pulumi-splunk 1.3.0a1735837426__py3-none-any.whl → 1.3.0a1763793741__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. pulumi_splunk/__init__.py +2 -1
  2. pulumi_splunk/_inputs.py +1275 -1275
  3. pulumi_splunk/_utilities.py +9 -5
  4. pulumi_splunk/admin_saml_groups.py +37 -36
  5. pulumi_splunk/apps_local.py +210 -209
  6. pulumi_splunk/authentication_users.py +156 -155
  7. pulumi_splunk/authorization_roles.py +224 -223
  8. pulumi_splunk/config/__init__.py +2 -1
  9. pulumi_splunk/config/__init__.pyi +3 -4
  10. pulumi_splunk/config/vars.py +9 -10
  11. pulumi_splunk/configs_conf.py +40 -39
  12. pulumi_splunk/data_ui_views.py +40 -39
  13. pulumi_splunk/generic_acl.py +23 -22
  14. pulumi_splunk/global_http_event_collector.py +122 -121
  15. pulumi_splunk/indexes.py +652 -651
  16. pulumi_splunk/inputs_http_event_collector.py +159 -158
  17. pulumi_splunk/inputs_monitor.py +261 -260
  18. pulumi_splunk/inputs_script.py +159 -158
  19. pulumi_splunk/inputs_tcp_cooked.py +91 -90
  20. pulumi_splunk/inputs_tcp_raw.py +176 -175
  21. pulumi_splunk/inputs_tcp_splunk_tcp_token.py +40 -39
  22. pulumi_splunk/inputs_tcp_ssl.py +88 -87
  23. pulumi_splunk/inputs_udp.py +193 -192
  24. pulumi_splunk/lookup_definition.py +40 -39
  25. pulumi_splunk/lookup_table_file.py +71 -70
  26. pulumi_splunk/outputs.py +857 -857
  27. pulumi_splunk/outputs_tcp_default.py +142 -141
  28. pulumi_splunk/outputs_tcp_group.py +176 -175
  29. pulumi_splunk/outputs_tcp_server.py +176 -175
  30. pulumi_splunk/outputs_tcp_syslog.py +125 -124
  31. pulumi_splunk/provider.py +94 -78
  32. pulumi_splunk/pulumi-plugin.json +1 -1
  33. pulumi_splunk/saved_searches.py +3099 -2886
  34. pulumi_splunk/sh_indexes_manager.py +74 -73
  35. {pulumi_splunk-1.3.0a1735837426.dist-info → pulumi_splunk-1.3.0a1763793741.dist-info}/METADATA +3 -3
  36. pulumi_splunk-1.3.0a1763793741.dist-info/RECORD +39 -0
  37. {pulumi_splunk-1.3.0a1735837426.dist-info → pulumi_splunk-1.3.0a1763793741.dist-info}/WHEEL +1 -1
  38. pulumi_splunk-1.3.0a1735837426.dist-info/RECORD +0 -39
  39. {pulumi_splunk-1.3.0a1735837426.dist-info → pulumi_splunk-1.3.0a1763793741.dist-info}/top_level.txt +0 -0
@@ -1,8 +1,8 @@
1
1
  # coding=utf-8
2
- # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import copy
5
+ import builtins as _builtins
6
6
  import warnings
7
7
  import sys
8
8
  import pulumi
@@ -22,32 +22,32 @@ __all__ = ['OutputsTcpServerArgs', 'OutputsTcpServer']
22
22
  class OutputsTcpServerArgs:
23
23
  def __init__(__self__, *,
24
24
  acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
25
- disabled: Optional[pulumi.Input[bool]] = None,
26
- method: Optional[pulumi.Input[str]] = None,
27
- name: Optional[pulumi.Input[str]] = None,
28
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
29
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
30
- ssl_cipher: Optional[pulumi.Input[str]] = None,
31
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
32
- ssl_password: Optional[pulumi.Input[str]] = None,
33
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
34
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
25
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ method: Optional[pulumi.Input[_builtins.str]] = None,
27
+ name: Optional[pulumi.Input[_builtins.str]] = None,
28
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
29
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
30
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
31
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
32
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
33
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
34
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
35
35
  """
36
36
  The set of arguments for constructing a OutputsTcpServer resource.
37
37
  :param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
38
- :param pulumi.Input[bool] disabled: If true, disables the group.
39
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
38
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
39
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
40
40
  The data distribution method used when two or more servers exist in the same forwarder group.
41
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
42
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
43
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
44
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
45
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
41
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
42
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
43
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
44
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
45
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
46
46
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
47
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
47
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
48
48
  The default Splunk Enterprise CAcert uses the password "password."
49
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
50
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
49
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
50
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
51
51
  """
52
52
  if acl is not None:
53
53
  pulumi.set(__self__, "acl", acl)
@@ -72,7 +72,7 @@ class OutputsTcpServerArgs:
72
72
  if ssl_verify_server_cert is not None:
73
73
  pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
74
74
 
75
- @property
75
+ @_builtins.property
76
76
  @pulumi.getter
77
77
  def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
78
78
  """
@@ -84,21 +84,21 @@ class OutputsTcpServerArgs:
84
84
  def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
85
85
  pulumi.set(self, "acl", value)
86
86
 
87
- @property
87
+ @_builtins.property
88
88
  @pulumi.getter
89
- def disabled(self) -> Optional[pulumi.Input[bool]]:
89
+ def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
90
90
  """
91
91
  If true, disables the group.
92
92
  """
93
93
  return pulumi.get(self, "disabled")
94
94
 
95
95
  @disabled.setter
96
- def disabled(self, value: Optional[pulumi.Input[bool]]):
96
+ def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
97
97
  pulumi.set(self, "disabled", value)
98
98
 
99
- @property
99
+ @_builtins.property
100
100
  @pulumi.getter
101
- def method(self) -> Optional[pulumi.Input[str]]:
101
+ def method(self) -> Optional[pulumi.Input[_builtins.str]]:
102
102
  """
103
103
  Valid values: (clone | balance | autobalance)
104
104
  The data distribution method used when two or more servers exist in the same forwarder group.
@@ -106,60 +106,60 @@ class OutputsTcpServerArgs:
106
106
  return pulumi.get(self, "method")
107
107
 
108
108
  @method.setter
109
- def method(self, value: Optional[pulumi.Input[str]]):
109
+ def method(self, value: Optional[pulumi.Input[_builtins.str]]):
110
110
  pulumi.set(self, "method", value)
111
111
 
112
- @property
112
+ @_builtins.property
113
113
  @pulumi.getter
114
- def name(self) -> Optional[pulumi.Input[str]]:
114
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
115
115
  """
116
116
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
117
117
  """
118
118
  return pulumi.get(self, "name")
119
119
 
120
120
  @name.setter
121
- def name(self, value: Optional[pulumi.Input[str]]):
121
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
122
122
  pulumi.set(self, "name", value)
123
123
 
124
- @property
124
+ @_builtins.property
125
125
  @pulumi.getter(name="sslAltNameToCheck")
126
- def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
126
+ def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
127
127
  """
128
128
  The alternate name to match in the remote server's SSL certificate.
129
129
  """
130
130
  return pulumi.get(self, "ssl_alt_name_to_check")
131
131
 
132
132
  @ssl_alt_name_to_check.setter
133
- def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
133
+ def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
134
134
  pulumi.set(self, "ssl_alt_name_to_check", value)
135
135
 
136
- @property
136
+ @_builtins.property
137
137
  @pulumi.getter(name="sslCertPath")
138
- def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
138
+ def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
139
139
  """
140
140
  Path to the client certificate. If specified, connection uses SSL.
141
141
  """
142
142
  return pulumi.get(self, "ssl_cert_path")
143
143
 
144
144
  @ssl_cert_path.setter
145
- def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
145
+ def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
146
146
  pulumi.set(self, "ssl_cert_path", value)
147
147
 
148
- @property
148
+ @_builtins.property
149
149
  @pulumi.getter(name="sslCipher")
150
- def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
150
+ def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
151
151
  """
152
152
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
153
153
  """
154
154
  return pulumi.get(self, "ssl_cipher")
155
155
 
156
156
  @ssl_cipher.setter
157
- def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
157
+ def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
158
158
  pulumi.set(self, "ssl_cipher", value)
159
159
 
160
- @property
160
+ @_builtins.property
161
161
  @pulumi.getter(name="sslCommonNameToCheck")
162
- def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
162
+ def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
163
163
  """
164
164
  Check the common name of the server's certificate against this name.
165
165
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
@@ -167,12 +167,12 @@ class OutputsTcpServerArgs:
167
167
  return pulumi.get(self, "ssl_common_name_to_check")
168
168
 
169
169
  @ssl_common_name_to_check.setter
170
- def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
170
+ def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
171
171
  pulumi.set(self, "ssl_common_name_to_check", value)
172
172
 
173
- @property
173
+ @_builtins.property
174
174
  @pulumi.getter(name="sslPassword")
175
- def ssl_password(self) -> Optional[pulumi.Input[str]]:
175
+ def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
176
176
  """
177
177
  The password associated with the CAcert.
178
178
  The default Splunk Enterprise CAcert uses the password "password."
@@ -180,31 +180,31 @@ class OutputsTcpServerArgs:
180
180
  return pulumi.get(self, "ssl_password")
181
181
 
182
182
  @ssl_password.setter
183
- def ssl_password(self, value: Optional[pulumi.Input[str]]):
183
+ def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
184
184
  pulumi.set(self, "ssl_password", value)
185
185
 
186
- @property
186
+ @_builtins.property
187
187
  @pulumi.getter(name="sslRootCaPath")
188
- def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
188
+ def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
189
189
  """
190
190
  The path to the root certificate authority file.
191
191
  """
192
192
  return pulumi.get(self, "ssl_root_ca_path")
193
193
 
194
194
  @ssl_root_ca_path.setter
195
- def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
195
+ def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
196
196
  pulumi.set(self, "ssl_root_ca_path", value)
197
197
 
198
- @property
198
+ @_builtins.property
199
199
  @pulumi.getter(name="sslVerifyServerCert")
200
- def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
200
+ def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
201
201
  """
202
202
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
203
203
  """
204
204
  return pulumi.get(self, "ssl_verify_server_cert")
205
205
 
206
206
  @ssl_verify_server_cert.setter
207
- def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
207
+ def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
208
208
  pulumi.set(self, "ssl_verify_server_cert", value)
209
209
 
210
210
 
@@ -212,32 +212,32 @@ class OutputsTcpServerArgs:
212
212
  class _OutputsTcpServerState:
213
213
  def __init__(__self__, *,
214
214
  acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
215
- disabled: Optional[pulumi.Input[bool]] = None,
216
- method: Optional[pulumi.Input[str]] = None,
217
- name: Optional[pulumi.Input[str]] = None,
218
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
219
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
220
- ssl_cipher: Optional[pulumi.Input[str]] = None,
221
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
222
- ssl_password: Optional[pulumi.Input[str]] = None,
223
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
224
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
215
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
216
+ method: Optional[pulumi.Input[_builtins.str]] = None,
217
+ name: Optional[pulumi.Input[_builtins.str]] = None,
218
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
219
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
220
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
221
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
222
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
223
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
224
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
225
225
  """
226
226
  Input properties used for looking up and filtering OutputsTcpServer resources.
227
227
  :param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
228
- :param pulumi.Input[bool] disabled: If true, disables the group.
229
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
228
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
229
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
230
230
  The data distribution method used when two or more servers exist in the same forwarder group.
231
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
232
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
233
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
234
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
235
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
231
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
232
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
233
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
234
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
235
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
236
236
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
237
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
237
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
238
238
  The default Splunk Enterprise CAcert uses the password "password."
239
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
240
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
239
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
240
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
241
241
  """
242
242
  if acl is not None:
243
243
  pulumi.set(__self__, "acl", acl)
@@ -262,7 +262,7 @@ class _OutputsTcpServerState:
262
262
  if ssl_verify_server_cert is not None:
263
263
  pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
264
264
 
265
- @property
265
+ @_builtins.property
266
266
  @pulumi.getter
267
267
  def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
268
268
  """
@@ -274,21 +274,21 @@ class _OutputsTcpServerState:
274
274
  def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
275
275
  pulumi.set(self, "acl", value)
276
276
 
277
- @property
277
+ @_builtins.property
278
278
  @pulumi.getter
279
- def disabled(self) -> Optional[pulumi.Input[bool]]:
279
+ def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
280
280
  """
281
281
  If true, disables the group.
282
282
  """
283
283
  return pulumi.get(self, "disabled")
284
284
 
285
285
  @disabled.setter
286
- def disabled(self, value: Optional[pulumi.Input[bool]]):
286
+ def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
287
287
  pulumi.set(self, "disabled", value)
288
288
 
289
- @property
289
+ @_builtins.property
290
290
  @pulumi.getter
291
- def method(self) -> Optional[pulumi.Input[str]]:
291
+ def method(self) -> Optional[pulumi.Input[_builtins.str]]:
292
292
  """
293
293
  Valid values: (clone | balance | autobalance)
294
294
  The data distribution method used when two or more servers exist in the same forwarder group.
@@ -296,60 +296,60 @@ class _OutputsTcpServerState:
296
296
  return pulumi.get(self, "method")
297
297
 
298
298
  @method.setter
299
- def method(self, value: Optional[pulumi.Input[str]]):
299
+ def method(self, value: Optional[pulumi.Input[_builtins.str]]):
300
300
  pulumi.set(self, "method", value)
301
301
 
302
- @property
302
+ @_builtins.property
303
303
  @pulumi.getter
304
- def name(self) -> Optional[pulumi.Input[str]]:
304
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
305
305
  """
306
306
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
307
307
  """
308
308
  return pulumi.get(self, "name")
309
309
 
310
310
  @name.setter
311
- def name(self, value: Optional[pulumi.Input[str]]):
311
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
312
312
  pulumi.set(self, "name", value)
313
313
 
314
- @property
314
+ @_builtins.property
315
315
  @pulumi.getter(name="sslAltNameToCheck")
316
- def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
316
+ def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
317
317
  """
318
318
  The alternate name to match in the remote server's SSL certificate.
319
319
  """
320
320
  return pulumi.get(self, "ssl_alt_name_to_check")
321
321
 
322
322
  @ssl_alt_name_to_check.setter
323
- def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
323
+ def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
324
324
  pulumi.set(self, "ssl_alt_name_to_check", value)
325
325
 
326
- @property
326
+ @_builtins.property
327
327
  @pulumi.getter(name="sslCertPath")
328
- def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
328
+ def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
329
329
  """
330
330
  Path to the client certificate. If specified, connection uses SSL.
331
331
  """
332
332
  return pulumi.get(self, "ssl_cert_path")
333
333
 
334
334
  @ssl_cert_path.setter
335
- def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
335
+ def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
336
336
  pulumi.set(self, "ssl_cert_path", value)
337
337
 
338
- @property
338
+ @_builtins.property
339
339
  @pulumi.getter(name="sslCipher")
340
- def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
340
+ def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
341
341
  """
342
342
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
343
343
  """
344
344
  return pulumi.get(self, "ssl_cipher")
345
345
 
346
346
  @ssl_cipher.setter
347
- def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
347
+ def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
348
348
  pulumi.set(self, "ssl_cipher", value)
349
349
 
350
- @property
350
+ @_builtins.property
351
351
  @pulumi.getter(name="sslCommonNameToCheck")
352
- def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
352
+ def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
353
353
  """
354
354
  Check the common name of the server's certificate against this name.
355
355
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
@@ -357,12 +357,12 @@ class _OutputsTcpServerState:
357
357
  return pulumi.get(self, "ssl_common_name_to_check")
358
358
 
359
359
  @ssl_common_name_to_check.setter
360
- def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
360
+ def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
361
361
  pulumi.set(self, "ssl_common_name_to_check", value)
362
362
 
363
- @property
363
+ @_builtins.property
364
364
  @pulumi.getter(name="sslPassword")
365
- def ssl_password(self) -> Optional[pulumi.Input[str]]:
365
+ def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
366
366
  """
367
367
  The password associated with the CAcert.
368
368
  The default Splunk Enterprise CAcert uses the password "password."
@@ -370,50 +370,51 @@ class _OutputsTcpServerState:
370
370
  return pulumi.get(self, "ssl_password")
371
371
 
372
372
  @ssl_password.setter
373
- def ssl_password(self, value: Optional[pulumi.Input[str]]):
373
+ def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
374
374
  pulumi.set(self, "ssl_password", value)
375
375
 
376
- @property
376
+ @_builtins.property
377
377
  @pulumi.getter(name="sslRootCaPath")
378
- def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
378
+ def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
379
379
  """
380
380
  The path to the root certificate authority file.
381
381
  """
382
382
  return pulumi.get(self, "ssl_root_ca_path")
383
383
 
384
384
  @ssl_root_ca_path.setter
385
- def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
385
+ def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
386
386
  pulumi.set(self, "ssl_root_ca_path", value)
387
387
 
388
- @property
388
+ @_builtins.property
389
389
  @pulumi.getter(name="sslVerifyServerCert")
390
- def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
390
+ def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
391
391
  """
392
392
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
393
393
  """
394
394
  return pulumi.get(self, "ssl_verify_server_cert")
395
395
 
396
396
  @ssl_verify_server_cert.setter
397
- def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
397
+ def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
398
398
  pulumi.set(self, "ssl_verify_server_cert", value)
399
399
 
400
400
 
401
+ @pulumi.type_token("splunk:index/outputsTcpServer:OutputsTcpServer")
401
402
  class OutputsTcpServer(pulumi.CustomResource):
402
403
  @overload
403
404
  def __init__(__self__,
404
405
  resource_name: str,
405
406
  opts: Optional[pulumi.ResourceOptions] = None,
406
407
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
407
- disabled: Optional[pulumi.Input[bool]] = None,
408
- method: Optional[pulumi.Input[str]] = None,
409
- name: Optional[pulumi.Input[str]] = None,
410
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
411
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
412
- ssl_cipher: Optional[pulumi.Input[str]] = None,
413
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
414
- ssl_password: Optional[pulumi.Input[str]] = None,
415
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
416
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
408
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
409
+ method: Optional[pulumi.Input[_builtins.str]] = None,
410
+ name: Optional[pulumi.Input[_builtins.str]] = None,
411
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
412
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
413
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
414
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
415
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
416
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
417
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
417
418
  __props__=None):
418
419
  """
419
420
  ## # Resource: OutputsTcpServer
@@ -434,19 +435,19 @@ class OutputsTcpServer(pulumi.CustomResource):
434
435
  :param str resource_name: The name of the resource.
435
436
  :param pulumi.ResourceOptions opts: Options for the resource.
436
437
  :param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
437
- :param pulumi.Input[bool] disabled: If true, disables the group.
438
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
438
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
439
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
439
440
  The data distribution method used when two or more servers exist in the same forwarder group.
440
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
441
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
442
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
443
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
444
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
441
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
442
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
443
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
444
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
445
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
445
446
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
446
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
447
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
447
448
  The default Splunk Enterprise CAcert uses the password "password."
448
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
449
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
449
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
450
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
450
451
  """
451
452
  ...
452
453
  @overload
@@ -486,16 +487,16 @@ class OutputsTcpServer(pulumi.CustomResource):
486
487
  resource_name: str,
487
488
  opts: Optional[pulumi.ResourceOptions] = None,
488
489
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
489
- disabled: Optional[pulumi.Input[bool]] = None,
490
- method: Optional[pulumi.Input[str]] = None,
491
- name: Optional[pulumi.Input[str]] = None,
492
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
493
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
494
- ssl_cipher: Optional[pulumi.Input[str]] = None,
495
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
496
- ssl_password: Optional[pulumi.Input[str]] = None,
497
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
498
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
490
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ method: Optional[pulumi.Input[_builtins.str]] = None,
492
+ name: Optional[pulumi.Input[_builtins.str]] = None,
493
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
494
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
495
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
496
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
497
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
498
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
499
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
499
500
  __props__=None):
500
501
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
501
502
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -529,16 +530,16 @@ class OutputsTcpServer(pulumi.CustomResource):
529
530
  id: pulumi.Input[str],
530
531
  opts: Optional[pulumi.ResourceOptions] = None,
531
532
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
532
- disabled: Optional[pulumi.Input[bool]] = None,
533
- method: Optional[pulumi.Input[str]] = None,
534
- name: Optional[pulumi.Input[str]] = None,
535
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
536
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
537
- ssl_cipher: Optional[pulumi.Input[str]] = None,
538
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
539
- ssl_password: Optional[pulumi.Input[str]] = None,
540
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
541
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None) -> 'OutputsTcpServer':
533
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
534
+ method: Optional[pulumi.Input[_builtins.str]] = None,
535
+ name: Optional[pulumi.Input[_builtins.str]] = None,
536
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
537
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
538
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
539
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
540
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
541
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
542
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None) -> 'OutputsTcpServer':
542
543
  """
543
544
  Get an existing OutputsTcpServer resource's state with the given name, id, and optional extra
544
545
  properties used to qualify the lookup.
@@ -547,19 +548,19 @@ class OutputsTcpServer(pulumi.CustomResource):
547
548
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
548
549
  :param pulumi.ResourceOptions opts: Options for the resource.
549
550
  :param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
550
- :param pulumi.Input[bool] disabled: If true, disables the group.
551
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
551
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
552
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
552
553
  The data distribution method used when two or more servers exist in the same forwarder group.
553
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
554
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
555
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
556
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
557
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
554
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
555
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
556
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
557
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
558
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
558
559
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
559
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
560
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
560
561
  The default Splunk Enterprise CAcert uses the password "password."
561
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
562
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
562
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
563
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
563
564
  """
564
565
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
565
566
 
@@ -578,7 +579,7 @@ class OutputsTcpServer(pulumi.CustomResource):
578
579
  __props__.__dict__["ssl_verify_server_cert"] = ssl_verify_server_cert
579
580
  return OutputsTcpServer(resource_name, opts=opts, __props__=__props__)
580
581
 
581
- @property
582
+ @_builtins.property
582
583
  @pulumi.getter
583
584
  def acl(self) -> pulumi.Output['outputs.OutputsTcpServerAcl']:
584
585
  """
@@ -586,84 +587,84 @@ class OutputsTcpServer(pulumi.CustomResource):
586
587
  """
587
588
  return pulumi.get(self, "acl")
588
589
 
589
- @property
590
+ @_builtins.property
590
591
  @pulumi.getter
591
- def disabled(self) -> pulumi.Output[bool]:
592
+ def disabled(self) -> pulumi.Output[_builtins.bool]:
592
593
  """
593
594
  If true, disables the group.
594
595
  """
595
596
  return pulumi.get(self, "disabled")
596
597
 
597
- @property
598
+ @_builtins.property
598
599
  @pulumi.getter
599
- def method(self) -> pulumi.Output[str]:
600
+ def method(self) -> pulumi.Output[_builtins.str]:
600
601
  """
601
602
  Valid values: (clone | balance | autobalance)
602
603
  The data distribution method used when two or more servers exist in the same forwarder group.
603
604
  """
604
605
  return pulumi.get(self, "method")
605
606
 
606
- @property
607
+ @_builtins.property
607
608
  @pulumi.getter
608
- def name(self) -> pulumi.Output[str]:
609
+ def name(self) -> pulumi.Output[_builtins.str]:
609
610
  """
610
611
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
611
612
  """
612
613
  return pulumi.get(self, "name")
613
614
 
614
- @property
615
+ @_builtins.property
615
616
  @pulumi.getter(name="sslAltNameToCheck")
616
- def ssl_alt_name_to_check(self) -> pulumi.Output[str]:
617
+ def ssl_alt_name_to_check(self) -> pulumi.Output[_builtins.str]:
617
618
  """
618
619
  The alternate name to match in the remote server's SSL certificate.
619
620
  """
620
621
  return pulumi.get(self, "ssl_alt_name_to_check")
621
622
 
622
- @property
623
+ @_builtins.property
623
624
  @pulumi.getter(name="sslCertPath")
624
- def ssl_cert_path(self) -> pulumi.Output[str]:
625
+ def ssl_cert_path(self) -> pulumi.Output[_builtins.str]:
625
626
  """
626
627
  Path to the client certificate. If specified, connection uses SSL.
627
628
  """
628
629
  return pulumi.get(self, "ssl_cert_path")
629
630
 
630
- @property
631
+ @_builtins.property
631
632
  @pulumi.getter(name="sslCipher")
632
- def ssl_cipher(self) -> pulumi.Output[str]:
633
+ def ssl_cipher(self) -> pulumi.Output[_builtins.str]:
633
634
  """
634
635
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
635
636
  """
636
637
  return pulumi.get(self, "ssl_cipher")
637
638
 
638
- @property
639
+ @_builtins.property
639
640
  @pulumi.getter(name="sslCommonNameToCheck")
640
- def ssl_common_name_to_check(self) -> pulumi.Output[str]:
641
+ def ssl_common_name_to_check(self) -> pulumi.Output[_builtins.str]:
641
642
  """
642
643
  Check the common name of the server's certificate against this name.
643
644
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
644
645
  """
645
646
  return pulumi.get(self, "ssl_common_name_to_check")
646
647
 
647
- @property
648
+ @_builtins.property
648
649
  @pulumi.getter(name="sslPassword")
649
- def ssl_password(self) -> pulumi.Output[str]:
650
+ def ssl_password(self) -> pulumi.Output[_builtins.str]:
650
651
  """
651
652
  The password associated with the CAcert.
652
653
  The default Splunk Enterprise CAcert uses the password "password."
653
654
  """
654
655
  return pulumi.get(self, "ssl_password")
655
656
 
656
- @property
657
+ @_builtins.property
657
658
  @pulumi.getter(name="sslRootCaPath")
658
- def ssl_root_ca_path(self) -> pulumi.Output[str]:
659
+ def ssl_root_ca_path(self) -> pulumi.Output[_builtins.str]:
659
660
  """
660
661
  The path to the root certificate authority file.
661
662
  """
662
663
  return pulumi.get(self, "ssl_root_ca_path")
663
664
 
664
- @property
665
+ @_builtins.property
665
666
  @pulumi.getter(name="sslVerifyServerCert")
666
- def ssl_verify_server_cert(self) -> pulumi.Output[bool]:
667
+ def ssl_verify_server_cert(self) -> pulumi.Output[_builtins.bool]:
667
668
  """
668
669
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
669
670
  """