pulumi-splunk 1.3.0a1735837426__py3-none-any.whl → 1.3.0a1763793741__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_splunk/__init__.py +2 -1
- pulumi_splunk/_inputs.py +1275 -1275
- pulumi_splunk/_utilities.py +9 -5
- pulumi_splunk/admin_saml_groups.py +37 -36
- pulumi_splunk/apps_local.py +210 -209
- pulumi_splunk/authentication_users.py +156 -155
- pulumi_splunk/authorization_roles.py +224 -223
- pulumi_splunk/config/__init__.py +2 -1
- pulumi_splunk/config/__init__.pyi +3 -4
- pulumi_splunk/config/vars.py +9 -10
- pulumi_splunk/configs_conf.py +40 -39
- pulumi_splunk/data_ui_views.py +40 -39
- pulumi_splunk/generic_acl.py +23 -22
- pulumi_splunk/global_http_event_collector.py +122 -121
- pulumi_splunk/indexes.py +652 -651
- pulumi_splunk/inputs_http_event_collector.py +159 -158
- pulumi_splunk/inputs_monitor.py +261 -260
- pulumi_splunk/inputs_script.py +159 -158
- pulumi_splunk/inputs_tcp_cooked.py +91 -90
- pulumi_splunk/inputs_tcp_raw.py +176 -175
- pulumi_splunk/inputs_tcp_splunk_tcp_token.py +40 -39
- pulumi_splunk/inputs_tcp_ssl.py +88 -87
- pulumi_splunk/inputs_udp.py +193 -192
- pulumi_splunk/lookup_definition.py +40 -39
- pulumi_splunk/lookup_table_file.py +71 -70
- pulumi_splunk/outputs.py +857 -857
- pulumi_splunk/outputs_tcp_default.py +142 -141
- pulumi_splunk/outputs_tcp_group.py +176 -175
- pulumi_splunk/outputs_tcp_server.py +176 -175
- pulumi_splunk/outputs_tcp_syslog.py +125 -124
- pulumi_splunk/provider.py +94 -78
- pulumi_splunk/pulumi-plugin.json +1 -1
- pulumi_splunk/saved_searches.py +3099 -2886
- pulumi_splunk/sh_indexes_manager.py +74 -73
- {pulumi_splunk-1.3.0a1735837426.dist-info → pulumi_splunk-1.3.0a1763793741.dist-info}/METADATA +3 -3
- pulumi_splunk-1.3.0a1763793741.dist-info/RECORD +39 -0
- {pulumi_splunk-1.3.0a1735837426.dist-info → pulumi_splunk-1.3.0a1763793741.dist-info}/WHEEL +1 -1
- pulumi_splunk-1.3.0a1735837426.dist-info/RECORD +0 -39
- {pulumi_splunk-1.3.0a1735837426.dist-info → pulumi_splunk-1.3.0a1763793741.dist-info}/top_level.txt +0 -0
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
|
|
5
|
-
import
|
|
5
|
+
import builtins as _builtins
|
|
6
6
|
import warnings
|
|
7
7
|
import sys
|
|
8
8
|
import pulumi
|
|
@@ -22,32 +22,32 @@ __all__ = ['OutputsTcpServerArgs', 'OutputsTcpServer']
|
|
|
22
22
|
class OutputsTcpServerArgs:
|
|
23
23
|
def __init__(__self__, *,
|
|
24
24
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
25
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
26
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
27
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
28
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
29
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
30
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
31
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
32
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
33
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
34
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
|
|
25
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
26
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
31
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
33
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
35
35
|
"""
|
|
36
36
|
The set of arguments for constructing a OutputsTcpServer resource.
|
|
37
37
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
38
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
39
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
38
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
39
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
40
40
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
41
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
42
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
43
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
44
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
45
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
41
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
42
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
43
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
44
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
45
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
46
46
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
47
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
47
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
48
48
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
49
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
50
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
49
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
50
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
51
51
|
"""
|
|
52
52
|
if acl is not None:
|
|
53
53
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -72,7 +72,7 @@ class OutputsTcpServerArgs:
|
|
|
72
72
|
if ssl_verify_server_cert is not None:
|
|
73
73
|
pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
|
|
74
74
|
|
|
75
|
-
@property
|
|
75
|
+
@_builtins.property
|
|
76
76
|
@pulumi.getter
|
|
77
77
|
def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
|
|
78
78
|
"""
|
|
@@ -84,21 +84,21 @@ class OutputsTcpServerArgs:
|
|
|
84
84
|
def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
|
|
85
85
|
pulumi.set(self, "acl", value)
|
|
86
86
|
|
|
87
|
-
@property
|
|
87
|
+
@_builtins.property
|
|
88
88
|
@pulumi.getter
|
|
89
|
-
def disabled(self) -> Optional[pulumi.Input[bool]]:
|
|
89
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
90
90
|
"""
|
|
91
91
|
If true, disables the group.
|
|
92
92
|
"""
|
|
93
93
|
return pulumi.get(self, "disabled")
|
|
94
94
|
|
|
95
95
|
@disabled.setter
|
|
96
|
-
def disabled(self, value: Optional[pulumi.Input[bool]]):
|
|
96
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
97
97
|
pulumi.set(self, "disabled", value)
|
|
98
98
|
|
|
99
|
-
@property
|
|
99
|
+
@_builtins.property
|
|
100
100
|
@pulumi.getter
|
|
101
|
-
def method(self) -> Optional[pulumi.Input[str]]:
|
|
101
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
102
102
|
"""
|
|
103
103
|
Valid values: (clone | balance | autobalance)
|
|
104
104
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -106,60 +106,60 @@ class OutputsTcpServerArgs:
|
|
|
106
106
|
return pulumi.get(self, "method")
|
|
107
107
|
|
|
108
108
|
@method.setter
|
|
109
|
-
def method(self, value: Optional[pulumi.Input[str]]):
|
|
109
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
110
110
|
pulumi.set(self, "method", value)
|
|
111
111
|
|
|
112
|
-
@property
|
|
112
|
+
@_builtins.property
|
|
113
113
|
@pulumi.getter
|
|
114
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
114
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
115
115
|
"""
|
|
116
116
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
117
117
|
"""
|
|
118
118
|
return pulumi.get(self, "name")
|
|
119
119
|
|
|
120
120
|
@name.setter
|
|
121
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
121
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
122
122
|
pulumi.set(self, "name", value)
|
|
123
123
|
|
|
124
|
-
@property
|
|
124
|
+
@_builtins.property
|
|
125
125
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
126
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
126
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
127
127
|
"""
|
|
128
128
|
The alternate name to match in the remote server's SSL certificate.
|
|
129
129
|
"""
|
|
130
130
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
131
131
|
|
|
132
132
|
@ssl_alt_name_to_check.setter
|
|
133
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
133
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
134
134
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
135
135
|
|
|
136
|
-
@property
|
|
136
|
+
@_builtins.property
|
|
137
137
|
@pulumi.getter(name="sslCertPath")
|
|
138
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
|
|
138
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
139
139
|
"""
|
|
140
140
|
Path to the client certificate. If specified, connection uses SSL.
|
|
141
141
|
"""
|
|
142
142
|
return pulumi.get(self, "ssl_cert_path")
|
|
143
143
|
|
|
144
144
|
@ssl_cert_path.setter
|
|
145
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
|
|
145
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
146
146
|
pulumi.set(self, "ssl_cert_path", value)
|
|
147
147
|
|
|
148
|
-
@property
|
|
148
|
+
@_builtins.property
|
|
149
149
|
@pulumi.getter(name="sslCipher")
|
|
150
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
|
|
150
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
151
151
|
"""
|
|
152
152
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
153
153
|
"""
|
|
154
154
|
return pulumi.get(self, "ssl_cipher")
|
|
155
155
|
|
|
156
156
|
@ssl_cipher.setter
|
|
157
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
|
|
157
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
158
158
|
pulumi.set(self, "ssl_cipher", value)
|
|
159
159
|
|
|
160
|
-
@property
|
|
160
|
+
@_builtins.property
|
|
161
161
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
162
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
162
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
163
163
|
"""
|
|
164
164
|
Check the common name of the server's certificate against this name.
|
|
165
165
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -167,12 +167,12 @@ class OutputsTcpServerArgs:
|
|
|
167
167
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
168
168
|
|
|
169
169
|
@ssl_common_name_to_check.setter
|
|
170
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
170
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
171
171
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
172
172
|
|
|
173
|
-
@property
|
|
173
|
+
@_builtins.property
|
|
174
174
|
@pulumi.getter(name="sslPassword")
|
|
175
|
-
def ssl_password(self) -> Optional[pulumi.Input[str]]:
|
|
175
|
+
def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
176
176
|
"""
|
|
177
177
|
The password associated with the CAcert.
|
|
178
178
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -180,31 +180,31 @@ class OutputsTcpServerArgs:
|
|
|
180
180
|
return pulumi.get(self, "ssl_password")
|
|
181
181
|
|
|
182
182
|
@ssl_password.setter
|
|
183
|
-
def ssl_password(self, value: Optional[pulumi.Input[str]]):
|
|
183
|
+
def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
184
184
|
pulumi.set(self, "ssl_password", value)
|
|
185
185
|
|
|
186
|
-
@property
|
|
186
|
+
@_builtins.property
|
|
187
187
|
@pulumi.getter(name="sslRootCaPath")
|
|
188
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
|
|
188
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
189
189
|
"""
|
|
190
190
|
The path to the root certificate authority file.
|
|
191
191
|
"""
|
|
192
192
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
193
193
|
|
|
194
194
|
@ssl_root_ca_path.setter
|
|
195
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
|
|
195
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
196
196
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
197
197
|
|
|
198
|
-
@property
|
|
198
|
+
@_builtins.property
|
|
199
199
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
200
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
|
|
200
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
201
201
|
"""
|
|
202
202
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
203
203
|
"""
|
|
204
204
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
205
205
|
|
|
206
206
|
@ssl_verify_server_cert.setter
|
|
207
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
|
|
207
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
208
208
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
209
209
|
|
|
210
210
|
|
|
@@ -212,32 +212,32 @@ class OutputsTcpServerArgs:
|
|
|
212
212
|
class _OutputsTcpServerState:
|
|
213
213
|
def __init__(__self__, *,
|
|
214
214
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
215
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
216
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
217
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
218
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
219
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
220
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
221
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
222
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
223
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
224
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
|
|
215
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
216
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
217
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
218
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
219
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
220
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
221
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
222
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
223
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
224
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
225
225
|
"""
|
|
226
226
|
Input properties used for looking up and filtering OutputsTcpServer resources.
|
|
227
227
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
228
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
229
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
228
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
229
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
230
230
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
231
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
232
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
233
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
234
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
235
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
231
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
232
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
233
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
234
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
235
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
236
236
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
237
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
237
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
238
238
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
239
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
240
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
239
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
240
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
241
241
|
"""
|
|
242
242
|
if acl is not None:
|
|
243
243
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -262,7 +262,7 @@ class _OutputsTcpServerState:
|
|
|
262
262
|
if ssl_verify_server_cert is not None:
|
|
263
263
|
pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
|
|
264
264
|
|
|
265
|
-
@property
|
|
265
|
+
@_builtins.property
|
|
266
266
|
@pulumi.getter
|
|
267
267
|
def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
|
|
268
268
|
"""
|
|
@@ -274,21 +274,21 @@ class _OutputsTcpServerState:
|
|
|
274
274
|
def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
|
|
275
275
|
pulumi.set(self, "acl", value)
|
|
276
276
|
|
|
277
|
-
@property
|
|
277
|
+
@_builtins.property
|
|
278
278
|
@pulumi.getter
|
|
279
|
-
def disabled(self) -> Optional[pulumi.Input[bool]]:
|
|
279
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
280
280
|
"""
|
|
281
281
|
If true, disables the group.
|
|
282
282
|
"""
|
|
283
283
|
return pulumi.get(self, "disabled")
|
|
284
284
|
|
|
285
285
|
@disabled.setter
|
|
286
|
-
def disabled(self, value: Optional[pulumi.Input[bool]]):
|
|
286
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
287
287
|
pulumi.set(self, "disabled", value)
|
|
288
288
|
|
|
289
|
-
@property
|
|
289
|
+
@_builtins.property
|
|
290
290
|
@pulumi.getter
|
|
291
|
-
def method(self) -> Optional[pulumi.Input[str]]:
|
|
291
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
292
292
|
"""
|
|
293
293
|
Valid values: (clone | balance | autobalance)
|
|
294
294
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -296,60 +296,60 @@ class _OutputsTcpServerState:
|
|
|
296
296
|
return pulumi.get(self, "method")
|
|
297
297
|
|
|
298
298
|
@method.setter
|
|
299
|
-
def method(self, value: Optional[pulumi.Input[str]]):
|
|
299
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
300
300
|
pulumi.set(self, "method", value)
|
|
301
301
|
|
|
302
|
-
@property
|
|
302
|
+
@_builtins.property
|
|
303
303
|
@pulumi.getter
|
|
304
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
304
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
305
305
|
"""
|
|
306
306
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
307
307
|
"""
|
|
308
308
|
return pulumi.get(self, "name")
|
|
309
309
|
|
|
310
310
|
@name.setter
|
|
311
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
311
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
312
312
|
pulumi.set(self, "name", value)
|
|
313
313
|
|
|
314
|
-
@property
|
|
314
|
+
@_builtins.property
|
|
315
315
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
316
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
316
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
317
317
|
"""
|
|
318
318
|
The alternate name to match in the remote server's SSL certificate.
|
|
319
319
|
"""
|
|
320
320
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
321
321
|
|
|
322
322
|
@ssl_alt_name_to_check.setter
|
|
323
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
323
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
324
324
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
325
325
|
|
|
326
|
-
@property
|
|
326
|
+
@_builtins.property
|
|
327
327
|
@pulumi.getter(name="sslCertPath")
|
|
328
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
|
|
328
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
329
329
|
"""
|
|
330
330
|
Path to the client certificate. If specified, connection uses SSL.
|
|
331
331
|
"""
|
|
332
332
|
return pulumi.get(self, "ssl_cert_path")
|
|
333
333
|
|
|
334
334
|
@ssl_cert_path.setter
|
|
335
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
|
|
335
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
336
336
|
pulumi.set(self, "ssl_cert_path", value)
|
|
337
337
|
|
|
338
|
-
@property
|
|
338
|
+
@_builtins.property
|
|
339
339
|
@pulumi.getter(name="sslCipher")
|
|
340
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
|
|
340
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
341
341
|
"""
|
|
342
342
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
343
343
|
"""
|
|
344
344
|
return pulumi.get(self, "ssl_cipher")
|
|
345
345
|
|
|
346
346
|
@ssl_cipher.setter
|
|
347
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
|
|
347
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
348
348
|
pulumi.set(self, "ssl_cipher", value)
|
|
349
349
|
|
|
350
|
-
@property
|
|
350
|
+
@_builtins.property
|
|
351
351
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
352
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
352
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
353
353
|
"""
|
|
354
354
|
Check the common name of the server's certificate against this name.
|
|
355
355
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -357,12 +357,12 @@ class _OutputsTcpServerState:
|
|
|
357
357
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
358
358
|
|
|
359
359
|
@ssl_common_name_to_check.setter
|
|
360
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
360
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
361
361
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
362
362
|
|
|
363
|
-
@property
|
|
363
|
+
@_builtins.property
|
|
364
364
|
@pulumi.getter(name="sslPassword")
|
|
365
|
-
def ssl_password(self) -> Optional[pulumi.Input[str]]:
|
|
365
|
+
def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
366
366
|
"""
|
|
367
367
|
The password associated with the CAcert.
|
|
368
368
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -370,50 +370,51 @@ class _OutputsTcpServerState:
|
|
|
370
370
|
return pulumi.get(self, "ssl_password")
|
|
371
371
|
|
|
372
372
|
@ssl_password.setter
|
|
373
|
-
def ssl_password(self, value: Optional[pulumi.Input[str]]):
|
|
373
|
+
def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
374
374
|
pulumi.set(self, "ssl_password", value)
|
|
375
375
|
|
|
376
|
-
@property
|
|
376
|
+
@_builtins.property
|
|
377
377
|
@pulumi.getter(name="sslRootCaPath")
|
|
378
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
|
|
378
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
379
379
|
"""
|
|
380
380
|
The path to the root certificate authority file.
|
|
381
381
|
"""
|
|
382
382
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
383
383
|
|
|
384
384
|
@ssl_root_ca_path.setter
|
|
385
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
|
|
385
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
386
386
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
387
387
|
|
|
388
|
-
@property
|
|
388
|
+
@_builtins.property
|
|
389
389
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
390
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
|
|
390
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
391
391
|
"""
|
|
392
392
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
393
393
|
"""
|
|
394
394
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
395
395
|
|
|
396
396
|
@ssl_verify_server_cert.setter
|
|
397
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
|
|
397
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
398
398
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
399
399
|
|
|
400
400
|
|
|
401
|
+
@pulumi.type_token("splunk:index/outputsTcpServer:OutputsTcpServer")
|
|
401
402
|
class OutputsTcpServer(pulumi.CustomResource):
|
|
402
403
|
@overload
|
|
403
404
|
def __init__(__self__,
|
|
404
405
|
resource_name: str,
|
|
405
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
406
407
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
407
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
408
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
409
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
410
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
411
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
412
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
413
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
414
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
415
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
416
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
|
|
408
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
409
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
410
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
411
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
412
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
413
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
414
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
415
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
416
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
417
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
417
418
|
__props__=None):
|
|
418
419
|
"""
|
|
419
420
|
## # Resource: OutputsTcpServer
|
|
@@ -434,19 +435,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
434
435
|
:param str resource_name: The name of the resource.
|
|
435
436
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
436
437
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
437
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
438
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
438
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
439
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
439
440
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
440
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
441
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
442
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
443
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
444
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
441
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
442
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
443
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
444
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
445
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
445
446
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
446
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
447
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
447
448
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
448
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
449
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
449
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
450
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
450
451
|
"""
|
|
451
452
|
...
|
|
452
453
|
@overload
|
|
@@ -486,16 +487,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
486
487
|
resource_name: str,
|
|
487
488
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
488
489
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
489
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
490
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
491
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
492
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
493
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
494
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
495
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
496
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
497
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
498
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
|
|
490
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
491
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
492
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
493
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
494
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
495
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
496
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
497
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
498
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
499
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
499
500
|
__props__=None):
|
|
500
501
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
501
502
|
if not isinstance(opts, pulumi.ResourceOptions):
|
|
@@ -529,16 +530,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
529
530
|
id: pulumi.Input[str],
|
|
530
531
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
531
532
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
532
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
533
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
534
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
535
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
536
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
537
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
538
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
539
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
540
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
541
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None) -> 'OutputsTcpServer':
|
|
533
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
534
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
535
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
536
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
537
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
538
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
539
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
540
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
541
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
542
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None) -> 'OutputsTcpServer':
|
|
542
543
|
"""
|
|
543
544
|
Get an existing OutputsTcpServer resource's state with the given name, id, and optional extra
|
|
544
545
|
properties used to qualify the lookup.
|
|
@@ -547,19 +548,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
547
548
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
548
549
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
549
550
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
550
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
551
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
551
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
552
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
552
553
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
553
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
554
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
555
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
556
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
557
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
554
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
555
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
556
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
557
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
558
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
558
559
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
559
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
560
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
560
561
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
561
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
562
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
562
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
563
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
563
564
|
"""
|
|
564
565
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
565
566
|
|
|
@@ -578,7 +579,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
578
579
|
__props__.__dict__["ssl_verify_server_cert"] = ssl_verify_server_cert
|
|
579
580
|
return OutputsTcpServer(resource_name, opts=opts, __props__=__props__)
|
|
580
581
|
|
|
581
|
-
@property
|
|
582
|
+
@_builtins.property
|
|
582
583
|
@pulumi.getter
|
|
583
584
|
def acl(self) -> pulumi.Output['outputs.OutputsTcpServerAcl']:
|
|
584
585
|
"""
|
|
@@ -586,84 +587,84 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
586
587
|
"""
|
|
587
588
|
return pulumi.get(self, "acl")
|
|
588
589
|
|
|
589
|
-
@property
|
|
590
|
+
@_builtins.property
|
|
590
591
|
@pulumi.getter
|
|
591
|
-
def disabled(self) -> pulumi.Output[bool]:
|
|
592
|
+
def disabled(self) -> pulumi.Output[_builtins.bool]:
|
|
592
593
|
"""
|
|
593
594
|
If true, disables the group.
|
|
594
595
|
"""
|
|
595
596
|
return pulumi.get(self, "disabled")
|
|
596
597
|
|
|
597
|
-
@property
|
|
598
|
+
@_builtins.property
|
|
598
599
|
@pulumi.getter
|
|
599
|
-
def method(self) -> pulumi.Output[str]:
|
|
600
|
+
def method(self) -> pulumi.Output[_builtins.str]:
|
|
600
601
|
"""
|
|
601
602
|
Valid values: (clone | balance | autobalance)
|
|
602
603
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
603
604
|
"""
|
|
604
605
|
return pulumi.get(self, "method")
|
|
605
606
|
|
|
606
|
-
@property
|
|
607
|
+
@_builtins.property
|
|
607
608
|
@pulumi.getter
|
|
608
|
-
def name(self) -> pulumi.Output[str]:
|
|
609
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
609
610
|
"""
|
|
610
611
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
611
612
|
"""
|
|
612
613
|
return pulumi.get(self, "name")
|
|
613
614
|
|
|
614
|
-
@property
|
|
615
|
+
@_builtins.property
|
|
615
616
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
616
|
-
def ssl_alt_name_to_check(self) -> pulumi.Output[str]:
|
|
617
|
+
def ssl_alt_name_to_check(self) -> pulumi.Output[_builtins.str]:
|
|
617
618
|
"""
|
|
618
619
|
The alternate name to match in the remote server's SSL certificate.
|
|
619
620
|
"""
|
|
620
621
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
621
622
|
|
|
622
|
-
@property
|
|
623
|
+
@_builtins.property
|
|
623
624
|
@pulumi.getter(name="sslCertPath")
|
|
624
|
-
def ssl_cert_path(self) -> pulumi.Output[str]:
|
|
625
|
+
def ssl_cert_path(self) -> pulumi.Output[_builtins.str]:
|
|
625
626
|
"""
|
|
626
627
|
Path to the client certificate. If specified, connection uses SSL.
|
|
627
628
|
"""
|
|
628
629
|
return pulumi.get(self, "ssl_cert_path")
|
|
629
630
|
|
|
630
|
-
@property
|
|
631
|
+
@_builtins.property
|
|
631
632
|
@pulumi.getter(name="sslCipher")
|
|
632
|
-
def ssl_cipher(self) -> pulumi.Output[str]:
|
|
633
|
+
def ssl_cipher(self) -> pulumi.Output[_builtins.str]:
|
|
633
634
|
"""
|
|
634
635
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
635
636
|
"""
|
|
636
637
|
return pulumi.get(self, "ssl_cipher")
|
|
637
638
|
|
|
638
|
-
@property
|
|
639
|
+
@_builtins.property
|
|
639
640
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
640
|
-
def ssl_common_name_to_check(self) -> pulumi.Output[str]:
|
|
641
|
+
def ssl_common_name_to_check(self) -> pulumi.Output[_builtins.str]:
|
|
641
642
|
"""
|
|
642
643
|
Check the common name of the server's certificate against this name.
|
|
643
644
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
644
645
|
"""
|
|
645
646
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
646
647
|
|
|
647
|
-
@property
|
|
648
|
+
@_builtins.property
|
|
648
649
|
@pulumi.getter(name="sslPassword")
|
|
649
|
-
def ssl_password(self) -> pulumi.Output[str]:
|
|
650
|
+
def ssl_password(self) -> pulumi.Output[_builtins.str]:
|
|
650
651
|
"""
|
|
651
652
|
The password associated with the CAcert.
|
|
652
653
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
653
654
|
"""
|
|
654
655
|
return pulumi.get(self, "ssl_password")
|
|
655
656
|
|
|
656
|
-
@property
|
|
657
|
+
@_builtins.property
|
|
657
658
|
@pulumi.getter(name="sslRootCaPath")
|
|
658
|
-
def ssl_root_ca_path(self) -> pulumi.Output[str]:
|
|
659
|
+
def ssl_root_ca_path(self) -> pulumi.Output[_builtins.str]:
|
|
659
660
|
"""
|
|
660
661
|
The path to the root certificate authority file.
|
|
661
662
|
"""
|
|
662
663
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
663
664
|
|
|
664
|
-
@property
|
|
665
|
+
@_builtins.property
|
|
665
666
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
666
|
-
def ssl_verify_server_cert(self) -> pulumi.Output[bool]:
|
|
667
|
+
def ssl_verify_server_cert(self) -> pulumi.Output[_builtins.bool]:
|
|
667
668
|
"""
|
|
668
669
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
669
670
|
"""
|