pulumi-splunk 1.3.0a1752907250__py3-none-any.whl → 1.3.0a1753398191__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-splunk might be problematic. Click here for more details.

Files changed (38) hide show
  1. pulumi_splunk/__init__.py +1 -1
  2. pulumi_splunk/_inputs.py +1274 -1275
  3. pulumi_splunk/admin_saml_groups.py +35 -36
  4. pulumi_splunk/apps_local.py +208 -209
  5. pulumi_splunk/authentication_users.py +154 -155
  6. pulumi_splunk/authorization_roles.py +222 -223
  7. pulumi_splunk/config/__init__.py +1 -1
  8. pulumi_splunk/config/__init__.pyi +1 -2
  9. pulumi_splunk/config/vars.py +7 -8
  10. pulumi_splunk/configs_conf.py +38 -39
  11. pulumi_splunk/data_ui_views.py +38 -39
  12. pulumi_splunk/generic_acl.py +21 -22
  13. pulumi_splunk/global_http_event_collector.py +120 -121
  14. pulumi_splunk/indexes.py +650 -651
  15. pulumi_splunk/inputs_http_event_collector.py +157 -158
  16. pulumi_splunk/inputs_monitor.py +259 -260
  17. pulumi_splunk/inputs_script.py +157 -158
  18. pulumi_splunk/inputs_tcp_cooked.py +89 -90
  19. pulumi_splunk/inputs_tcp_raw.py +174 -175
  20. pulumi_splunk/inputs_tcp_splunk_tcp_token.py +38 -39
  21. pulumi_splunk/inputs_tcp_ssl.py +86 -87
  22. pulumi_splunk/inputs_udp.py +191 -192
  23. pulumi_splunk/lookup_definition.py +38 -39
  24. pulumi_splunk/lookup_table_file.py +69 -70
  25. pulumi_splunk/outputs.py +856 -857
  26. pulumi_splunk/outputs_tcp_default.py +140 -141
  27. pulumi_splunk/outputs_tcp_group.py +174 -175
  28. pulumi_splunk/outputs_tcp_server.py +174 -175
  29. pulumi_splunk/outputs_tcp_syslog.py +123 -124
  30. pulumi_splunk/provider.py +58 -59
  31. pulumi_splunk/pulumi-plugin.json +1 -1
  32. pulumi_splunk/saved_searches.py +2803 -2804
  33. pulumi_splunk/sh_indexes_manager.py +72 -73
  34. {pulumi_splunk-1.3.0a1752907250.dist-info → pulumi_splunk-1.3.0a1753398191.dist-info}/METADATA +1 -1
  35. pulumi_splunk-1.3.0a1753398191.dist-info/RECORD +39 -0
  36. pulumi_splunk-1.3.0a1752907250.dist-info/RECORD +0 -39
  37. {pulumi_splunk-1.3.0a1752907250.dist-info → pulumi_splunk-1.3.0a1753398191.dist-info}/WHEEL +0 -0
  38. {pulumi_splunk-1.3.0a1752907250.dist-info → pulumi_splunk-1.3.0a1753398191.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -23,32 +22,32 @@ __all__ = ['OutputsTcpServerArgs', 'OutputsTcpServer']
23
22
  class OutputsTcpServerArgs:
24
23
  def __init__(__self__, *,
25
24
  acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
26
- disabled: Optional[pulumi.Input[builtins.bool]] = None,
27
- method: Optional[pulumi.Input[builtins.str]] = None,
28
- name: Optional[pulumi.Input[builtins.str]] = None,
29
- ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
30
- ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
31
- ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
32
- ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
33
- ssl_password: Optional[pulumi.Input[builtins.str]] = None,
34
- ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
35
- ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None):
25
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ method: Optional[pulumi.Input[_builtins.str]] = None,
27
+ name: Optional[pulumi.Input[_builtins.str]] = None,
28
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
29
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
30
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
31
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
32
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
33
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
34
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
36
35
  """
37
36
  The set of arguments for constructing a OutputsTcpServer resource.
38
37
  :param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
39
- :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
40
- :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
38
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
39
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
41
40
  The data distribution method used when two or more servers exist in the same forwarder group.
42
- :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
43
- :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
44
- :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
45
- :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
46
- :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
41
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
42
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
43
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
44
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
45
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
47
46
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
48
- :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
47
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
49
48
  The default Splunk Enterprise CAcert uses the password "password."
50
- :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
51
- :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
49
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
50
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
52
51
  """
53
52
  if acl is not None:
54
53
  pulumi.set(__self__, "acl", acl)
@@ -73,7 +72,7 @@ class OutputsTcpServerArgs:
73
72
  if ssl_verify_server_cert is not None:
74
73
  pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter
78
77
  def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
79
78
  """
@@ -85,21 +84,21 @@ class OutputsTcpServerArgs:
85
84
  def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
86
85
  pulumi.set(self, "acl", value)
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter
90
- def disabled(self) -> Optional[pulumi.Input[builtins.bool]]:
89
+ def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
91
90
  """
92
91
  If true, disables the group.
93
92
  """
94
93
  return pulumi.get(self, "disabled")
95
94
 
96
95
  @disabled.setter
97
- def disabled(self, value: Optional[pulumi.Input[builtins.bool]]):
96
+ def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
98
97
  pulumi.set(self, "disabled", value)
99
98
 
100
- @property
99
+ @_builtins.property
101
100
  @pulumi.getter
102
- def method(self) -> Optional[pulumi.Input[builtins.str]]:
101
+ def method(self) -> Optional[pulumi.Input[_builtins.str]]:
103
102
  """
104
103
  Valid values: (clone | balance | autobalance)
105
104
  The data distribution method used when two or more servers exist in the same forwarder group.
@@ -107,60 +106,60 @@ class OutputsTcpServerArgs:
107
106
  return pulumi.get(self, "method")
108
107
 
109
108
  @method.setter
110
- def method(self, value: Optional[pulumi.Input[builtins.str]]):
109
+ def method(self, value: Optional[pulumi.Input[_builtins.str]]):
111
110
  pulumi.set(self, "method", value)
112
111
 
113
- @property
112
+ @_builtins.property
114
113
  @pulumi.getter
115
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
114
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
116
115
  """
117
116
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
118
117
  """
119
118
  return pulumi.get(self, "name")
120
119
 
121
120
  @name.setter
122
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
121
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
123
122
  pulumi.set(self, "name", value)
124
123
 
125
- @property
124
+ @_builtins.property
126
125
  @pulumi.getter(name="sslAltNameToCheck")
127
- def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
126
+ def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
128
127
  """
129
128
  The alternate name to match in the remote server's SSL certificate.
130
129
  """
131
130
  return pulumi.get(self, "ssl_alt_name_to_check")
132
131
 
133
132
  @ssl_alt_name_to_check.setter
134
- def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
133
+ def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
135
134
  pulumi.set(self, "ssl_alt_name_to_check", value)
136
135
 
137
- @property
136
+ @_builtins.property
138
137
  @pulumi.getter(name="sslCertPath")
139
- def ssl_cert_path(self) -> Optional[pulumi.Input[builtins.str]]:
138
+ def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
140
139
  """
141
140
  Path to the client certificate. If specified, connection uses SSL.
142
141
  """
143
142
  return pulumi.get(self, "ssl_cert_path")
144
143
 
145
144
  @ssl_cert_path.setter
146
- def ssl_cert_path(self, value: Optional[pulumi.Input[builtins.str]]):
145
+ def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
147
146
  pulumi.set(self, "ssl_cert_path", value)
148
147
 
149
- @property
148
+ @_builtins.property
150
149
  @pulumi.getter(name="sslCipher")
151
- def ssl_cipher(self) -> Optional[pulumi.Input[builtins.str]]:
150
+ def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
152
151
  """
153
152
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
154
153
  """
155
154
  return pulumi.get(self, "ssl_cipher")
156
155
 
157
156
  @ssl_cipher.setter
158
- def ssl_cipher(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "ssl_cipher", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="sslCommonNameToCheck")
163
- def ssl_common_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
162
+ def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
164
163
  """
165
164
  Check the common name of the server's certificate against this name.
166
165
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
@@ -168,12 +167,12 @@ class OutputsTcpServerArgs:
168
167
  return pulumi.get(self, "ssl_common_name_to_check")
169
168
 
170
169
  @ssl_common_name_to_check.setter
171
- def ssl_common_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
170
+ def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
172
171
  pulumi.set(self, "ssl_common_name_to_check", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter(name="sslPassword")
176
- def ssl_password(self) -> Optional[pulumi.Input[builtins.str]]:
175
+ def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
177
176
  """
178
177
  The password associated with the CAcert.
179
178
  The default Splunk Enterprise CAcert uses the password "password."
@@ -181,31 +180,31 @@ class OutputsTcpServerArgs:
181
180
  return pulumi.get(self, "ssl_password")
182
181
 
183
182
  @ssl_password.setter
184
- def ssl_password(self, value: Optional[pulumi.Input[builtins.str]]):
183
+ def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
185
184
  pulumi.set(self, "ssl_password", value)
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter(name="sslRootCaPath")
189
- def ssl_root_ca_path(self) -> Optional[pulumi.Input[builtins.str]]:
188
+ def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
190
189
  """
191
190
  The path to the root certificate authority file.
192
191
  """
193
192
  return pulumi.get(self, "ssl_root_ca_path")
194
193
 
195
194
  @ssl_root_ca_path.setter
196
- def ssl_root_ca_path(self, value: Optional[pulumi.Input[builtins.str]]):
195
+ def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
197
196
  pulumi.set(self, "ssl_root_ca_path", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter(name="sslVerifyServerCert")
201
- def ssl_verify_server_cert(self) -> Optional[pulumi.Input[builtins.bool]]:
200
+ def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
202
201
  """
203
202
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
204
203
  """
205
204
  return pulumi.get(self, "ssl_verify_server_cert")
206
205
 
207
206
  @ssl_verify_server_cert.setter
208
- def ssl_verify_server_cert(self, value: Optional[pulumi.Input[builtins.bool]]):
207
+ def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
209
208
  pulumi.set(self, "ssl_verify_server_cert", value)
210
209
 
211
210
 
@@ -213,32 +212,32 @@ class OutputsTcpServerArgs:
213
212
  class _OutputsTcpServerState:
214
213
  def __init__(__self__, *,
215
214
  acl: Optional[pulumi.Input['OutputsTcpServerAclArgs']] = None,
216
- disabled: Optional[pulumi.Input[builtins.bool]] = None,
217
- method: Optional[pulumi.Input[builtins.str]] = None,
218
- name: Optional[pulumi.Input[builtins.str]] = None,
219
- ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
220
- ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
221
- ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
222
- ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
223
- ssl_password: Optional[pulumi.Input[builtins.str]] = None,
224
- ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
225
- ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None):
215
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
216
+ method: Optional[pulumi.Input[_builtins.str]] = None,
217
+ name: Optional[pulumi.Input[_builtins.str]] = None,
218
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
219
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
220
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
221
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
222
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
223
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
224
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None):
226
225
  """
227
226
  Input properties used for looking up and filtering OutputsTcpServer resources.
228
227
  :param pulumi.Input['OutputsTcpServerAclArgs'] acl: The app/user context that is the namespace for the resource
229
- :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
230
- :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
228
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
229
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
231
230
  The data distribution method used when two or more servers exist in the same forwarder group.
232
- :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
233
- :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
234
- :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
235
- :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
236
- :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
231
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
232
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
233
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
234
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
235
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
237
236
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
238
- :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
237
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
239
238
  The default Splunk Enterprise CAcert uses the password "password."
240
- :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
241
- :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
239
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
240
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
242
241
  """
243
242
  if acl is not None:
244
243
  pulumi.set(__self__, "acl", acl)
@@ -263,7 +262,7 @@ class _OutputsTcpServerState:
263
262
  if ssl_verify_server_cert is not None:
264
263
  pulumi.set(__self__, "ssl_verify_server_cert", ssl_verify_server_cert)
265
264
 
266
- @property
265
+ @_builtins.property
267
266
  @pulumi.getter
268
267
  def acl(self) -> Optional[pulumi.Input['OutputsTcpServerAclArgs']]:
269
268
  """
@@ -275,21 +274,21 @@ class _OutputsTcpServerState:
275
274
  def acl(self, value: Optional[pulumi.Input['OutputsTcpServerAclArgs']]):
276
275
  pulumi.set(self, "acl", value)
277
276
 
278
- @property
277
+ @_builtins.property
279
278
  @pulumi.getter
280
- def disabled(self) -> Optional[pulumi.Input[builtins.bool]]:
279
+ def disabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
281
280
  """
282
281
  If true, disables the group.
283
282
  """
284
283
  return pulumi.get(self, "disabled")
285
284
 
286
285
  @disabled.setter
287
- def disabled(self, value: Optional[pulumi.Input[builtins.bool]]):
286
+ def disabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
288
287
  pulumi.set(self, "disabled", value)
289
288
 
290
- @property
289
+ @_builtins.property
291
290
  @pulumi.getter
292
- def method(self) -> Optional[pulumi.Input[builtins.str]]:
291
+ def method(self) -> Optional[pulumi.Input[_builtins.str]]:
293
292
  """
294
293
  Valid values: (clone | balance | autobalance)
295
294
  The data distribution method used when two or more servers exist in the same forwarder group.
@@ -297,60 +296,60 @@ class _OutputsTcpServerState:
297
296
  return pulumi.get(self, "method")
298
297
 
299
298
  @method.setter
300
- def method(self, value: Optional[pulumi.Input[builtins.str]]):
299
+ def method(self, value: Optional[pulumi.Input[_builtins.str]]):
301
300
  pulumi.set(self, "method", value)
302
301
 
303
- @property
302
+ @_builtins.property
304
303
  @pulumi.getter
305
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
304
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
306
305
  """
307
306
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
308
307
  """
309
308
  return pulumi.get(self, "name")
310
309
 
311
310
  @name.setter
312
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
311
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
313
312
  pulumi.set(self, "name", value)
314
313
 
315
- @property
314
+ @_builtins.property
316
315
  @pulumi.getter(name="sslAltNameToCheck")
317
- def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
316
+ def ssl_alt_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
318
317
  """
319
318
  The alternate name to match in the remote server's SSL certificate.
320
319
  """
321
320
  return pulumi.get(self, "ssl_alt_name_to_check")
322
321
 
323
322
  @ssl_alt_name_to_check.setter
324
- def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
323
+ def ssl_alt_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
325
324
  pulumi.set(self, "ssl_alt_name_to_check", value)
326
325
 
327
- @property
326
+ @_builtins.property
328
327
  @pulumi.getter(name="sslCertPath")
329
- def ssl_cert_path(self) -> Optional[pulumi.Input[builtins.str]]:
328
+ def ssl_cert_path(self) -> Optional[pulumi.Input[_builtins.str]]:
330
329
  """
331
330
  Path to the client certificate. If specified, connection uses SSL.
332
331
  """
333
332
  return pulumi.get(self, "ssl_cert_path")
334
333
 
335
334
  @ssl_cert_path.setter
336
- def ssl_cert_path(self, value: Optional[pulumi.Input[builtins.str]]):
335
+ def ssl_cert_path(self, value: Optional[pulumi.Input[_builtins.str]]):
337
336
  pulumi.set(self, "ssl_cert_path", value)
338
337
 
339
- @property
338
+ @_builtins.property
340
339
  @pulumi.getter(name="sslCipher")
341
- def ssl_cipher(self) -> Optional[pulumi.Input[builtins.str]]:
340
+ def ssl_cipher(self) -> Optional[pulumi.Input[_builtins.str]]:
342
341
  """
343
342
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
344
343
  """
345
344
  return pulumi.get(self, "ssl_cipher")
346
345
 
347
346
  @ssl_cipher.setter
348
- def ssl_cipher(self, value: Optional[pulumi.Input[builtins.str]]):
347
+ def ssl_cipher(self, value: Optional[pulumi.Input[_builtins.str]]):
349
348
  pulumi.set(self, "ssl_cipher", value)
350
349
 
351
- @property
350
+ @_builtins.property
352
351
  @pulumi.getter(name="sslCommonNameToCheck")
353
- def ssl_common_name_to_check(self) -> Optional[pulumi.Input[builtins.str]]:
352
+ def ssl_common_name_to_check(self) -> Optional[pulumi.Input[_builtins.str]]:
354
353
  """
355
354
  Check the common name of the server's certificate against this name.
356
355
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
@@ -358,12 +357,12 @@ class _OutputsTcpServerState:
358
357
  return pulumi.get(self, "ssl_common_name_to_check")
359
358
 
360
359
  @ssl_common_name_to_check.setter
361
- def ssl_common_name_to_check(self, value: Optional[pulumi.Input[builtins.str]]):
360
+ def ssl_common_name_to_check(self, value: Optional[pulumi.Input[_builtins.str]]):
362
361
  pulumi.set(self, "ssl_common_name_to_check", value)
363
362
 
364
- @property
363
+ @_builtins.property
365
364
  @pulumi.getter(name="sslPassword")
366
- def ssl_password(self) -> Optional[pulumi.Input[builtins.str]]:
365
+ def ssl_password(self) -> Optional[pulumi.Input[_builtins.str]]:
367
366
  """
368
367
  The password associated with the CAcert.
369
368
  The default Splunk Enterprise CAcert uses the password "password."
@@ -371,31 +370,31 @@ class _OutputsTcpServerState:
371
370
  return pulumi.get(self, "ssl_password")
372
371
 
373
372
  @ssl_password.setter
374
- def ssl_password(self, value: Optional[pulumi.Input[builtins.str]]):
373
+ def ssl_password(self, value: Optional[pulumi.Input[_builtins.str]]):
375
374
  pulumi.set(self, "ssl_password", value)
376
375
 
377
- @property
376
+ @_builtins.property
378
377
  @pulumi.getter(name="sslRootCaPath")
379
- def ssl_root_ca_path(self) -> Optional[pulumi.Input[builtins.str]]:
378
+ def ssl_root_ca_path(self) -> Optional[pulumi.Input[_builtins.str]]:
380
379
  """
381
380
  The path to the root certificate authority file.
382
381
  """
383
382
  return pulumi.get(self, "ssl_root_ca_path")
384
383
 
385
384
  @ssl_root_ca_path.setter
386
- def ssl_root_ca_path(self, value: Optional[pulumi.Input[builtins.str]]):
385
+ def ssl_root_ca_path(self, value: Optional[pulumi.Input[_builtins.str]]):
387
386
  pulumi.set(self, "ssl_root_ca_path", value)
388
387
 
389
- @property
388
+ @_builtins.property
390
389
  @pulumi.getter(name="sslVerifyServerCert")
391
- def ssl_verify_server_cert(self) -> Optional[pulumi.Input[builtins.bool]]:
390
+ def ssl_verify_server_cert(self) -> Optional[pulumi.Input[_builtins.bool]]:
392
391
  """
393
392
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
394
393
  """
395
394
  return pulumi.get(self, "ssl_verify_server_cert")
396
395
 
397
396
  @ssl_verify_server_cert.setter
398
- def ssl_verify_server_cert(self, value: Optional[pulumi.Input[builtins.bool]]):
397
+ def ssl_verify_server_cert(self, value: Optional[pulumi.Input[_builtins.bool]]):
399
398
  pulumi.set(self, "ssl_verify_server_cert", value)
400
399
 
401
400
 
@@ -406,16 +405,16 @@ class OutputsTcpServer(pulumi.CustomResource):
406
405
  resource_name: str,
407
406
  opts: Optional[pulumi.ResourceOptions] = None,
408
407
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
409
- disabled: Optional[pulumi.Input[builtins.bool]] = None,
410
- method: Optional[pulumi.Input[builtins.str]] = None,
411
- name: Optional[pulumi.Input[builtins.str]] = None,
412
- ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
413
- ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
414
- ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
415
- ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
416
- ssl_password: Optional[pulumi.Input[builtins.str]] = None,
417
- ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
418
- ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None,
408
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
409
+ method: Optional[pulumi.Input[_builtins.str]] = None,
410
+ name: Optional[pulumi.Input[_builtins.str]] = None,
411
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
412
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
413
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
414
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
415
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
416
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
417
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
419
418
  __props__=None):
420
419
  """
421
420
  ## # Resource: OutputsTcpServer
@@ -436,19 +435,19 @@ class OutputsTcpServer(pulumi.CustomResource):
436
435
  :param str resource_name: The name of the resource.
437
436
  :param pulumi.ResourceOptions opts: Options for the resource.
438
437
  :param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
439
- :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
440
- :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
438
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
439
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
441
440
  The data distribution method used when two or more servers exist in the same forwarder group.
442
- :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
443
- :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
444
- :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
445
- :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
446
- :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
441
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
442
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
443
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
444
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
445
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
447
446
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
448
- :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
447
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
449
448
  The default Splunk Enterprise CAcert uses the password "password."
450
- :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
451
- :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
449
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
450
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
452
451
  """
453
452
  ...
454
453
  @overload
@@ -488,16 +487,16 @@ class OutputsTcpServer(pulumi.CustomResource):
488
487
  resource_name: str,
489
488
  opts: Optional[pulumi.ResourceOptions] = None,
490
489
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
491
- disabled: Optional[pulumi.Input[builtins.bool]] = None,
492
- method: Optional[pulumi.Input[builtins.str]] = None,
493
- name: Optional[pulumi.Input[builtins.str]] = None,
494
- ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
495
- ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
496
- ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
497
- ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
498
- ssl_password: Optional[pulumi.Input[builtins.str]] = None,
499
- ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
500
- ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None,
490
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ method: Optional[pulumi.Input[_builtins.str]] = None,
492
+ name: Optional[pulumi.Input[_builtins.str]] = None,
493
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
494
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
495
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
496
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
497
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
498
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
499
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None,
501
500
  __props__=None):
502
501
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
503
502
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -531,16 +530,16 @@ class OutputsTcpServer(pulumi.CustomResource):
531
530
  id: pulumi.Input[str],
532
531
  opts: Optional[pulumi.ResourceOptions] = None,
533
532
  acl: Optional[pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']]] = None,
534
- disabled: Optional[pulumi.Input[builtins.bool]] = None,
535
- method: Optional[pulumi.Input[builtins.str]] = None,
536
- name: Optional[pulumi.Input[builtins.str]] = None,
537
- ssl_alt_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
538
- ssl_cert_path: Optional[pulumi.Input[builtins.str]] = None,
539
- ssl_cipher: Optional[pulumi.Input[builtins.str]] = None,
540
- ssl_common_name_to_check: Optional[pulumi.Input[builtins.str]] = None,
541
- ssl_password: Optional[pulumi.Input[builtins.str]] = None,
542
- ssl_root_ca_path: Optional[pulumi.Input[builtins.str]] = None,
543
- ssl_verify_server_cert: Optional[pulumi.Input[builtins.bool]] = None) -> 'OutputsTcpServer':
533
+ disabled: Optional[pulumi.Input[_builtins.bool]] = None,
534
+ method: Optional[pulumi.Input[_builtins.str]] = None,
535
+ name: Optional[pulumi.Input[_builtins.str]] = None,
536
+ ssl_alt_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
537
+ ssl_cert_path: Optional[pulumi.Input[_builtins.str]] = None,
538
+ ssl_cipher: Optional[pulumi.Input[_builtins.str]] = None,
539
+ ssl_common_name_to_check: Optional[pulumi.Input[_builtins.str]] = None,
540
+ ssl_password: Optional[pulumi.Input[_builtins.str]] = None,
541
+ ssl_root_ca_path: Optional[pulumi.Input[_builtins.str]] = None,
542
+ ssl_verify_server_cert: Optional[pulumi.Input[_builtins.bool]] = None) -> 'OutputsTcpServer':
544
543
  """
545
544
  Get an existing OutputsTcpServer resource's state with the given name, id, and optional extra
546
545
  properties used to qualify the lookup.
@@ -549,19 +548,19 @@ class OutputsTcpServer(pulumi.CustomResource):
549
548
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
550
549
  :param pulumi.ResourceOptions opts: Options for the resource.
551
550
  :param pulumi.Input[Union['OutputsTcpServerAclArgs', 'OutputsTcpServerAclArgsDict']] acl: The app/user context that is the namespace for the resource
552
- :param pulumi.Input[builtins.bool] disabled: If true, disables the group.
553
- :param pulumi.Input[builtins.str] method: Valid values: (clone | balance | autobalance)
551
+ :param pulumi.Input[_builtins.bool] disabled: If true, disables the group.
552
+ :param pulumi.Input[_builtins.str] method: Valid values: (clone | balance | autobalance)
554
553
  The data distribution method used when two or more servers exist in the same forwarder group.
555
- :param pulumi.Input[builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
556
- :param pulumi.Input[builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
557
- :param pulumi.Input[builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
558
- :param pulumi.Input[builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
559
- :param pulumi.Input[builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
554
+ :param pulumi.Input[_builtins.str] name: <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
555
+ :param pulumi.Input[_builtins.str] ssl_alt_name_to_check: The alternate name to match in the remote server's SSL certificate.
556
+ :param pulumi.Input[_builtins.str] ssl_cert_path: Path to the client certificate. If specified, connection uses SSL.
557
+ :param pulumi.Input[_builtins.str] ssl_cipher: SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
558
+ :param pulumi.Input[_builtins.str] ssl_common_name_to_check: Check the common name of the server's certificate against this name.
560
559
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
561
- :param pulumi.Input[builtins.str] ssl_password: The password associated with the CAcert.
560
+ :param pulumi.Input[_builtins.str] ssl_password: The password associated with the CAcert.
562
561
  The default Splunk Enterprise CAcert uses the password "password."
563
- :param pulumi.Input[builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
564
- :param pulumi.Input[builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
562
+ :param pulumi.Input[_builtins.str] ssl_root_ca_path: The path to the root certificate authority file.
563
+ :param pulumi.Input[_builtins.bool] ssl_verify_server_cert: If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
565
564
  """
566
565
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
567
566
 
@@ -580,7 +579,7 @@ class OutputsTcpServer(pulumi.CustomResource):
580
579
  __props__.__dict__["ssl_verify_server_cert"] = ssl_verify_server_cert
581
580
  return OutputsTcpServer(resource_name, opts=opts, __props__=__props__)
582
581
 
583
- @property
582
+ @_builtins.property
584
583
  @pulumi.getter
585
584
  def acl(self) -> pulumi.Output['outputs.OutputsTcpServerAcl']:
586
585
  """
@@ -588,84 +587,84 @@ class OutputsTcpServer(pulumi.CustomResource):
588
587
  """
589
588
  return pulumi.get(self, "acl")
590
589
 
591
- @property
590
+ @_builtins.property
592
591
  @pulumi.getter
593
- def disabled(self) -> pulumi.Output[builtins.bool]:
592
+ def disabled(self) -> pulumi.Output[_builtins.bool]:
594
593
  """
595
594
  If true, disables the group.
596
595
  """
597
596
  return pulumi.get(self, "disabled")
598
597
 
599
- @property
598
+ @_builtins.property
600
599
  @pulumi.getter
601
- def method(self) -> pulumi.Output[builtins.str]:
600
+ def method(self) -> pulumi.Output[_builtins.str]:
602
601
  """
603
602
  Valid values: (clone | balance | autobalance)
604
603
  The data distribution method used when two or more servers exist in the same forwarder group.
605
604
  """
606
605
  return pulumi.get(self, "method")
607
606
 
608
- @property
607
+ @_builtins.property
609
608
  @pulumi.getter
610
- def name(self) -> pulumi.Output[builtins.str]:
609
+ def name(self) -> pulumi.Output[_builtins.str]:
611
610
  """
612
611
  <host>:<port> of the Splunk receiver. <host> can be either an ip address or server name. <port> is the that port that the Splunk receiver is listening on.
613
612
  """
614
613
  return pulumi.get(self, "name")
615
614
 
616
- @property
615
+ @_builtins.property
617
616
  @pulumi.getter(name="sslAltNameToCheck")
618
- def ssl_alt_name_to_check(self) -> pulumi.Output[builtins.str]:
617
+ def ssl_alt_name_to_check(self) -> pulumi.Output[_builtins.str]:
619
618
  """
620
619
  The alternate name to match in the remote server's SSL certificate.
621
620
  """
622
621
  return pulumi.get(self, "ssl_alt_name_to_check")
623
622
 
624
- @property
623
+ @_builtins.property
625
624
  @pulumi.getter(name="sslCertPath")
626
- def ssl_cert_path(self) -> pulumi.Output[builtins.str]:
625
+ def ssl_cert_path(self) -> pulumi.Output[_builtins.str]:
627
626
  """
628
627
  Path to the client certificate. If specified, connection uses SSL.
629
628
  """
630
629
  return pulumi.get(self, "ssl_cert_path")
631
630
 
632
- @property
631
+ @_builtins.property
633
632
  @pulumi.getter(name="sslCipher")
634
- def ssl_cipher(self) -> pulumi.Output[builtins.str]:
633
+ def ssl_cipher(self) -> pulumi.Output[_builtins.str]:
635
634
  """
636
635
  SSL Cipher in the form ALL:!aNULL:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM
637
636
  """
638
637
  return pulumi.get(self, "ssl_cipher")
639
638
 
640
- @property
639
+ @_builtins.property
641
640
  @pulumi.getter(name="sslCommonNameToCheck")
642
- def ssl_common_name_to_check(self) -> pulumi.Output[builtins.str]:
641
+ def ssl_common_name_to_check(self) -> pulumi.Output[_builtins.str]:
643
642
  """
644
643
  Check the common name of the server's certificate against this name.
645
644
  If there is no match, assume that Splunk Enterprise is not authenticated against this server. You must specify this setting if sslVerifyServerCert is true.
646
645
  """
647
646
  return pulumi.get(self, "ssl_common_name_to_check")
648
647
 
649
- @property
648
+ @_builtins.property
650
649
  @pulumi.getter(name="sslPassword")
651
- def ssl_password(self) -> pulumi.Output[builtins.str]:
650
+ def ssl_password(self) -> pulumi.Output[_builtins.str]:
652
651
  """
653
652
  The password associated with the CAcert.
654
653
  The default Splunk Enterprise CAcert uses the password "password."
655
654
  """
656
655
  return pulumi.get(self, "ssl_password")
657
656
 
658
- @property
657
+ @_builtins.property
659
658
  @pulumi.getter(name="sslRootCaPath")
660
- def ssl_root_ca_path(self) -> pulumi.Output[builtins.str]:
659
+ def ssl_root_ca_path(self) -> pulumi.Output[_builtins.str]:
661
660
  """
662
661
  The path to the root certificate authority file.
663
662
  """
664
663
  return pulumi.get(self, "ssl_root_ca_path")
665
664
 
666
- @property
665
+ @_builtins.property
667
666
  @pulumi.getter(name="sslVerifyServerCert")
668
- def ssl_verify_server_cert(self) -> pulumi.Output[builtins.bool]:
667
+ def ssl_verify_server_cert(self) -> pulumi.Output[_builtins.bool]:
669
668
  """
670
669
  If true, make sure that the server you are connecting to is a valid one (authenticated). Both the common name and the alternate name of the server are then checked for a match.
671
670
  """