pulumi-splunk 1.3.0a1743489547__py3-none-any.whl → 1.3.0a1744266748__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-splunk might be problematic. Click here for more details.

Files changed (38) hide show
  1. pulumi_splunk/__init__.py +1 -0
  2. pulumi_splunk/_inputs.py +1065 -1064
  3. pulumi_splunk/admin_saml_groups.py +29 -28
  4. pulumi_splunk/apps_local.py +169 -168
  5. pulumi_splunk/authentication_users.py +127 -126
  6. pulumi_splunk/authorization_roles.py +183 -182
  7. pulumi_splunk/config/__init__.py +1 -0
  8. pulumi_splunk/config/__init__.pyi +1 -0
  9. pulumi_splunk/config/vars.py +1 -0
  10. pulumi_splunk/configs_conf.py +29 -28
  11. pulumi_splunk/data_ui_views.py +29 -28
  12. pulumi_splunk/generic_acl.py +15 -14
  13. pulumi_splunk/global_http_event_collector.py +99 -98
  14. pulumi_splunk/indexes.py +533 -532
  15. pulumi_splunk/inputs_http_event_collector.py +127 -126
  16. pulumi_splunk/inputs_monitor.py +211 -210
  17. pulumi_splunk/inputs_script.py +127 -126
  18. pulumi_splunk/inputs_tcp_cooked.py +71 -70
  19. pulumi_splunk/inputs_tcp_raw.py +141 -140
  20. pulumi_splunk/inputs_tcp_splunk_tcp_token.py +29 -28
  21. pulumi_splunk/inputs_tcp_ssl.py +71 -70
  22. pulumi_splunk/inputs_udp.py +155 -154
  23. pulumi_splunk/lookup_definition.py +29 -28
  24. pulumi_splunk/lookup_table_file.py +57 -56
  25. pulumi_splunk/outputs.py +647 -646
  26. pulumi_splunk/outputs_tcp_default.py +113 -112
  27. pulumi_splunk/outputs_tcp_group.py +141 -140
  28. pulumi_splunk/outputs_tcp_server.py +141 -140
  29. pulumi_splunk/outputs_tcp_syslog.py +99 -98
  30. pulumi_splunk/provider.py +47 -46
  31. pulumi_splunk/pulumi-plugin.json +1 -1
  32. pulumi_splunk/saved_searches.py +2304 -2303
  33. pulumi_splunk/sh_indexes_manager.py +57 -56
  34. {pulumi_splunk-1.3.0a1743489547.dist-info → pulumi_splunk-1.3.0a1744266748.dist-info}/METADATA +1 -1
  35. pulumi_splunk-1.3.0a1744266748.dist-info/RECORD +39 -0
  36. pulumi_splunk-1.3.0a1743489547.dist-info/RECORD +0 -39
  37. {pulumi_splunk-1.3.0a1743489547.dist-info → pulumi_splunk-1.3.0a1744266748.dist-info}/WHEEL +0 -0
  38. {pulumi_splunk-1.3.0a1743489547.dist-info → pulumi_splunk-1.3.0a1744266748.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -22,32 +23,32 @@ __all__ = ['OutputsTcpServerArgs', 'OutputsTcpServer']
22
23
  class OutputsTcpServerArgs:
23
24
  def __init__(__self__, *,
24
25
  acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
25
- disabled: Optional[pulumi.Input[bool]] = None,
26
- method: Optional[pulumi.Input[str]] = None,
27
- name: Optional[pulumi.Input[str]] = None,
28
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
29
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
30
- ssl_cipher: Optional[pulumi.Input[str]] = None,
31
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
32
- ssl_password: Optional[pulumi.Input[str]] = None,
33
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
34
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
26
+ disabled: Optional[pulumi.Input[builtins.bool]] = None,
27
+ method: Optional[pulumi.Input[builtins.str]] = None,
28
+ name: Optional[pulumi.Input[builtins.str]] = None,
29
+ ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
30
+ ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
31
+ ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
32
+ ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
33
+ ssl_password: Optional[pulumi.Input[builtins.str]] = None,
34
+ ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
35
+ ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None):
35
36
  """
36
37
  The set of arguments for constructing a OutputsTcpServer resource.
37
38
  :param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
38
- :param pulumi.Input[bool] disabled: If true, disables the group.
39
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
39
+ :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
40
+ :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
40
41
  The data distribution method used when two or more servers exist in the same forwarder group.
41
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
42
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
43
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
44
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
45
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
42
+ :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
43
+ :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
44
+ :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
45
+ :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
46
+ :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
46
47
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
47
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
48
+ :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
48
49
  The default Splunk Enterprise CAcert uses the password "password."
49
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
50
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
50
+ :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
51
+ :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
51
52
  """
52
53
  if acl is not None:
53
54
  pulumi.set(__self__, "acl", acl)
@@ -86,19 +87,19 @@ class OutputsTcpServerArgs:
86
87
 
87
88
  @property
88
89
  @pulumi.getter
89
- def disabled(self) -> Optional[pulumi.Input[bool]]:
90
+ def disabled(self) -> Optional[pulumi.Input[builtins.bool]]:
90
91
  """
91
92
  If true, disables the group.
92
93
  """
93
94
  return pulumi.get(self, "disabled")
94
95
 
95
96
  @disabled.setter
96
- def disabled(self, value: Optional[pulumi.Input[bool]]):
97
+ def disabled(self, value: Optional[pulumi.Input[builtins.bool]]):
97
98
  pulumi.set(self, "disabled", value)
98
99
 
99
100
  @property
100
101
  @pulumi.getter
101
- def method(self) -> Optional[pulumi.Input[str]]:
102
+ def method(self) -> Optional[pulumi.Input[builtins.str]]:
102
103
  """
103
104
  Valid values: (clone | balance | autobalance)
104
105
  The data distribution method used when two or more servers exist in the same forwarder group.
@@ -106,60 +107,60 @@ class OutputsTcpServerArgs:
106
107
  return pulumi.get(self, "method")
107
108
 
108
109
  @method.setter
109
- def method(self, value: Optional[pulumi.Input[str]]):
110
+ def method(self, value: Optional[pulumi.Input[builtins.str]]):
110
111
  pulumi.set(self, "method", value)
111
112
 
112
113
  @property
113
114
  @pulumi.getter
114
- def name(self) -> Optional[pulumi.Input[str]]:
115
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
115
116
  """
116
117
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
117
118
  """
118
119
  return pulumi.get(self, "name")
119
120
 
120
121
  @name.setter
121
- def name(self, value: Optional[pulumi.Input[str]]):
122
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
122
123
  pulumi.set(self, "name", value)
123
124
 
124
125
  @property
125
126
  @pulumi.getter(name="sslAltNameToCheck")
126
- def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
127
+ def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
127
128
  """
128
129
  The alternate name to match in the remote server's SSL certificate.
129
130
  """
130
131
  return pulumi.get(self, "ssl_alt_name_to_check")
131
132
 
132
133
  @ssl_alt_name_to_check.setter
133
- def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
134
+ def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
134
135
  pulumi.set(self, "ssl_alt_name_to_check", value)
135
136
 
136
137
  @property
137
138
  @pulumi.getter(name="sslCertPath")
138
- def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
139
+ def ssl_cert_path(self) -> Optional[pulumi.Input[builtins.str]]:
139
140
  """
140
141
  Path to the client certificate. If specified, connection uses SSL.
141
142
  """
142
143
  return pulumi.get(self, "ssl_cert_path")
143
144
 
144
145
  @ssl_cert_path.setter
145
- def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
146
+ def ssl_cert_path(self, value: Optional[pulumi.Input[builtins.str]]):
146
147
  pulumi.set(self, "ssl_cert_path", value)
147
148
 
148
149
  @property
149
150
  @pulumi.getter(name="sslCipher")
150
- def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
151
+ def ssl_cipher(self) -> Optional[pulumi.Input[builtins.str]]:
151
152
  """
152
153
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
153
154
  """
154
155
  return pulumi.get(self, "ssl_cipher")
155
156
 
156
157
  @ssl_cipher.setter
157
- def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
158
+ def ssl_cipher(self, value: Optional[pulumi.Input[builtins.str]]):
158
159
  pulumi.set(self, "ssl_cipher", value)
159
160
 
160
161
  @property
161
162
  @pulumi.getter(name="sslCommonNameToCheck")
162
- def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
163
+ def ssl_common_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
163
164
  """
164
165
  Check the common name of the server's certificate against this name.
165
166
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
@@ -167,12 +168,12 @@ class OutputsTcpServerArgs:
167
168
  return pulumi.get(self, "ssl_common_name_to_check")
168
169
 
169
170
  @ssl_common_name_to_check.setter
170
- def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
171
+ def ssl_common_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
171
172
  pulumi.set(self, "ssl_common_name_to_check", value)
172
173
 
173
174
  @property
174
175
  @pulumi.getter(name="sslPassword")
175
- def ssl_password(self) -> Optional[pulumi.Input[str]]:
176
+ def ssl_password(self) -> Optional[pulumi.Input[builtins.str]]:
176
177
  """
177
178
  The password associated with the CAcert.
178
179
  The default Splunk Enterprise CAcert uses the password "password."
@@ -180,31 +181,31 @@ class OutputsTcpServerArgs:
180
181
  return pulumi.get(self, "ssl_password")
181
182
 
182
183
  @ssl_password.setter
183
- def ssl_password(self, value: Optional[pulumi.Input[str]]):
184
+ def ssl_password(self, value: Optional[pulumi.Input[builtins.str]]):
184
185
  pulumi.set(self, "ssl_password", value)
185
186
 
186
187
  @property
187
188
  @pulumi.getter(name="sslRootCaPath")
188
- def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
189
+ def ssl_root_ca_path(self) -> Optional[pulumi.Input[builtins.str]]:
189
190
  """
190
191
  The path to the root certificate authority file.
191
192
  """
192
193
  return pulumi.get(self, "ssl_root_ca_path")
193
194
 
194
195
  @ssl_root_ca_path.setter
195
- def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
196
+ def ssl_root_ca_path(self, value: Optional[pulumi.Input[builtins.str]]):
196
197
  pulumi.set(self, "ssl_root_ca_path", value)
197
198
 
198
199
  @property
199
200
  @pulumi.getter(name="sslVerifyServerCert")
200
- def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
201
+ def ssl_verify_server_cert(self) -> Optional[pulumi.Input[builtins.bool]]:
201
202
  """
202
203
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
203
204
  """
204
205
  return pulumi.get(self, "ssl_verify_server_cert")
205
206
 
206
207
  @ssl_verify_server_cert.setter
207
- def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
208
+ def ssl_verify_server_cert(self, value: Optional[pulumi.Input[builtins.bool]]):
208
209
  pulumi.set(self, "ssl_verify_server_cert", value)
209
210
 
210
211
 
@@ -212,32 +213,32 @@ class OutputsTcpServerArgs:
212
213
  class _OutputsTcpServerState:
213
214
  def __init__(__self__, *,
214
215
  acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
215
- disabled: Optional[pulumi.Input[bool]] = None,
216
- method: Optional[pulumi.Input[str]] = None,
217
- name: Optional[pulumi.Input[str]] = None,
218
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
219
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
220
- ssl_cipher: Optional[pulumi.Input[str]] = None,
221
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
222
- ssl_password: Optional[pulumi.Input[str]] = None,
223
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
224
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
216
+ disabled: Optional[pulumi.Input[builtins.bool]] = None,
217
+ method: Optional[pulumi.Input[builtins.str]] = None,
218
+ name: Optional[pulumi.Input[builtins.str]] = None,
219
+ ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
220
+ ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
221
+ ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
222
+ ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
223
+ ssl_password: Optional[pulumi.Input[builtins.str]] = None,
224
+ ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
225
+ ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None):
225
226
  """
226
227
  Input properties used for looking up and filtering OutputsTcpServer resources.
227
228
  :param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
228
- :param pulumi.Input[bool] disabled: If true, disables the group.
229
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
229
+ :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
230
+ :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
230
231
  The data distribution method used when two or more servers exist in the same forwarder group.
231
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
232
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
233
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
234
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
235
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
232
+ :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
233
+ :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
234
+ :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
235
+ :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
236
+ :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
236
237
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
237
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
238
+ :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
238
239
  The default Splunk Enterprise CAcert uses the password "password."
239
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
240
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
240
+ :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
241
+ :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
241
242
  """
242
243
  if acl is not None:
243
244
  pulumi.set(__self__, "acl", acl)
@@ -276,19 +277,19 @@ class _OutputsTcpServerState:
276
277
 
277
278
  @property
278
279
  @pulumi.getter
279
- def disabled(self) -> Optional[pulumi.Input[bool]]:
280
+ def disabled(self) -> Optional[pulumi.Input[builtins.bool]]:
280
281
  """
281
282
  If true, disables the group.
282
283
  """
283
284
  return pulumi.get(self, "disabled")
284
285
 
285
286
  @disabled.setter
286
- def disabled(self, value: Optional[pulumi.Input[bool]]):
287
+ def disabled(self, value: Optional[pulumi.Input[builtins.bool]]):
287
288
  pulumi.set(self, "disabled", value)
288
289
 
289
290
  @property
290
291
  @pulumi.getter
291
- def method(self) -> Optional[pulumi.Input[str]]:
292
+ def method(self) -> Optional[pulumi.Input[builtins.str]]:
292
293
  """
293
294
  Valid values: (clone | balance | autobalance)
294
295
  The data distribution method used when two or more servers exist in the same forwarder group.
@@ -296,60 +297,60 @@ class _OutputsTcpServerState:
296
297
  return pulumi.get(self, "method")
297
298
 
298
299
  @method.setter
299
- def method(self, value: Optional[pulumi.Input[str]]):
300
+ def method(self, value: Optional[pulumi.Input[builtins.str]]):
300
301
  pulumi.set(self, "method", value)
301
302
 
302
303
  @property
303
304
  @pulumi.getter
304
- def name(self) -> Optional[pulumi.Input[str]]:
305
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
305
306
  """
306
307
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
307
308
  """
308
309
  return pulumi.get(self, "name")
309
310
 
310
311
  @name.setter
311
- def name(self, value: Optional[pulumi.Input[str]]):
312
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
312
313
  pulumi.set(self, "name", value)
313
314
 
314
315
  @property
315
316
  @pulumi.getter(name="sslAltNameToCheck")
316
- def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
317
+ def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
317
318
  """
318
319
  The alternate name to match in the remote server's SSL certificate.
319
320
  """
320
321
  return pulumi.get(self, "ssl_alt_name_to_check")
321
322
 
322
323
  @ssl_alt_name_to_check.setter
323
- def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
324
+ def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
324
325
  pulumi.set(self, "ssl_alt_name_to_check", value)
325
326
 
326
327
  @property
327
328
  @pulumi.getter(name="sslCertPath")
328
- def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
329
+ def ssl_cert_path(self) -> Optional[pulumi.Input[builtins.str]]:
329
330
  """
330
331
  Path to the client certificate. If specified, connection uses SSL.
331
332
  """
332
333
  return pulumi.get(self, "ssl_cert_path")
333
334
 
334
335
  @ssl_cert_path.setter
335
- def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
336
+ def ssl_cert_path(self, value: Optional[pulumi.Input[builtins.str]]):
336
337
  pulumi.set(self, "ssl_cert_path", value)
337
338
 
338
339
  @property
339
340
  @pulumi.getter(name="sslCipher")
340
- def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
341
+ def ssl_cipher(self) -> Optional[pulumi.Input[builtins.str]]:
341
342
  """
342
343
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
343
344
  """
344
345
  return pulumi.get(self, "ssl_cipher")
345
346
 
346
347
  @ssl_cipher.setter
347
- def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
348
+ def ssl_cipher(self, value: Optional[pulumi.Input[builtins.str]]):
348
349
  pulumi.set(self, "ssl_cipher", value)
349
350
 
350
351
  @property
351
352
  @pulumi.getter(name="sslCommonNameToCheck")
352
- def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
353
+ def ssl_common_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
353
354
  """
354
355
  Check the common name of the server's certificate against this name.
355
356
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
@@ -357,12 +358,12 @@ class _OutputsTcpServerState:
357
358
  return pulumi.get(self, "ssl_common_name_to_check")
358
359
 
359
360
  @ssl_common_name_to_check.setter
360
- def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
361
+ def ssl_common_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
361
362
  pulumi.set(self, "ssl_common_name_to_check", value)
362
363
 
363
364
  @property
364
365
  @pulumi.getter(name="sslPassword")
365
- def ssl_password(self) -> Optional[pulumi.Input[str]]:
366
+ def ssl_password(self) -> Optional[pulumi.Input[builtins.str]]:
366
367
  """
367
368
  The password associated with the CAcert.
368
369
  The default Splunk Enterprise CAcert uses the password "password."
@@ -370,31 +371,31 @@ class _OutputsTcpServerState:
370
371
  return pulumi.get(self, "ssl_password")
371
372
 
372
373
  @ssl_password.setter
373
- def ssl_password(self, value: Optional[pulumi.Input[str]]):
374
+ def ssl_password(self, value: Optional[pulumi.Input[builtins.str]]):
374
375
  pulumi.set(self, "ssl_password", value)
375
376
 
376
377
  @property
377
378
  @pulumi.getter(name="sslRootCaPath")
378
- def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
379
+ def ssl_root_ca_path(self) -> Optional[pulumi.Input[builtins.str]]:
379
380
  """
380
381
  The path to the root certificate authority file.
381
382
  """
382
383
  return pulumi.get(self, "ssl_root_ca_path")
383
384
 
384
385
  @ssl_root_ca_path.setter
385
- def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
386
+ def ssl_root_ca_path(self, value: Optional[pulumi.Input[builtins.str]]):
386
387
  pulumi.set(self, "ssl_root_ca_path", value)
387
388
 
388
389
  @property
389
390
  @pulumi.getter(name="sslVerifyServerCert")
390
- def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
391
+ def ssl_verify_server_cert(self) -> Optional[pulumi.Input[builtins.bool]]:
391
392
  """
392
393
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
393
394
  """
394
395
  return pulumi.get(self, "ssl_verify_server_cert")
395
396
 
396
397
  @ssl_verify_server_cert.setter
397
- def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
398
+ def ssl_verify_server_cert(self, value: Optional[pulumi.Input[builtins.bool]]):
398
399
  pulumi.set(self, "ssl_verify_server_cert", value)
399
400
 
400
401
 
@@ -404,16 +405,16 @@ class OutputsTcpServer(pulumi.CustomResource):
404
405
  resource_name: str,
405
406
  opts: Optional[pulumi.ResourceOptions] = None,
406
407
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
407
- disabled: Optional[pulumi.Input[bool]] = None,
408
- method: Optional[pulumi.Input[str]] = None,
409
- name: Optional[pulumi.Input[str]] = None,
410
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
411
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
412
- ssl_cipher: Optional[pulumi.Input[str]] = None,
413
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
414
- ssl_password: Optional[pulumi.Input[str]] = None,
415
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
416
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
408
+ disabled: Optional[pulumi.Input[builtins.bool]] = None,
409
+ method: Optional[pulumi.Input[builtins.str]] = None,
410
+ name: Optional[pulumi.Input[builtins.str]] = None,
411
+ ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
412
+ ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
413
+ ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
414
+ ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
415
+ ssl_password: Optional[pulumi.Input[builtins.str]] = None,
416
+ ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
417
+ ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None,
417
418
  __props__=None):
418
419
  """
419
420
  ## # Resource: OutputsTcpServer
@@ -434,19 +435,19 @@ class OutputsTcpServer(pulumi.CustomResource):
434
435
  :param str resource_name: The name of the resource.
435
436
  :param pulumi.ResourceOptions opts: Options for the resource.
436
437
  :param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
437
- :param pulumi.Input[bool] disabled: If true, disables the group.
438
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
438
+ :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
439
+ :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
439
440
  The data distribution method used when two or more servers exist in the same forwarder group.
440
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
441
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
442
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
443
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
444
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
441
+ :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
442
+ :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
443
+ :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
444
+ :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
445
+ :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
445
446
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
446
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
447
+ :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
447
448
  The default Splunk Enterprise CAcert uses the password "password."
448
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
449
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
449
+ :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
450
+ :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
450
451
  """
451
452
  ...
452
453
  @overload
@@ -486,16 +487,16 @@ class OutputsTcpServer(pulumi.CustomResource):
486
487
  resource_name: str,
487
488
  opts: Optional[pulumi.ResourceOptions] = None,
488
489
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
489
- disabled: Optional[pulumi.Input[bool]] = None,
490
- method: Optional[pulumi.Input[str]] = None,
491
- name: Optional[pulumi.Input[str]] = None,
492
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
493
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
494
- ssl_cipher: Optional[pulumi.Input[str]] = None,
495
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
496
- ssl_password: Optional[pulumi.Input[str]] = None,
497
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
498
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
490
+ disabled: Optional[pulumi.Input[builtins.bool]] = None,
491
+ method: Optional[pulumi.Input[builtins.str]] = None,
492
+ name: Optional[pulumi.Input[builtins.str]] = None,
493
+ ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
494
+ ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
495
+ ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
496
+ ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
497
+ ssl_password: Optional[pulumi.Input[builtins.str]] = None,
498
+ ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
499
+ ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None,
499
500
  __props__=None):
500
501
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
501
502
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -529,16 +530,16 @@ class OutputsTcpServer(pulumi.CustomResource):
529
530
  id: pulumi.Input[str],
530
531
  opts: Optional[pulumi.ResourceOptions] = None,
531
532
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
532
- disabled: Optional[pulumi.Input[bool]] = None,
533
- method: Optional[pulumi.Input[str]] = None,
534
- name: Optional[pulumi.Input[str]] = None,
535
- ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
536
- ssl_cert_path: Optional[pulumi.Input[str]] = None,
537
- ssl_cipher: Optional[pulumi.Input[str]] = None,
538
- ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
539
- ssl_password: Optional[pulumi.Input[str]] = None,
540
- ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
541
- ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None) -> 'OutputsTcpServer':
533
+ disabled: Optional[pulumi.Input[builtins.bool]] = None,
534
+ method: Optional[pulumi.Input[builtins.str]] = None,
535
+ name: Optional[pulumi.Input[builtins.str]] = None,
536
+ ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
537
+ ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
538
+ ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
539
+ ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
540
+ ssl_password: Optional[pulumi.Input[builtins.str]] = None,
541
+ ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
542
+ ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None) -> 'OutputsTcpServer':
542
543
  """
543
544
  Get an existing OutputsTcpServer resource's state with the given name, id, and optional extra
544
545
  properties used to qualify the lookup.
@@ -547,19 +548,19 @@ class OutputsTcpServer(pulumi.CustomResource):
547
548
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
548
549
  :param pulumi.ResourceOptions opts: Options for the resource.
549
550
  :param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
550
- :param pulumi.Input[bool] disabled: If true, disables the group.
551
- :param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
551
+ :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
552
+ :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
552
553
  The data distribution method used when two or more servers exist in the same forwarder group.
553
- :param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
554
- :param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
555
- :param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
556
- :param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
557
- :param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
554
+ :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
555
+ :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
556
+ :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
557
+ :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
558
+ :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
558
559
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
559
- :param pulumi.Input[str] ssl_password: The password associated with the CAcert.
560
+ :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
560
561
  The default Splunk Enterprise CAcert uses the password "password."
561
- :param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
562
- :param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
562
+ :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
563
+ :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
563
564
  """
564
565
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
565
566
 
@@ -588,7 +589,7 @@ class OutputsTcpServer(pulumi.CustomResource):
588
589
 
589
590
  @property
590
591
  @pulumi.getter
591
- def disabled(self) -> pulumi.Output[bool]:
592
+ def disabled(self) -> pulumi.Output[builtins.bool]:
592
593
  """
593
594
  If true, disables the group.
594
595
  """
@@ -596,7 +597,7 @@ class OutputsTcpServer(pulumi.CustomResource):
596
597
 
597
598
  @property
598
599
  @pulumi.getter
599
- def method(self) -> pulumi.Output[str]:
600
+ def method(self) -> pulumi.Output[builtins.str]:
600
601
  """
601
602
  Valid values: (clone | balance | autobalance)
602
603
  The data distribution method used when two or more servers exist in the same forwarder group.
@@ -605,7 +606,7 @@ class OutputsTcpServer(pulumi.CustomResource):
605
606
 
606
607
  @property
607
608
  @pulumi.getter
608
- def name(self) -> pulumi.Output[str]:
609
+ def name(self) -> pulumi.Output[builtins.str]:
609
610
  """
610
611
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
611
612
  """
@@ -613,7 +614,7 @@ class OutputsTcpServer(pulumi.CustomResource):
613
614
 
614
615
  @property
615
616
  @pulumi.getter(name="sslAltNameToCheck")
616
- def ssl_alt_name_to_check(self) -> pulumi.Output[str]:
617
+ def ssl_alt_name_to_check(self) -> pulumi.Output[builtins.str]:
617
618
  """
618
619
  The alternate name to match in the remote server's SSL certificate.
619
620
  """
@@ -621,7 +622,7 @@ class OutputsTcpServer(pulumi.CustomResource):
621
622
 
622
623
  @property
623
624
  @pulumi.getter(name="sslCertPath")
624
- def ssl_cert_path(self) -> pulumi.Output[str]:
625
+ def ssl_cert_path(self) -> pulumi.Output[builtins.str]:
625
626
  """
626
627
  Path to the client certificate. If specified, connection uses SSL.
627
628
  """
@@ -629,7 +630,7 @@ class OutputsTcpServer(pulumi.CustomResource):
629
630
 
630
631
  @property
631
632
  @pulumi.getter(name="sslCipher")
632
- def ssl_cipher(self) -> pulumi.Output[str]:
633
+ def ssl_cipher(self) -> pulumi.Output[builtins.str]:
633
634
  """
634
635
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
635
636
  """
@@ -637,7 +638,7 @@ class OutputsTcpServer(pulumi.CustomResource):
637
638
 
638
639
  @property
639
640
  @pulumi.getter(name="sslCommonNameToCheck")
640
- def ssl_common_name_to_check(self) -> pulumi.Output[str]:
641
+ def ssl_common_name_to_check(self) -> pulumi.Output[builtins.str]:
641
642
  """
642
643
  Check the common name of the server's certificate against this name.
643
644
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
@@ -646,7 +647,7 @@ class OutputsTcpServer(pulumi.CustomResource):
646
647
 
647
648
  @property
648
649
  @pulumi.getter(name="sslPassword")
649
- def ssl_password(self) -> pulumi.Output[str]:
650
+ def ssl_password(self) -> pulumi.Output[builtins.str]:
650
651
  """
651
652
  The password associated with the CAcert.
652
653
  The default Splunk Enterprise CAcert uses the password "password."
@@ -655,7 +656,7 @@ class OutputsTcpServer(pulumi.CustomResource):
655
656
 
656
657
  @property
657
658
  @pulumi.getter(name="sslRootCaPath")
658
- def ssl_root_ca_path(self) -> pulumi.Output[str]:
659
+ def ssl_root_ca_path(self) -> pulumi.Output[builtins.str]:
659
660
  """
660
661
  The path to the root certificate authority file.
661
662
  """
@@ -663,7 +664,7 @@ class OutputsTcpServer(pulumi.CustomResource):
663
664
 
664
665
  @property
665
666
  @pulumi.getter(name="sslVerifyServerCert")
666
- def ssl_verify_server_cert(self) -> pulumi.Output[bool]:
667
+ def ssl_verify_server_cert(self) -> pulumi.Output[builtins.bool]:
667
668
  """
668
669
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
669
670
  """