pulumi-splunk 1.3.0a1750230248__py3-none-any.whl → 1.3.0a1759215781__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-splunk might be problematic. Click here for more details.
- pulumi_splunk/__init__.py +1 -1
- pulumi_splunk/_inputs.py +1274 -1275
- pulumi_splunk/admin_saml_groups.py +35 -36
- pulumi_splunk/apps_local.py +208 -209
- pulumi_splunk/authentication_users.py +154 -155
- pulumi_splunk/authorization_roles.py +222 -223
- pulumi_splunk/config/__init__.py +1 -1
- pulumi_splunk/config/__init__.pyi +2 -4
- pulumi_splunk/config/vars.py +8 -10
- pulumi_splunk/configs_conf.py +38 -39
- pulumi_splunk/data_ui_views.py +38 -39
- pulumi_splunk/generic_acl.py +21 -22
- pulumi_splunk/global_http_event_collector.py +120 -121
- pulumi_splunk/indexes.py +650 -651
- pulumi_splunk/inputs_http_event_collector.py +157 -158
- pulumi_splunk/inputs_monitor.py +259 -260
- pulumi_splunk/inputs_script.py +157 -158
- pulumi_splunk/inputs_tcp_cooked.py +89 -90
- pulumi_splunk/inputs_tcp_raw.py +174 -175
- pulumi_splunk/inputs_tcp_splunk_tcp_token.py +38 -39
- pulumi_splunk/inputs_tcp_ssl.py +86 -87
- pulumi_splunk/inputs_udp.py +191 -192
- pulumi_splunk/lookup_definition.py +38 -39
- pulumi_splunk/lookup_table_file.py +69 -70
- pulumi_splunk/outputs.py +856 -857
- pulumi_splunk/outputs_tcp_default.py +140 -141
- pulumi_splunk/outputs_tcp_group.py +174 -175
- pulumi_splunk/outputs_tcp_server.py +174 -175
- pulumi_splunk/outputs_tcp_syslog.py +123 -124
- pulumi_splunk/provider.py +60 -65
- pulumi_splunk/pulumi-plugin.json +1 -1
- pulumi_splunk/saved_searches.py +3097 -2886
- pulumi_splunk/sh_indexes_manager.py +72 -73
- {pulumi_splunk-1.3.0a1750230248.dist-info → pulumi_splunk-1.3.0a1759215781.dist-info}/METADATA +1 -1
- pulumi_splunk-1.3.0a1759215781.dist-info/RECORD +39 -0
- pulumi_splunk-1.3.0a1750230248.dist-info/RECORD +0 -39
- {pulumi_splunk-1.3.0a1750230248.dist-info → pulumi_splunk-1.3.0a1759215781.dist-info}/WHEEL +0 -0
- {pulumi_splunk-1.3.0a1750230248.dist-info → pulumi_splunk-1.3.0a1759215781.dist-info}/top_level.txt +0 -0
|
@@ -2,8 +2,7 @@
|
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
|
|
5
|
-
import builtins
|
|
6
|
-
import copy
|
|
5
|
+
import builtins as _builtins
|
|
7
6
|
import warnings
|
|
8
7
|
import sys
|
|
9
8
|
import pulumi
|
|
@@ -23,32 +22,32 @@ __all__ = ['OutputsTcpServerArgs', 'OutputsTcpServer']
|
|
|
23
22
|
class OutputsTcpServerArgs:
|
|
24
23
|
def __init__(__self__, *,
|
|
25
24
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
26
|
-
disabled: Optional[pulumi.Input[
|
|
27
|
-
method: Optional[pulumi.Input[
|
|
28
|
-
name: Optional[pulumi.Input[
|
|
29
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
30
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
31
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
32
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
33
|
-
ssl_password: Optional[pulumi.Input[
|
|
34
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
35
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
25
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
26
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
27
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
28
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
29
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
30
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
31
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
32
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
33
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
34
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
36
35
|
"""
|
|
37
36
|
The set of arguments for constructing a OutputsTcpServer resource.
|
|
38
37
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
39
|
-
:param pulumi.Input[
|
|
40
|
-
:param pulumi.Input[
|
|
38
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
39
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
41
40
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
42
|
-
:param pulumi.Input[
|
|
43
|
-
:param pulumi.Input[
|
|
44
|
-
:param pulumi.Input[
|
|
45
|
-
:param pulumi.Input[
|
|
46
|
-
:param pulumi.Input[
|
|
41
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
42
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
43
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
44
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
45
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
47
46
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
48
|
-
:param pulumi.Input[
|
|
47
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
49
48
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
50
|
-
:param pulumi.Input[
|
|
51
|
-
:param pulumi.Input[
|
|
49
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
50
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
52
51
|
"""
|
|
53
52
|
if acl is not None:
|
|
54
53
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -73,7 +72,7 @@ class OutputsTcpServerArgs:
|
|
|
73
72
|
if ssl_verify_server_cert is not None:
|
|
74
73
|
pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
|
|
75
74
|
|
|
76
|
-
@property
|
|
75
|
+
@_builtins.property
|
|
77
76
|
@pulumi.getter
|
|
78
77
|
def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
|
|
79
78
|
"""
|
|
@@ -85,21 +84,21 @@ class OutputsTcpServerArgs:
|
|
|
85
84
|
def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
|
|
86
85
|
pulumi.set(self, "acl", value)
|
|
87
86
|
|
|
88
|
-
@property
|
|
87
|
+
@_builtins.property
|
|
89
88
|
@pulumi.getter
|
|
90
|
-
def disabled(self) -> Optional[pulumi.Input[
|
|
89
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
91
90
|
"""
|
|
92
91
|
If true, disables the group.
|
|
93
92
|
"""
|
|
94
93
|
return pulumi.get(self, "disabled")
|
|
95
94
|
|
|
96
95
|
@disabled.setter
|
|
97
|
-
def disabled(self, value: Optional[pulumi.Input[
|
|
96
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
98
97
|
pulumi.set(self, "disabled", value)
|
|
99
98
|
|
|
100
|
-
@property
|
|
99
|
+
@_builtins.property
|
|
101
100
|
@pulumi.getter
|
|
102
|
-
def method(self) -> Optional[pulumi.Input[
|
|
101
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
103
102
|
"""
|
|
104
103
|
Valid values: (clone | balance | autobalance)
|
|
105
104
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -107,60 +106,60 @@ class OutputsTcpServerArgs:
|
|
|
107
106
|
return pulumi.get(self, "method")
|
|
108
107
|
|
|
109
108
|
@method.setter
|
|
110
|
-
def method(self, value: Optional[pulumi.Input[
|
|
109
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
111
110
|
pulumi.set(self, "method", value)
|
|
112
111
|
|
|
113
|
-
@property
|
|
112
|
+
@_builtins.property
|
|
114
113
|
@pulumi.getter
|
|
115
|
-
def name(self) -> Optional[pulumi.Input[
|
|
114
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
116
115
|
"""
|
|
117
116
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
118
117
|
"""
|
|
119
118
|
return pulumi.get(self, "name")
|
|
120
119
|
|
|
121
120
|
@name.setter
|
|
122
|
-
def name(self, value: Optional[pulumi.Input[
|
|
121
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
123
122
|
pulumi.set(self, "name", value)
|
|
124
123
|
|
|
125
|
-
@property
|
|
124
|
+
@_builtins.property
|
|
126
125
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
127
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[
|
|
126
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
128
127
|
"""
|
|
129
128
|
The alternate name to match in the remote server's SSL certificate.
|
|
130
129
|
"""
|
|
131
130
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
132
131
|
|
|
133
132
|
@ssl_alt_name_to_check.setter
|
|
134
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[
|
|
133
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
135
134
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
136
135
|
|
|
137
|
-
@property
|
|
136
|
+
@_builtins.property
|
|
138
137
|
@pulumi.getter(name="sslCertPath")
|
|
139
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[
|
|
138
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
140
139
|
"""
|
|
141
140
|
Path to the client certificate. If specified, connection uses SSL.
|
|
142
141
|
"""
|
|
143
142
|
return pulumi.get(self, "ssl_cert_path")
|
|
144
143
|
|
|
145
144
|
@ssl_cert_path.setter
|
|
146
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[
|
|
145
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
147
146
|
pulumi.set(self, "ssl_cert_path", value)
|
|
148
147
|
|
|
149
|
-
@property
|
|
148
|
+
@_builtins.property
|
|
150
149
|
@pulumi.getter(name="sslCipher")
|
|
151
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[
|
|
150
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
152
151
|
"""
|
|
153
152
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
154
153
|
"""
|
|
155
154
|
return pulumi.get(self, "ssl_cipher")
|
|
156
155
|
|
|
157
156
|
@ssl_cipher.setter
|
|
158
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[
|
|
157
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
159
158
|
pulumi.set(self, "ssl_cipher", value)
|
|
160
159
|
|
|
161
|
-
@property
|
|
160
|
+
@_builtins.property
|
|
162
161
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
163
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[
|
|
162
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
164
163
|
"""
|
|
165
164
|
Check the common name of the server's certificate against this name.
|
|
166
165
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -168,12 +167,12 @@ class OutputsTcpServerArgs:
|
|
|
168
167
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
169
168
|
|
|
170
169
|
@ssl_common_name_to_check.setter
|
|
171
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[
|
|
170
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
172
171
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
173
172
|
|
|
174
|
-
@property
|
|
173
|
+
@_builtins.property
|
|
175
174
|
@pulumi.getter(name="sslPassword")
|
|
176
|
-
def ssl_password(self) -> Optional[pulumi.Input[
|
|
175
|
+
def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
177
176
|
"""
|
|
178
177
|
The password associated with the CAcert.
|
|
179
178
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -181,31 +180,31 @@ class OutputsTcpServerArgs:
|
|
|
181
180
|
return pulumi.get(self, "ssl_password")
|
|
182
181
|
|
|
183
182
|
@ssl_password.setter
|
|
184
|
-
def ssl_password(self, value: Optional[pulumi.Input[
|
|
183
|
+
def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
185
184
|
pulumi.set(self, "ssl_password", value)
|
|
186
185
|
|
|
187
|
-
@property
|
|
186
|
+
@_builtins.property
|
|
188
187
|
@pulumi.getter(name="sslRootCaPath")
|
|
189
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[
|
|
188
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
190
189
|
"""
|
|
191
190
|
The path to the root certificate authority file.
|
|
192
191
|
"""
|
|
193
192
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
194
193
|
|
|
195
194
|
@ssl_root_ca_path.setter
|
|
196
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[
|
|
195
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
197
196
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
198
197
|
|
|
199
|
-
@property
|
|
198
|
+
@_builtins.property
|
|
200
199
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
201
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[
|
|
200
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
202
201
|
"""
|
|
203
202
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
204
203
|
"""
|
|
205
204
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
206
205
|
|
|
207
206
|
@ssl_verify_server_cert.setter
|
|
208
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[
|
|
207
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
209
208
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
210
209
|
|
|
211
210
|
|
|
@@ -213,32 +212,32 @@ class OutputsTcpServerArgs:
|
|
|
213
212
|
class _OutputsTcpServerState:
|
|
214
213
|
def __init__(__self__, *,
|
|
215
214
|
acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
|
|
216
|
-
disabled: Optional[pulumi.Input[
|
|
217
|
-
method: Optional[pulumi.Input[
|
|
218
|
-
name: Optional[pulumi.Input[
|
|
219
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
220
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
221
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
222
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
223
|
-
ssl_password: Optional[pulumi.Input[
|
|
224
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
225
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
215
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
216
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
217
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
218
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
219
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
220
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
221
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
222
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
223
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
224
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
|
|
226
225
|
"""
|
|
227
226
|
Input properties used for looking up and filtering OutputsTcpServer resources.
|
|
228
227
|
:param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
|
|
229
|
-
:param pulumi.Input[
|
|
230
|
-
:param pulumi.Input[
|
|
228
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
229
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
231
230
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
232
|
-
:param pulumi.Input[
|
|
233
|
-
:param pulumi.Input[
|
|
234
|
-
:param pulumi.Input[
|
|
235
|
-
:param pulumi.Input[
|
|
236
|
-
:param pulumi.Input[
|
|
231
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
232
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
233
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
234
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
235
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
237
236
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
238
|
-
:param pulumi.Input[
|
|
237
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
239
238
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
240
|
-
:param pulumi.Input[
|
|
241
|
-
:param pulumi.Input[
|
|
239
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
240
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
242
241
|
"""
|
|
243
242
|
if acl is not None:
|
|
244
243
|
pulumi.set(__self__, "acl", acl)
|
|
@@ -263,7 +262,7 @@ class _OutputsTcpServerState:
|
|
|
263
262
|
if ssl_verify_server_cert is not None:
|
|
264
263
|
pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
|
|
265
264
|
|
|
266
|
-
@property
|
|
265
|
+
@_builtins.property
|
|
267
266
|
@pulumi.getter
|
|
268
267
|
def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
|
|
269
268
|
"""
|
|
@@ -275,21 +274,21 @@ class _OutputsTcpServerState:
|
|
|
275
274
|
def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
|
|
276
275
|
pulumi.set(self, "acl", value)
|
|
277
276
|
|
|
278
|
-
@property
|
|
277
|
+
@_builtins.property
|
|
279
278
|
@pulumi.getter
|
|
280
|
-
def disabled(self) -> Optional[pulumi.Input[
|
|
279
|
+
def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
281
280
|
"""
|
|
282
281
|
If true, disables the group.
|
|
283
282
|
"""
|
|
284
283
|
return pulumi.get(self, "disabled")
|
|
285
284
|
|
|
286
285
|
@disabled.setter
|
|
287
|
-
def disabled(self, value: Optional[pulumi.Input[
|
|
286
|
+
def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
288
287
|
pulumi.set(self, "disabled", value)
|
|
289
288
|
|
|
290
|
-
@property
|
|
289
|
+
@_builtins.property
|
|
291
290
|
@pulumi.getter
|
|
292
|
-
def method(self) -> Optional[pulumi.Input[
|
|
291
|
+
def method(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
293
292
|
"""
|
|
294
293
|
Valid values: (clone | balance | autobalance)
|
|
295
294
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
@@ -297,60 +296,60 @@ class _OutputsTcpServerState:
|
|
|
297
296
|
return pulumi.get(self, "method")
|
|
298
297
|
|
|
299
298
|
@method.setter
|
|
300
|
-
def method(self, value: Optional[pulumi.Input[
|
|
299
|
+
def method(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
301
300
|
pulumi.set(self, "method", value)
|
|
302
301
|
|
|
303
|
-
@property
|
|
302
|
+
@_builtins.property
|
|
304
303
|
@pulumi.getter
|
|
305
|
-
def name(self) -> Optional[pulumi.Input[
|
|
304
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
306
305
|
"""
|
|
307
306
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
308
307
|
"""
|
|
309
308
|
return pulumi.get(self, "name")
|
|
310
309
|
|
|
311
310
|
@name.setter
|
|
312
|
-
def name(self, value: Optional[pulumi.Input[
|
|
311
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
313
312
|
pulumi.set(self, "name", value)
|
|
314
313
|
|
|
315
|
-
@property
|
|
314
|
+
@_builtins.property
|
|
316
315
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
317
|
-
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[
|
|
316
|
+
def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
318
317
|
"""
|
|
319
318
|
The alternate name to match in the remote server's SSL certificate.
|
|
320
319
|
"""
|
|
321
320
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
322
321
|
|
|
323
322
|
@ssl_alt_name_to_check.setter
|
|
324
|
-
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[
|
|
323
|
+
def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
325
324
|
pulumi.set(self, "ssl_alt_name_to_check", value)
|
|
326
325
|
|
|
327
|
-
@property
|
|
326
|
+
@_builtins.property
|
|
328
327
|
@pulumi.getter(name="sslCertPath")
|
|
329
|
-
def ssl_cert_path(self) -> Optional[pulumi.Input[
|
|
328
|
+
def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
330
329
|
"""
|
|
331
330
|
Path to the client certificate. If specified, connection uses SSL.
|
|
332
331
|
"""
|
|
333
332
|
return pulumi.get(self, "ssl_cert_path")
|
|
334
333
|
|
|
335
334
|
@ssl_cert_path.setter
|
|
336
|
-
def ssl_cert_path(self, value: Optional[pulumi.Input[
|
|
335
|
+
def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
337
336
|
pulumi.set(self, "ssl_cert_path", value)
|
|
338
337
|
|
|
339
|
-
@property
|
|
338
|
+
@_builtins.property
|
|
340
339
|
@pulumi.getter(name="sslCipher")
|
|
341
|
-
def ssl_cipher(self) -> Optional[pulumi.Input[
|
|
340
|
+
def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
342
341
|
"""
|
|
343
342
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
344
343
|
"""
|
|
345
344
|
return pulumi.get(self, "ssl_cipher")
|
|
346
345
|
|
|
347
346
|
@ssl_cipher.setter
|
|
348
|
-
def ssl_cipher(self, value: Optional[pulumi.Input[
|
|
347
|
+
def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
349
348
|
pulumi.set(self, "ssl_cipher", value)
|
|
350
349
|
|
|
351
|
-
@property
|
|
350
|
+
@_builtins.property
|
|
352
351
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
353
|
-
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[
|
|
352
|
+
def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
354
353
|
"""
|
|
355
354
|
Check the common name of the server's certificate against this name.
|
|
356
355
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
@@ -358,12 +357,12 @@ class _OutputsTcpServerState:
|
|
|
358
357
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
359
358
|
|
|
360
359
|
@ssl_common_name_to_check.setter
|
|
361
|
-
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[
|
|
360
|
+
def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
362
361
|
pulumi.set(self, "ssl_common_name_to_check", value)
|
|
363
362
|
|
|
364
|
-
@property
|
|
363
|
+
@_builtins.property
|
|
365
364
|
@pulumi.getter(name="sslPassword")
|
|
366
|
-
def ssl_password(self) -> Optional[pulumi.Input[
|
|
365
|
+
def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
367
366
|
"""
|
|
368
367
|
The password associated with the CAcert.
|
|
369
368
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
@@ -371,31 +370,31 @@ class _OutputsTcpServerState:
|
|
|
371
370
|
return pulumi.get(self, "ssl_password")
|
|
372
371
|
|
|
373
372
|
@ssl_password.setter
|
|
374
|
-
def ssl_password(self, value: Optional[pulumi.Input[
|
|
373
|
+
def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
375
374
|
pulumi.set(self, "ssl_password", value)
|
|
376
375
|
|
|
377
|
-
@property
|
|
376
|
+
@_builtins.property
|
|
378
377
|
@pulumi.getter(name="sslRootCaPath")
|
|
379
|
-
def ssl_root_ca_path(self) -> Optional[pulumi.Input[
|
|
378
|
+
def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
380
379
|
"""
|
|
381
380
|
The path to the root certificate authority file.
|
|
382
381
|
"""
|
|
383
382
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
384
383
|
|
|
385
384
|
@ssl_root_ca_path.setter
|
|
386
|
-
def ssl_root_ca_path(self, value: Optional[pulumi.Input[
|
|
385
|
+
def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
387
386
|
pulumi.set(self, "ssl_root_ca_path", value)
|
|
388
387
|
|
|
389
|
-
@property
|
|
388
|
+
@_builtins.property
|
|
390
389
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
391
|
-
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[
|
|
390
|
+
def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
|
392
391
|
"""
|
|
393
392
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
394
393
|
"""
|
|
395
394
|
return pulumi.get(self, "ssl_verify_server_cert")
|
|
396
395
|
|
|
397
396
|
@ssl_verify_server_cert.setter
|
|
398
|
-
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[
|
|
397
|
+
def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
|
399
398
|
pulumi.set(self, "ssl_verify_server_cert", value)
|
|
400
399
|
|
|
401
400
|
|
|
@@ -406,16 +405,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
406
405
|
resource_name: str,
|
|
407
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
408
407
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
409
|
-
disabled: Optional[pulumi.Input[
|
|
410
|
-
method: Optional[pulumi.Input[
|
|
411
|
-
name: Optional[pulumi.Input[
|
|
412
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
413
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
414
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
415
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
416
|
-
ssl_password: Optional[pulumi.Input[
|
|
417
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
418
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
408
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
409
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
410
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
411
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
412
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
413
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
414
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
415
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
416
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
417
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
419
418
|
__props__=None):
|
|
420
419
|
"""
|
|
421
420
|
## # Resource: OutputsTcpServer
|
|
@@ -436,19 +435,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
436
435
|
:param str resource_name: The name of the resource.
|
|
437
436
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
438
437
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
439
|
-
:param pulumi.Input[
|
|
440
|
-
:param pulumi.Input[
|
|
438
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
439
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
441
440
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
442
|
-
:param pulumi.Input[
|
|
443
|
-
:param pulumi.Input[
|
|
444
|
-
:param pulumi.Input[
|
|
445
|
-
:param pulumi.Input[
|
|
446
|
-
:param pulumi.Input[
|
|
441
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
442
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
443
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
444
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
445
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
447
446
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
448
|
-
:param pulumi.Input[
|
|
447
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
449
448
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
450
|
-
:param pulumi.Input[
|
|
451
|
-
:param pulumi.Input[
|
|
449
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
450
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
452
451
|
"""
|
|
453
452
|
...
|
|
454
453
|
@overload
|
|
@@ -488,16 +487,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
488
487
|
resource_name: str,
|
|
489
488
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
490
489
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
491
|
-
disabled: Optional[pulumi.Input[
|
|
492
|
-
method: Optional[pulumi.Input[
|
|
493
|
-
name: Optional[pulumi.Input[
|
|
494
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
495
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
496
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
497
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
498
|
-
ssl_password: Optional[pulumi.Input[
|
|
499
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
500
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
490
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
491
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
492
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
493
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
494
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
495
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
496
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
497
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
498
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
499
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
501
500
|
__props__=None):
|
|
502
501
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
503
502
|
if not isinstance(opts, pulumi.ResourceOptions):
|
|
@@ -531,16 +530,16 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
531
530
|
id: pulumi.Input[str],
|
|
532
531
|
opts: Optional[pulumi.ResourceOptions] = None,
|
|
533
532
|
acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
|
|
534
|
-
disabled: Optional[pulumi.Input[
|
|
535
|
-
method: Optional[pulumi.Input[
|
|
536
|
-
name: Optional[pulumi.Input[
|
|
537
|
-
ssl_alt_name_to_check: Optional[pulumi.Input[
|
|
538
|
-
ssl_cert_path: Optional[pulumi.Input[
|
|
539
|
-
ssl_cipher: Optional[pulumi.Input[
|
|
540
|
-
ssl_common_name_to_check: Optional[pulumi.Input[
|
|
541
|
-
ssl_password: Optional[pulumi.Input[
|
|
542
|
-
ssl_root_ca_path: Optional[pulumi.Input[
|
|
543
|
-
ssl_verify_server_cert: Optional[pulumi.Input[
|
|
533
|
+
disabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
|
534
|
+
method: Optional[pulumi.Input[_builtins.str]] = None,
|
|
535
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
536
|
+
ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
537
|
+
ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
538
|
+
ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
|
|
539
|
+
ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
|
|
540
|
+
ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
|
|
541
|
+
ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
542
|
+
ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None) -> 'OutputsTcpServer':
|
|
544
543
|
"""
|
|
545
544
|
Get an existing OutputsTcpServer resource's state with the given name, id, and optional extra
|
|
546
545
|
properties used to qualify the lookup.
|
|
@@ -549,19 +548,19 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
549
548
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
550
549
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
551
550
|
:param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
|
|
552
|
-
:param pulumi.Input[
|
|
553
|
-
:param pulumi.Input[
|
|
551
|
+
:param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
|
|
552
|
+
:param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
|
|
554
553
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
555
|
-
:param pulumi.Input[
|
|
556
|
-
:param pulumi.Input[
|
|
557
|
-
:param pulumi.Input[
|
|
558
|
-
:param pulumi.Input[
|
|
559
|
-
:param pulumi.Input[
|
|
554
|
+
:param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
555
|
+
:param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
|
|
556
|
+
:param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
|
|
557
|
+
:param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
558
|
+
:param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
|
|
560
559
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
561
|
-
:param pulumi.Input[
|
|
560
|
+
:param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
|
|
562
561
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
563
|
-
:param pulumi.Input[
|
|
564
|
-
:param pulumi.Input[
|
|
562
|
+
:param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
|
|
563
|
+
:param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
565
564
|
"""
|
|
566
565
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
567
566
|
|
|
@@ -580,7 +579,7 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
580
579
|
__props__.__dict__["ssl_verify_server_cert"] = ssl_verify_server_cert
|
|
581
580
|
return OutputsTcpServer(resource_name, opts=opts, __props__=__props__)
|
|
582
581
|
|
|
583
|
-
@property
|
|
582
|
+
@_builtins.property
|
|
584
583
|
@pulumi.getter
|
|
585
584
|
def acl(self) -> pulumi.Output['outputs.OutputsTcpServerAcl']:
|
|
586
585
|
"""
|
|
@@ -588,84 +587,84 @@ class OutputsTcpServer(pulumi.CustomResource):
|
|
|
588
587
|
"""
|
|
589
588
|
return pulumi.get(self, "acl")
|
|
590
589
|
|
|
591
|
-
@property
|
|
590
|
+
@_builtins.property
|
|
592
591
|
@pulumi.getter
|
|
593
|
-
def disabled(self) -> pulumi.Output[
|
|
592
|
+
def disabled(self) -> pulumi.Output[_builtins.bool]:
|
|
594
593
|
"""
|
|
595
594
|
If true, disables the group.
|
|
596
595
|
"""
|
|
597
596
|
return pulumi.get(self, "disabled")
|
|
598
597
|
|
|
599
|
-
@property
|
|
598
|
+
@_builtins.property
|
|
600
599
|
@pulumi.getter
|
|
601
|
-
def method(self) -> pulumi.Output[
|
|
600
|
+
def method(self) -> pulumi.Output[_builtins.str]:
|
|
602
601
|
"""
|
|
603
602
|
Valid values: (clone | balance | autobalance)
|
|
604
603
|
The data distribution method used when two or more servers exist in the same forwarder group.
|
|
605
604
|
"""
|
|
606
605
|
return pulumi.get(self, "method")
|
|
607
606
|
|
|
608
|
-
@property
|
|
607
|
+
@_builtins.property
|
|
609
608
|
@pulumi.getter
|
|
610
|
-
def name(self) -> pulumi.Output[
|
|
609
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
|
611
610
|
"""
|
|
612
611
|
<host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
|
|
613
612
|
"""
|
|
614
613
|
return pulumi.get(self, "name")
|
|
615
614
|
|
|
616
|
-
@property
|
|
615
|
+
@_builtins.property
|
|
617
616
|
@pulumi.getter(name="sslAltNameToCheck")
|
|
618
|
-
def ssl_alt_name_to_check(self) -> pulumi.Output[
|
|
617
|
+
def ssl_alt_name_to_check(self) -> pulumi.Output[_builtins.str]:
|
|
619
618
|
"""
|
|
620
619
|
The alternate name to match in the remote server's SSL certificate.
|
|
621
620
|
"""
|
|
622
621
|
return pulumi.get(self, "ssl_alt_name_to_check")
|
|
623
622
|
|
|
624
|
-
@property
|
|
623
|
+
@_builtins.property
|
|
625
624
|
@pulumi.getter(name="sslCertPath")
|
|
626
|
-
def ssl_cert_path(self) -> pulumi.Output[
|
|
625
|
+
def ssl_cert_path(self) -> pulumi.Output[_builtins.str]:
|
|
627
626
|
"""
|
|
628
627
|
Path to the client certificate. If specified, connection uses SSL.
|
|
629
628
|
"""
|
|
630
629
|
return pulumi.get(self, "ssl_cert_path")
|
|
631
630
|
|
|
632
|
-
@property
|
|
631
|
+
@_builtins.property
|
|
633
632
|
@pulumi.getter(name="sslCipher")
|
|
634
|
-
def ssl_cipher(self) -> pulumi.Output[
|
|
633
|
+
def ssl_cipher(self) -> pulumi.Output[_builtins.str]:
|
|
635
634
|
"""
|
|
636
635
|
SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
|
|
637
636
|
"""
|
|
638
637
|
return pulumi.get(self, "ssl_cipher")
|
|
639
638
|
|
|
640
|
-
@property
|
|
639
|
+
@_builtins.property
|
|
641
640
|
@pulumi.getter(name="sslCommonNameToCheck")
|
|
642
|
-
def ssl_common_name_to_check(self) -> pulumi.Output[
|
|
641
|
+
def ssl_common_name_to_check(self) -> pulumi.Output[_builtins.str]:
|
|
643
642
|
"""
|
|
644
643
|
Check the common name of the server's certificate against this name.
|
|
645
644
|
If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
|
|
646
645
|
"""
|
|
647
646
|
return pulumi.get(self, "ssl_common_name_to_check")
|
|
648
647
|
|
|
649
|
-
@property
|
|
648
|
+
@_builtins.property
|
|
650
649
|
@pulumi.getter(name="sslPassword")
|
|
651
|
-
def ssl_password(self) -> pulumi.Output[
|
|
650
|
+
def ssl_password(self) -> pulumi.Output[_builtins.str]:
|
|
652
651
|
"""
|
|
653
652
|
The password associated with the CAcert.
|
|
654
653
|
The default Splunk Enterprise CAcert uses the password "password."
|
|
655
654
|
"""
|
|
656
655
|
return pulumi.get(self, "ssl_password")
|
|
657
656
|
|
|
658
|
-
@property
|
|
657
|
+
@_builtins.property
|
|
659
658
|
@pulumi.getter(name="sslRootCaPath")
|
|
660
|
-
def ssl_root_ca_path(self) -> pulumi.Output[
|
|
659
|
+
def ssl_root_ca_path(self) -> pulumi.Output[_builtins.str]:
|
|
661
660
|
"""
|
|
662
661
|
The path to the root certificate authority file.
|
|
663
662
|
"""
|
|
664
663
|
return pulumi.get(self, "ssl_root_ca_path")
|
|
665
664
|
|
|
666
|
-
@property
|
|
665
|
+
@_builtins.property
|
|
667
666
|
@pulumi.getter(name="sslVerifyServerCert")
|
|
668
|
-
def ssl_verify_server_cert(self) -> pulumi.Output[
|
|
667
|
+
def ssl_verify_server_cert(self) -> pulumi.Output[_builtins.bool]:
|
|
669
668
|
"""
|
|
670
669
|
If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
|
|
671
670
|
"""
|