pulumi-splunk 1.3.0a1744699028__py3-none-any.whl → 1.3.0a1762412804__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-splunk might be problematic. Click here for more details.
- pulumi_splunk/__init__.py +2 -2
- pulumi_splunk/_inputs.py +1275 -1276
- pulumi_splunk/_utilities.py +1 -1
- pulumi_splunk/admin_saml_groups.py +37 -37
- pulumi_splunk/apps_local.py +210 -210
- pulumi_splunk/authentication_users.py +156 -156
- pulumi_splunk/authorization_roles.py +224 -224
- pulumi_splunk/config/__init__.py +2 -2
- pulumi_splunk/config/__init__.pyi +3 -5
- pulumi_splunk/config/vars.py +9 -11
- pulumi_splunk/configs_conf.py +40 -40
- pulumi_splunk/data_ui_views.py +40 -40
- pulumi_splunk/generic_acl.py +23 -23
- pulumi_splunk/global_http_event_collector.py +122 -122
- pulumi_splunk/indexes.py +652 -652
- pulumi_splunk/inputs_http_event_collector.py +159 -159
- pulumi_splunk/inputs_monitor.py +261 -261
- pulumi_splunk/inputs_script.py +159 -159
- pulumi_splunk/inputs_tcp_cooked.py +91 -91
- pulumi_splunk/inputs_tcp_raw.py +176 -176
- pulumi_splunk/inputs_tcp_splunk_tcp_token.py +40 -40
- pulumi_splunk/inputs_tcp_ssl.py +88 -88
- pulumi_splunk/inputs_udp.py +193 -193
- pulumi_splunk/lookup_definition.py +40 -40
- pulumi_splunk/lookup_table_file.py +71 -71
- pulumi_splunk/outputs.py +857 -858
- pulumi_splunk/outputs_tcp_default.py +142 -142
- pulumi_splunk/outputs_tcp_group.py +176 -176
- pulumi_splunk/outputs_tcp_server.py +176 -176
- pulumi_splunk/outputs_tcp_syslog.py +125 -125
- pulumi_splunk/provider.py +94 -79
- pulumi_splunk/pulumi-plugin.json +1 -1
- pulumi_splunk/saved_searches.py +3099 -2887
- pulumi_splunk/sh_indexes_manager.py +74 -74
- {pulumi_splunk-1.3.0a1744699028.dist-info → pulumi_splunk-1.3.0a1762412804.dist-info}/METADATA +2 -2
- pulumi_splunk-1.3.0a1762412804.dist-info/RECORD +39 -0
- {pulumi_splunk-1.3.0a1744699028.dist-info → pulumi_splunk-1.3.0a1762412804.dist-info}/WHEEL +1 -1
- pulumi_splunk-1.3.0a1744699028.dist-info/RECORD +0 -39
- {pulumi_splunk-1.3.0a1744699028.dist-info → pulumi_splunk-1.3.0a1762412804.dist-info}/top_level.txt +0 -0
|
@@ -1,9 +1,8 @@
|
|
|
1
1
|
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
|
|
5
|
-
import builtins
|
|
6
|
-
import copy
|
|
5
|
+
import builtins as _builtins
|
|
7
6
|
import warnings
|
|
8
7
|
import sys
|
|
9
8
|
import pulumi
|
|
@@ -23,32 +22,32 @@ __all__ = ['OutputsTcpServerArgs', 'OutputsTcpServer']
|
|
|
23
22
|
class OutputsTcpServerArgs:
|
|
24
23
|
def __init__(__self__, *,
|
|
25
24
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
26
|
-
disabled: Optional[pulumi.Input[
|
|
27
|
-
method: Optional[pulumi.Input[
|
|
28
|
-
name: Optional[pulumi.Input[
|
|
29
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
30
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
31
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
32
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
33
|
-
ssl_password: Optional[pulumi.Input[
|
|
34
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
35
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
25
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
26
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
31
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
33
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
36
35
|
"""
|
|
37
36
|
The set of arguments for constructing a OutputsTcpServer resource.
|
|
38
37
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
39
|
-
:param pulumi.Input[
|
|
40
|
-
:param pulumi.Input[
|
|
38
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
39
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
41
40
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
42
|
-
:param pulumi.Input[
|
|
43
|
-
:param pulumi.Input[
|
|
44
|
-
:param pulumi.Input[
|
|
45
|
-
:param pulumi.Input[
|
|
46
|
-
:param pulumi.Input[
|
|
41
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
42
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
43
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
44
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
45
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
47
46
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
48
|
-
:param pulumi.Input[
|
|
47
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
49
48
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
50
|
-
:param pulumi.Input[
|
|
51
|
-
:param pulumi.Input[
|
|
49
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
50
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
52
51
|
"""
|
|
53
52
|
if acl is not None:
|
|
54
53
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -73,7 +72,7 @@ class OutputsTcpServerArgs:
|
|
|
73
72
|
if ssl_verify_server_cert is not None:
|
|
74
73
|
pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
|
|
75
74
|
|
|
76
|
-
@property
|
|
75
|
+
@_builtins.property
|
|
77
76
|
@pulumi.getter
|
|
78
77
|
def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
|
|
79
78
|
"""
|
|
@@ -85,21 +84,21 @@ class OutputsTcpServerArgs:
|
|
|
85
84
|
def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
|
|
86
85
|
pulumi.set(self, "acl", value)
|
|
87
86
|
|
|
88
|
-
@property
|
|
87
|
+
@_builtins.property
|
|
89
88
|
@pulumi.getter
|
|
90
|
-
def disabled(self) -> Optional[pulumi.Input[
|
|
89
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
91
90
|
"""
|
|
92
91
|
If true, disables the group.
|
|
93
92
|
"""
|
|
94
93
|
return pulumi.get(self, "disabled")
|
|
95
94
|
|
|
96
95
|
@disabled.setter
|
|
97
|
-
def disabled(self, value: Optional[pulumi.Input[
|
|
96
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
98
97
|
pulumi.set(self, "disabled", value)
|
|
99
98
|
|
|
100
|
-
@property
|
|
99
|
+
@_builtins.property
|
|
101
100
|
@pulumi.getter
|
|
102
|
-
def method(self) -> Optional[pulumi.Input[
|
|
101
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
103
102
|
"""
|
|
104
103
|
Valid values: (clone | balance | autobalance)
|
|
105
104
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -107,60 +106,60 @@ class OutputsTcpServerArgs:
|
|
|
107
106
|
return pulumi.get(self, "method")
|
|
108
107
|
|
|
109
108
|
@method.setter
|
|
110
|
-
def method(self, value: Optional[pulumi.Input[
|
|
109
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
111
110
|
pulumi.set(self, "method", value)
|
|
112
111
|
|
|
113
|
-
@property
|
|
112
|
+
@_builtins.property
|
|
114
113
|
@pulumi.getter
|
|
115
|
-
def name(self) -> Optional[pulumi.Input[
|
|
114
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
116
115
|
"""
|
|
117
116
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
118
117
|
"""
|
|
119
118
|
return pulumi.get(self, "name")
|
|
120
119
|
|
|
121
120
|
@name.setter
|
|
122
|
-
def name(self, value: Optional[pulumi.Input[
|
|
121
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
123
122
|
pulumi.set(self, "name", value)
|
|
124
123
|
|
|
125
|
-
@property
|
|
124
|
+
@_builtins.property
|
|
126
125
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
127
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[
|
|
126
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
128
127
|
"""
|
|
129
128
|
The alternate name to match in the remote server's SSL certificate.
|
|
130
129
|
"""
|
|
131
130
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
132
131
|
|
|
133
132
|
@ssl_alt_name_to_check.setter
|
|
134
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[
|
|
133
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
135
134
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
136
135
|
|
|
137
|
-
@property
|
|
136
|
+
@_builtins.property
|
|
138
137
|
@pulumi.getter(name="sslCertPath")
|
|
139
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[
|
|
138
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
140
139
|
"""
|
|
141
140
|
Path to the client certificate. If specified, connection uses SSL.
|
|
142
141
|
"""
|
|
143
142
|
return pulumi.get(self, "ssl_cert_path")
|
|
144
143
|
|
|
145
144
|
@ssl_cert_path.setter
|
|
146
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[
|
|
145
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
147
146
|
pulumi.set(self, "ssl_cert_path", value)
|
|
148
147
|
|
|
149
|
-
@property
|
|
148
|
+
@_builtins.property
|
|
150
149
|
@pulumi.getter(name="sslCipher")
|
|
151
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[
|
|
150
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
152
151
|
"""
|
|
153
152
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
154
153
|
"""
|
|
155
154
|
return pulumi.get(self, "ssl_cipher")
|
|
156
155
|
|
|
157
156
|
@ssl_cipher.setter
|
|
158
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[
|
|
157
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
159
158
|
pulumi.set(self, "ssl_cipher", value)
|
|
160
159
|
|
|
161
|
-
@property
|
|
160
|
+
@_builtins.property
|
|
162
161
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
163
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[
|
|
162
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
164
163
|
"""
|
|
165
164
|
Check the common name of the server's certificate against this name.
|
|
166
165
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -168,12 +167,12 @@ class OutputsTcpServerArgs:
|
|
|
168
167
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
169
168
|
|
|
170
169
|
@ssl_common_name_to_check.setter
|
|
171
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[
|
|
170
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
172
171
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
173
172
|
|
|
174
|
-
@property
|
|
173
|
+
@_builtins.property
|
|
175
174
|
@pulumi.getter(name="sslPassword")
|
|
176
|
-
def ssl_password(self) -> Optional[pulumi.Input[
|
|
175
|
+
def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
177
176
|
"""
|
|
178
177
|
The password associated with the CAcert.
|
|
179
178
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -181,31 +180,31 @@ class OutputsTcpServerArgs:
|
|
|
181
180
|
return pulumi.get(self, "ssl_password")
|
|
182
181
|
|
|
183
182
|
@ssl_password.setter
|
|
184
|
-
def ssl_password(self, value: Optional[pulumi.Input[
|
|
183
|
+
def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
185
184
|
pulumi.set(self, "ssl_password", value)
|
|
186
185
|
|
|
187
|
-
@property
|
|
186
|
+
@_builtins.property
|
|
188
187
|
@pulumi.getter(name="sslRootCaPath")
|
|
189
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[
|
|
188
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
190
189
|
"""
|
|
191
190
|
The path to the root certificate authority file.
|
|
192
191
|
"""
|
|
193
192
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
194
193
|
|
|
195
194
|
@ssl_root_ca_path.setter
|
|
196
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[
|
|
195
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
197
196
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
198
197
|
|
|
199
|
-
@property
|
|
198
|
+
@_builtins.property
|
|
200
199
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
201
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[
|
|
200
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
202
201
|
"""
|
|
203
202
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
204
203
|
"""
|
|
205
204
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
206
205
|
|
|
207
206
|
@ssl_verify_server_cert.setter
|
|
208
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[
|
|
207
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
209
208
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
210
209
|
|
|
211
210
|
|
|
@@ -213,32 +212,32 @@ class OutputsTcpServerArgs:
|
|
|
213
212
|
class _OutputsTcpServerState:
|
|
214
213
|
def __init__(__self__, *,
|
|
215
214
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
216
|
-
disabled: Optional[pulumi.Input[
|
|
217
|
-
method: Optional[pulumi.Input[
|
|
218
|
-
name: Optional[pulumi.Input[
|
|
219
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
220
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
221
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
222
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
223
|
-
ssl_password: Optional[pulumi.Input[
|
|
224
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
225
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
215
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
216
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
217
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
218
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
219
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
220
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
221
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
222
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
223
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
224
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
226
225
|
"""
|
|
227
226
|
Input properties used for looking up and filtering OutputsTcpServer resources.
|
|
228
227
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
229
|
-
:param pulumi.Input[
|
|
230
|
-
:param pulumi.Input[
|
|
228
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
229
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
231
230
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
232
|
-
:param pulumi.Input[
|
|
233
|
-
:param pulumi.Input[
|
|
234
|
-
:param pulumi.Input[
|
|
235
|
-
:param pulumi.Input[
|
|
236
|
-
:param pulumi.Input[
|
|
231
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
232
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
233
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
234
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
235
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
237
236
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
238
|
-
:param pulumi.Input[
|
|
237
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
239
238
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
240
|
-
:param pulumi.Input[
|
|
241
|
-
:param pulumi.Input[
|
|
239
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
240
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
242
241
|
"""
|
|
243
242
|
if acl is not None:
|
|
244
243
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -263,7 +262,7 @@ class _OutputsTcpServerState:
|
|
|
263
262
|
if ssl_verify_server_cert is not None:
|
|
264
263
|
pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
|
|
265
264
|
|
|
266
|
-
@property
|
|
265
|
+
@_builtins.property
|
|
267
266
|
@pulumi.getter
|
|
268
267
|
def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
|
|
269
268
|
"""
|
|
@@ -275,21 +274,21 @@ class _OutputsTcpServerState:
|
|
|
275
274
|
def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
|
|
276
275
|
pulumi.set(self, "acl", value)
|
|
277
276
|
|
|
278
|
-
@property
|
|
277
|
+
@_builtins.property
|
|
279
278
|
@pulumi.getter
|
|
280
|
-
def disabled(self) -> Optional[pulumi.Input[
|
|
279
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
281
280
|
"""
|
|
282
281
|
If true, disables the group.
|
|
283
282
|
"""
|
|
284
283
|
return pulumi.get(self, "disabled")
|
|
285
284
|
|
|
286
285
|
@disabled.setter
|
|
287
|
-
def disabled(self, value: Optional[pulumi.Input[
|
|
286
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
288
287
|
pulumi.set(self, "disabled", value)
|
|
289
288
|
|
|
290
|
-
@property
|
|
289
|
+
@_builtins.property
|
|
291
290
|
@pulumi.getter
|
|
292
|
-
def method(self) -> Optional[pulumi.Input[
|
|
291
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
293
292
|
"""
|
|
294
293
|
Valid values: (clone | balance | autobalance)
|
|
295
294
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -297,60 +296,60 @@ class _OutputsTcpServerState:
|
|
|
297
296
|
return pulumi.get(self, "method")
|
|
298
297
|
|
|
299
298
|
@method.setter
|
|
300
|
-
def method(self, value: Optional[pulumi.Input[
|
|
299
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
301
300
|
pulumi.set(self, "method", value)
|
|
302
301
|
|
|
303
|
-
@property
|
|
302
|
+
@_builtins.property
|
|
304
303
|
@pulumi.getter
|
|
305
|
-
def name(self) -> Optional[pulumi.Input[
|
|
304
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
306
305
|
"""
|
|
307
306
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
308
307
|
"""
|
|
309
308
|
return pulumi.get(self, "name")
|
|
310
309
|
|
|
311
310
|
@name.setter
|
|
312
|
-
def name(self, value: Optional[pulumi.Input[
|
|
311
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
313
312
|
pulumi.set(self, "name", value)
|
|
314
313
|
|
|
315
|
-
@property
|
|
314
|
+
@_builtins.property
|
|
316
315
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
317
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[
|
|
316
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
318
317
|
"""
|
|
319
318
|
The alternate name to match in the remote server's SSL certificate.
|
|
320
319
|
"""
|
|
321
320
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
322
321
|
|
|
323
322
|
@ssl_alt_name_to_check.setter
|
|
324
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[
|
|
323
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
325
324
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
326
325
|
|
|
327
|
-
@property
|
|
326
|
+
@_builtins.property
|
|
328
327
|
@pulumi.getter(name="sslCertPath")
|
|
329
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[
|
|
328
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
330
329
|
"""
|
|
331
330
|
Path to the client certificate. If specified, connection uses SSL.
|
|
332
331
|
"""
|
|
333
332
|
return pulumi.get(self, "ssl_cert_path")
|
|
334
333
|
|
|
335
334
|
@ssl_cert_path.setter
|
|
336
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[
|
|
335
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
337
336
|
pulumi.set(self, "ssl_cert_path", value)
|
|
338
337
|
|
|
339
|
-
@property
|
|
338
|
+
@_builtins.property
|
|
340
339
|
@pulumi.getter(name="sslCipher")
|
|
341
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[
|
|
340
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
342
341
|
"""
|
|
343
342
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
344
343
|
"""
|
|
345
344
|
return pulumi.get(self, "ssl_cipher")
|
|
346
345
|
|
|
347
346
|
@ssl_cipher.setter
|
|
348
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[
|
|
347
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
349
348
|
pulumi.set(self, "ssl_cipher", value)
|
|
350
349
|
|
|
351
|
-
@property
|
|
350
|
+
@_builtins.property
|
|
352
351
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
353
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[
|
|
352
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
354
353
|
"""
|
|
355
354
|
Check the common name of the server's certificate against this name.
|
|
356
355
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -358,12 +357,12 @@ class _OutputsTcpServerState:
|
|
|
358
357
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
359
358
|
|
|
360
359
|
@ssl_common_name_to_check.setter
|
|
361
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[
|
|
360
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
362
361
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
363
362
|
|
|
364
|
-
@property
|
|
363
|
+
@_builtins.property
|
|
365
364
|
@pulumi.getter(name="sslPassword")
|
|
366
|
-
def ssl_password(self) -> Optional[pulumi.Input[
|
|
365
|
+
def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
367
366
|
"""
|
|
368
367
|
The password associated with the CAcert.
|
|
369
368
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -371,50 +370,51 @@ class _OutputsTcpServerState:
|
|
|
371
370
|
return pulumi.get(self, "ssl_password")
|
|
372
371
|
|
|
373
372
|
@ssl_password.setter
|
|
374
|
-
def ssl_password(self, value: Optional[pulumi.Input[
|
|
373
|
+
def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
375
374
|
pulumi.set(self, "ssl_password", value)
|
|
376
375
|
|
|
377
|
-
@property
|
|
376
|
+
@_builtins.property
|
|
378
377
|
@pulumi.getter(name="sslRootCaPath")
|
|
379
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[
|
|
378
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
380
379
|
"""
|
|
381
380
|
The path to the root certificate authority file.
|
|
382
381
|
"""
|
|
383
382
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
384
383
|
|
|
385
384
|
@ssl_root_ca_path.setter
|
|
386
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[
|
|
385
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
387
386
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
388
387
|
|
|
389
|
-
@property
|
|
388
|
+
@_builtins.property
|
|
390
389
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
391
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[
|
|
390
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
392
391
|
"""
|
|
393
392
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
394
393
|
"""
|
|
395
394
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
396
395
|
|
|
397
396
|
@ssl_verify_server_cert.setter
|
|
398
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[
|
|
397
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
399
398
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
400
399
|
|
|
401
400
|
|
|
401
|
+
@pulumi.type_token("splunk:index/outputsTcpServer:OutputsTcpServer")
|
|
402
402
|
class OutputsTcpServer(pulumi.CustomResource):
|
|
403
403
|
@overload
|
|
404
404
|
def __init__(__self__,
|
|
405
405
|
resource_name: str,
|
|
406
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
407
407
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
408
|
-
disabled: Optional[pulumi.Input[
|
|
409
|
-
method: Optional[pulumi.Input[
|
|
410
|
-
name: Optional[pulumi.Input[
|
|
411
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
412
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
413
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
414
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
415
|
-
ssl_password: Optional[pulumi.Input[
|
|
416
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
417
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
408
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
409
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
410
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
411
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
412
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
413
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
414
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
415
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
416
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
417
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
418
418
|
__props__=None):
|
|
419
419
|
"""
|
|
420
420
|
## # Resource: OutputsTcpServer
|
|
@@ -435,19 +435,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
435
435
|
:param str resource_name: The name of the resource.
|
|
436
436
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
437
437
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
438
|
-
:param pulumi.Input[
|
|
439
|
-
:param pulumi.Input[
|
|
438
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
439
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
440
440
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
441
|
-
:param pulumi.Input[
|
|
442
|
-
:param pulumi.Input[
|
|
443
|
-
:param pulumi.Input[
|
|
444
|
-
:param pulumi.Input[
|
|
445
|
-
:param pulumi.Input[
|
|
441
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
442
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
443
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
444
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
445
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
446
446
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
447
|
-
:param pulumi.Input[
|
|
447
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
448
448
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
449
|
-
:param pulumi.Input[
|
|
450
|
-
:param pulumi.Input[
|
|
449
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
450
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
451
451
|
"""
|
|
452
452
|
...
|
|
453
453
|
@overload
|
|
@@ -487,16 +487,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
487
487
|
resource_name: str,
|
|
488
488
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
489
489
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
490
|
-
disabled: Optional[pulumi.Input[
|
|
491
|
-
method: Optional[pulumi.Input[
|
|
492
|
-
name: Optional[pulumi.Input[
|
|
493
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
494
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
495
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
496
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
497
|
-
ssl_password: Optional[pulumi.Input[
|
|
498
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
499
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
490
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
491
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
492
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
493
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
494
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
495
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
496
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
497
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
498
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
499
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
500
500
|
__props__=None):
|
|
501
501
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
502
502
|
if not isinstance(opts, pulumi.ResourceOptions):
|
|
@@ -530,16 +530,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
530
530
|
id: pulumi.Input[str],
|
|
531
531
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
532
532
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
533
|
-
disabled: Optional[pulumi.Input[
|
|
534
|
-
method: Optional[pulumi.Input[
|
|
535
|
-
name: Optional[pulumi.Input[
|
|
536
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
537
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
538
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
539
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
540
|
-
ssl_password: Optional[pulumi.Input[
|
|
541
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
542
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
533
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
534
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
535
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
536
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
537
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
538
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
539
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
540
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
541
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
542
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None) -> 'OutputsTcpServer':
|
|
543
543
|
"""
|
|
544
544
|
Get an existing OutputsTcpServer resource's state with the given name, id, and optional extra
|
|
545
545
|
properties used to qualify the lookup.
|
|
@@ -548,19 +548,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
548
548
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
549
549
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
550
550
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
551
|
-
:param pulumi.Input[
|
|
552
|
-
:param pulumi.Input[
|
|
551
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
552
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
553
553
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
554
|
-
:param pulumi.Input[
|
|
555
|
-
:param pulumi.Input[
|
|
556
|
-
:param pulumi.Input[
|
|
557
|
-
:param pulumi.Input[
|
|
558
|
-
:param pulumi.Input[
|
|
554
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
555
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
556
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
557
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
558
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
559
559
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
560
|
-
:param pulumi.Input[
|
|
560
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
561
561
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
562
|
-
:param pulumi.Input[
|
|
563
|
-
:param pulumi.Input[
|
|
562
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
563
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
564
564
|
"""
|
|
565
565
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
566
566
|
|
|
@@ -579,7 +579,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
579
579
|
__props__.__dict__["ssl_verify_server_cert"] = ssl_verify_server_cert
|
|
580
580
|
return OutputsTcpServer(resource_name, opts=opts, __props__=__props__)
|
|
581
581
|
|
|
582
|
-
@property
|
|
582
|
+
@_builtins.property
|
|
583
583
|
@pulumi.getter
|
|
584
584
|
def acl(self) -> pulumi.Output['outputs.OutputsTcpServerAcl']:
|
|
585
585
|
"""
|
|
@@ -587,84 +587,84 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
587
587
|
"""
|
|
588
588
|
return pulumi.get(self, "acl")
|
|
589
589
|
|
|
590
|
-
@property
|
|
590
|
+
@_builtins.property
|
|
591
591
|
@pulumi.getter
|
|
592
|
-
def disabled(self) -> pulumi.Output[
|
|
592
|
+
def disabled(self) -> pulumi.Output[_builtins.bool]:
|
|
593
593
|
"""
|
|
594
594
|
If true, disables the group.
|
|
595
595
|
"""
|
|
596
596
|
return pulumi.get(self, "disabled")
|
|
597
597
|
|
|
598
|
-
@property
|
|
598
|
+
@_builtins.property
|
|
599
599
|
@pulumi.getter
|
|
600
|
-
def method(self) -> pulumi.Output[
|
|
600
|
+
def method(self) -> pulumi.Output[_builtins.str]:
|
|
601
601
|
"""
|
|
602
602
|
Valid values: (clone | balance | autobalance)
|
|
603
603
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
604
604
|
"""
|
|
605
605
|
return pulumi.get(self, "method")
|
|
606
606
|
|
|
607
|
-
@property
|
|
607
|
+
@_builtins.property
|
|
608
608
|
@pulumi.getter
|
|
609
|
-
def name(self) -> pulumi.Output[
|
|
609
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
610
610
|
"""
|
|
611
611
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
612
612
|
"""
|
|
613
613
|
return pulumi.get(self, "name")
|
|
614
614
|
|
|
615
|
-
@property
|
|
615
|
+
@_builtins.property
|
|
616
616
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
617
|
-
def ssl_alt_name_to_check(self) -> pulumi.Output[
|
|
617
|
+
def ssl_alt_name_to_check(self) -> pulumi.Output[_builtins.str]:
|
|
618
618
|
"""
|
|
619
619
|
The alternate name to match in the remote server's SSL certificate.
|
|
620
620
|
"""
|
|
621
621
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
622
622
|
|
|
623
|
-
@property
|
|
623
|
+
@_builtins.property
|
|
624
624
|
@pulumi.getter(name="sslCertPath")
|
|
625
|
-
def ssl_cert_path(self) -> pulumi.Output[
|
|
625
|
+
def ssl_cert_path(self) -> pulumi.Output[_builtins.str]:
|
|
626
626
|
"""
|
|
627
627
|
Path to the client certificate. If specified, connection uses SSL.
|
|
628
628
|
"""
|
|
629
629
|
return pulumi.get(self, "ssl_cert_path")
|
|
630
630
|
|
|
631
|
-
@property
|
|
631
|
+
@_builtins.property
|
|
632
632
|
@pulumi.getter(name="sslCipher")
|
|
633
|
-
def ssl_cipher(self) -> pulumi.Output[
|
|
633
|
+
def ssl_cipher(self) -> pulumi.Output[_builtins.str]:
|
|
634
634
|
"""
|
|
635
635
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
636
636
|
"""
|
|
637
637
|
return pulumi.get(self, "ssl_cipher")
|
|
638
638
|
|
|
639
|
-
@property
|
|
639
|
+
@_builtins.property
|
|
640
640
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
641
|
-
def ssl_common_name_to_check(self) -> pulumi.Output[
|
|
641
|
+
def ssl_common_name_to_check(self) -> pulumi.Output[_builtins.str]:
|
|
642
642
|
"""
|
|
643
643
|
Check the common name of the server's certificate against this name.
|
|
644
644
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
645
645
|
"""
|
|
646
646
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
647
647
|
|
|
648
|
-
@property
|
|
648
|
+
@_builtins.property
|
|
649
649
|
@pulumi.getter(name="sslPassword")
|
|
650
|
-
def ssl_password(self) -> pulumi.Output[
|
|
650
|
+
def ssl_password(self) -> pulumi.Output[_builtins.str]:
|
|
651
651
|
"""
|
|
652
652
|
The password associated with the CAcert.
|
|
653
653
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
654
654
|
"""
|
|
655
655
|
return pulumi.get(self, "ssl_password")
|
|
656
656
|
|
|
657
|
-
@property
|
|
657
|
+
@_builtins.property
|
|
658
658
|
@pulumi.getter(name="sslRootCaPath")
|
|
659
|
-
def ssl_root_ca_path(self) -> pulumi.Output[
|
|
659
|
+
def ssl_root_ca_path(self) -> pulumi.Output[_builtins.str]:
|
|
660
660
|
"""
|
|
661
661
|
The path to the root certificate authority file.
|
|
662
662
|
"""
|
|
663
663
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
664
664
|
|
|
665
|
-
@property
|
|
665
|
+
@_builtins.property
|
|
666
666
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
667
|
-
def ssl_verify_server_cert(self) -> pulumi.Output[
|
|
667
|
+
def ssl_verify_server_cert(self) -> pulumi.Output[_builtins.bool]:
|
|
668
668
|
"""
|
|
669
669
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
670
670
|
"""
|