pulumi-oci 2.5.0a1722062014__py3-none-any.whl → 2.6.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +91 -32
- pulumi_oci/bigdataservice/_inputs.py +157 -14
- pulumi_oci/bigdataservice/bds_instance.py +175 -0
- pulumi_oci/bigdataservice/bds_instance_patch_action.py +64 -3
- pulumi_oci/bigdataservice/get_bds_instance.py +41 -1
- pulumi_oci/bigdataservice/outputs.py +264 -30
- pulumi_oci/core/__init__.py +3 -0
- pulumi_oci/core/_inputs.py +40 -0
- pulumi_oci/core/get_instance_maintenance_event.py +414 -0
- pulumi_oci/core/get_instance_maintenance_events.py +250 -0
- pulumi_oci/core/instance_maintenance_event.py +1022 -0
- pulumi_oci/core/outputs.py +314 -0
- pulumi_oci/database/autonomous_database.py +28 -0
- pulumi_oci/database/get_autonomous_database.py +14 -1
- pulumi_oci/database/outputs.py +22 -0
- pulumi_oci/databasemigration/_inputs.py +184 -0
- pulumi_oci/databasemigration/job.py +99 -24
- pulumi_oci/databasemigration/outputs.py +171 -0
- pulumi_oci/datasafe/__init__.py +2 -4
- pulumi_oci/datasafe/_inputs.py +55 -0
- pulumi_oci/datasafe/alert.py +56 -0
- pulumi_oci/datasafe/alert_policy.py +745 -0
- pulumi_oci/datasafe/alert_policy_rule.py +446 -0
- pulumi_oci/datasafe/get_alert.py +27 -1
- pulumi_oci/datasafe/get_alert_policy.py +26 -2
- pulumi_oci/datasafe/get_alert_policy_rule.py +94 -18
- pulumi_oci/datasafe/get_report.py +14 -1
- pulumi_oci/datasafe/get_report_definition.py +14 -1
- pulumi_oci/datasafe/get_target_alert_policy_association.py +15 -2
- pulumi_oci/datasafe/outputs.py +231 -27
- pulumi_oci/datasafe/report.py +28 -0
- pulumi_oci/datasafe/report_definition.py +28 -0
- pulumi_oci/datasafe/target_alert_policy_association.py +28 -0
- pulumi_oci/devops/__init__.py +6 -0
- pulumi_oci/devops/_inputs.py +531 -32
- pulumi_oci/devops/get_build_runs.py +0 -5
- pulumi_oci/devops/get_project_repository_setting.py +129 -0
- pulumi_oci/devops/get_repositories.py +1 -1
- pulumi_oci/devops/get_repository.py +17 -4
- pulumi_oci/devops/get_repository_diffs.py +20 -3
- pulumi_oci/devops/get_repository_protected_branches.py +150 -0
- pulumi_oci/devops/get_repository_ref.py +2 -2
- pulumi_oci/devops/get_repository_setting.py +142 -0
- pulumi_oci/devops/get_triggers.py +0 -5
- pulumi_oci/devops/outputs.py +1216 -180
- pulumi_oci/devops/project_repository_setting.py +338 -0
- pulumi_oci/devops/repository.py +66 -75
- pulumi_oci/devops/repository_protected_branch_management.py +333 -0
- pulumi_oci/devops/repository_ref.py +2 -2
- pulumi_oci/devops/repository_setting.py +391 -0
- pulumi_oci/fleetsoftwareupdate/__init__.py +15 -0
- pulumi_oci/fleetsoftwareupdate/_inputs.py +553 -0
- pulumi_oci/fleetsoftwareupdate/fsu_collection.py +514 -0
- pulumi_oci/fleetsoftwareupdate/fsu_cycle.py +812 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_collection.py +225 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_collections.py +141 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_cycle.py +325 -0
- pulumi_oci/fleetsoftwareupdate/get_fsu_cycles.py +167 -0
- pulumi_oci/fleetsoftwareupdate/outputs.py +1481 -0
- pulumi_oci/generativeai/get_dedicated_ai_cluster.py +3 -0
- pulumi_oci/generativeai/get_dedicated_ai_clusters.py +3 -0
- pulumi_oci/generativeai/get_endpoint.py +6 -9
- pulumi_oci/generativeai/get_endpoints.py +3 -3
- pulumi_oci/generativeai/get_model.py +36 -6
- pulumi_oci/generativeai/get_models.py +6 -0
- pulumi_oci/generativeai/outputs.py +228 -16
- pulumi_oci/identity/__init__.py +3 -0
- pulumi_oci/identity/_inputs.py +1029 -0
- pulumi_oci/identity/domains_social_identity_provider.py +4628 -0
- pulumi_oci/identity/get_domains_social_identity_provider.py +664 -0
- pulumi_oci/identity/get_domains_social_identity_providers.py +276 -0
- pulumi_oci/identity/outputs.py +19544 -17378
- pulumi_oci/jms/__init__.py +4 -0
- pulumi_oci/jms/_inputs.py +80 -0
- pulumi_oci/jms/get_agent_installers.py +190 -0
- pulumi_oci/jms/get_fleet_blocklists.py +2 -2
- pulumi_oci/jms/get_fleet_crypto_analysis_result.py +29 -3
- pulumi_oci/jms/get_fleet_crypto_analysis_results.py +97 -3
- pulumi_oci/jms/get_fleet_export_setting.py +3 -3
- pulumi_oci/jms/get_fleet_export_status.py +2 -2
- pulumi_oci/jms/get_fleet_java_migration_analysis_result.py +2 -2
- pulumi_oci/jms/get_fleet_java_migration_analysis_results.py +45 -5
- pulumi_oci/jms/get_fleet_performance_tuning_analysis_result.py +4 -4
- pulumi_oci/jms/get_fleet_performance_tuning_analysis_results.py +25 -5
- pulumi_oci/jms/get_fleets.py +2 -2
- pulumi_oci/jms/get_installation_site.py +4 -4
- pulumi_oci/jms/get_installation_sites.py +4 -4
- pulumi_oci/jms/get_java_downloads_java_download_tokens.py +2 -2
- pulumi_oci/jms/get_java_downloads_java_license_acceptance_records.py +2 -2
- pulumi_oci/jms/get_java_family.py +14 -1
- pulumi_oci/jms/get_jms_plugin.py +313 -0
- pulumi_oci/jms/get_jms_plugins.py +291 -0
- pulumi_oci/jms/jms_plugin.py +731 -0
- pulumi_oci/jms/outputs.py +488 -32
- pulumi_oci/networkfirewall/__init__.py +3 -0
- pulumi_oci/networkfirewall/_inputs.py +150 -0
- pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rule.py +227 -0
- pulumi_oci/networkfirewall/get_network_firewall_policy_tunnel_inspection_rules.py +167 -0
- pulumi_oci/networkfirewall/network_firewall_policy_tunnel_inspection_rule.py +605 -0
- pulumi_oci/networkfirewall/outputs.py +457 -0
- pulumi_oci/osmanagementhub/get_software_source.py +19 -1
- pulumi_oci/osmanagementhub/software_source.py +82 -0
- pulumi_oci/psql/_inputs.py +8 -4
- pulumi_oci/psql/backup.py +4 -4
- pulumi_oci/psql/configuration.py +141 -38
- pulumi_oci/psql/db_system.py +53 -55
- pulumi_oci/psql/get_backup.py +1 -1
- pulumi_oci/psql/get_configuration.py +27 -1
- pulumi_oci/psql/get_configurations.py +2 -2
- pulumi_oci/psql/get_default_configuration.py +15 -2
- pulumi_oci/psql/get_default_configurations.py +2 -2
- pulumi_oci/psql/outputs.py +176 -13
- pulumi_oci/pulumi-plugin.json +1 -1
- pulumi_oci/redis/get_redis_cluster.py +1 -1
- pulumi_oci/redis/outputs.py +2 -2
- pulumi_oci/redis/redis_cluster.py +7 -7
- pulumi_oci/stackmonitoring/_inputs.py +2 -2
- pulumi_oci/stackmonitoring/baselineable_metric.py +76 -28
- pulumi_oci/stackmonitoring/get_baselineable_metric.py +14 -1
- pulumi_oci/stackmonitoring/get_baselineable_metrics.py +45 -5
- pulumi_oci/stackmonitoring/outputs.py +19 -8
- {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/METADATA +1 -1
- {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/RECORD +125 -99
- {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/WHEEL +1 -1
- pulumi_oci/datasafe/masking_policy_health_report_management.py +0 -453
- pulumi_oci/datasafe/masking_report_management.py +0 -693
- pulumi_oci/datasafe/set_security_assessment_baseline_management.py +0 -304
- pulumi_oci/datasafe/set_user_assessment_baseline_management.py +0 -304
- {pulumi_oci-2.5.0a1722062014.dist-info → pulumi_oci-2.6.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,605 @@
|
|
1
|
+
# coding=utf-8
|
2
|
+
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
+
|
5
|
+
import copy
|
6
|
+
import warnings
|
7
|
+
import pulumi
|
8
|
+
import pulumi.runtime
|
9
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
10
|
+
from .. import _utilities
|
11
|
+
from . import outputs
|
12
|
+
from ._inputs import *
|
13
|
+
|
14
|
+
__all__ = ['NetworkFirewallPolicyTunnelInspectionRuleArgs', 'NetworkFirewallPolicyTunnelInspectionRule']
|
15
|
+
|
16
|
+
@pulumi.input_type
|
17
|
+
class NetworkFirewallPolicyTunnelInspectionRuleArgs:
|
18
|
+
def __init__(__self__, *,
|
19
|
+
condition: pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs'],
|
20
|
+
network_firewall_policy_id: pulumi.Input[str],
|
21
|
+
protocol: pulumi.Input[str],
|
22
|
+
action: Optional[pulumi.Input[str]] = None,
|
23
|
+
name: Optional[pulumi.Input[str]] = None,
|
24
|
+
position: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] = None,
|
25
|
+
profile: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] = None):
|
26
|
+
"""
|
27
|
+
The set of arguments for constructing a NetworkFirewallPolicyTunnelInspectionRule resource.
|
28
|
+
:param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs'] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
29
|
+
:param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
|
30
|
+
:param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
|
31
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
32
|
+
|
33
|
+
|
34
|
+
** IMPORTANT **
|
35
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
36
|
+
:param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
|
37
|
+
* INSPECT - Inspect the traffic.
|
38
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
39
|
+
:param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
|
40
|
+
:param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs'] position: (Updatable) An object which defines the position of the rule.
|
41
|
+
:param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs'] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
42
|
+
"""
|
43
|
+
pulumi.set(__self__, "condition", condition)
|
44
|
+
pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
|
45
|
+
pulumi.set(__self__, "protocol", protocol)
|
46
|
+
if action is not None:
|
47
|
+
pulumi.set(__self__, "action", action)
|
48
|
+
if name is not None:
|
49
|
+
pulumi.set(__self__, "name", name)
|
50
|
+
if position is not None:
|
51
|
+
pulumi.set(__self__, "position", position)
|
52
|
+
if profile is not None:
|
53
|
+
pulumi.set(__self__, "profile", profile)
|
54
|
+
|
55
|
+
@property
|
56
|
+
@pulumi.getter
|
57
|
+
def condition(self) -> pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']:
|
58
|
+
"""
|
59
|
+
(Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
60
|
+
"""
|
61
|
+
return pulumi.get(self, "condition")
|
62
|
+
|
63
|
+
@condition.setter
|
64
|
+
def condition(self, value: pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']):
|
65
|
+
pulumi.set(self, "condition", value)
|
66
|
+
|
67
|
+
@property
|
68
|
+
@pulumi.getter(name="networkFirewallPolicyId")
|
69
|
+
def network_firewall_policy_id(self) -> pulumi.Input[str]:
|
70
|
+
"""
|
71
|
+
Unique Network Firewall Policy identifier
|
72
|
+
"""
|
73
|
+
return pulumi.get(self, "network_firewall_policy_id")
|
74
|
+
|
75
|
+
@network_firewall_policy_id.setter
|
76
|
+
def network_firewall_policy_id(self, value: pulumi.Input[str]):
|
77
|
+
pulumi.set(self, "network_firewall_policy_id", value)
|
78
|
+
|
79
|
+
@property
|
80
|
+
@pulumi.getter
|
81
|
+
def protocol(self) -> pulumi.Input[str]:
|
82
|
+
"""
|
83
|
+
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
|
84
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
85
|
+
|
86
|
+
|
87
|
+
** IMPORTANT **
|
88
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
89
|
+
"""
|
90
|
+
return pulumi.get(self, "protocol")
|
91
|
+
|
92
|
+
@protocol.setter
|
93
|
+
def protocol(self, value: pulumi.Input[str]):
|
94
|
+
pulumi.set(self, "protocol", value)
|
95
|
+
|
96
|
+
@property
|
97
|
+
@pulumi.getter
|
98
|
+
def action(self) -> Optional[pulumi.Input[str]]:
|
99
|
+
"""
|
100
|
+
(Updatable) Types of Inspect Action on the traffic flow.
|
101
|
+
* INSPECT - Inspect the traffic.
|
102
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
103
|
+
"""
|
104
|
+
return pulumi.get(self, "action")
|
105
|
+
|
106
|
+
@action.setter
|
107
|
+
def action(self, value: Optional[pulumi.Input[str]]):
|
108
|
+
pulumi.set(self, "action", value)
|
109
|
+
|
110
|
+
@property
|
111
|
+
@pulumi.getter
|
112
|
+
def name(self) -> Optional[pulumi.Input[str]]:
|
113
|
+
"""
|
114
|
+
Name for the Tunnel Inspection Rule, must be unique within the policy.
|
115
|
+
"""
|
116
|
+
return pulumi.get(self, "name")
|
117
|
+
|
118
|
+
@name.setter
|
119
|
+
def name(self, value: Optional[pulumi.Input[str]]):
|
120
|
+
pulumi.set(self, "name", value)
|
121
|
+
|
122
|
+
@property
|
123
|
+
@pulumi.getter
|
124
|
+
def position(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]:
|
125
|
+
"""
|
126
|
+
(Updatable) An object which defines the position of the rule.
|
127
|
+
"""
|
128
|
+
return pulumi.get(self, "position")
|
129
|
+
|
130
|
+
@position.setter
|
131
|
+
def position(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]):
|
132
|
+
pulumi.set(self, "position", value)
|
133
|
+
|
134
|
+
@property
|
135
|
+
@pulumi.getter
|
136
|
+
def profile(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]:
|
137
|
+
"""
|
138
|
+
(Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
139
|
+
"""
|
140
|
+
return pulumi.get(self, "profile")
|
141
|
+
|
142
|
+
@profile.setter
|
143
|
+
def profile(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]):
|
144
|
+
pulumi.set(self, "profile", value)
|
145
|
+
|
146
|
+
|
147
|
+
@pulumi.input_type
|
148
|
+
class _NetworkFirewallPolicyTunnelInspectionRuleState:
|
149
|
+
def __init__(__self__, *,
|
150
|
+
action: Optional[pulumi.Input[str]] = None,
|
151
|
+
condition: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']] = None,
|
152
|
+
name: Optional[pulumi.Input[str]] = None,
|
153
|
+
network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
|
154
|
+
parent_resource_id: Optional[pulumi.Input[str]] = None,
|
155
|
+
position: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] = None,
|
156
|
+
priority_order: Optional[pulumi.Input[str]] = None,
|
157
|
+
profile: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] = None,
|
158
|
+
protocol: Optional[pulumi.Input[str]] = None):
|
159
|
+
"""
|
160
|
+
Input properties used for looking up and filtering NetworkFirewallPolicyTunnelInspectionRule resources.
|
161
|
+
:param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
|
162
|
+
* INSPECT - Inspect the traffic.
|
163
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
164
|
+
:param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs'] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
165
|
+
:param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
|
166
|
+
:param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
|
167
|
+
:param pulumi.Input[str] parent_resource_id: OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
|
168
|
+
:param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs'] position: (Updatable) An object which defines the position of the rule.
|
169
|
+
:param pulumi.Input[str] priority_order: The priority order in which this rule should be evaluated
|
170
|
+
:param pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs'] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
171
|
+
:param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
|
172
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
173
|
+
|
174
|
+
|
175
|
+
** IMPORTANT **
|
176
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
177
|
+
"""
|
178
|
+
if action is not None:
|
179
|
+
pulumi.set(__self__, "action", action)
|
180
|
+
if condition is not None:
|
181
|
+
pulumi.set(__self__, "condition", condition)
|
182
|
+
if name is not None:
|
183
|
+
pulumi.set(__self__, "name", name)
|
184
|
+
if network_firewall_policy_id is not None:
|
185
|
+
pulumi.set(__self__, "network_firewall_policy_id", network_firewall_policy_id)
|
186
|
+
if parent_resource_id is not None:
|
187
|
+
pulumi.set(__self__, "parent_resource_id", parent_resource_id)
|
188
|
+
if position is not None:
|
189
|
+
pulumi.set(__self__, "position", position)
|
190
|
+
if priority_order is not None:
|
191
|
+
pulumi.set(__self__, "priority_order", priority_order)
|
192
|
+
if profile is not None:
|
193
|
+
pulumi.set(__self__, "profile", profile)
|
194
|
+
if protocol is not None:
|
195
|
+
pulumi.set(__self__, "protocol", protocol)
|
196
|
+
|
197
|
+
@property
|
198
|
+
@pulumi.getter
|
199
|
+
def action(self) -> Optional[pulumi.Input[str]]:
|
200
|
+
"""
|
201
|
+
(Updatable) Types of Inspect Action on the traffic flow.
|
202
|
+
* INSPECT - Inspect the traffic.
|
203
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
204
|
+
"""
|
205
|
+
return pulumi.get(self, "action")
|
206
|
+
|
207
|
+
@action.setter
|
208
|
+
def action(self, value: Optional[pulumi.Input[str]]):
|
209
|
+
pulumi.set(self, "action", value)
|
210
|
+
|
211
|
+
@property
|
212
|
+
@pulumi.getter
|
213
|
+
def condition(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]:
|
214
|
+
"""
|
215
|
+
(Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
216
|
+
"""
|
217
|
+
return pulumi.get(self, "condition")
|
218
|
+
|
219
|
+
@condition.setter
|
220
|
+
def condition(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]):
|
221
|
+
pulumi.set(self, "condition", value)
|
222
|
+
|
223
|
+
@property
|
224
|
+
@pulumi.getter
|
225
|
+
def name(self) -> Optional[pulumi.Input[str]]:
|
226
|
+
"""
|
227
|
+
Name for the Tunnel Inspection Rule, must be unique within the policy.
|
228
|
+
"""
|
229
|
+
return pulumi.get(self, "name")
|
230
|
+
|
231
|
+
@name.setter
|
232
|
+
def name(self, value: Optional[pulumi.Input[str]]):
|
233
|
+
pulumi.set(self, "name", value)
|
234
|
+
|
235
|
+
@property
|
236
|
+
@pulumi.getter(name="networkFirewallPolicyId")
|
237
|
+
def network_firewall_policy_id(self) -> Optional[pulumi.Input[str]]:
|
238
|
+
"""
|
239
|
+
Unique Network Firewall Policy identifier
|
240
|
+
"""
|
241
|
+
return pulumi.get(self, "network_firewall_policy_id")
|
242
|
+
|
243
|
+
@network_firewall_policy_id.setter
|
244
|
+
def network_firewall_policy_id(self, value: Optional[pulumi.Input[str]]):
|
245
|
+
pulumi.set(self, "network_firewall_policy_id", value)
|
246
|
+
|
247
|
+
@property
|
248
|
+
@pulumi.getter(name="parentResourceId")
|
249
|
+
def parent_resource_id(self) -> Optional[pulumi.Input[str]]:
|
250
|
+
"""
|
251
|
+
OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
|
252
|
+
"""
|
253
|
+
return pulumi.get(self, "parent_resource_id")
|
254
|
+
|
255
|
+
@parent_resource_id.setter
|
256
|
+
def parent_resource_id(self, value: Optional[pulumi.Input[str]]):
|
257
|
+
pulumi.set(self, "parent_resource_id", value)
|
258
|
+
|
259
|
+
@property
|
260
|
+
@pulumi.getter
|
261
|
+
def position(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]:
|
262
|
+
"""
|
263
|
+
(Updatable) An object which defines the position of the rule.
|
264
|
+
"""
|
265
|
+
return pulumi.get(self, "position")
|
266
|
+
|
267
|
+
@position.setter
|
268
|
+
def position(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]):
|
269
|
+
pulumi.set(self, "position", value)
|
270
|
+
|
271
|
+
@property
|
272
|
+
@pulumi.getter(name="priorityOrder")
|
273
|
+
def priority_order(self) -> Optional[pulumi.Input[str]]:
|
274
|
+
"""
|
275
|
+
The priority order in which this rule should be evaluated
|
276
|
+
"""
|
277
|
+
return pulumi.get(self, "priority_order")
|
278
|
+
|
279
|
+
@priority_order.setter
|
280
|
+
def priority_order(self, value: Optional[pulumi.Input[str]]):
|
281
|
+
pulumi.set(self, "priority_order", value)
|
282
|
+
|
283
|
+
@property
|
284
|
+
@pulumi.getter
|
285
|
+
def profile(self) -> Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]:
|
286
|
+
"""
|
287
|
+
(Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
288
|
+
"""
|
289
|
+
return pulumi.get(self, "profile")
|
290
|
+
|
291
|
+
@profile.setter
|
292
|
+
def profile(self, value: Optional[pulumi.Input['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]):
|
293
|
+
pulumi.set(self, "profile", value)
|
294
|
+
|
295
|
+
@property
|
296
|
+
@pulumi.getter
|
297
|
+
def protocol(self) -> Optional[pulumi.Input[str]]:
|
298
|
+
"""
|
299
|
+
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
|
300
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
301
|
+
|
302
|
+
|
303
|
+
** IMPORTANT **
|
304
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
305
|
+
"""
|
306
|
+
return pulumi.get(self, "protocol")
|
307
|
+
|
308
|
+
@protocol.setter
|
309
|
+
def protocol(self, value: Optional[pulumi.Input[str]]):
|
310
|
+
pulumi.set(self, "protocol", value)
|
311
|
+
|
312
|
+
|
313
|
+
class NetworkFirewallPolicyTunnelInspectionRule(pulumi.CustomResource):
|
314
|
+
@overload
|
315
|
+
def __init__(__self__,
|
316
|
+
resource_name: str,
|
317
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
318
|
+
action: Optional[pulumi.Input[str]] = None,
|
319
|
+
condition: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]] = None,
|
320
|
+
name: Optional[pulumi.Input[str]] = None,
|
321
|
+
network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
|
322
|
+
position: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]] = None,
|
323
|
+
profile: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]] = None,
|
324
|
+
protocol: Optional[pulumi.Input[str]] = None,
|
325
|
+
__props__=None):
|
326
|
+
"""
|
327
|
+
This resource provides the Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
|
328
|
+
|
329
|
+
Creates a new tunnel inspection rule for the network firewall policy.
|
330
|
+
|
331
|
+
## Example Usage
|
332
|
+
|
333
|
+
```python
|
334
|
+
import pulumi
|
335
|
+
import pulumi_oci as oci
|
336
|
+
|
337
|
+
test_network_firewall_policy_tunnel_inspection_rule = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule",
|
338
|
+
condition=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs(
|
339
|
+
destination_addresses=network_firewall_policy_tunnel_inspection_rule_condition_destination_address,
|
340
|
+
source_addresses=network_firewall_policy_tunnel_inspection_rule_condition_source_address,
|
341
|
+
),
|
342
|
+
name=network_firewall_policy_tunnel_inspection_rule_name,
|
343
|
+
network_firewall_policy_id=test_network_firewall_policy["id"],
|
344
|
+
protocol=network_firewall_policy_tunnel_inspection_rule_protocol,
|
345
|
+
action=network_firewall_policy_tunnel_inspection_rule_action,
|
346
|
+
position=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs(
|
347
|
+
after_rule=network_firewall_policy_tunnel_inspection_rule_position_after_rule,
|
348
|
+
before_rule=network_firewall_policy_tunnel_inspection_rule_position_before_rule,
|
349
|
+
),
|
350
|
+
profile=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs(
|
351
|
+
must_return_traffic_to_source=network_firewall_policy_tunnel_inspection_rule_profile_must_return_traffic_to_source,
|
352
|
+
))
|
353
|
+
```
|
354
|
+
|
355
|
+
## Import
|
356
|
+
|
357
|
+
NetworkFirewallPolicyTunnelInspectionRules can be imported using the `id`, e.g.
|
358
|
+
|
359
|
+
```sh
|
360
|
+
$ pulumi import oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule test_network_firewall_policy_tunnel_inspection_rule "networkFirewallPolicies/{networkFirewallPolicyId}/tunnelInspectionRules/{tunnelInspectionRuleName}"
|
361
|
+
```
|
362
|
+
|
363
|
+
:param str resource_name: The name of the resource.
|
364
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
365
|
+
:param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
|
366
|
+
* INSPECT - Inspect the traffic.
|
367
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
368
|
+
:param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
369
|
+
:param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
|
370
|
+
:param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
|
371
|
+
:param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] position: (Updatable) An object which defines the position of the rule.
|
372
|
+
:param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
373
|
+
:param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
|
374
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
375
|
+
|
376
|
+
|
377
|
+
** IMPORTANT **
|
378
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
379
|
+
"""
|
380
|
+
...
|
381
|
+
@overload
|
382
|
+
def __init__(__self__,
|
383
|
+
resource_name: str,
|
384
|
+
args: NetworkFirewallPolicyTunnelInspectionRuleArgs,
|
385
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
386
|
+
"""
|
387
|
+
This resource provides the Network Firewall Policy Tunnel Inspection Rule resource in Oracle Cloud Infrastructure Network Firewall service.
|
388
|
+
|
389
|
+
Creates a new tunnel inspection rule for the network firewall policy.
|
390
|
+
|
391
|
+
## Example Usage
|
392
|
+
|
393
|
+
```python
|
394
|
+
import pulumi
|
395
|
+
import pulumi_oci as oci
|
396
|
+
|
397
|
+
test_network_firewall_policy_tunnel_inspection_rule = oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRule("test_network_firewall_policy_tunnel_inspection_rule",
|
398
|
+
condition=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleConditionArgs(
|
399
|
+
destination_addresses=network_firewall_policy_tunnel_inspection_rule_condition_destination_address,
|
400
|
+
source_addresses=network_firewall_policy_tunnel_inspection_rule_condition_source_address,
|
401
|
+
),
|
402
|
+
name=network_firewall_policy_tunnel_inspection_rule_name,
|
403
|
+
network_firewall_policy_id=test_network_firewall_policy["id"],
|
404
|
+
protocol=network_firewall_policy_tunnel_inspection_rule_protocol,
|
405
|
+
action=network_firewall_policy_tunnel_inspection_rule_action,
|
406
|
+
position=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRulePositionArgs(
|
407
|
+
after_rule=network_firewall_policy_tunnel_inspection_rule_position_after_rule,
|
408
|
+
before_rule=network_firewall_policy_tunnel_inspection_rule_position_before_rule,
|
409
|
+
),
|
410
|
+
profile=oci.network_firewall.NetworkFirewallPolicyTunnelInspectionRuleProfileArgs(
|
411
|
+
must_return_traffic_to_source=network_firewall_policy_tunnel_inspection_rule_profile_must_return_traffic_to_source,
|
412
|
+
))
|
413
|
+
```
|
414
|
+
|
415
|
+
## Import
|
416
|
+
|
417
|
+
NetworkFirewallPolicyTunnelInspectionRules can be imported using the `id`, e.g.
|
418
|
+
|
419
|
+
```sh
|
420
|
+
$ pulumi import oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule test_network_firewall_policy_tunnel_inspection_rule "networkFirewallPolicies/{networkFirewallPolicyId}/tunnelInspectionRules/{tunnelInspectionRuleName}"
|
421
|
+
```
|
422
|
+
|
423
|
+
:param str resource_name: The name of the resource.
|
424
|
+
:param NetworkFirewallPolicyTunnelInspectionRuleArgs args: The arguments to use to populate this resource's properties.
|
425
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
426
|
+
"""
|
427
|
+
...
|
428
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
429
|
+
resource_args, opts = _utilities.get_resource_args_opts(NetworkFirewallPolicyTunnelInspectionRuleArgs, pulumi.ResourceOptions, *args, **kwargs)
|
430
|
+
if resource_args is not None:
|
431
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
432
|
+
else:
|
433
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
434
|
+
|
435
|
+
def _internal_init(__self__,
|
436
|
+
resource_name: str,
|
437
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
438
|
+
action: Optional[pulumi.Input[str]] = None,
|
439
|
+
condition: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]] = None,
|
440
|
+
name: Optional[pulumi.Input[str]] = None,
|
441
|
+
network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
|
442
|
+
position: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]] = None,
|
443
|
+
profile: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]] = None,
|
444
|
+
protocol: Optional[pulumi.Input[str]] = None,
|
445
|
+
__props__=None):
|
446
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
447
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
448
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
449
|
+
if opts.id is None:
|
450
|
+
if __props__ is not None:
|
451
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
452
|
+
__props__ = NetworkFirewallPolicyTunnelInspectionRuleArgs.__new__(NetworkFirewallPolicyTunnelInspectionRuleArgs)
|
453
|
+
|
454
|
+
__props__.__dict__["action"] = action
|
455
|
+
if condition is None and not opts.urn:
|
456
|
+
raise TypeError("Missing required property 'condition'")
|
457
|
+
__props__.__dict__["condition"] = condition
|
458
|
+
__props__.__dict__["name"] = name
|
459
|
+
if network_firewall_policy_id is None and not opts.urn:
|
460
|
+
raise TypeError("Missing required property 'network_firewall_policy_id'")
|
461
|
+
__props__.__dict__["network_firewall_policy_id"] = network_firewall_policy_id
|
462
|
+
__props__.__dict__["position"] = position
|
463
|
+
__props__.__dict__["profile"] = profile
|
464
|
+
if protocol is None and not opts.urn:
|
465
|
+
raise TypeError("Missing required property 'protocol'")
|
466
|
+
__props__.__dict__["protocol"] = protocol
|
467
|
+
__props__.__dict__["parent_resource_id"] = None
|
468
|
+
__props__.__dict__["priority_order"] = None
|
469
|
+
super(NetworkFirewallPolicyTunnelInspectionRule, __self__).__init__(
|
470
|
+
'oci:NetworkFirewall/networkFirewallPolicyTunnelInspectionRule:NetworkFirewallPolicyTunnelInspectionRule',
|
471
|
+
resource_name,
|
472
|
+
__props__,
|
473
|
+
opts)
|
474
|
+
|
475
|
+
@staticmethod
|
476
|
+
def get(resource_name: str,
|
477
|
+
id: pulumi.Input[str],
|
478
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
479
|
+
action: Optional[pulumi.Input[str]] = None,
|
480
|
+
condition: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']]] = None,
|
481
|
+
name: Optional[pulumi.Input[str]] = None,
|
482
|
+
network_firewall_policy_id: Optional[pulumi.Input[str]] = None,
|
483
|
+
parent_resource_id: Optional[pulumi.Input[str]] = None,
|
484
|
+
position: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']]] = None,
|
485
|
+
priority_order: Optional[pulumi.Input[str]] = None,
|
486
|
+
profile: Optional[pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']]] = None,
|
487
|
+
protocol: Optional[pulumi.Input[str]] = None) -> 'NetworkFirewallPolicyTunnelInspectionRule':
|
488
|
+
"""
|
489
|
+
Get an existing NetworkFirewallPolicyTunnelInspectionRule resource's state with the given name, id, and optional extra
|
490
|
+
properties used to qualify the lookup.
|
491
|
+
|
492
|
+
:param str resource_name: The unique name of the resulting resource.
|
493
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
494
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
495
|
+
:param pulumi.Input[str] action: (Updatable) Types of Inspect Action on the traffic flow.
|
496
|
+
* INSPECT - Inspect the traffic.
|
497
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
498
|
+
:param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleConditionArgs']] condition: (Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
499
|
+
:param pulumi.Input[str] name: Name for the Tunnel Inspection Rule, must be unique within the policy.
|
500
|
+
:param pulumi.Input[str] network_firewall_policy_id: Unique Network Firewall Policy identifier
|
501
|
+
:param pulumi.Input[str] parent_resource_id: OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
|
502
|
+
:param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRulePositionArgs']] position: (Updatable) An object which defines the position of the rule.
|
503
|
+
:param pulumi.Input[str] priority_order: The priority order in which this rule should be evaluated
|
504
|
+
:param pulumi.Input[pulumi.InputType['NetworkFirewallPolicyTunnelInspectionRuleProfileArgs']] profile: (Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
505
|
+
:param pulumi.Input[str] protocol: (Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
|
506
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
507
|
+
|
508
|
+
|
509
|
+
** IMPORTANT **
|
510
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
511
|
+
"""
|
512
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
513
|
+
|
514
|
+
__props__ = _NetworkFirewallPolicyTunnelInspectionRuleState.__new__(_NetworkFirewallPolicyTunnelInspectionRuleState)
|
515
|
+
|
516
|
+
__props__.__dict__["action"] = action
|
517
|
+
__props__.__dict__["condition"] = condition
|
518
|
+
__props__.__dict__["name"] = name
|
519
|
+
__props__.__dict__["network_firewall_policy_id"] = network_firewall_policy_id
|
520
|
+
__props__.__dict__["parent_resource_id"] = parent_resource_id
|
521
|
+
__props__.__dict__["position"] = position
|
522
|
+
__props__.__dict__["priority_order"] = priority_order
|
523
|
+
__props__.__dict__["profile"] = profile
|
524
|
+
__props__.__dict__["protocol"] = protocol
|
525
|
+
return NetworkFirewallPolicyTunnelInspectionRule(resource_name, opts=opts, __props__=__props__)
|
526
|
+
|
527
|
+
@property
|
528
|
+
@pulumi.getter
|
529
|
+
def action(self) -> pulumi.Output[str]:
|
530
|
+
"""
|
531
|
+
(Updatable) Types of Inspect Action on the traffic flow.
|
532
|
+
* INSPECT - Inspect the traffic.
|
533
|
+
* INSPECT_AND_CAPTURE_LOG - Inspect and capture logs for the traffic.
|
534
|
+
"""
|
535
|
+
return pulumi.get(self, "action")
|
536
|
+
|
537
|
+
@property
|
538
|
+
@pulumi.getter
|
539
|
+
def condition(self) -> pulumi.Output['outputs.NetworkFirewallPolicyTunnelInspectionRuleCondition']:
|
540
|
+
"""
|
541
|
+
(Updatable) Criteria to evaluate against incoming network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic.
|
542
|
+
"""
|
543
|
+
return pulumi.get(self, "condition")
|
544
|
+
|
545
|
+
@property
|
546
|
+
@pulumi.getter
|
547
|
+
def name(self) -> pulumi.Output[str]:
|
548
|
+
"""
|
549
|
+
Name for the Tunnel Inspection Rule, must be unique within the policy.
|
550
|
+
"""
|
551
|
+
return pulumi.get(self, "name")
|
552
|
+
|
553
|
+
@property
|
554
|
+
@pulumi.getter(name="networkFirewallPolicyId")
|
555
|
+
def network_firewall_policy_id(self) -> pulumi.Output[str]:
|
556
|
+
"""
|
557
|
+
Unique Network Firewall Policy identifier
|
558
|
+
"""
|
559
|
+
return pulumi.get(self, "network_firewall_policy_id")
|
560
|
+
|
561
|
+
@property
|
562
|
+
@pulumi.getter(name="parentResourceId")
|
563
|
+
def parent_resource_id(self) -> pulumi.Output[str]:
|
564
|
+
"""
|
565
|
+
OCID of the Network Firewall Policy this Tunnel Inspection Rule belongs to.
|
566
|
+
"""
|
567
|
+
return pulumi.get(self, "parent_resource_id")
|
568
|
+
|
569
|
+
@property
|
570
|
+
@pulumi.getter
|
571
|
+
def position(self) -> pulumi.Output['outputs.NetworkFirewallPolicyTunnelInspectionRulePosition']:
|
572
|
+
"""
|
573
|
+
(Updatable) An object which defines the position of the rule.
|
574
|
+
"""
|
575
|
+
return pulumi.get(self, "position")
|
576
|
+
|
577
|
+
@property
|
578
|
+
@pulumi.getter(name="priorityOrder")
|
579
|
+
def priority_order(self) -> pulumi.Output[str]:
|
580
|
+
"""
|
581
|
+
The priority order in which this rule should be evaluated
|
582
|
+
"""
|
583
|
+
return pulumi.get(self, "priority_order")
|
584
|
+
|
585
|
+
@property
|
586
|
+
@pulumi.getter
|
587
|
+
def profile(self) -> pulumi.Output['outputs.NetworkFirewallPolicyTunnelInspectionRuleProfile']:
|
588
|
+
"""
|
589
|
+
(Updatable) Vxlan Inspect profile used in Vxlan Tunnel Inspection Rules.
|
590
|
+
"""
|
591
|
+
return pulumi.get(self, "profile")
|
592
|
+
|
593
|
+
@property
|
594
|
+
@pulumi.getter
|
595
|
+
def protocol(self) -> pulumi.Output[str]:
|
596
|
+
"""
|
597
|
+
(Updatable) Types of Tunnel Inspection Protocol to be applied on the traffic.
|
598
|
+
* VXLAN - VXLAN Tunnel Inspection Protocol will be applied on the traffic.
|
599
|
+
|
600
|
+
|
601
|
+
** IMPORTANT **
|
602
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
603
|
+
"""
|
604
|
+
return pulumi.get(self, "protocol")
|
605
|
+
|