pulumi-azure-native 2.66.0__py3-none-any.whl → 2.66.0a1728396986__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure-native might be problematic. Click here for more details.

Files changed (525) hide show
  1. pulumi_azure_native/__init__.py +0 -66
  2. pulumi_azure_native/app/__init__.py +0 -3
  3. pulumi_azure_native/app/app_resiliency.py +3 -3
  4. pulumi_azure_native/app/build.py +3 -3
  5. pulumi_azure_native/app/builder.py +3 -3
  6. pulumi_azure_native/app/certificate.py +3 -3
  7. pulumi_azure_native/app/connected_environment.py +3 -3
  8. pulumi_azure_native/app/connected_environments_certificate.py +3 -3
  9. pulumi_azure_native/app/connected_environments_dapr_component.py +3 -3
  10. pulumi_azure_native/app/connected_environments_storage.py +3 -3
  11. pulumi_azure_native/app/container_app.py +3 -3
  12. pulumi_azure_native/app/container_apps_auth_config.py +3 -3
  13. pulumi_azure_native/app/container_apps_session_pool.py +1 -5
  14. pulumi_azure_native/app/container_apps_source_control.py +3 -3
  15. pulumi_azure_native/app/dapr_component.py +3 -3
  16. pulumi_azure_native/app/dapr_component_resiliency_policy.py +3 -3
  17. pulumi_azure_native/app/dapr_subscription.py +3 -3
  18. pulumi_azure_native/app/dot_net_component.py +3 -3
  19. pulumi_azure_native/app/get_app_resiliency.py +2 -2
  20. pulumi_azure_native/app/get_build.py +2 -2
  21. pulumi_azure_native/app/get_builder.py +2 -2
  22. pulumi_azure_native/app/get_certificate.py +2 -2
  23. pulumi_azure_native/app/get_connected_environment.py +2 -2
  24. pulumi_azure_native/app/get_connected_environments_certificate.py +2 -2
  25. pulumi_azure_native/app/get_connected_environments_dapr_component.py +2 -2
  26. pulumi_azure_native/app/get_connected_environments_storage.py +2 -2
  27. pulumi_azure_native/app/get_container_app.py +2 -2
  28. pulumi_azure_native/app/get_container_app_auth_token.py +2 -2
  29. pulumi_azure_native/app/get_container_apps_auth_config.py +2 -2
  30. pulumi_azure_native/app/get_container_apps_session_pool.py +0 -4
  31. pulumi_azure_native/app/get_container_apps_source_control.py +2 -2
  32. pulumi_azure_native/app/get_custom_domain_verification_id.py +2 -2
  33. pulumi_azure_native/app/get_dapr_component.py +2 -2
  34. pulumi_azure_native/app/get_dapr_component_resiliency_policy.py +2 -2
  35. pulumi_azure_native/app/get_dapr_subscription.py +2 -2
  36. pulumi_azure_native/app/get_dot_net_component.py +2 -2
  37. pulumi_azure_native/app/get_java_component.py +2 -2
  38. pulumi_azure_native/app/get_job.py +2 -2
  39. pulumi_azure_native/app/get_logic_app.py +0 -4
  40. pulumi_azure_native/app/get_managed_certificate.py +2 -2
  41. pulumi_azure_native/app/get_managed_environment.py +2 -2
  42. pulumi_azure_native/app/get_managed_environment_auth_token.py +2 -2
  43. pulumi_azure_native/app/get_managed_environment_private_endpoint_connection.py +0 -4
  44. pulumi_azure_native/app/get_managed_environments_storage.py +2 -2
  45. pulumi_azure_native/app/java_component.py +3 -3
  46. pulumi_azure_native/app/job.py +3 -3
  47. pulumi_azure_native/app/list_build_auth_token.py +2 -2
  48. pulumi_azure_native/app/list_connected_environments_dapr_component_secrets.py +2 -2
  49. pulumi_azure_native/app/list_container_app_custom_host_name_analysis.py +2 -2
  50. pulumi_azure_native/app/list_container_app_secrets.py +2 -2
  51. pulumi_azure_native/app/list_dapr_component_secrets.py +2 -2
  52. pulumi_azure_native/app/list_job_secrets.py +2 -2
  53. pulumi_azure_native/app/list_logic_app_workflows_connections.py +0 -4
  54. pulumi_azure_native/app/logic_app.py +1 -5
  55. pulumi_azure_native/app/managed_certificate.py +3 -3
  56. pulumi_azure_native/app/managed_environment.py +3 -3
  57. pulumi_azure_native/app/managed_environment_private_endpoint_connection.py +1 -5
  58. pulumi_azure_native/app/managed_environments_storage.py +3 -3
  59. pulumi_azure_native/app/v20220101preview/certificate.py +1 -1
  60. pulumi_azure_native/app/v20220101preview/container_app.py +1 -1
  61. pulumi_azure_native/app/v20220101preview/container_apps_auth_config.py +1 -1
  62. pulumi_azure_native/app/v20220101preview/container_apps_source_control.py +1 -1
  63. pulumi_azure_native/app/v20220101preview/dapr_component.py +1 -1
  64. pulumi_azure_native/app/v20220101preview/managed_environment.py +1 -1
  65. pulumi_azure_native/app/v20220101preview/managed_environments_storage.py +1 -1
  66. pulumi_azure_native/app/v20221001/certificate.py +1 -1
  67. pulumi_azure_native/app/v20221001/connected_environment.py +1 -1
  68. pulumi_azure_native/app/v20221001/connected_environments_certificate.py +1 -1
  69. pulumi_azure_native/app/v20221001/connected_environments_dapr_component.py +1 -1
  70. pulumi_azure_native/app/v20221001/connected_environments_storage.py +1 -1
  71. pulumi_azure_native/app/v20221001/container_app.py +1 -1
  72. pulumi_azure_native/app/v20221001/container_apps_auth_config.py +1 -1
  73. pulumi_azure_native/app/v20221001/container_apps_source_control.py +1 -1
  74. pulumi_azure_native/app/v20221001/dapr_component.py +1 -1
  75. pulumi_azure_native/app/v20221001/managed_environment.py +1 -1
  76. pulumi_azure_native/app/v20221001/managed_environments_storage.py +1 -1
  77. pulumi_azure_native/app/v20230401preview/certificate.py +1 -1
  78. pulumi_azure_native/app/v20230401preview/connected_environment.py +1 -1
  79. pulumi_azure_native/app/v20230401preview/connected_environments_certificate.py +1 -1
  80. pulumi_azure_native/app/v20230401preview/connected_environments_dapr_component.py +1 -1
  81. pulumi_azure_native/app/v20230401preview/connected_environments_storage.py +1 -1
  82. pulumi_azure_native/app/v20230401preview/container_app.py +1 -1
  83. pulumi_azure_native/app/v20230401preview/container_apps_auth_config.py +1 -1
  84. pulumi_azure_native/app/v20230401preview/container_apps_source_control.py +1 -1
  85. pulumi_azure_native/app/v20230401preview/dapr_component.py +1 -1
  86. pulumi_azure_native/app/v20230401preview/job.py +1 -1
  87. pulumi_azure_native/app/v20230401preview/managed_certificate.py +1 -1
  88. pulumi_azure_native/app/v20230401preview/managed_environment.py +1 -1
  89. pulumi_azure_native/app/v20230401preview/managed_environments_storage.py +1 -1
  90. pulumi_azure_native/app/v20230501/certificate.py +1 -1
  91. pulumi_azure_native/app/v20230501/connected_environment.py +1 -1
  92. pulumi_azure_native/app/v20230501/connected_environments_certificate.py +1 -1
  93. pulumi_azure_native/app/v20230501/connected_environments_dapr_component.py +1 -1
  94. pulumi_azure_native/app/v20230501/connected_environments_storage.py +1 -1
  95. pulumi_azure_native/app/v20230501/container_app.py +1 -1
  96. pulumi_azure_native/app/v20230501/container_apps_auth_config.py +1 -1
  97. pulumi_azure_native/app/v20230501/container_apps_source_control.py +1 -1
  98. pulumi_azure_native/app/v20230501/dapr_component.py +1 -1
  99. pulumi_azure_native/app/v20230501/job.py +1 -1
  100. pulumi_azure_native/app/v20230501/managed_certificate.py +1 -1
  101. pulumi_azure_native/app/v20230501/managed_environment.py +1 -1
  102. pulumi_azure_native/app/v20230501/managed_environments_storage.py +1 -1
  103. pulumi_azure_native/app/v20230502preview/certificate.py +1 -1
  104. pulumi_azure_native/app/v20230502preview/connected_environment.py +1 -1
  105. pulumi_azure_native/app/v20230502preview/connected_environments_certificate.py +1 -1
  106. pulumi_azure_native/app/v20230502preview/connected_environments_dapr_component.py +1 -1
  107. pulumi_azure_native/app/v20230502preview/connected_environments_storage.py +1 -1
  108. pulumi_azure_native/app/v20230502preview/container_app.py +1 -1
  109. pulumi_azure_native/app/v20230502preview/container_apps_auth_config.py +1 -1
  110. pulumi_azure_native/app/v20230502preview/container_apps_source_control.py +1 -1
  111. pulumi_azure_native/app/v20230502preview/dapr_component.py +1 -1
  112. pulumi_azure_native/app/v20230502preview/job.py +1 -1
  113. pulumi_azure_native/app/v20230502preview/managed_certificate.py +1 -1
  114. pulumi_azure_native/app/v20230502preview/managed_environment.py +1 -1
  115. pulumi_azure_native/app/v20230502preview/managed_environments_storage.py +1 -1
  116. pulumi_azure_native/app/v20230801preview/app_resiliency.py +1 -1
  117. pulumi_azure_native/app/v20230801preview/build.py +1 -1
  118. pulumi_azure_native/app/v20230801preview/builder.py +1 -1
  119. pulumi_azure_native/app/v20230801preview/certificate.py +1 -1
  120. pulumi_azure_native/app/v20230801preview/connected_environment.py +1 -1
  121. pulumi_azure_native/app/v20230801preview/connected_environments_certificate.py +1 -1
  122. pulumi_azure_native/app/v20230801preview/connected_environments_dapr_component.py +1 -1
  123. pulumi_azure_native/app/v20230801preview/connected_environments_storage.py +1 -1
  124. pulumi_azure_native/app/v20230801preview/container_app.py +1 -1
  125. pulumi_azure_native/app/v20230801preview/container_apps_auth_config.py +1 -1
  126. pulumi_azure_native/app/v20230801preview/container_apps_source_control.py +1 -1
  127. pulumi_azure_native/app/v20230801preview/dapr_component.py +1 -1
  128. pulumi_azure_native/app/v20230801preview/dapr_component_resiliency_policy.py +1 -1
  129. pulumi_azure_native/app/v20230801preview/dapr_subscription.py +1 -1
  130. pulumi_azure_native/app/v20230801preview/job.py +1 -1
  131. pulumi_azure_native/app/v20230801preview/managed_certificate.py +1 -1
  132. pulumi_azure_native/app/v20230801preview/managed_environment.py +1 -1
  133. pulumi_azure_native/app/v20230801preview/managed_environments_storage.py +1 -1
  134. pulumi_azure_native/app/v20231102preview/app_resiliency.py +1 -1
  135. pulumi_azure_native/app/v20231102preview/build.py +1 -1
  136. pulumi_azure_native/app/v20231102preview/builder.py +1 -1
  137. pulumi_azure_native/app/v20231102preview/certificate.py +1 -1
  138. pulumi_azure_native/app/v20231102preview/connected_environment.py +1 -1
  139. pulumi_azure_native/app/v20231102preview/connected_environments_certificate.py +1 -1
  140. pulumi_azure_native/app/v20231102preview/connected_environments_dapr_component.py +1 -1
  141. pulumi_azure_native/app/v20231102preview/connected_environments_storage.py +1 -1
  142. pulumi_azure_native/app/v20231102preview/container_app.py +1 -1
  143. pulumi_azure_native/app/v20231102preview/container_apps_auth_config.py +1 -1
  144. pulumi_azure_native/app/v20231102preview/container_apps_source_control.py +1 -1
  145. pulumi_azure_native/app/v20231102preview/dapr_component.py +1 -1
  146. pulumi_azure_native/app/v20231102preview/dapr_component_resiliency_policy.py +1 -1
  147. pulumi_azure_native/app/v20231102preview/dapr_subscription.py +1 -1
  148. pulumi_azure_native/app/v20231102preview/dot_net_component.py +1 -1
  149. pulumi_azure_native/app/v20231102preview/java_component.py +1 -1
  150. pulumi_azure_native/app/v20231102preview/job.py +1 -1
  151. pulumi_azure_native/app/v20231102preview/managed_certificate.py +1 -1
  152. pulumi_azure_native/app/v20231102preview/managed_environment.py +1 -1
  153. pulumi_azure_native/app/v20231102preview/managed_environments_storage.py +1 -1
  154. pulumi_azure_native/app/v20240202preview/app_resiliency.py +1 -1
  155. pulumi_azure_native/app/v20240202preview/build.py +1 -1
  156. pulumi_azure_native/app/v20240202preview/builder.py +1 -1
  157. pulumi_azure_native/app/v20240202preview/certificate.py +1 -1
  158. pulumi_azure_native/app/v20240202preview/connected_environment.py +1 -1
  159. pulumi_azure_native/app/v20240202preview/connected_environments_certificate.py +1 -1
  160. pulumi_azure_native/app/v20240202preview/connected_environments_dapr_component.py +1 -1
  161. pulumi_azure_native/app/v20240202preview/connected_environments_storage.py +1 -1
  162. pulumi_azure_native/app/v20240202preview/container_app.py +1 -1
  163. pulumi_azure_native/app/v20240202preview/container_apps_auth_config.py +1 -1
  164. pulumi_azure_native/app/v20240202preview/container_apps_session_pool.py +1 -1
  165. pulumi_azure_native/app/v20240202preview/container_apps_source_control.py +1 -1
  166. pulumi_azure_native/app/v20240202preview/dapr_component.py +1 -1
  167. pulumi_azure_native/app/v20240202preview/dapr_component_resiliency_policy.py +1 -1
  168. pulumi_azure_native/app/v20240202preview/dapr_subscription.py +1 -1
  169. pulumi_azure_native/app/v20240202preview/dot_net_component.py +1 -1
  170. pulumi_azure_native/app/v20240202preview/java_component.py +1 -1
  171. pulumi_azure_native/app/v20240202preview/job.py +1 -1
  172. pulumi_azure_native/app/v20240202preview/logic_app.py +1 -1
  173. pulumi_azure_native/app/v20240202preview/managed_certificate.py +1 -1
  174. pulumi_azure_native/app/v20240202preview/managed_environment.py +1 -1
  175. pulumi_azure_native/app/v20240202preview/managed_environment_private_endpoint_connection.py +1 -1
  176. pulumi_azure_native/app/v20240202preview/managed_environments_storage.py +1 -1
  177. pulumi_azure_native/app/v20240301/certificate.py +1 -1
  178. pulumi_azure_native/app/v20240301/connected_environment.py +1 -1
  179. pulumi_azure_native/app/v20240301/connected_environments_certificate.py +1 -1
  180. pulumi_azure_native/app/v20240301/connected_environments_dapr_component.py +1 -1
  181. pulumi_azure_native/app/v20240301/connected_environments_storage.py +1 -1
  182. pulumi_azure_native/app/v20240301/container_app.py +1 -1
  183. pulumi_azure_native/app/v20240301/container_apps_auth_config.py +1 -1
  184. pulumi_azure_native/app/v20240301/container_apps_source_control.py +1 -1
  185. pulumi_azure_native/app/v20240301/dapr_component.py +1 -1
  186. pulumi_azure_native/app/v20240301/job.py +1 -1
  187. pulumi_azure_native/app/v20240301/managed_certificate.py +1 -1
  188. pulumi_azure_native/app/v20240301/managed_environment.py +1 -1
  189. pulumi_azure_native/app/v20240301/managed_environments_storage.py +1 -1
  190. pulumi_azure_native/devcenter/__init__.py +0 -5
  191. pulumi_azure_native/devcenter/_inputs.py +3 -3
  192. pulumi_azure_native/devcenter/attached_network_by_dev_center.py +3 -3
  193. pulumi_azure_native/devcenter/catalog.py +3 -3
  194. pulumi_azure_native/devcenter/curation_profile.py +1 -5
  195. pulumi_azure_native/devcenter/dev_box_definition.py +3 -3
  196. pulumi_azure_native/devcenter/dev_center.py +3 -3
  197. pulumi_azure_native/devcenter/encryption_set.py +3 -3
  198. pulumi_azure_native/devcenter/environment_type.py +3 -3
  199. pulumi_azure_native/devcenter/gallery.py +3 -3
  200. pulumi_azure_native/devcenter/get_attached_network_by_dev_center.py +2 -2
  201. pulumi_azure_native/devcenter/get_catalog.py +2 -2
  202. pulumi_azure_native/devcenter/get_catalog_sync_error_details.py +2 -2
  203. pulumi_azure_native/devcenter/get_curation_profile.py +0 -4
  204. pulumi_azure_native/devcenter/get_customization_task_error_details.py +2 -2
  205. pulumi_azure_native/devcenter/get_dev_box_definition.py +2 -2
  206. pulumi_azure_native/devcenter/get_dev_center.py +2 -2
  207. pulumi_azure_native/devcenter/get_encryption_set.py +2 -2
  208. pulumi_azure_native/devcenter/get_environment_definition_error_details.py +2 -2
  209. pulumi_azure_native/devcenter/get_environment_type.py +2 -2
  210. pulumi_azure_native/devcenter/get_gallery.py +2 -2
  211. pulumi_azure_native/devcenter/get_network_connection.py +2 -2
  212. pulumi_azure_native/devcenter/get_plan.py +2 -2
  213. pulumi_azure_native/devcenter/get_plan_member.py +2 -2
  214. pulumi_azure_native/devcenter/get_pool.py +2 -2
  215. pulumi_azure_native/devcenter/get_project.py +2 -2
  216. pulumi_azure_native/devcenter/get_project_catalog.py +2 -2
  217. pulumi_azure_native/devcenter/get_project_catalog_environment_definition_error_details.py +2 -2
  218. pulumi_azure_native/devcenter/get_project_catalog_image_definition_build_details.py +2 -2
  219. pulumi_azure_native/devcenter/get_project_catalog_sync_error_details.py +2 -2
  220. pulumi_azure_native/devcenter/get_project_environment_type.py +2 -2
  221. pulumi_azure_native/devcenter/get_project_inherited_settings.py +2 -2
  222. pulumi_azure_native/devcenter/get_schedule.py +2 -2
  223. pulumi_azure_native/devcenter/list_skus_by_project.py +2 -2
  224. pulumi_azure_native/devcenter/network_connection.py +3 -3
  225. pulumi_azure_native/devcenter/outputs.py +2 -2
  226. pulumi_azure_native/devcenter/plan.py +3 -3
  227. pulumi_azure_native/devcenter/plan_member.py +3 -3
  228. pulumi_azure_native/devcenter/pool.py +3 -3
  229. pulumi_azure_native/devcenter/project.py +3 -3
  230. pulumi_azure_native/devcenter/project_catalog.py +3 -3
  231. pulumi_azure_native/devcenter/project_environment_type.py +3 -3
  232. pulumi_azure_native/devcenter/schedule.py +3 -3
  233. pulumi_azure_native/devcenter/v20221111preview/dev_box_definition.py +1 -1
  234. pulumi_azure_native/devcenter/v20230401/attached_network_by_dev_center.py +1 -1
  235. pulumi_azure_native/devcenter/v20230401/catalog.py +1 -1
  236. pulumi_azure_native/devcenter/v20230401/dev_box_definition.py +1 -1
  237. pulumi_azure_native/devcenter/v20230401/dev_center.py +1 -1
  238. pulumi_azure_native/devcenter/v20230401/environment_type.py +1 -1
  239. pulumi_azure_native/devcenter/v20230401/gallery.py +1 -1
  240. pulumi_azure_native/devcenter/v20230401/network_connection.py +1 -1
  241. pulumi_azure_native/devcenter/v20230401/pool.py +1 -1
  242. pulumi_azure_native/devcenter/v20230401/project.py +1 -1
  243. pulumi_azure_native/devcenter/v20230401/project_environment_type.py +1 -1
  244. pulumi_azure_native/devcenter/v20230401/schedule.py +1 -1
  245. pulumi_azure_native/devcenter/v20230801preview/attached_network_by_dev_center.py +1 -1
  246. pulumi_azure_native/devcenter/v20230801preview/catalog.py +1 -1
  247. pulumi_azure_native/devcenter/v20230801preview/dev_box_definition.py +1 -1
  248. pulumi_azure_native/devcenter/v20230801preview/dev_center.py +1 -1
  249. pulumi_azure_native/devcenter/v20230801preview/environment_type.py +1 -1
  250. pulumi_azure_native/devcenter/v20230801preview/gallery.py +1 -1
  251. pulumi_azure_native/devcenter/v20230801preview/network_connection.py +1 -1
  252. pulumi_azure_native/devcenter/v20230801preview/pool.py +1 -1
  253. pulumi_azure_native/devcenter/v20230801preview/project.py +1 -1
  254. pulumi_azure_native/devcenter/v20230801preview/project_environment_type.py +1 -1
  255. pulumi_azure_native/devcenter/v20230801preview/schedule.py +1 -1
  256. pulumi_azure_native/devcenter/v20231001preview/attached_network_by_dev_center.py +1 -1
  257. pulumi_azure_native/devcenter/v20231001preview/catalog.py +1 -1
  258. pulumi_azure_native/devcenter/v20231001preview/dev_box_definition.py +1 -1
  259. pulumi_azure_native/devcenter/v20231001preview/dev_center.py +1 -1
  260. pulumi_azure_native/devcenter/v20231001preview/environment_type.py +1 -1
  261. pulumi_azure_native/devcenter/v20231001preview/gallery.py +1 -1
  262. pulumi_azure_native/devcenter/v20231001preview/network_connection.py +1 -1
  263. pulumi_azure_native/devcenter/v20231001preview/pool.py +1 -1
  264. pulumi_azure_native/devcenter/v20231001preview/project.py +1 -1
  265. pulumi_azure_native/devcenter/v20231001preview/project_environment_type.py +1 -1
  266. pulumi_azure_native/devcenter/v20231001preview/schedule.py +1 -1
  267. pulumi_azure_native/devcenter/v20240201/attached_network_by_dev_center.py +1 -1
  268. pulumi_azure_native/devcenter/v20240201/catalog.py +1 -1
  269. pulumi_azure_native/devcenter/v20240201/dev_box_definition.py +1 -1
  270. pulumi_azure_native/devcenter/v20240201/dev_center.py +1 -1
  271. pulumi_azure_native/devcenter/v20240201/environment_type.py +1 -1
  272. pulumi_azure_native/devcenter/v20240201/gallery.py +1 -1
  273. pulumi_azure_native/devcenter/v20240201/network_connection.py +1 -1
  274. pulumi_azure_native/devcenter/v20240201/pool.py +1 -1
  275. pulumi_azure_native/devcenter/v20240201/project.py +1 -1
  276. pulumi_azure_native/devcenter/v20240201/project_catalog.py +1 -1
  277. pulumi_azure_native/devcenter/v20240201/project_environment_type.py +1 -1
  278. pulumi_azure_native/devcenter/v20240201/schedule.py +1 -1
  279. pulumi_azure_native/devcenter/v20240501preview/attached_network_by_dev_center.py +1 -1
  280. pulumi_azure_native/devcenter/v20240501preview/catalog.py +1 -1
  281. pulumi_azure_native/devcenter/v20240501preview/dev_box_definition.py +1 -1
  282. pulumi_azure_native/devcenter/v20240501preview/dev_center.py +1 -1
  283. pulumi_azure_native/devcenter/v20240501preview/encryption_set.py +1 -1
  284. pulumi_azure_native/devcenter/v20240501preview/environment_type.py +1 -1
  285. pulumi_azure_native/devcenter/v20240501preview/gallery.py +1 -1
  286. pulumi_azure_native/devcenter/v20240501preview/network_connection.py +1 -1
  287. pulumi_azure_native/devcenter/v20240501preview/plan.py +1 -1
  288. pulumi_azure_native/devcenter/v20240501preview/plan_member.py +1 -1
  289. pulumi_azure_native/devcenter/v20240501preview/pool.py +1 -1
  290. pulumi_azure_native/devcenter/v20240501preview/project.py +1 -1
  291. pulumi_azure_native/devcenter/v20240501preview/project_catalog.py +1 -1
  292. pulumi_azure_native/devcenter/v20240501preview/project_environment_type.py +1 -1
  293. pulumi_azure_native/devcenter/v20240501preview/schedule.py +1 -1
  294. pulumi_azure_native/devcenter/v20240601preview/attached_network_by_dev_center.py +1 -1
  295. pulumi_azure_native/devcenter/v20240601preview/catalog.py +1 -1
  296. pulumi_azure_native/devcenter/v20240601preview/dev_box_definition.py +1 -1
  297. pulumi_azure_native/devcenter/v20240601preview/dev_center.py +1 -1
  298. pulumi_azure_native/devcenter/v20240601preview/encryption_set.py +1 -1
  299. pulumi_azure_native/devcenter/v20240601preview/environment_type.py +1 -1
  300. pulumi_azure_native/devcenter/v20240601preview/gallery.py +1 -1
  301. pulumi_azure_native/devcenter/v20240601preview/network_connection.py +1 -1
  302. pulumi_azure_native/devcenter/v20240601preview/plan.py +1 -1
  303. pulumi_azure_native/devcenter/v20240601preview/plan_member.py +1 -1
  304. pulumi_azure_native/devcenter/v20240601preview/pool.py +1 -1
  305. pulumi_azure_native/devcenter/v20240601preview/project.py +1 -1
  306. pulumi_azure_native/devcenter/v20240601preview/project_catalog.py +1 -1
  307. pulumi_azure_native/devcenter/v20240601preview/project_environment_type.py +1 -1
  308. pulumi_azure_native/devcenter/v20240601preview/schedule.py +1 -1
  309. pulumi_azure_native/devcenter/v20240701preview/attached_network_by_dev_center.py +1 -1
  310. pulumi_azure_native/devcenter/v20240701preview/catalog.py +1 -1
  311. pulumi_azure_native/devcenter/v20240701preview/dev_box_definition.py +1 -1
  312. pulumi_azure_native/devcenter/v20240701preview/dev_center.py +1 -1
  313. pulumi_azure_native/devcenter/v20240701preview/encryption_set.py +1 -1
  314. pulumi_azure_native/devcenter/v20240701preview/environment_type.py +1 -1
  315. pulumi_azure_native/devcenter/v20240701preview/gallery.py +1 -1
  316. pulumi_azure_native/devcenter/v20240701preview/network_connection.py +1 -1
  317. pulumi_azure_native/devcenter/v20240701preview/plan.py +1 -1
  318. pulumi_azure_native/devcenter/v20240701preview/plan_member.py +1 -1
  319. pulumi_azure_native/devcenter/v20240701preview/pool.py +1 -1
  320. pulumi_azure_native/devcenter/v20240701preview/project.py +1 -1
  321. pulumi_azure_native/devcenter/v20240701preview/project_catalog.py +1 -1
  322. pulumi_azure_native/devcenter/v20240701preview/project_environment_type.py +1 -1
  323. pulumi_azure_native/devcenter/v20240701preview/schedule.py +1 -1
  324. pulumi_azure_native/devcenter/v20240801preview/attached_network_by_dev_center.py +1 -1
  325. pulumi_azure_native/devcenter/v20240801preview/catalog.py +1 -1
  326. pulumi_azure_native/devcenter/v20240801preview/curation_profile.py +1 -1
  327. pulumi_azure_native/devcenter/v20240801preview/dev_box_definition.py +1 -1
  328. pulumi_azure_native/devcenter/v20240801preview/dev_center.py +1 -1
  329. pulumi_azure_native/devcenter/v20240801preview/encryption_set.py +1 -1
  330. pulumi_azure_native/devcenter/v20240801preview/environment_type.py +1 -1
  331. pulumi_azure_native/devcenter/v20240801preview/gallery.py +1 -1
  332. pulumi_azure_native/devcenter/v20240801preview/network_connection.py +1 -1
  333. pulumi_azure_native/devcenter/v20240801preview/plan.py +1 -1
  334. pulumi_azure_native/devcenter/v20240801preview/plan_member.py +1 -1
  335. pulumi_azure_native/devcenter/v20240801preview/pool.py +1 -1
  336. pulumi_azure_native/devcenter/v20240801preview/project.py +1 -1
  337. pulumi_azure_native/devcenter/v20240801preview/project_catalog.py +1 -1
  338. pulumi_azure_native/devcenter/v20240801preview/project_environment_type.py +1 -1
  339. pulumi_azure_native/devcenter/v20240801preview/schedule.py +1 -1
  340. pulumi_azure_native/elastic/__init__.py +0 -3
  341. pulumi_azure_native/elastic/get_billing_info.py +2 -2
  342. pulumi_azure_native/elastic/get_monitor.py +2 -2
  343. pulumi_azure_native/elastic/get_monitored_subscription.py +2 -2
  344. pulumi_azure_native/elastic/get_open_ai.py +2 -2
  345. pulumi_azure_native/elastic/get_open_ai_status.py +2 -2
  346. pulumi_azure_native/elastic/get_organization_api_key.py +2 -2
  347. pulumi_azure_native/elastic/get_organization_elastic_to_azure_subscription_mapping.py +2 -2
  348. pulumi_azure_native/elastic/get_tag_rule.py +2 -2
  349. pulumi_azure_native/elastic/list_all_traffic_filter.py +2 -2
  350. pulumi_azure_native/elastic/list_connected_partner_resource.py +2 -2
  351. pulumi_azure_native/elastic/list_deployment_info.py +2 -2
  352. pulumi_azure_native/elastic/list_monitored_resource.py +2 -2
  353. pulumi_azure_native/elastic/list_upgradable_version_details.py +2 -2
  354. pulumi_azure_native/elastic/list_vm_host.py +2 -2
  355. pulumi_azure_native/elastic/listlist_associated_traffic_filter.py +2 -2
  356. pulumi_azure_native/elastic/monitor.py +3 -3
  357. pulumi_azure_native/elastic/monitored_subscription.py +3 -3
  358. pulumi_azure_native/elastic/open_ai.py +3 -3
  359. pulumi_azure_native/elastic/tag_rule.py +3 -3
  360. pulumi_azure_native/elastic/v20230601/monitor.py +1 -1
  361. pulumi_azure_native/elastic/v20230601/tag_rule.py +1 -1
  362. pulumi_azure_native/elastic/v20230615preview/monitor.py +1 -1
  363. pulumi_azure_native/elastic/v20230615preview/tag_rule.py +1 -1
  364. pulumi_azure_native/elastic/v20230701preview/monitor.py +1 -1
  365. pulumi_azure_native/elastic/v20230701preview/tag_rule.py +1 -1
  366. pulumi_azure_native/elastic/v20231001preview/monitor.py +1 -1
  367. pulumi_azure_native/elastic/v20231001preview/tag_rule.py +1 -1
  368. pulumi_azure_native/elastic/v20231101preview/monitor.py +1 -1
  369. pulumi_azure_native/elastic/v20231101preview/tag_rule.py +1 -1
  370. pulumi_azure_native/elastic/v20240101preview/monitor.py +1 -1
  371. pulumi_azure_native/elastic/v20240101preview/open_ai.py +1 -1
  372. pulumi_azure_native/elastic/v20240101preview/tag_rule.py +1 -1
  373. pulumi_azure_native/elastic/v20240301/monitor.py +1 -1
  374. pulumi_azure_native/elastic/v20240301/open_ai.py +1 -1
  375. pulumi_azure_native/elastic/v20240301/tag_rule.py +1 -1
  376. pulumi_azure_native/elastic/v20240501preview/monitor.py +1 -1
  377. pulumi_azure_native/elastic/v20240501preview/monitored_subscription.py +1 -1
  378. pulumi_azure_native/elastic/v20240501preview/open_ai.py +1 -1
  379. pulumi_azure_native/elastic/v20240501preview/tag_rule.py +1 -1
  380. pulumi_azure_native/elastic/v20240615preview/monitor.py +1 -1
  381. pulumi_azure_native/elastic/v20240615preview/monitored_subscription.py +1 -1
  382. pulumi_azure_native/elastic/v20240615preview/open_ai.py +1 -1
  383. pulumi_azure_native/elastic/v20240615preview/tag_rule.py +1 -1
  384. pulumi_azure_native/hybridconnectivity/outputs.py +2 -44
  385. pulumi_azure_native/hybridconnectivity/v20241201/outputs.py +2 -44
  386. pulumi_azure_native/pulumi-plugin.json +1 -1
  387. pulumi_azure_native/security/_inputs.py +15 -3
  388. pulumi_azure_native/security/outputs.py +10 -2
  389. pulumi_azure_native/security/v20240101/_inputs.py +15 -3
  390. pulumi_azure_native/security/v20240101/outputs.py +10 -2
  391. {pulumi_azure_native-2.66.0.dist-info → pulumi_azure_native-2.66.0a1728396986.dist-info}/METADATA +1 -1
  392. {pulumi_azure_native-2.66.0.dist-info → pulumi_azure_native-2.66.0a1728396986.dist-info}/RECORD +394 -525
  393. pulumi_azure_native/app/v20240802preview/__init__.py +0 -66
  394. pulumi_azure_native/app/v20240802preview/_enums.py +0 -347
  395. pulumi_azure_native/app/v20240802preview/_inputs.py +0 -13190
  396. pulumi_azure_native/app/v20240802preview/app_resiliency.py +0 -364
  397. pulumi_azure_native/app/v20240802preview/build.py +0 -299
  398. pulumi_azure_native/app/v20240802preview/builder.py +0 -327
  399. pulumi_azure_native/app/v20240802preview/certificate.py +0 -279
  400. pulumi_azure_native/app/v20240802preview/connected_environment.py +0 -375
  401. pulumi_azure_native/app/v20240802preview/connected_environments_certificate.py +0 -279
  402. pulumi_azure_native/app/v20240802preview/connected_environments_dapr_component.py +0 -456
  403. pulumi_azure_native/app/v20240802preview/connected_environments_storage.py +0 -221
  404. pulumi_azure_native/app/v20240802preview/container_app.py +0 -599
  405. pulumi_azure_native/app/v20240802preview/container_apps_auth_config.py +0 -366
  406. pulumi_azure_native/app/v20240802preview/container_apps_session_pool.py +0 -491
  407. pulumi_azure_native/app/v20240802preview/container_apps_source_control.py +0 -296
  408. pulumi_azure_native/app/v20240802preview/dapr_component.py +0 -456
  409. pulumi_azure_native/app/v20240802preview/dapr_component_resiliency_policy.py +0 -269
  410. pulumi_azure_native/app/v20240802preview/dapr_subscription.py +0 -393
  411. pulumi_azure_native/app/v20240802preview/dot_net_component.py +0 -288
  412. pulumi_azure_native/app/v20240802preview/get_app_resiliency.py +0 -206
  413. pulumi_azure_native/app/v20240802preview/get_build.py +0 -219
  414. pulumi_azure_native/app/v20240802preview/get_builder.py +0 -201
  415. pulumi_azure_native/app/v20240802preview/get_certificate.py +0 -167
  416. pulumi_azure_native/app/v20240802preview/get_connected_environment.py +0 -240
  417. pulumi_azure_native/app/v20240802preview/get_connected_environments_certificate.py +0 -167
  418. pulumi_azure_native/app/v20240802preview/get_connected_environments_dapr_component.py +0 -245
  419. pulumi_azure_native/app/v20240802preview/get_connected_environments_storage.py +0 -141
  420. pulumi_azure_native/app/v20240802preview/get_container_app.py +0 -383
  421. pulumi_azure_native/app/v20240802preview/get_container_app_auth_token.py +0 -175
  422. pulumi_azure_native/app/v20240802preview/get_container_apps_auth_config.py +0 -206
  423. pulumi_azure_native/app/v20240802preview/get_container_apps_session_pool.py +0 -292
  424. pulumi_azure_native/app/v20240802preview/get_container_apps_source_control.py +0 -182
  425. pulumi_azure_native/app/v20240802preview/get_custom_domain_verification_id.py +0 -66
  426. pulumi_azure_native/app/v20240802preview/get_dapr_component.py +0 -245
  427. pulumi_azure_native/app/v20240802preview/get_dapr_component_resiliency_policy.py +0 -159
  428. pulumi_azure_native/app/v20240802preview/get_dapr_subscription.py +0 -219
  429. pulumi_azure_native/app/v20240802preview/get_dot_net_component.py +0 -180
  430. pulumi_azure_native/app/v20240802preview/get_java_component.py +0 -141
  431. pulumi_azure_native/app/v20240802preview/get_job.py +0 -279
  432. pulumi_azure_native/app/v20240802preview/get_logic_app.py +0 -128
  433. pulumi_azure_native/app/v20240802preview/get_managed_certificate.py +0 -167
  434. pulumi_azure_native/app/v20240802preview/get_managed_environment.py +0 -450
  435. pulumi_azure_native/app/v20240802preview/get_managed_environment_auth_token.py +0 -175
  436. pulumi_azure_native/app/v20240802preview/get_managed_environment_private_endpoint_connection.py +0 -180
  437. pulumi_azure_native/app/v20240802preview/get_managed_environments_storage.py +0 -141
  438. pulumi_azure_native/app/v20240802preview/java_component.py +0 -219
  439. pulumi_azure_native/app/v20240802preview/job.py +0 -443
  440. pulumi_azure_native/app/v20240802preview/list_build_auth_token.py +0 -101
  441. pulumi_azure_native/app/v20240802preview/list_connected_environments_dapr_component_secrets.py +0 -89
  442. pulumi_azure_native/app/v20240802preview/list_container_app_custom_host_name_analysis.py +0 -232
  443. pulumi_azure_native/app/v20240802preview/list_container_app_secrets.py +0 -84
  444. pulumi_azure_native/app/v20240802preview/list_dapr_component_secrets.py +0 -89
  445. pulumi_azure_native/app/v20240802preview/list_job_secrets.py +0 -84
  446. pulumi_azure_native/app/v20240802preview/list_logic_app_workflows_connections.py +0 -154
  447. pulumi_azure_native/app/v20240802preview/logic_app.py +0 -190
  448. pulumi_azure_native/app/v20240802preview/managed_certificate.py +0 -279
  449. pulumi_azure_native/app/v20240802preview/managed_environment.py +0 -752
  450. pulumi_azure_native/app/v20240802preview/managed_environment_private_endpoint_connection.py +0 -252
  451. pulumi_azure_native/app/v20240802preview/managed_environments_storage.py +0 -221
  452. pulumi_azure_native/app/v20240802preview/outputs.py +0 -11488
  453. pulumi_azure_native/devcenter/get_project_policy.py +0 -169
  454. pulumi_azure_native/devcenter/project_policy.py +0 -261
  455. pulumi_azure_native/devcenter/v20241001preview/__init__.py +0 -52
  456. pulumi_azure_native/devcenter/v20241001preview/_enums.py +0 -228
  457. pulumi_azure_native/devcenter/v20241001preview/_inputs.py +0 -962
  458. pulumi_azure_native/devcenter/v20241001preview/attached_network_by_dev_center.py +0 -260
  459. pulumi_azure_native/devcenter/v20241001preview/catalog.py +0 -368
  460. pulumi_azure_native/devcenter/v20241001preview/curation_profile.py +0 -259
  461. pulumi_azure_native/devcenter/v20241001preview/dev_box_definition.py +0 -418
  462. pulumi_azure_native/devcenter/v20241001preview/dev_center.py +0 -481
  463. pulumi_azure_native/devcenter/v20241001preview/encryption_set.py +0 -347
  464. pulumi_azure_native/devcenter/v20241001preview/environment_type.py +0 -258
  465. pulumi_azure_native/devcenter/v20241001preview/gallery.py +0 -230
  466. pulumi_azure_native/devcenter/v20241001preview/get_attached_network_by_dev_center.py +0 -193
  467. pulumi_azure_native/devcenter/v20241001preview/get_catalog.py +0 -258
  468. pulumi_azure_native/devcenter/v20241001preview/get_catalog_sync_error_details.py +0 -115
  469. pulumi_azure_native/devcenter/v20241001preview/get_curation_profile.py +0 -167
  470. pulumi_azure_native/devcenter/v20241001preview/get_customization_task_error_details.py +0 -94
  471. pulumi_azure_native/devcenter/v20241001preview/get_dev_box_definition.py +0 -271
  472. pulumi_azure_native/devcenter/v20241001preview/get_dev_center.py +0 -279
  473. pulumi_azure_native/devcenter/v20241001preview/get_encryption_set.py +0 -206
  474. pulumi_azure_native/devcenter/v20241001preview/get_environment_definition_error_details.py +0 -94
  475. pulumi_azure_native/devcenter/v20241001preview/get_environment_type.py +0 -167
  476. pulumi_azure_native/devcenter/v20241001preview/get_gallery.py +0 -154
  477. pulumi_azure_native/devcenter/v20241001preview/get_network_connection.py +0 -266
  478. pulumi_azure_native/devcenter/v20241001preview/get_plan.py +0 -175
  479. pulumi_azure_native/devcenter/v20241001preview/get_plan_member.py +0 -206
  480. pulumi_azure_native/devcenter/v20241001preview/get_pool.py +0 -362
  481. pulumi_azure_native/devcenter/v20241001preview/get_project.py +0 -253
  482. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog.py +0 -258
  483. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_environment_definition_error_details.py +0 -94
  484. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_image_definition_build_details.py +0 -216
  485. pulumi_azure_native/devcenter/v20241001preview/get_project_catalog_sync_error_details.py +0 -115
  486. pulumi_azure_native/devcenter/v20241001preview/get_project_environment_type.py +0 -258
  487. pulumi_azure_native/devcenter/v20241001preview/get_project_inherited_settings.py +0 -97
  488. pulumi_azure_native/devcenter/v20241001preview/get_project_policy.py +0 -167
  489. pulumi_azure_native/devcenter/v20241001preview/get_schedule.py +0 -229
  490. pulumi_azure_native/devcenter/v20241001preview/list_skus_by_project.py +0 -97
  491. pulumi_azure_native/devcenter/v20241001preview/network_connection.py +0 -453
  492. pulumi_azure_native/devcenter/v20241001preview/outputs.py +0 -1952
  493. pulumi_azure_native/devcenter/v20241001preview/plan.py +0 -268
  494. pulumi_azure_native/devcenter/v20241001preview/plan_member.py +0 -327
  495. pulumi_azure_native/devcenter/v20241001preview/pool.py +0 -642
  496. pulumi_azure_native/devcenter/v20241001preview/project.py +0 -423
  497. pulumi_azure_native/devcenter/v20241001preview/project_catalog.py +0 -368
  498. pulumi_azure_native/devcenter/v20241001preview/project_environment_type.py +0 -444
  499. pulumi_azure_native/devcenter/v20241001preview/project_policy.py +0 -259
  500. pulumi_azure_native/devcenter/v20241001preview/schedule.py +0 -439
  501. pulumi_azure_native/elastic/v20241001preview/__init__.py +0 -29
  502. pulumi_azure_native/elastic/v20241001preview/_enums.py +0 -57
  503. pulumi_azure_native/elastic/v20241001preview/_inputs.py +0 -1117
  504. pulumi_azure_native/elastic/v20241001preview/get_billing_info.py +0 -97
  505. pulumi_azure_native/elastic/v20241001preview/get_monitor.py +0 -188
  506. pulumi_azure_native/elastic/v20241001preview/get_monitored_subscription.py +0 -128
  507. pulumi_azure_native/elastic/v20241001preview/get_open_ai.py +0 -128
  508. pulumi_azure_native/elastic/v20241001preview/get_open_ai_status.py +0 -89
  509. pulumi_azure_native/elastic/v20241001preview/get_organization_api_key.py +0 -76
  510. pulumi_azure_native/elastic/v20241001preview/get_organization_elastic_to_azure_subscription_mapping.py +0 -70
  511. pulumi_azure_native/elastic/v20241001preview/get_tag_rule.py +0 -141
  512. pulumi_azure_native/elastic/v20241001preview/list_all_traffic_filter.py +0 -84
  513. pulumi_azure_native/elastic/v20241001preview/list_connected_partner_resource.py +0 -97
  514. pulumi_azure_native/elastic/v20241001preview/list_deployment_info.py +0 -162
  515. pulumi_azure_native/elastic/v20241001preview/list_monitored_resource.py +0 -97
  516. pulumi_azure_native/elastic/v20241001preview/list_upgradable_version_details.py +0 -96
  517. pulumi_azure_native/elastic/v20241001preview/list_vm_host.py +0 -97
  518. pulumi_azure_native/elastic/v20241001preview/listlist_associated_traffic_filter.py +0 -84
  519. pulumi_azure_native/elastic/v20241001preview/monitor.py +0 -316
  520. pulumi_azure_native/elastic/v20241001preview/monitored_subscription.py +0 -211
  521. pulumi_azure_native/elastic/v20241001preview/open_ai.py +0 -210
  522. pulumi_azure_native/elastic/v20241001preview/outputs.py +0 -1757
  523. pulumi_azure_native/elastic/v20241001preview/tag_rule.py +0 -221
  524. {pulumi_azure_native-2.66.0.dist-info → pulumi_azure_native-2.66.0a1728396986.dist-info}/WHEEL +0 -0
  525. {pulumi_azure_native-2.66.0.dist-info → pulumi_azure_native-2.66.0a1728396986.dist-info}/top_level.txt +0 -0
@@ -216,7 +216,7 @@ class Monitor(pulumi.CustomResource):
216
216
  __props__.__dict__["name"] = None
217
217
  __props__.__dict__["system_data"] = None
218
218
  __props__.__dict__["type"] = None
219
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230601:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240301:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:Monitor")])
219
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230601:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240301:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:Monitor")])
220
220
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
221
221
  super(Monitor, __self__).__init__(
222
222
  'azure-native:elastic/v20240501preview:Monitor',
@@ -156,7 +156,7 @@ class MonitoredSubscription(pulumi.CustomResource):
156
156
  __props__.__dict__["resource_group_name"] = resource_group_name
157
157
  __props__.__dict__["name"] = None
158
158
  __props__.__dict__["type"] = None
159
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:MonitoredSubscription"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:MonitoredSubscription"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:MonitoredSubscription")])
159
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:MonitoredSubscription"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:MonitoredSubscription")])
160
160
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
161
161
  super(MonitoredSubscription, __self__).__init__(
162
162
  'azure-native:elastic/v20240501preview:MonitoredSubscription',
@@ -155,7 +155,7 @@ class OpenAI(pulumi.CustomResource):
155
155
  __props__.__dict__["resource_group_name"] = resource_group_name
156
156
  __props__.__dict__["name"] = None
157
157
  __props__.__dict__["type"] = None
158
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240301:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:OpenAI")])
158
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240301:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:OpenAI")])
159
159
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
160
160
  super(OpenAI, __self__).__init__(
161
161
  'azure-native:elastic/v20240501preview:OpenAI',
@@ -157,7 +157,7 @@ class TagRule(pulumi.CustomResource):
157
157
  __props__.__dict__["name"] = None
158
158
  __props__.__dict__["system_data"] = None
159
159
  __props__.__dict__["type"] = None
160
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230601:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240301:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:TagRule")])
160
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230601:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240301:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240615preview:TagRule")])
161
161
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
162
162
  super(TagRule, __self__).__init__(
163
163
  'azure-native:elastic/v20240501preview:TagRule',
@@ -216,7 +216,7 @@ class Monitor(pulumi.CustomResource):
216
216
  __props__.__dict__["name"] = None
217
217
  __props__.__dict__["system_data"] = None
218
218
  __props__.__dict__["type"] = None
219
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230601:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240301:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:Monitor")])
219
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230601:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240301:Monitor"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:Monitor")])
220
220
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
221
221
  super(Monitor, __self__).__init__(
222
222
  'azure-native:elastic/v20240615preview:Monitor',
@@ -156,7 +156,7 @@ class MonitoredSubscription(pulumi.CustomResource):
156
156
  __props__.__dict__["resource_group_name"] = resource_group_name
157
157
  __props__.__dict__["name"] = None
158
158
  __props__.__dict__["type"] = None
159
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:MonitoredSubscription"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:MonitoredSubscription"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:MonitoredSubscription")])
159
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:MonitoredSubscription"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:MonitoredSubscription")])
160
160
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
161
161
  super(MonitoredSubscription, __self__).__init__(
162
162
  'azure-native:elastic/v20240615preview:MonitoredSubscription',
@@ -155,7 +155,7 @@ class OpenAI(pulumi.CustomResource):
155
155
  __props__.__dict__["resource_group_name"] = resource_group_name
156
156
  __props__.__dict__["name"] = None
157
157
  __props__.__dict__["type"] = None
158
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240301:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:OpenAI")])
158
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240301:OpenAI"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:OpenAI")])
159
159
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
160
160
  super(OpenAI, __self__).__init__(
161
161
  'azure-native:elastic/v20240615preview:OpenAI',
@@ -157,7 +157,7 @@ class TagRule(pulumi.CustomResource):
157
157
  __props__.__dict__["name"] = None
158
158
  __props__.__dict__["system_data"] = None
159
159
  __props__.__dict__["type"] = None
160
- alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230601:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240301:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20241001preview:TagRule")])
160
+ alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="azure-native:elastic:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20200701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20210901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20211001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220505preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20220901preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230201preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230501preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230601:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230615preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20230701preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231001preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20231101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240101preview:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240301:TagRule"), pulumi.Alias(type_="azure-native:elastic/v20240501preview:TagRule")])
161
161
  opts = pulumi.ResourceOptions.merge(opts, alias_opts)
162
162
  super(TagRule, __self__).__init__(
163
163
  'azure-native:elastic/v20240615preview:TagRule',
@@ -32,12 +32,8 @@ class AwsCloudProfileResponse(dict):
32
32
  @staticmethod
33
33
  def __key_warning(key: str):
34
34
  suggest = None
35
- if key == "accountId":
36
- suggest = "account_id"
37
- elif key == "excludedAccounts":
35
+ if key == "excludedAccounts":
38
36
  suggest = "excluded_accounts"
39
- elif key == "isOrganizationalAccount":
40
- suggest = "is_organizational_account"
41
37
 
42
38
  if suggest:
43
39
  pulumi.log.warn(f"Key '{key}' not found in AwsCloudProfileResponse. Access the value via the '{suggest}' property getter instead.")
@@ -51,30 +47,13 @@ class AwsCloudProfileResponse(dict):
51
47
  return super().get(key, default)
52
48
 
53
49
  def __init__(__self__, *,
54
- account_id: str,
55
- excluded_accounts: Optional[Sequence[str]] = None,
56
- is_organizational_account: Optional[bool] = None):
50
+ excluded_accounts: Optional[Sequence[str]] = None):
57
51
  """
58
52
  cloud profile for AWS.
59
- :param str account_id: Account id for the AWS account.
60
53
  :param Sequence[str] excluded_accounts: List of AWS accounts which need to be excluded.
61
- :param bool is_organizational_account: Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
62
54
  """
63
- pulumi.set(__self__, "account_id", account_id)
64
55
  if excluded_accounts is not None:
65
56
  pulumi.set(__self__, "excluded_accounts", excluded_accounts)
66
- if is_organizational_account is None:
67
- is_organizational_account = False
68
- if is_organizational_account is not None:
69
- pulumi.set(__self__, "is_organizational_account", is_organizational_account)
70
-
71
- @property
72
- @pulumi.getter(name="accountId")
73
- def account_id(self) -> str:
74
- """
75
- Account id for the AWS account.
76
- """
77
- return pulumi.get(self, "account_id")
78
57
 
79
58
  @property
80
59
  @pulumi.getter(name="excludedAccounts")
@@ -84,14 +63,6 @@ class AwsCloudProfileResponse(dict):
84
63
  """
85
64
  return pulumi.get(self, "excluded_accounts")
86
65
 
87
- @property
88
- @pulumi.getter(name="isOrganizationalAccount")
89
- def is_organizational_account(self) -> Optional[bool]:
90
- """
91
- Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
92
- """
93
- return pulumi.get(self, "is_organizational_account")
94
-
95
66
 
96
67
  @pulumi.output_type
97
68
  class EndpointPropertiesResponse(dict):
@@ -169,8 +140,6 @@ class PublicCloudConnectorPropertiesResponse(dict):
169
140
  suggest = "aws_cloud_profile"
170
141
  elif key == "connectorPrimaryIdentifier":
171
142
  suggest = "connector_primary_identifier"
172
- elif key == "hostType":
173
- suggest = "host_type"
174
143
  elif key == "provisioningState":
175
144
  suggest = "provisioning_state"
176
145
 
@@ -188,18 +157,15 @@ class PublicCloudConnectorPropertiesResponse(dict):
188
157
  def __init__(__self__, *,
189
158
  aws_cloud_profile: 'outputs.AwsCloudProfileResponse',
190
159
  connector_primary_identifier: str,
191
- host_type: str,
192
160
  provisioning_state: str):
193
161
  """
194
162
  Properties of public cloud connectors.
195
163
  :param 'AwsCloudProfileResponse' aws_cloud_profile: Cloud profile for AWS.
196
164
  :param str connector_primary_identifier: Connector primary identifier.
197
- :param str host_type: Host cloud the public cloud connector.
198
165
  :param str provisioning_state: The resource provisioning state.
199
166
  """
200
167
  pulumi.set(__self__, "aws_cloud_profile", aws_cloud_profile)
201
168
  pulumi.set(__self__, "connector_primary_identifier", connector_primary_identifier)
202
- pulumi.set(__self__, "host_type", host_type)
203
169
  pulumi.set(__self__, "provisioning_state", provisioning_state)
204
170
 
205
171
  @property
@@ -218,14 +184,6 @@ class PublicCloudConnectorPropertiesResponse(dict):
218
184
  """
219
185
  return pulumi.get(self, "connector_primary_identifier")
220
186
 
221
- @property
222
- @pulumi.getter(name="hostType")
223
- def host_type(self) -> str:
224
- """
225
- Host cloud the public cloud connector.
226
- """
227
- return pulumi.get(self, "host_type")
228
-
229
187
  @property
230
188
  @pulumi.getter(name="provisioningState")
231
189
  def provisioning_state(self) -> str:
@@ -32,12 +32,8 @@ class AwsCloudProfileResponse(dict):
32
32
  @staticmethod
33
33
  def __key_warning(key: str):
34
34
  suggest = None
35
- if key == "accountId":
36
- suggest = "account_id"
37
- elif key == "excludedAccounts":
35
+ if key == "excludedAccounts":
38
36
  suggest = "excluded_accounts"
39
- elif key == "isOrganizationalAccount":
40
- suggest = "is_organizational_account"
41
37
 
42
38
  if suggest:
43
39
  pulumi.log.warn(f"Key '{key}' not found in AwsCloudProfileResponse. Access the value via the '{suggest}' property getter instead.")
@@ -51,30 +47,13 @@ class AwsCloudProfileResponse(dict):
51
47
  return super().get(key, default)
52
48
 
53
49
  def __init__(__self__, *,
54
- account_id: str,
55
- excluded_accounts: Optional[Sequence[str]] = None,
56
- is_organizational_account: Optional[bool] = None):
50
+ excluded_accounts: Optional[Sequence[str]] = None):
57
51
  """
58
52
  cloud profile for AWS.
59
- :param str account_id: Account id for the AWS account.
60
53
  :param Sequence[str] excluded_accounts: List of AWS accounts which need to be excluded.
61
- :param bool is_organizational_account: Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
62
54
  """
63
- pulumi.set(__self__, "account_id", account_id)
64
55
  if excluded_accounts is not None:
65
56
  pulumi.set(__self__, "excluded_accounts", excluded_accounts)
66
- if is_organizational_account is None:
67
- is_organizational_account = False
68
- if is_organizational_account is not None:
69
- pulumi.set(__self__, "is_organizational_account", is_organizational_account)
70
-
71
- @property
72
- @pulumi.getter(name="accountId")
73
- def account_id(self) -> str:
74
- """
75
- Account id for the AWS account.
76
- """
77
- return pulumi.get(self, "account_id")
78
57
 
79
58
  @property
80
59
  @pulumi.getter(name="excludedAccounts")
@@ -84,14 +63,6 @@ class AwsCloudProfileResponse(dict):
84
63
  """
85
64
  return pulumi.get(self, "excluded_accounts")
86
65
 
87
- @property
88
- @pulumi.getter(name="isOrganizationalAccount")
89
- def is_organizational_account(self) -> Optional[bool]:
90
- """
91
- Boolean value that indicates whether the account is organizational or not. True represents organization account, whereas false represents a single account.
92
- """
93
- return pulumi.get(self, "is_organizational_account")
94
-
95
66
 
96
67
  @pulumi.output_type
97
68
  class EndpointPropertiesResponse(dict):
@@ -169,8 +140,6 @@ class PublicCloudConnectorPropertiesResponse(dict):
169
140
  suggest = "aws_cloud_profile"
170
141
  elif key == "connectorPrimaryIdentifier":
171
142
  suggest = "connector_primary_identifier"
172
- elif key == "hostType":
173
- suggest = "host_type"
174
143
  elif key == "provisioningState":
175
144
  suggest = "provisioning_state"
176
145
 
@@ -188,18 +157,15 @@ class PublicCloudConnectorPropertiesResponse(dict):
188
157
  def __init__(__self__, *,
189
158
  aws_cloud_profile: 'outputs.AwsCloudProfileResponse',
190
159
  connector_primary_identifier: str,
191
- host_type: str,
192
160
  provisioning_state: str):
193
161
  """
194
162
  Properties of public cloud connectors.
195
163
  :param 'AwsCloudProfileResponse' aws_cloud_profile: Cloud profile for AWS.
196
164
  :param str connector_primary_identifier: Connector primary identifier.
197
- :param str host_type: Host cloud the public cloud connector.
198
165
  :param str provisioning_state: The resource provisioning state.
199
166
  """
200
167
  pulumi.set(__self__, "aws_cloud_profile", aws_cloud_profile)
201
168
  pulumi.set(__self__, "connector_primary_identifier", connector_primary_identifier)
202
- pulumi.set(__self__, "host_type", host_type)
203
169
  pulumi.set(__self__, "provisioning_state", provisioning_state)
204
170
 
205
171
  @property
@@ -218,14 +184,6 @@ class PublicCloudConnectorPropertiesResponse(dict):
218
184
  """
219
185
  return pulumi.get(self, "connector_primary_identifier")
220
186
 
221
- @property
222
- @pulumi.getter(name="hostType")
223
- def host_type(self) -> str:
224
- """
225
- Host cloud the public cloud connector.
226
- """
227
- return pulumi.get(self, "host_type")
228
-
229
187
  @property
230
188
  @pulumi.getter(name="provisioningState")
231
189
  def provisioning_state(self) -> str:
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "azure-native",
4
- "version": "2.66.0"
4
+ "version": "2.66.0-alpha.1728396986"
5
5
  }
@@ -5508,7 +5508,11 @@ if not MYPY:
5508
5508
  """
5509
5509
  name: pulumi.Input[str]
5510
5510
  """
5511
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5511
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5512
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5513
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5514
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5515
+ Available for CloudPosture and Containers plans.
5512
5516
  """
5513
5517
  additional_extension_properties: NotRequired[Any]
5514
5518
  """
@@ -5526,7 +5530,11 @@ class ExtensionArgs:
5526
5530
  """
5527
5531
  A plan's extension properties
5528
5532
  :param pulumi.Input[Union[str, 'IsEnabled']] is_enabled: Indicates whether the extension is enabled.
5529
- :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5533
+ :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5534
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5535
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5536
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5537
+ Available for CloudPosture and Containers plans.
5530
5538
  :param Any additional_extension_properties: Property values associated with the extension.
5531
5539
  """
5532
5540
  pulumi.set(__self__, "is_enabled", is_enabled)
@@ -5550,7 +5558,11 @@ class ExtensionArgs:
5550
5558
  @pulumi.getter
5551
5559
  def name(self) -> pulumi.Input[str]:
5552
5560
  """
5553
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5561
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5562
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5563
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5564
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5565
+ Available for CloudPosture and Containers plans.
5554
5566
  """
5555
5567
  return pulumi.get(self, "name")
5556
5568
 
@@ -5485,7 +5485,11 @@ class ExtensionResponse(dict):
5485
5485
  """
5486
5486
  A plan's extension properties
5487
5487
  :param str is_enabled: Indicates whether the extension is enabled.
5488
- :param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5488
+ :param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5489
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5490
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5491
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5492
+ Available for CloudPosture and Containers plans.
5489
5493
  :param 'OperationStatusResponse' operation_status: Optional. A status describing the success/failure of the extension's enablement/disablement operation.
5490
5494
  :param Any additional_extension_properties: Property values associated with the extension.
5491
5495
  """
@@ -5507,7 +5511,11 @@ class ExtensionResponse(dict):
5507
5511
  @pulumi.getter
5508
5512
  def name(self) -> str:
5509
5513
  """
5510
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
5514
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
5515
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
5516
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
5517
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
5518
+ Available for CloudPosture and Containers plans.
5511
5519
  """
5512
5520
  return pulumi.get(self, "name")
5513
5521
 
@@ -33,7 +33,11 @@ if not MYPY:
33
33
  """
34
34
  name: pulumi.Input[str]
35
35
  """
36
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
36
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
37
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
38
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
39
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
40
+ Available for CloudPosture and Containers plans.
37
41
  """
38
42
  additional_extension_properties: NotRequired[Any]
39
43
  """
@@ -51,7 +55,11 @@ class ExtensionArgs:
51
55
  """
52
56
  A plan's extension properties
53
57
  :param pulumi.Input[Union[str, 'IsEnabled']] is_enabled: Indicates whether the extension is enabled.
54
- :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
58
+ :param pulumi.Input[str] name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
59
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
60
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
61
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
62
+ Available for CloudPosture and Containers plans.
55
63
  :param Any additional_extension_properties: Property values associated with the extension.
56
64
  """
57
65
  pulumi.set(__self__, "is_enabled", is_enabled)
@@ -75,7 +83,11 @@ class ExtensionArgs:
75
83
  @pulumi.getter
76
84
  def name(self) -> pulumi.Input[str]:
77
85
  """
78
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
86
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
87
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
88
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
89
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
90
+ Available for CloudPosture and Containers plans.
79
91
  """
80
92
  return pulumi.get(self, "name")
81
93
 
@@ -55,7 +55,11 @@ class ExtensionResponse(dict):
55
55
  """
56
56
  A plan's extension properties
57
57
  :param str is_enabled: Indicates whether the extension is enabled.
58
- :param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
58
+ :param str name: The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
59
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
60
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
61
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
62
+ Available for CloudPosture and Containers plans.
59
63
  :param 'OperationStatusResponse' operation_status: Optional. A status describing the success/failure of the extension's enablement/disablement operation.
60
64
  :param Any additional_extension_properties: Property values associated with the extension.
61
65
  """
@@ -77,7 +81,11 @@ class ExtensionResponse(dict):
77
81
  @pulumi.getter
78
82
  def name(self) -> str:
79
83
  """
80
- The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - Provides zero footprint, API-based discovery of Kubernetes clusters, their configurations and deployments. The collected data is used to create a contextualized security graph for Kubernetes clusters, provide risk hunting capabilities, and visualize risks and threats to Kubernetes environments and workloads.<br>Available for CloudPosture plan and Containers plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plans).<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.<br>Available for StorageAccounts plan (DefenderForStorageV2 sub plan) and CloudPosture plan.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.<br>Available for CloudPosture plan and Containers plan.<br><br>**MdeDesignatedSubscription** - Direct onboarding is a seamless integration between Defender for Endpoint and Defender for Cloud that doesn’t require extra software deployment on your servers. The onboarded resources will be presented under a designated Azure Subscription you configure<br>Available for VirtualMachines plan (P1 and P2 sub plans).<br><br>**AgentlessVmScanning** - Scans your machines for installed software, vulnerabilities, malware and secret scanning without relying on agents or impacting machine performance. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-agentless-data-collection.<br>Available for CloudPosture plan, VirtualMachines plan (P2 sub plan) and Containers plan.<br><br>**EntraPermissionsManagement** - Permissions Management provides Cloud Infrastructure Entitlement Management (CIEM) capabilities that helps organizations to manage and control user access and entitlements in their cloud infrastructure - important attack vector for cloud environments.<br>Permissions Management analyzes all permissions and active usage, and suggests recommendations to reduce permissions to enforce the principle of least privilege. Learn more here https://learn.microsoft.com/en-us/azure/defender-for-cloud/permissions-management.<br>Available for CloudPosture plan. <br><br>**FileIntegrityMonitoring** - File integrity monitoring (FIM), examines operating system files.<br>Windows registries, Linux system files, in real time, for changes that might indicate an attack.<br>Available for VirtualMachines plan (P2 sub plan). <br><br>**ContainerSensor** - The sensor is based on IG and provides a rich threat detection suite for Kubernetes clusters, nodes, and workloads, powered by Microsoft leading threat intelligence, provides mapping to MITRE ATT&CK framework.<br>Available for Containers plan. <br><br>**AIPromptEvidence** - Exposes the prompts passed between the user and the AI model as alert evidence. This helps classify and triage the alerts with relevant user context. The prompt snippets will include only segments of the user prompt or model response that were deemed suspicious and relevant for security classifications. The prompt evidence will be available through Defender portal as part of each alert.<br>Available for AI plan. <br><br>
84
+ The extension name. Supported values are: <br><br>**AgentlessDiscoveryForKubernetes** - API-based discovery of information about Kubernetes cluster architecture, workload objects, and setup. Required for Kubernetes inventory, identity and network exposure detection, attack path analysis and risk hunting as part of the cloud security explorer.
85
+ Available for CloudPosture plan.<br><br>**OnUploadMalwareScanning** - Limits the GB to be scanned per month for each storage account within the subscription. Once this limit reached on a given storage account, Blobs won't be scanned during current calendar month.
86
+ Available for StorageAccounts plan.<br><br>**SensitiveDataDiscovery** - Sensitive data discovery identifies Blob storage container with sensitive data such as credentials, credit cards, and more, to help prioritize and investigate security events.
87
+ Available for StorageAccounts and CloudPosture plans.<br><br>**ContainerRegistriesVulnerabilityAssessments** - Provides vulnerability management for images stored in your container registries.
88
+ Available for CloudPosture and Containers plans.
81
89
  """
82
90
  return pulumi.get(self, "name")
83
91
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_azure_native
3
- Version: 2.66.0
3
+ Version: 2.66.0a1728396986
4
4
  Summary: A native Pulumi package for creating and managing Azure resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.com