[Optional[str], pydantic.Field(alias="caPath")] = None
|
|
267
220
|
r"""Path on server containing CA certificates to use. PEM format. Can reference $ENV_VARS."""
|
|
268
221
|
|
|
222
|
+
request_cert: Annotated[Optional[bool], pydantic.Field(alias="requestCert")] = False
|
|
223
|
+
r"""Require clients to present their certificates. Used to perform client authentication using SSL certs."""
|
|
224
|
+
|
|
225
|
+
reject_unauthorized: Annotated[
|
|
226
|
+
Optional[Any], pydantic.Field(alias="rejectUnauthorized")
|
|
227
|
+
] = None
|
|
228
|
+
|
|
229
|
+
common_name_regex: Annotated[
|
|
230
|
+
Optional[Any], pydantic.Field(alias="commonNameRegex")
|
|
231
|
+
] = None
|
|
232
|
+
|
|
269
233
|
min_version: Annotated[
|
|
270
234
|
Annotated[
|
|
271
235
|
Optional[InputSplunkHecMinimumTLSVersion],
|
|
@@ -282,24 +246,6 @@ class InputSplunkHecTLSSettingsServerSide(BaseModel):
|
|
|
282
246
|
pydantic.Field(alias="maxVersion"),
|
|
283
247
|
] = None
|
|
284
248
|
|
|
285
|
-
@field_serializer("min_version")
|
|
286
|
-
def serialize_min_version(self, value):
|
|
287
|
-
if isinstance(value, str):
|
|
288
|
-
try:
|
|
289
|
-
return models.InputSplunkHecMinimumTLSVersion(value)
|
|
290
|
-
except ValueError:
|
|
291
|
-
return value
|
|
292
|
-
return value
|
|
293
|
-
|
|
294
|
-
@field_serializer("max_version")
|
|
295
|
-
def serialize_max_version(self, value):
|
|
296
|
-
if isinstance(value, str):
|
|
297
|
-
try:
|
|
298
|
-
return models.InputSplunkHecMaximumTLSVersion(value)
|
|
299
|
-
except ValueError:
|
|
300
|
-
return value
|
|
301
|
-
return value
|
|
302
|
-
|
|
303
249
|
|
|
304
250
|
class InputSplunkHecMetadatumTypedDict(TypedDict):
|
|
305
251
|
name: str
|
|
@@ -1,12 +1,11 @@
|
|
|
1
1
|
"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT."""
|
|
2
2
|
|
|
3
3
|
from __future__ import annotations
|
|
4
|
-
from cribl_control_plane import
|
|
4
|
+
from cribl_control_plane import utils
|
|
5
5
|
from cribl_control_plane.types import BaseModel
|
|
6
6
|
from cribl_control_plane.utils import validate_open_enum
|
|
7
7
|
from enum import Enum
|
|
8
8
|
import pydantic
|
|
9
|
-
from pydantic import field_serializer
|
|
10
9
|
from pydantic.functional_validators import PlainValidator
|
|
11
10
|
from typing import List, Optional
|
|
12
11
|
from typing_extensions import Annotated, NotRequired, TypedDict
|
|
@@ -30,18 +29,14 @@ class InputSplunkSearchConnection(BaseModel):
|
|
|
30
29
|
class InputSplunkSearchMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
31
30
|
r"""With Smart mode, PQ will write events to the filesystem only when it detects backpressure from the processing engine. With Always On mode, PQ will always write events directly to the queue before forwarding them to the processing engine."""
|
|
32
31
|
|
|
33
|
-
# Smart
|
|
34
32
|
SMART = "smart"
|
|
35
|
-
# Always On
|
|
36
33
|
ALWAYS = "always"
|
|
37
34
|
|
|
38
35
|
|
|
39
36
|
class InputSplunkSearchCompression(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
40
37
|
r"""Codec to use to compress the persisted data"""
|
|
41
38
|
|
|
42
|
-
# None
|
|
43
39
|
NONE = "none"
|
|
44
|
-
# Gzip
|
|
45
40
|
GZIP = "gzip"
|
|
46
41
|
|
|
47
42
|
|
|
@@ -108,24 +103,6 @@ class InputSplunkSearchPq(BaseModel):
|
|
|
108
103
|
Optional[InputSplunkSearchPqControls], pydantic.Field(alias="pqControls")
|
|
109
104
|
] = None
|
|
110
105
|
|
|
111
|
-
@field_serializer("mode")
|
|
112
|
-
def serialize_mode(self, value):
|
|
113
|
-
if isinstance(value, str):
|
|
114
|
-
try:
|
|
115
|
-
return models.InputSplunkSearchMode(value)
|
|
116
|
-
except ValueError:
|
|
117
|
-
return value
|
|
118
|
-
return value
|
|
119
|
-
|
|
120
|
-
@field_serializer("compress")
|
|
121
|
-
def serialize_compress(self, value):
|
|
122
|
-
if isinstance(value, str):
|
|
123
|
-
try:
|
|
124
|
-
return models.InputSplunkSearchCompression(value)
|
|
125
|
-
except ValueError:
|
|
126
|
-
return value
|
|
127
|
-
return value
|
|
128
|
-
|
|
129
106
|
|
|
130
107
|
class OutputMode(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
131
108
|
r"""Format of the returned output"""
|
|
@@ -185,11 +162,8 @@ class InputSplunkSearchMetadatum(BaseModel):
|
|
|
185
162
|
class InputSplunkSearchRetryType(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
186
163
|
r"""The algorithm to use when performing HTTP retries"""
|
|
187
164
|
|
|
188
|
-
# Disabled
|
|
189
165
|
NONE = "none"
|
|
190
|
-
# Backoff
|
|
191
166
|
BACKOFF = "backoff"
|
|
192
|
-
# Static
|
|
193
167
|
STATIC = "static"
|
|
194
168
|
|
|
195
169
|
|
|
@@ -245,15 +219,6 @@ class InputSplunkSearchRetryRules(BaseModel):
|
|
|
245
219
|
] = False
|
|
246
220
|
r"""Retry request when a connection reset (ECONNRESET) error occurs"""
|
|
247
221
|
|
|
248
|
-
@field_serializer("type")
|
|
249
|
-
def serialize_type(self, value):
|
|
250
|
-
if isinstance(value, str):
|
|
251
|
-
try:
|
|
252
|
-
return models.InputSplunkSearchRetryType(value)
|
|
253
|
-
except ValueError:
|
|
254
|
-
return value
|
|
255
|
-
return value
|
|
256
|
-
|
|
257
222
|
|
|
258
223
|
class InputSplunkSearchAuthenticationType(str, Enum, metaclass=utils.OpenEnumMeta):
|
|
259
224
|
r"""Splunk Search authentication type"""
|
|
@@ -583,30 +548,3 @@ class InputSplunkSearch(BaseModel):
|
|
|
583
548
|
pydantic.Field(alias="oauthHeaders"),
|
|
584
549
|
] = None
|
|
585
550
|
r"""Additional headers to send in the OAuth login request. @{product} will automatically add the content-type header 'application/x-www-form-urlencoded' when sending this request."""
|
|
586
|
-
|
|
587
|
-
@field_serializer("output_mode")
|
|
588
|
-
def serialize_output_mode(self, value):
|
|
589
|
-
if isinstance(value, str):
|
|
590
|
-
try:
|
|
591
|
-
return models.OutputMode(value)
|
|
592
|
-
except ValueError:
|
|
593
|
-
return value
|
|
594
|
-
return value
|
|
595
|
-
|
|
596
|
-
@field_serializer("log_level")
|
|
597
|
-
def serialize_log_level(self, value):
|
|
598
|
-
if isinstance(value, str):
|
|
599
|
-
try:
|
|
600
|
-
return models.InputSplunkSearchLogLevel(value)
|
|
601
|
-
except ValueError:
|
|
602
|
-
return value
|
|
603
|
-
return value
|
|
604
|
-
|
|
605
|
-
@field_serializer("auth_type")
|
|
606
|
-
def serialize_auth_type(self, value):
|
|
607
|
-
if isinstance(value, str):
|
|
608
|
-
try:
|
|
609
|
-
return models.InputSplunkSearchAuthenticationType(value)
|
|
610
|
-
except ValueError:
|
|
611
|
-
return value
|
|
612
|
-
return value
|