pulumi-splunk 1.3.0a1743489547__py3-none-any.whl → 1.3.0a1744266748__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-splunk might be problematic. Click here for more details.
- pulumi_splunk/__init__.py +1 -0
- pulumi_splunk/_inputs.py +1065 -1064
- pulumi_splunk/admin_saml_groups.py +29 -28
- pulumi_splunk/apps_local.py +169 -168
- pulumi_splunk/authentication_users.py +127 -126
- pulumi_splunk/authorization_roles.py +183 -182
- pulumi_splunk/config/__init__.py +1 -0
- pulumi_splunk/config/__init__.pyi +1 -0
- pulumi_splunk/config/vars.py +1 -0
- pulumi_splunk/configs_conf.py +29 -28
- pulumi_splunk/data_ui_views.py +29 -28
- pulumi_splunk/generic_acl.py +15 -14
- pulumi_splunk/global_http_event_collector.py +99 -98
- pulumi_splunk/indexes.py +533 -532
- pulumi_splunk/inputs_http_event_collector.py +127 -126
- pulumi_splunk/inputs_monitor.py +211 -210
- pulumi_splunk/inputs_script.py +127 -126
- pulumi_splunk/inputs_tcp_cooked.py +71 -70
- pulumi_splunk/inputs_tcp_raw.py +141 -140
- pulumi_splunk/inputs_tcp_splunk_tcp_token.py +29 -28
- pulumi_splunk/inputs_tcp_ssl.py +71 -70
- pulumi_splunk/inputs_udp.py +155 -154
- pulumi_splunk/lookup_definition.py +29 -28
- pulumi_splunk/lookup_table_file.py +57 -56
- pulumi_splunk/outputs.py +647 -646
- pulumi_splunk/outputs_tcp_default.py +113 -112
- pulumi_splunk/outputs_tcp_group.py +141 -140
- pulumi_splunk/outputs_tcp_server.py +141 -140
- pulumi_splunk/outputs_tcp_syslog.py +99 -98
- pulumi_splunk/provider.py +47 -46
- pulumi_splunk/pulumi-plugin.json +1 -1
- pulumi_splunk/saved_searches.py +2304 -2303
- pulumi_splunk/sh_indexes_manager.py +57 -56
- {pulumi_splunk-1.3.0a1743489547.dist-info → pulumi_splunk-1.3.0a1744266748.dist-info}/METADATA +1 -1
- pulumi_splunk-1.3.0a1744266748.dist-info/RECORD +39 -0
- pulumi_splunk-1.3.0a1743489547.dist-info/RECORD +0 -39
- {pulumi_splunk-1.3.0a1743489547.dist-info → pulumi_splunk-1.3.0a1744266748.dist-info}/WHEEL +0 -0
- {pulumi_splunk-1.3.0a1743489547.dist-info → pulumi_splunk-1.3.0a1744266748.dist-info}/top_level.txt +0 -0
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
|
|
5
|
+
import builtins
|
|
5
6
|
import copy
|
|
6
7
|
import warnings
|
|
7
8
|
import sys
|
|
@@ -22,32 +23,32 @@ __all__ = ['OutputsTcpServerArgs', 'OutputsTcpServer']
|
|
|
22
23
|
class OutputsTcpServerArgs:
|
|
23
24
|
def __init__(__self__, *,
|
|
24
25
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
25
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
26
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
27
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
28
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
29
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
30
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
31
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
32
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
33
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
34
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
|
|
26
|
+
disabled: Optional[pulumi.Input[builtins.bool]] = None,
|
|
27
|
+
method: Optional[pulumi.Input[builtins.str]] = None,
|
|
28
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
29
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
30
|
+
ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
31
|
+
ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
|
|
32
|
+
ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
33
|
+
ssl_password: Optional[pulumi.Input[builtins.str]] = None,
|
|
34
|
+
ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
35
|
+
ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None):
|
|
35
36
|
"""
|
|
36
37
|
The set of arguments for constructing a OutputsTcpServer resource.
|
|
37
38
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
38
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
39
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
39
|
+
:param pulumi.Input[builtins.bool] disabled: If true, disables the group.
|
|
40
|
+
:param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
40
41
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
41
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
42
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
43
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
44
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
45
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
42
|
+
:param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
43
|
+
:param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
44
|
+
:param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
45
|
+
:param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
46
|
+
:param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
46
47
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
47
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
48
|
+
:param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
|
|
48
49
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
49
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
50
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
50
|
+
:param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
51
|
+
:param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
51
52
|
"""
|
|
52
53
|
if acl is not None:
|
|
53
54
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -86,19 +87,19 @@ class OutputsTcpServerArgs:
|
|
|
86
87
|
|
|
87
88
|
@property
|
|
88
89
|
@pulumi.getter
|
|
89
|
-
def disabled(self) -> Optional[pulumi.Input[bool]]:
|
|
90
|
+
def disabled(self) -> Optional[pulumi.Input[builtins.bool]]:
|
|
90
91
|
"""
|
|
91
92
|
If true, disables the group.
|
|
92
93
|
"""
|
|
93
94
|
return pulumi.get(self, "disabled")
|
|
94
95
|
|
|
95
96
|
@disabled.setter
|
|
96
|
-
def disabled(self, value: Optional[pulumi.Input[bool]]):
|
|
97
|
+
def disabled(self, value: Optional[pulumi.Input[builtins.bool]]):
|
|
97
98
|
pulumi.set(self, "disabled", value)
|
|
98
99
|
|
|
99
100
|
@property
|
|
100
101
|
@pulumi.getter
|
|
101
|
-
def method(self) -> Optional[pulumi.Input[str]]:
|
|
102
|
+
def method(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
102
103
|
"""
|
|
103
104
|
Valid values: (clone | balance | autobalance)
|
|
104
105
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -106,60 +107,60 @@ class OutputsTcpServerArgs:
|
|
|
106
107
|
return pulumi.get(self, "method")
|
|
107
108
|
|
|
108
109
|
@method.setter
|
|
109
|
-
def method(self, value: Optional[pulumi.Input[str]]):
|
|
110
|
+
def method(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
110
111
|
pulumi.set(self, "method", value)
|
|
111
112
|
|
|
112
113
|
@property
|
|
113
114
|
@pulumi.getter
|
|
114
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
115
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
115
116
|
"""
|
|
116
117
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
117
118
|
"""
|
|
118
119
|
return pulumi.get(self, "name")
|
|
119
120
|
|
|
120
121
|
@name.setter
|
|
121
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
122
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
122
123
|
pulumi.set(self, "name", value)
|
|
123
124
|
|
|
124
125
|
@property
|
|
125
126
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
126
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
127
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
127
128
|
"""
|
|
128
129
|
The alternate name to match in the remote server's SSL certificate.
|
|
129
130
|
"""
|
|
130
131
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
131
132
|
|
|
132
133
|
@ssl_alt_name_to_check.setter
|
|
133
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
134
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
134
135
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
135
136
|
|
|
136
137
|
@property
|
|
137
138
|
@pulumi.getter(name="sslCertPath")
|
|
138
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
|
|
139
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
139
140
|
"""
|
|
140
141
|
Path to the client certificate. If specified, connection uses SSL.
|
|
141
142
|
"""
|
|
142
143
|
return pulumi.get(self, "ssl_cert_path")
|
|
143
144
|
|
|
144
145
|
@ssl_cert_path.setter
|
|
145
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
|
|
146
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
146
147
|
pulumi.set(self, "ssl_cert_path", value)
|
|
147
148
|
|
|
148
149
|
@property
|
|
149
150
|
@pulumi.getter(name="sslCipher")
|
|
150
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
|
|
151
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
151
152
|
"""
|
|
152
153
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
153
154
|
"""
|
|
154
155
|
return pulumi.get(self, "ssl_cipher")
|
|
155
156
|
|
|
156
157
|
@ssl_cipher.setter
|
|
157
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
|
|
158
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
158
159
|
pulumi.set(self, "ssl_cipher", value)
|
|
159
160
|
|
|
160
161
|
@property
|
|
161
162
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
162
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
163
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
163
164
|
"""
|
|
164
165
|
Check the common name of the server's certificate against this name.
|
|
165
166
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -167,12 +168,12 @@ class OutputsTcpServerArgs:
|
|
|
167
168
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
168
169
|
|
|
169
170
|
@ssl_common_name_to_check.setter
|
|
170
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
171
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
171
172
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
172
173
|
|
|
173
174
|
@property
|
|
174
175
|
@pulumi.getter(name="sslPassword")
|
|
175
|
-
def ssl_password(self) -> Optional[pulumi.Input[str]]:
|
|
176
|
+
def ssl_password(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
176
177
|
"""
|
|
177
178
|
The password associated with the CAcert.
|
|
178
179
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -180,31 +181,31 @@ class OutputsTcpServerArgs:
|
|
|
180
181
|
return pulumi.get(self, "ssl_password")
|
|
181
182
|
|
|
182
183
|
@ssl_password.setter
|
|
183
|
-
def ssl_password(self, value: Optional[pulumi.Input[str]]):
|
|
184
|
+
def ssl_password(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
184
185
|
pulumi.set(self, "ssl_password", value)
|
|
185
186
|
|
|
186
187
|
@property
|
|
187
188
|
@pulumi.getter(name="sslRootCaPath")
|
|
188
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
|
|
189
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
189
190
|
"""
|
|
190
191
|
The path to the root certificate authority file.
|
|
191
192
|
"""
|
|
192
193
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
193
194
|
|
|
194
195
|
@ssl_root_ca_path.setter
|
|
195
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
|
|
196
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
196
197
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
197
198
|
|
|
198
199
|
@property
|
|
199
200
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
200
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
|
|
201
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[builtins.bool]]:
|
|
201
202
|
"""
|
|
202
203
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
203
204
|
"""
|
|
204
205
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
205
206
|
|
|
206
207
|
@ssl_verify_server_cert.setter
|
|
207
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
|
|
208
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[builtins.bool]]):
|
|
208
209
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
209
210
|
|
|
210
211
|
|
|
@@ -212,32 +213,32 @@ class OutputsTcpServerArgs:
|
|
|
212
213
|
class _OutputsTcpServerState:
|
|
213
214
|
def __init__(__self__, *,
|
|
214
215
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
215
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
216
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
217
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
218
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
219
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
220
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
221
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
222
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
223
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
224
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None):
|
|
216
|
+
disabled: Optional[pulumi.Input[builtins.bool]] = None,
|
|
217
|
+
method: Optional[pulumi.Input[builtins.str]] = None,
|
|
218
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
219
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
220
|
+
ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
221
|
+
ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
|
|
222
|
+
ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
223
|
+
ssl_password: Optional[pulumi.Input[builtins.str]] = None,
|
|
224
|
+
ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
225
|
+
ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None):
|
|
225
226
|
"""
|
|
226
227
|
Input properties used for looking up and filtering OutputsTcpServer resources.
|
|
227
228
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
228
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
229
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
229
|
+
:param pulumi.Input[builtins.bool] disabled: If true, disables the group.
|
|
230
|
+
:param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
230
231
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
231
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
232
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
233
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
234
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
235
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
232
|
+
:param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
233
|
+
:param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
234
|
+
:param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
235
|
+
:param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
236
|
+
:param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
236
237
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
237
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
238
|
+
:param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
|
|
238
239
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
239
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
240
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
240
|
+
:param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
241
|
+
:param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
241
242
|
"""
|
|
242
243
|
if acl is not None:
|
|
243
244
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -276,19 +277,19 @@ class _OutputsTcpServerState:
|
|
|
276
277
|
|
|
277
278
|
@property
|
|
278
279
|
@pulumi.getter
|
|
279
|
-
def disabled(self) -> Optional[pulumi.Input[bool]]:
|
|
280
|
+
def disabled(self) -> Optional[pulumi.Input[builtins.bool]]:
|
|
280
281
|
"""
|
|
281
282
|
If true, disables the group.
|
|
282
283
|
"""
|
|
283
284
|
return pulumi.get(self, "disabled")
|
|
284
285
|
|
|
285
286
|
@disabled.setter
|
|
286
|
-
def disabled(self, value: Optional[pulumi.Input[bool]]):
|
|
287
|
+
def disabled(self, value: Optional[pulumi.Input[builtins.bool]]):
|
|
287
288
|
pulumi.set(self, "disabled", value)
|
|
288
289
|
|
|
289
290
|
@property
|
|
290
291
|
@pulumi.getter
|
|
291
|
-
def method(self) -> Optional[pulumi.Input[str]]:
|
|
292
|
+
def method(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
292
293
|
"""
|
|
293
294
|
Valid values: (clone | balance | autobalance)
|
|
294
295
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -296,60 +297,60 @@ class _OutputsTcpServerState:
|
|
|
296
297
|
return pulumi.get(self, "method")
|
|
297
298
|
|
|
298
299
|
@method.setter
|
|
299
|
-
def method(self, value: Optional[pulumi.Input[str]]):
|
|
300
|
+
def method(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
300
301
|
pulumi.set(self, "method", value)
|
|
301
302
|
|
|
302
303
|
@property
|
|
303
304
|
@pulumi.getter
|
|
304
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
305
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
305
306
|
"""
|
|
306
307
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
307
308
|
"""
|
|
308
309
|
return pulumi.get(self, "name")
|
|
309
310
|
|
|
310
311
|
@name.setter
|
|
311
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
312
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
312
313
|
pulumi.set(self, "name", value)
|
|
313
314
|
|
|
314
315
|
@property
|
|
315
316
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
316
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
317
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
317
318
|
"""
|
|
318
319
|
The alternate name to match in the remote server's SSL certificate.
|
|
319
320
|
"""
|
|
320
321
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
321
322
|
|
|
322
323
|
@ssl_alt_name_to_check.setter
|
|
323
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
324
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
324
325
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
325
326
|
|
|
326
327
|
@property
|
|
327
328
|
@pulumi.getter(name="sslCertPath")
|
|
328
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[str]]:
|
|
329
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
329
330
|
"""
|
|
330
331
|
Path to the client certificate. If specified, connection uses SSL.
|
|
331
332
|
"""
|
|
332
333
|
return pulumi.get(self, "ssl_cert_path")
|
|
333
334
|
|
|
334
335
|
@ssl_cert_path.setter
|
|
335
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[str]]):
|
|
336
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
336
337
|
pulumi.set(self, "ssl_cert_path", value)
|
|
337
338
|
|
|
338
339
|
@property
|
|
339
340
|
@pulumi.getter(name="sslCipher")
|
|
340
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[str]]:
|
|
341
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
341
342
|
"""
|
|
342
343
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
343
344
|
"""
|
|
344
345
|
return pulumi.get(self, "ssl_cipher")
|
|
345
346
|
|
|
346
347
|
@ssl_cipher.setter
|
|
347
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[str]]):
|
|
348
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
348
349
|
pulumi.set(self, "ssl_cipher", value)
|
|
349
350
|
|
|
350
351
|
@property
|
|
351
352
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
352
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[str]]:
|
|
353
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
353
354
|
"""
|
|
354
355
|
Check the common name of the server's certificate against this name.
|
|
355
356
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -357,12 +358,12 @@ class _OutputsTcpServerState:
|
|
|
357
358
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
358
359
|
|
|
359
360
|
@ssl_common_name_to_check.setter
|
|
360
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[str]]):
|
|
361
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
361
362
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
362
363
|
|
|
363
364
|
@property
|
|
364
365
|
@pulumi.getter(name="sslPassword")
|
|
365
|
-
def ssl_password(self) -> Optional[pulumi.Input[str]]:
|
|
366
|
+
def ssl_password(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
366
367
|
"""
|
|
367
368
|
The password associated with the CAcert.
|
|
368
369
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -370,31 +371,31 @@ class _OutputsTcpServerState:
|
|
|
370
371
|
return pulumi.get(self, "ssl_password")
|
|
371
372
|
|
|
372
373
|
@ssl_password.setter
|
|
373
|
-
def ssl_password(self, value: Optional[pulumi.Input[str]]):
|
|
374
|
+
def ssl_password(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
374
375
|
pulumi.set(self, "ssl_password", value)
|
|
375
376
|
|
|
376
377
|
@property
|
|
377
378
|
@pulumi.getter(name="sslRootCaPath")
|
|
378
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[str]]:
|
|
379
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
379
380
|
"""
|
|
380
381
|
The path to the root certificate authority file.
|
|
381
382
|
"""
|
|
382
383
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
383
384
|
|
|
384
385
|
@ssl_root_ca_path.setter
|
|
385
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[str]]):
|
|
386
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
386
387
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
387
388
|
|
|
388
389
|
@property
|
|
389
390
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
390
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[bool]]:
|
|
391
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[builtins.bool]]:
|
|
391
392
|
"""
|
|
392
393
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
393
394
|
"""
|
|
394
395
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
395
396
|
|
|
396
397
|
@ssl_verify_server_cert.setter
|
|
397
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[bool]]):
|
|
398
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[builtins.bool]]):
|
|
398
399
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
399
400
|
|
|
400
401
|
|
|
@@ -404,16 +405,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
404
405
|
resource_name: str,
|
|
405
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
406
407
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
407
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
408
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
409
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
410
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
411
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
412
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
413
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
414
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
415
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
416
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
|
|
408
|
+
disabled: Optional[pulumi.Input[builtins.bool]] = None,
|
|
409
|
+
method: Optional[pulumi.Input[builtins.str]] = None,
|
|
410
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
411
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
412
|
+
ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
413
|
+
ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
|
|
414
|
+
ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
415
|
+
ssl_password: Optional[pulumi.Input[builtins.str]] = None,
|
|
416
|
+
ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
417
|
+
ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None,
|
|
417
418
|
__props__=None):
|
|
418
419
|
"""
|
|
419
420
|
## # Resource: OutputsTcpServer
|
|
@@ -434,19 +435,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
434
435
|
:param str resource_name: The name of the resource.
|
|
435
436
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
436
437
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
437
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
438
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
438
|
+
:param pulumi.Input[builtins.bool] disabled: If true, disables the group.
|
|
439
|
+
:param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
439
440
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
440
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
441
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
442
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
443
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
444
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
441
|
+
:param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
442
|
+
:param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
443
|
+
:param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
444
|
+
:param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
445
|
+
:param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
445
446
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
446
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
447
|
+
:param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
|
|
447
448
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
448
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
449
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
449
|
+
:param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
450
|
+
:param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
450
451
|
"""
|
|
451
452
|
...
|
|
452
453
|
@overload
|
|
@@ -486,16 +487,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
486
487
|
resource_name: str,
|
|
487
488
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
488
489
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
489
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
490
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
491
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
492
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
493
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
494
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
495
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
496
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
497
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
498
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None,
|
|
490
|
+
disabled: Optional[pulumi.Input[builtins.bool]] = None,
|
|
491
|
+
method: Optional[pulumi.Input[builtins.str]] = None,
|
|
492
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
493
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
494
|
+
ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
495
|
+
ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
|
|
496
|
+
ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
497
|
+
ssl_password: Optional[pulumi.Input[builtins.str]] = None,
|
|
498
|
+
ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
499
|
+
ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None,
|
|
499
500
|
__props__=None):
|
|
500
501
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
501
502
|
if not isinstance(opts, pulumi.ResourceOptions):
|
|
@@ -529,16 +530,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
529
530
|
id: pulumi.Input[str],
|
|
530
531
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
531
532
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
532
|
-
disabled: Optional[pulumi.Input[bool]] = None,
|
|
533
|
-
method: Optional[pulumi.Input[str]] = None,
|
|
534
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
535
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
536
|
-
ssl_cert_path: Optional[pulumi.Input[str]] = None,
|
|
537
|
-
ssl_cipher: Optional[pulumi.Input[str]] = None,
|
|
538
|
-
ssl_common_name_to_check: Optional[pulumi.Input[str]] = None,
|
|
539
|
-
ssl_password: Optional[pulumi.Input[str]] = None,
|
|
540
|
-
ssl_root_ca_path: Optional[pulumi.Input[str]] = None,
|
|
541
|
-
ssl_verify_server_cert: Optional[pulumi.Input[bool]] = None) -> 'OutputsTcpServer':
|
|
533
|
+
disabled: Optional[pulumi.Input[builtins.bool]] = None,
|
|
534
|
+
method: Optional[pulumi.Input[builtins.str]] = None,
|
|
535
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
|
536
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
537
|
+
ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
538
|
+
ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
|
|
539
|
+
ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
|
|
540
|
+
ssl_password: Optional[pulumi.Input[builtins.str]] = None,
|
|
541
|
+
ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
|
|
542
|
+
ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None) -> 'OutputsTcpServer':
|
|
542
543
|
"""
|
|
543
544
|
Get an existing OutputsTcpServer resource's state with the given name, id, and optional extra
|
|
544
545
|
properties used to qualify the lookup.
|
|
@@ -547,19 +548,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
547
548
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
548
549
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
549
550
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
550
|
-
:param pulumi.Input[bool] disabled: If true, disables the group.
|
|
551
|
-
:param pulumi.Input[str] method: Valid values: (clone | balance | autobalance)
|
|
551
|
+
:param pulumi.Input[builtins.bool] disabled: If true, disables the group.
|
|
552
|
+
:param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
552
553
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
553
|
-
:param pulumi.Input[str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
554
|
-
:param pulumi.Input[str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
555
|
-
:param pulumi.Input[str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
556
|
-
:param pulumi.Input[str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
557
|
-
:param pulumi.Input[str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
554
|
+
:param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
555
|
+
:param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
556
|
+
:param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
557
|
+
:param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
558
|
+
:param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
558
559
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
559
|
-
:param pulumi.Input[str] ssl_password: The password associated with the CAcert.
|
|
560
|
+
:param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
|
|
560
561
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
561
|
-
:param pulumi.Input[str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
562
|
-
:param pulumi.Input[bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
562
|
+
:param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
563
|
+
:param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
563
564
|
"""
|
|
564
565
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
565
566
|
|
|
@@ -588,7 +589,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
588
589
|
|
|
589
590
|
@property
|
|
590
591
|
@pulumi.getter
|
|
591
|
-
def disabled(self) -> pulumi.Output[bool]:
|
|
592
|
+
def disabled(self) -> pulumi.Output[builtins.bool]:
|
|
592
593
|
"""
|
|
593
594
|
If true, disables the group.
|
|
594
595
|
"""
|
|
@@ -596,7 +597,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
596
597
|
|
|
597
598
|
@property
|
|
598
599
|
@pulumi.getter
|
|
599
|
-
def method(self) -> pulumi.Output[str]:
|
|
600
|
+
def method(self) -> pulumi.Output[builtins.str]:
|
|
600
601
|
"""
|
|
601
602
|
Valid values: (clone | balance | autobalance)
|
|
602
603
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -605,7 +606,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
605
606
|
|
|
606
607
|
@property
|
|
607
608
|
@pulumi.getter
|
|
608
|
-
def name(self) -> pulumi.Output[str]:
|
|
609
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
|
609
610
|
"""
|
|
610
611
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
611
612
|
"""
|
|
@@ -613,7 +614,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
613
614
|
|
|
614
615
|
@property
|
|
615
616
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
616
|
-
def ssl_alt_name_to_check(self) -> pulumi.Output[str]:
|
|
617
|
+
def ssl_alt_name_to_check(self) -> pulumi.Output[builtins.str]:
|
|
617
618
|
"""
|
|
618
619
|
The alternate name to match in the remote server's SSL certificate.
|
|
619
620
|
"""
|
|
@@ -621,7 +622,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
621
622
|
|
|
622
623
|
@property
|
|
623
624
|
@pulumi.getter(name="sslCertPath")
|
|
624
|
-
def ssl_cert_path(self) -> pulumi.Output[str]:
|
|
625
|
+
def ssl_cert_path(self) -> pulumi.Output[builtins.str]:
|
|
625
626
|
"""
|
|
626
627
|
Path to the client certificate. If specified, connection uses SSL.
|
|
627
628
|
"""
|
|
@@ -629,7 +630,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
629
630
|
|
|
630
631
|
@property
|
|
631
632
|
@pulumi.getter(name="sslCipher")
|
|
632
|
-
def ssl_cipher(self) -> pulumi.Output[str]:
|
|
633
|
+
def ssl_cipher(self) -> pulumi.Output[builtins.str]:
|
|
633
634
|
"""
|
|
634
635
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
635
636
|
"""
|
|
@@ -637,7 +638,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
637
638
|
|
|
638
639
|
@property
|
|
639
640
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
640
|
-
def ssl_common_name_to_check(self) -> pulumi.Output[str]:
|
|
641
|
+
def ssl_common_name_to_check(self) -> pulumi.Output[builtins.str]:
|
|
641
642
|
"""
|
|
642
643
|
Check the common name of the server's certificate against this name.
|
|
643
644
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -646,7 +647,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
646
647
|
|
|
647
648
|
@property
|
|
648
649
|
@pulumi.getter(name="sslPassword")
|
|
649
|
-
def ssl_password(self) -> pulumi.Output[str]:
|
|
650
|
+
def ssl_password(self) -> pulumi.Output[builtins.str]:
|
|
650
651
|
"""
|
|
651
652
|
The password associated with the CAcert.
|
|
652
653
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -655,7 +656,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
655
656
|
|
|
656
657
|
@property
|
|
657
658
|
@pulumi.getter(name="sslRootCaPath")
|
|
658
|
-
def ssl_root_ca_path(self) -> pulumi.Output[str]:
|
|
659
|
+
def ssl_root_ca_path(self) -> pulumi.Output[builtins.str]:
|
|
659
660
|
"""
|
|
660
661
|
The path to the root certificate authority file.
|
|
661
662
|
"""
|
|
@@ -663,7 +664,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
663
664
|
|
|
664
665
|
@property
|
|
665
666
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
666
|
-
def ssl_verify_server_cert(self) -> pulumi.Output[bool]:
|
|
667
|
+
def ssl_verify_server_cert(self) -> pulumi.Output[builtins.bool]:
|
|
667
668
|
"""
|
|
668
669
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
669
670
|
"""
|