1. Packages
  2. Konnect Provider
  3. API Docs
  4. EventGatewayVirtualCluster
Viewing docs for konnect 3.11.0
published on Thursday, Mar 12, 2026 by kong
konnect logo
Viewing docs for konnect 3.11.0
published on Thursday, Mar 12, 2026 by kong

    EventGatewayVirtualCluster Resource

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as konnect from "@pulumi/konnect";
    
    const myEventgatewayvirtualcluster = new konnect.EventGatewayVirtualCluster("my_eventgatewayvirtualcluster", {
        aclMode: "enforce_on_gateway",
        authentications: [{
            saslPlain: {
                mediation: "passthrough",
                principals: [{
                    password: "${vault.env['MY_ENV_VAR']}",
                    username: "...my_username...",
                }],
            },
        }],
        description: "...my_description...",
        destination: {
            id: "759b5471-3de4-485c-b7d3-6e8cb8929d81",
        },
        dnsLabel: "vcluster-1",
        gatewayId: "9524ec7d-36d9-465d-a8c5-83a3c9390458",
        labels: {
            key: "value",
        },
        name: "...my_name...",
        namespace: {
            additional: {
                consumerGroups: [{
                    glob: {
                        glob: "...my_glob...",
                    },
                }],
                topics: [{
                    exactList: {
                        conflict: "warn",
                        exactLists: [{
                            backend: "...my_backend...",
                        }],
                    },
                }],
            },
            mode: "hide_prefix",
            prefix: "...my_prefix...",
        },
    });
    
    import pulumi
    import pulumi_konnect as konnect
    
    my_eventgatewayvirtualcluster = konnect.EventGatewayVirtualCluster("my_eventgatewayvirtualcluster",
        acl_mode="enforce_on_gateway",
        authentications=[{
            "sasl_plain": {
                "mediation": "passthrough",
                "principals": [{
                    "password": "${vault.env['MY_ENV_VAR']}",
                    "username": "...my_username...",
                }],
            },
        }],
        description="...my_description...",
        destination={
            "id": "759b5471-3de4-485c-b7d3-6e8cb8929d81",
        },
        dns_label="vcluster-1",
        gateway_id="9524ec7d-36d9-465d-a8c5-83a3c9390458",
        labels={
            "key": "value",
        },
        name="...my_name...",
        namespace={
            "additional": {
                "consumer_groups": [{
                    "glob": {
                        "glob": "...my_glob...",
                    },
                }],
                "topics": [{
                    "exact_list": {
                        "conflict": "warn",
                        "exact_lists": [{
                            "backend": "...my_backend...",
                        }],
                    },
                }],
            },
            "mode": "hide_prefix",
            "prefix": "...my_prefix...",
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/konnect/v3/konnect"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := konnect.NewEventGatewayVirtualCluster(ctx, "my_eventgatewayvirtualcluster", &konnect.EventGatewayVirtualClusterArgs{
    			AclMode: pulumi.String("enforce_on_gateway"),
    			Authentications: konnect.EventGatewayVirtualClusterAuthenticationArray{
    				&konnect.EventGatewayVirtualClusterAuthenticationArgs{
    					SaslPlain: &konnect.EventGatewayVirtualClusterAuthenticationSaslPlainArgs{
    						Mediation: pulumi.String("passthrough"),
    						Principals: konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArray{
    							&konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs{
    								Password: pulumi.String("${vault.env['MY_ENV_VAR']}"),
    								Username: pulumi.String("...my_username..."),
    							},
    						},
    					},
    				},
    			},
    			Description: pulumi.String("...my_description..."),
    			Destination: &konnect.EventGatewayVirtualClusterDestinationArgs{
    				Id: pulumi.String("759b5471-3de4-485c-b7d3-6e8cb8929d81"),
    			},
    			DnsLabel:  pulumi.String("vcluster-1"),
    			GatewayId: pulumi.String("9524ec7d-36d9-465d-a8c5-83a3c9390458"),
    			Labels: pulumi.StringMap{
    				"key": pulumi.String("value"),
    			},
    			Name: pulumi.String("...my_name..."),
    			Namespace: &konnect.EventGatewayVirtualClusterNamespaceArgs{
    				Additional: &konnect.EventGatewayVirtualClusterNamespaceAdditionalArgs{
    					ConsumerGroups: konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArray{
    						&konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs{
    							Glob: &konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs{
    								Glob: pulumi.String("...my_glob..."),
    							},
    						},
    					},
    					Topics: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArray{
    						&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs{
    							ExactList: &konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs{
    								Conflict: pulumi.String("warn"),
    								ExactLists: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArray{
    									&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs{
    										Backend: pulumi.String("...my_backend..."),
    									},
    								},
    							},
    						},
    					},
    				},
    				Mode:   pulumi.String("hide_prefix"),
    				Prefix: pulumi.String("...my_prefix..."),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Konnect = Pulumi.Konnect;
    
    return await Deployment.RunAsync(() => 
    {
        var myEventgatewayvirtualcluster = new Konnect.EventGatewayVirtualCluster("my_eventgatewayvirtualcluster", new()
        {
            AclMode = "enforce_on_gateway",
            Authentications = new[]
            {
                new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationArgs
                {
                    SaslPlain = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainArgs
                    {
                        Mediation = "passthrough",
                        Principals = new[]
                        {
                            new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs
                            {
                                Password = "${vault.env['MY_ENV_VAR']}",
                                Username = "...my_username...",
                            },
                        },
                    },
                },
            },
            Description = "...my_description...",
            Destination = new Konnect.Inputs.EventGatewayVirtualClusterDestinationArgs
            {
                Id = "759b5471-3de4-485c-b7d3-6e8cb8929d81",
            },
            DnsLabel = "vcluster-1",
            GatewayId = "9524ec7d-36d9-465d-a8c5-83a3c9390458",
            Labels = 
            {
                { "key", "value" },
            },
            Name = "...my_name...",
            Namespace = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceArgs
            {
                Additional = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalArgs
                {
                    ConsumerGroups = new[]
                    {
                        new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs
                        {
                            Glob = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs
                            {
                                Glob = "...my_glob...",
                            },
                        },
                    },
                    Topics = new[]
                    {
                        new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs
                        {
                            ExactList = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs
                            {
                                Conflict = "warn",
                                ExactLists = new[]
                                {
                                    new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs
                                    {
                                        Backend = "...my_backend...",
                                    },
                                },
                            },
                        },
                    },
                },
                Mode = "hide_prefix",
                Prefix = "...my_prefix...",
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.konnect.EventGatewayVirtualCluster;
    import com.pulumi.konnect.EventGatewayVirtualClusterArgs;
    import com.pulumi.konnect.inputs.EventGatewayVirtualClusterAuthenticationArgs;
    import com.pulumi.konnect.inputs.EventGatewayVirtualClusterAuthenticationSaslPlainArgs;
    import com.pulumi.konnect.inputs.EventGatewayVirtualClusterDestinationArgs;
    import com.pulumi.konnect.inputs.EventGatewayVirtualClusterNamespaceArgs;
    import com.pulumi.konnect.inputs.EventGatewayVirtualClusterNamespaceAdditionalArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var myEventgatewayvirtualcluster = new EventGatewayVirtualCluster("myEventgatewayvirtualcluster", EventGatewayVirtualClusterArgs.builder()
                .aclMode("enforce_on_gateway")
                .authentications(EventGatewayVirtualClusterAuthenticationArgs.builder()
                    .saslPlain(EventGatewayVirtualClusterAuthenticationSaslPlainArgs.builder()
                        .mediation("passthrough")
                        .principals(EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs.builder()
                            .password("${vault.env['MY_ENV_VAR']}")
                            .username("...my_username...")
                            .build())
                        .build())
                    .build())
                .description("...my_description...")
                .destination(EventGatewayVirtualClusterDestinationArgs.builder()
                    .id("759b5471-3de4-485c-b7d3-6e8cb8929d81")
                    .build())
                .dnsLabel("vcluster-1")
                .gatewayId("9524ec7d-36d9-465d-a8c5-83a3c9390458")
                .labels(Map.of("key", "value"))
                .name("...my_name...")
                .namespace(EventGatewayVirtualClusterNamespaceArgs.builder()
                    .additional(EventGatewayVirtualClusterNamespaceAdditionalArgs.builder()
                        .consumerGroups(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs.builder()
                            .glob(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs.builder()
                                .glob("...my_glob...")
                                .build())
                            .build())
                        .topics(EventGatewayVirtualClusterNamespaceAdditionalTopicArgs.builder()
                            .exactList(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs.builder()
                                .conflict("warn")
                                .exactLists(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs.builder()
                                    .backend("...my_backend...")
                                    .build())
                                .build())
                            .build())
                        .build())
                    .mode("hide_prefix")
                    .prefix("...my_prefix...")
                    .build())
                .build());
    
        }
    }
    
    resources:
      myEventgatewayvirtualcluster:
        type: konnect:EventGatewayVirtualCluster
        name: my_eventgatewayvirtualcluster
        properties:
          aclMode: enforce_on_gateway
          authentications:
            - saslPlain:
                mediation: passthrough
                principals:
                  - password: $${vault.env['MY_ENV_VAR']}
                    username: '...my_username...'
          description: '...my_description...'
          destination:
            id: 759b5471-3de4-485c-b7d3-6e8cb8929d81
          dnsLabel: vcluster-1
          gatewayId: 9524ec7d-36d9-465d-a8c5-83a3c9390458
          labels:
            key: value
          name: '...my_name...'
          namespace:
            additional:
              consumerGroups:
                - glob:
                    glob: '...my_glob...'
              topics:
                - exactList:
                    conflict: warn
                    exactLists:
                      - backend: '...my_backend...'
            mode: hide_prefix
            prefix: '...my_prefix...'
    

    Create EventGatewayVirtualCluster Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new EventGatewayVirtualCluster(name: string, args: EventGatewayVirtualClusterArgs, opts?: CustomResourceOptions);
    @overload
    def EventGatewayVirtualCluster(resource_name: str,
                                   args: EventGatewayVirtualClusterArgs,
                                   opts: Optional[ResourceOptions] = None)
    
    @overload
    def EventGatewayVirtualCluster(resource_name: str,
                                   opts: Optional[ResourceOptions] = None,
                                   acl_mode: Optional[str] = None,
                                   authentications: Optional[Sequence[EventGatewayVirtualClusterAuthenticationArgs]] = None,
                                   destination: Optional[EventGatewayVirtualClusterDestinationArgs] = None,
                                   dns_label: Optional[str] = None,
                                   gateway_id: Optional[str] = None,
                                   description: Optional[str] = None,
                                   labels: Optional[Mapping[str, str]] = None,
                                   name: Optional[str] = None,
                                   namespace: Optional[EventGatewayVirtualClusterNamespaceArgs] = None)
    func NewEventGatewayVirtualCluster(ctx *Context, name string, args EventGatewayVirtualClusterArgs, opts ...ResourceOption) (*EventGatewayVirtualCluster, error)
    public EventGatewayVirtualCluster(string name, EventGatewayVirtualClusterArgs args, CustomResourceOptions? opts = null)
    public EventGatewayVirtualCluster(String name, EventGatewayVirtualClusterArgs args)
    public EventGatewayVirtualCluster(String name, EventGatewayVirtualClusterArgs args, CustomResourceOptions options)
    
    type: konnect:EventGatewayVirtualCluster
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args EventGatewayVirtualClusterArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args EventGatewayVirtualClusterArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args EventGatewayVirtualClusterArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args EventGatewayVirtualClusterArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args EventGatewayVirtualClusterArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var eventGatewayVirtualClusterResource = new Konnect.EventGatewayVirtualCluster("eventGatewayVirtualClusterResource", new()
    {
        AclMode = "string",
        Authentications = new[]
        {
            new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationArgs
            {
                Anonymous = null,
                OauthBearer = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerArgs
                {
                    ClaimsMapping = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs
                    {
                        Scope = "string",
                        Sub = "string",
                    },
                    Jwks = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs
                    {
                        CacheExpiration = "string",
                        Endpoint = "string",
                        Timeout = "string",
                    },
                    Mediation = "string",
                    Validate = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs
                    {
                        Audiences = new[]
                        {
                            new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs
                            {
                                Name = "string",
                            },
                        },
                        Issuer = "string",
                    },
                },
                SaslPlain = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainArgs
                {
                    Mediation = "string",
                    Principals = new[]
                    {
                        new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs
                        {
                            Password = "string",
                            Username = "string",
                        },
                    },
                },
                SaslScram = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslScramArgs
                {
                    Algorithm = "string",
                },
            },
        },
        Destination = new Konnect.Inputs.EventGatewayVirtualClusterDestinationArgs
        {
            Id = "string",
            Name = "string",
        },
        DnsLabel = "string",
        GatewayId = "string",
        Description = "string",
        Labels = 
        {
            { "string", "string" },
        },
        Name = "string",
        Namespace = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceArgs
        {
            Mode = "string",
            Prefix = "string",
            Additional = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalArgs
            {
                ConsumerGroups = new[]
                {
                    new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs
                    {
                        ExactList = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs
                        {
                            ExactLists = new[]
                            {
                                new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs
                                {
                                    Value = "string",
                                },
                            },
                        },
                        Glob = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs
                        {
                            Glob = "string",
                        },
                    },
                },
                Topics = new[]
                {
                    new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs
                    {
                        ExactList = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs
                        {
                            Conflict = "string",
                            ExactLists = new[]
                            {
                                new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs
                                {
                                    Backend = "string",
                                },
                            },
                        },
                        Glob = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs
                        {
                            Conflict = "string",
                            Glob = "string",
                        },
                    },
                },
            },
        },
    });
    
    example, err := konnect.NewEventGatewayVirtualCluster(ctx, "eventGatewayVirtualClusterResource", &konnect.EventGatewayVirtualClusterArgs{
    	AclMode: pulumi.String("string"),
    	Authentications: konnect.EventGatewayVirtualClusterAuthenticationArray{
    		&konnect.EventGatewayVirtualClusterAuthenticationArgs{
    			Anonymous: &konnect.EventGatewayVirtualClusterAuthenticationAnonymousArgs{},
    			OauthBearer: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerArgs{
    				ClaimsMapping: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs{
    					Scope: pulumi.String("string"),
    					Sub:   pulumi.String("string"),
    				},
    				Jwks: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs{
    					CacheExpiration: pulumi.String("string"),
    					Endpoint:        pulumi.String("string"),
    					Timeout:         pulumi.String("string"),
    				},
    				Mediation: pulumi.String("string"),
    				Validate: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs{
    					Audiences: konnect.EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArray{
    						&konnect.EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs{
    							Name: pulumi.String("string"),
    						},
    					},
    					Issuer: pulumi.String("string"),
    				},
    			},
    			SaslPlain: &konnect.EventGatewayVirtualClusterAuthenticationSaslPlainArgs{
    				Mediation: pulumi.String("string"),
    				Principals: konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArray{
    					&konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs{
    						Password: pulumi.String("string"),
    						Username: pulumi.String("string"),
    					},
    				},
    			},
    			SaslScram: &konnect.EventGatewayVirtualClusterAuthenticationSaslScramArgs{
    				Algorithm: pulumi.String("string"),
    			},
    		},
    	},
    	Destination: &konnect.EventGatewayVirtualClusterDestinationArgs{
    		Id:   pulumi.String("string"),
    		Name: pulumi.String("string"),
    	},
    	DnsLabel:    pulumi.String("string"),
    	GatewayId:   pulumi.String("string"),
    	Description: pulumi.String("string"),
    	Labels: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Name: pulumi.String("string"),
    	Namespace: &konnect.EventGatewayVirtualClusterNamespaceArgs{
    		Mode:   pulumi.String("string"),
    		Prefix: pulumi.String("string"),
    		Additional: &konnect.EventGatewayVirtualClusterNamespaceAdditionalArgs{
    			ConsumerGroups: konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArray{
    				&konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs{
    					ExactList: &konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs{
    						ExactLists: konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArray{
    							&konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs{
    								Value: pulumi.String("string"),
    							},
    						},
    					},
    					Glob: &konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs{
    						Glob: pulumi.String("string"),
    					},
    				},
    			},
    			Topics: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArray{
    				&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs{
    					ExactList: &konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs{
    						Conflict: pulumi.String("string"),
    						ExactLists: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArray{
    							&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs{
    								Backend: pulumi.String("string"),
    							},
    						},
    					},
    					Glob: &konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs{
    						Conflict: pulumi.String("string"),
    						Glob:     pulumi.String("string"),
    					},
    				},
    			},
    		},
    	},
    })
    
    var eventGatewayVirtualClusterResource = new EventGatewayVirtualCluster("eventGatewayVirtualClusterResource", EventGatewayVirtualClusterArgs.builder()
        .aclMode("string")
        .authentications(EventGatewayVirtualClusterAuthenticationArgs.builder()
            .anonymous(EventGatewayVirtualClusterAuthenticationAnonymousArgs.builder()
                .build())
            .oauthBearer(EventGatewayVirtualClusterAuthenticationOauthBearerArgs.builder()
                .claimsMapping(EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs.builder()
                    .scope("string")
                    .sub("string")
                    .build())
                .jwks(EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs.builder()
                    .cacheExpiration("string")
                    .endpoint("string")
                    .timeout("string")
                    .build())
                .mediation("string")
                .validate(EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs.builder()
                    .audiences(EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs.builder()
                        .name("string")
                        .build())
                    .issuer("string")
                    .build())
                .build())
            .saslPlain(EventGatewayVirtualClusterAuthenticationSaslPlainArgs.builder()
                .mediation("string")
                .principals(EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs.builder()
                    .password("string")
                    .username("string")
                    .build())
                .build())
            .saslScram(EventGatewayVirtualClusterAuthenticationSaslScramArgs.builder()
                .algorithm("string")
                .build())
            .build())
        .destination(EventGatewayVirtualClusterDestinationArgs.builder()
            .id("string")
            .name("string")
            .build())
        .dnsLabel("string")
        .gatewayId("string")
        .description("string")
        .labels(Map.of("string", "string"))
        .name("string")
        .namespace(EventGatewayVirtualClusterNamespaceArgs.builder()
            .mode("string")
            .prefix("string")
            .additional(EventGatewayVirtualClusterNamespaceAdditionalArgs.builder()
                .consumerGroups(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs.builder()
                    .exactList(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs.builder()
                        .exactLists(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs.builder()
                            .value("string")
                            .build())
                        .build())
                    .glob(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs.builder()
                        .glob("string")
                        .build())
                    .build())
                .topics(EventGatewayVirtualClusterNamespaceAdditionalTopicArgs.builder()
                    .exactList(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs.builder()
                        .conflict("string")
                        .exactLists(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs.builder()
                            .backend("string")
                            .build())
                        .build())
                    .glob(EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs.builder()
                        .conflict("string")
                        .glob("string")
                        .build())
                    .build())
                .build())
            .build())
        .build());
    
    event_gateway_virtual_cluster_resource = konnect.EventGatewayVirtualCluster("eventGatewayVirtualClusterResource",
        acl_mode="string",
        authentications=[{
            "anonymous": {},
            "oauth_bearer": {
                "claims_mapping": {
                    "scope": "string",
                    "sub": "string",
                },
                "jwks": {
                    "cache_expiration": "string",
                    "endpoint": "string",
                    "timeout": "string",
                },
                "mediation": "string",
                "validate": {
                    "audiences": [{
                        "name": "string",
                    }],
                    "issuer": "string",
                },
            },
            "sasl_plain": {
                "mediation": "string",
                "principals": [{
                    "password": "string",
                    "username": "string",
                }],
            },
            "sasl_scram": {
                "algorithm": "string",
            },
        }],
        destination={
            "id": "string",
            "name": "string",
        },
        dns_label="string",
        gateway_id="string",
        description="string",
        labels={
            "string": "string",
        },
        name="string",
        namespace={
            "mode": "string",
            "prefix": "string",
            "additional": {
                "consumer_groups": [{
                    "exact_list": {
                        "exact_lists": [{
                            "value": "string",
                        }],
                    },
                    "glob": {
                        "glob": "string",
                    },
                }],
                "topics": [{
                    "exact_list": {
                        "conflict": "string",
                        "exact_lists": [{
                            "backend": "string",
                        }],
                    },
                    "glob": {
                        "conflict": "string",
                        "glob": "string",
                    },
                }],
            },
        })
    
    const eventGatewayVirtualClusterResource = new konnect.EventGatewayVirtualCluster("eventGatewayVirtualClusterResource", {
        aclMode: "string",
        authentications: [{
            anonymous: {},
            oauthBearer: {
                claimsMapping: {
                    scope: "string",
                    sub: "string",
                },
                jwks: {
                    cacheExpiration: "string",
                    endpoint: "string",
                    timeout: "string",
                },
                mediation: "string",
                validate: {
                    audiences: [{
                        name: "string",
                    }],
                    issuer: "string",
                },
            },
            saslPlain: {
                mediation: "string",
                principals: [{
                    password: "string",
                    username: "string",
                }],
            },
            saslScram: {
                algorithm: "string",
            },
        }],
        destination: {
            id: "string",
            name: "string",
        },
        dnsLabel: "string",
        gatewayId: "string",
        description: "string",
        labels: {
            string: "string",
        },
        name: "string",
        namespace: {
            mode: "string",
            prefix: "string",
            additional: {
                consumerGroups: [{
                    exactList: {
                        exactLists: [{
                            value: "string",
                        }],
                    },
                    glob: {
                        glob: "string",
                    },
                }],
                topics: [{
                    exactList: {
                        conflict: "string",
                        exactLists: [{
                            backend: "string",
                        }],
                    },
                    glob: {
                        conflict: "string",
                        glob: "string",
                    },
                }],
            },
        },
    });
    
    type: konnect:EventGatewayVirtualCluster
    properties:
        aclMode: string
        authentications:
            - anonymous: {}
              oauthBearer:
                claimsMapping:
                    scope: string
                    sub: string
                jwks:
                    cacheExpiration: string
                    endpoint: string
                    timeout: string
                mediation: string
                validate:
                    audiences:
                        - name: string
                    issuer: string
              saslPlain:
                mediation: string
                principals:
                    - password: string
                      username: string
              saslScram:
                algorithm: string
        description: string
        destination:
            id: string
            name: string
        dnsLabel: string
        gatewayId: string
        labels:
            string: string
        name: string
        namespace:
            additional:
                consumerGroups:
                    - exactList:
                        exactLists:
                            - value: string
                      glob:
                        glob: string
                topics:
                    - exactList:
                        conflict: string
                        exactLists:
                            - backend: string
                      glob:
                        conflict: string
                        glob: string
            mode: string
            prefix: string
    

    EventGatewayVirtualCluster Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The EventGatewayVirtualCluster resource accepts the following input properties:

    AclMode string
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    Authentications List<EventGatewayVirtualClusterAuthentication>

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    Destination EventGatewayVirtualClusterDestination

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    DnsLabel string
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    GatewayId string
    The UUID of your Gateway.
    Description string
    A human-readable description of the virtual cluster. Default: ""
    Labels Dictionary<string, string>

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    Name string
    The name of the virtual cluster.
    Namespace EventGatewayVirtualClusterNamespace
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    AclMode string
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    Authentications []EventGatewayVirtualClusterAuthenticationArgs

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    Destination EventGatewayVirtualClusterDestinationArgs

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    DnsLabel string
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    GatewayId string
    The UUID of your Gateway.
    Description string
    A human-readable description of the virtual cluster. Default: ""
    Labels map[string]string

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    Name string
    The name of the virtual cluster.
    Namespace EventGatewayVirtualClusterNamespaceArgs
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    aclMode String
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications List<EventGatewayVirtualClusterAuthentication>

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    destination EventGatewayVirtualClusterDestination

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dnsLabel String
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gatewayId String
    The UUID of your Gateway.
    description String
    A human-readable description of the virtual cluster. Default: ""
    labels Map<String,String>

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name String
    The name of the virtual cluster.
    namespace EventGatewayVirtualClusterNamespace
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    aclMode string
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications EventGatewayVirtualClusterAuthentication[]

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    destination EventGatewayVirtualClusterDestination

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dnsLabel string
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gatewayId string
    The UUID of your Gateway.
    description string
    A human-readable description of the virtual cluster. Default: ""
    labels {[key: string]: string}

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name string
    The name of the virtual cluster.
    namespace EventGatewayVirtualClusterNamespace
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    acl_mode str
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications Sequence[EventGatewayVirtualClusterAuthenticationArgs]

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    destination EventGatewayVirtualClusterDestinationArgs

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dns_label str
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gateway_id str
    The UUID of your Gateway.
    description str
    A human-readable description of the virtual cluster. Default: ""
    labels Mapping[str, str]

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name str
    The name of the virtual cluster.
    namespace EventGatewayVirtualClusterNamespaceArgs
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    aclMode String
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications List<Property Map>

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    destination Property Map

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dnsLabel String
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gatewayId String
    The UUID of your Gateway.
    description String
    A human-readable description of the virtual cluster. Default: ""
    labels Map<String>

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name String
    The name of the virtual cluster.
    namespace Property Map
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).

    Outputs

    All input properties are implicitly available as output properties. Additionally, the EventGatewayVirtualCluster resource produces the following output properties:

    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Id string
    The provider-assigned unique ID for this managed resource.
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    id String
    The provider-assigned unique ID for this managed resource.
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.
    createdAt string
    An ISO-8601 timestamp representation of entity creation date.
    id string
    The provider-assigned unique ID for this managed resource.
    updatedAt string
    An ISO-8601 timestamp representation of entity update date.
    created_at str
    An ISO-8601 timestamp representation of entity creation date.
    id str
    The provider-assigned unique ID for this managed resource.
    updated_at str
    An ISO-8601 timestamp representation of entity update date.
    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    id String
    The provider-assigned unique ID for this managed resource.
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.

    Look up Existing EventGatewayVirtualCluster Resource

    Get an existing EventGatewayVirtualCluster resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: EventGatewayVirtualClusterState, opts?: CustomResourceOptions): EventGatewayVirtualCluster
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            acl_mode: Optional[str] = None,
            authentications: Optional[Sequence[EventGatewayVirtualClusterAuthenticationArgs]] = None,
            created_at: Optional[str] = None,
            description: Optional[str] = None,
            destination: Optional[EventGatewayVirtualClusterDestinationArgs] = None,
            dns_label: Optional[str] = None,
            gateway_id: Optional[str] = None,
            labels: Optional[Mapping[str, str]] = None,
            name: Optional[str] = None,
            namespace: Optional[EventGatewayVirtualClusterNamespaceArgs] = None,
            updated_at: Optional[str] = None) -> EventGatewayVirtualCluster
    func GetEventGatewayVirtualCluster(ctx *Context, name string, id IDInput, state *EventGatewayVirtualClusterState, opts ...ResourceOption) (*EventGatewayVirtualCluster, error)
    public static EventGatewayVirtualCluster Get(string name, Input<string> id, EventGatewayVirtualClusterState? state, CustomResourceOptions? opts = null)
    public static EventGatewayVirtualCluster get(String name, Output<String> id, EventGatewayVirtualClusterState state, CustomResourceOptions options)
    resources:  _:    type: konnect:EventGatewayVirtualCluster    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AclMode string
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    Authentications List<EventGatewayVirtualClusterAuthentication>

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Description string
    A human-readable description of the virtual cluster. Default: ""
    Destination EventGatewayVirtualClusterDestination

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    DnsLabel string
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    GatewayId string
    The UUID of your Gateway.
    Labels Dictionary<string, string>

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    Name string
    The name of the virtual cluster.
    Namespace EventGatewayVirtualClusterNamespace
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    AclMode string
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    Authentications []EventGatewayVirtualClusterAuthenticationArgs

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    CreatedAt string
    An ISO-8601 timestamp representation of entity creation date.
    Description string
    A human-readable description of the virtual cluster. Default: ""
    Destination EventGatewayVirtualClusterDestinationArgs

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    DnsLabel string
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    GatewayId string
    The UUID of your Gateway.
    Labels map[string]string

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    Name string
    The name of the virtual cluster.
    Namespace EventGatewayVirtualClusterNamespaceArgs
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    UpdatedAt string
    An ISO-8601 timestamp representation of entity update date.
    aclMode String
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications List<EventGatewayVirtualClusterAuthentication>

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    description String
    A human-readable description of the virtual cluster. Default: ""
    destination EventGatewayVirtualClusterDestination

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dnsLabel String
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gatewayId String
    The UUID of your Gateway.
    labels Map<String,String>

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name String
    The name of the virtual cluster.
    namespace EventGatewayVirtualClusterNamespace
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.
    aclMode string
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications EventGatewayVirtualClusterAuthentication[]

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    createdAt string
    An ISO-8601 timestamp representation of entity creation date.
    description string
    A human-readable description of the virtual cluster. Default: ""
    destination EventGatewayVirtualClusterDestination

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dnsLabel string
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gatewayId string
    The UUID of your Gateway.
    labels {[key: string]: string}

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name string
    The name of the virtual cluster.
    namespace EventGatewayVirtualClusterNamespace
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    updatedAt string
    An ISO-8601 timestamp representation of entity update date.
    acl_mode str
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications Sequence[EventGatewayVirtualClusterAuthenticationArgs]

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    created_at str
    An ISO-8601 timestamp representation of entity creation date.
    description str
    A human-readable description of the virtual cluster. Default: ""
    destination EventGatewayVirtualClusterDestinationArgs

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dns_label str
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gateway_id str
    The UUID of your Gateway.
    labels Mapping[str, str]

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name str
    The name of the virtual cluster.
    namespace EventGatewayVirtualClusterNamespaceArgs
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    updated_at str
    An ISO-8601 timestamp representation of entity update date.
    aclMode String
    Configures whether or not ACL policies are enforced on the gateway.

    • enforce_on_gateway means the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.
    • passthrough tells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
    authentications List<Property Map>

    How to handle authentication from clients.

    It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.

    createdAt String
    An ISO-8601 timestamp representation of entity creation date.
    description String
    A human-readable description of the virtual cluster. Default: ""
    destination Property Map

    The backend cluster associated with the virtual cluster.

    Either id or name must be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship by id.

    dnsLabel String
    The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
    gatewayId String
    The UUID of your Gateway.
    labels Map<String>

    Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.

    Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".

    name String
    The name of the virtual cluster.
    namespace Property Map
    Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
    updatedAt String
    An ISO-8601 timestamp representation of entity update date.

    Supporting Types

    EventGatewayVirtualClusterAuthentication, EventGatewayVirtualClusterAuthenticationArgs

    Anonymous EventGatewayVirtualClusterAuthenticationAnonymous
    OauthBearer EventGatewayVirtualClusterAuthenticationOauthBearer
    Oauth Bearer authentication scheme for the virtual cluster.
    SaslPlain EventGatewayVirtualClusterAuthenticationSaslPlain
    SASL/PLAIN authentication scheme for the virtual cluster.
    SaslScram EventGatewayVirtualClusterAuthenticationSaslScram
    SASL/SCRAM authentication scheme for the virtual cluster.
    Anonymous EventGatewayVirtualClusterAuthenticationAnonymous
    OauthBearer EventGatewayVirtualClusterAuthenticationOauthBearer
    Oauth Bearer authentication scheme for the virtual cluster.
    SaslPlain EventGatewayVirtualClusterAuthenticationSaslPlain
    SASL/PLAIN authentication scheme for the virtual cluster.
    SaslScram EventGatewayVirtualClusterAuthenticationSaslScram
    SASL/SCRAM authentication scheme for the virtual cluster.
    anonymous EventGatewayVirtualClusterAuthenticationAnonymous
    oauthBearer EventGatewayVirtualClusterAuthenticationOauthBearer
    Oauth Bearer authentication scheme for the virtual cluster.
    saslPlain EventGatewayVirtualClusterAuthenticationSaslPlain
    SASL/PLAIN authentication scheme for the virtual cluster.
    saslScram EventGatewayVirtualClusterAuthenticationSaslScram
    SASL/SCRAM authentication scheme for the virtual cluster.
    anonymous EventGatewayVirtualClusterAuthenticationAnonymous
    oauthBearer EventGatewayVirtualClusterAuthenticationOauthBearer
    Oauth Bearer authentication scheme for the virtual cluster.
    saslPlain EventGatewayVirtualClusterAuthenticationSaslPlain
    SASL/PLAIN authentication scheme for the virtual cluster.
    saslScram EventGatewayVirtualClusterAuthenticationSaslScram
    SASL/SCRAM authentication scheme for the virtual cluster.
    anonymous EventGatewayVirtualClusterAuthenticationAnonymous
    oauth_bearer EventGatewayVirtualClusterAuthenticationOauthBearer
    Oauth Bearer authentication scheme for the virtual cluster.
    sasl_plain EventGatewayVirtualClusterAuthenticationSaslPlain
    SASL/PLAIN authentication scheme for the virtual cluster.
    sasl_scram EventGatewayVirtualClusterAuthenticationSaslScram
    SASL/SCRAM authentication scheme for the virtual cluster.
    anonymous Property Map
    oauthBearer Property Map
    Oauth Bearer authentication scheme for the virtual cluster.
    saslPlain Property Map
    SASL/PLAIN authentication scheme for the virtual cluster.
    saslScram Property Map
    SASL/SCRAM authentication scheme for the virtual cluster.

    EventGatewayVirtualClusterAuthenticationOauthBearer, EventGatewayVirtualClusterAuthenticationOauthBearerArgs

    ClaimsMapping EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMapping
    Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
    Jwks EventGatewayVirtualClusterAuthenticationOauthBearerJwks
    JSON Web Key Set configuration for verifying token signatures.
    Mediation string
    Methods to mediate authentication:

    • passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
    • terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
    Validate EventGatewayVirtualClusterAuthenticationOauthBearerValidate
    Validation rules.
    ClaimsMapping EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMapping
    Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
    Jwks EventGatewayVirtualClusterAuthenticationOauthBearerJwks
    JSON Web Key Set configuration for verifying token signatures.
    Mediation string
    Methods to mediate authentication:

    • passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
    • terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
    Validate EventGatewayVirtualClusterAuthenticationOauthBearerValidate
    Validation rules.
    claimsMapping EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMapping
    Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
    jwks EventGatewayVirtualClusterAuthenticationOauthBearerJwks
    JSON Web Key Set configuration for verifying token signatures.
    mediation String
    Methods to mediate authentication:

    • passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
    • terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
    validate EventGatewayVirtualClusterAuthenticationOauthBearerValidate
    Validation rules.
    claimsMapping EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMapping
    Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
    jwks EventGatewayVirtualClusterAuthenticationOauthBearerJwks
    JSON Web Key Set configuration for verifying token signatures.
    mediation string
    Methods to mediate authentication:

    • passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
    • terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
    validate EventGatewayVirtualClusterAuthenticationOauthBearerValidate
    Validation rules.
    claims_mapping EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMapping
    Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
    jwks EventGatewayVirtualClusterAuthenticationOauthBearerJwks
    JSON Web Key Set configuration for verifying token signatures.
    mediation str
    Methods to mediate authentication:

    • passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
    • terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
    validate EventGatewayVirtualClusterAuthenticationOauthBearerValidate
    Validation rules.
    claimsMapping Property Map
    Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
    jwks Property Map
    JSON Web Key Set configuration for verifying token signatures.
    mediation String
    Methods to mediate authentication:

    • passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
    • terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
    validate Property Map
    Validation rules.

    EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMapping, EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs

    Scope string
    Maps the scope claim.
    Sub string
    Maps the subject claim.
    Scope string
    Maps the scope claim.
    Sub string
    Maps the subject claim.
    scope String
    Maps the scope claim.
    sub String
    Maps the subject claim.
    scope string
    Maps the scope claim.
    sub string
    Maps the subject claim.
    scope str
    Maps the scope claim.
    sub str
    Maps the subject claim.
    scope String
    Maps the scope claim.
    sub String
    Maps the subject claim.

    EventGatewayVirtualClusterAuthenticationOauthBearerJwks, EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs

    CacheExpiration string
    Duration after which the gateway will fetch and cache JWKS. Default: "1h"
    Endpoint string
    URL for JWKS endpoint. Not Null
    Timeout string
    Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
    CacheExpiration string
    Duration after which the gateway will fetch and cache JWKS. Default: "1h"
    Endpoint string
    URL for JWKS endpoint. Not Null
    Timeout string
    Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
    cacheExpiration String
    Duration after which the gateway will fetch and cache JWKS. Default: "1h"
    endpoint String
    URL for JWKS endpoint. Not Null
    timeout String
    Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
    cacheExpiration string
    Duration after which the gateway will fetch and cache JWKS. Default: "1h"
    endpoint string
    URL for JWKS endpoint. Not Null
    timeout string
    Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
    cache_expiration str
    Duration after which the gateway will fetch and cache JWKS. Default: "1h"
    endpoint str
    URL for JWKS endpoint. Not Null
    timeout str
    Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
    cacheExpiration String
    Duration after which the gateway will fetch and cache JWKS. Default: "1h"
    endpoint String
    URL for JWKS endpoint. Not Null
    timeout String
    Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"

    EventGatewayVirtualClusterAuthenticationOauthBearerValidate, EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs

    Audiences List<EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudience>
    List of expected audience values. One of them has to match the audience claim in the token.
    Issuer string
    Expected token issuer in the token.
    Audiences []EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudience
    List of expected audience values. One of them has to match the audience claim in the token.
    Issuer string
    Expected token issuer in the token.
    audiences List<EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudience>
    List of expected audience values. One of them has to match the audience claim in the token.
    issuer String
    Expected token issuer in the token.
    audiences EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudience[]
    List of expected audience values. One of them has to match the audience claim in the token.
    issuer string
    Expected token issuer in the token.
    audiences Sequence[EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudience]
    List of expected audience values. One of them has to match the audience claim in the token.
    issuer str
    Expected token issuer in the token.
    audiences List<Property Map>
    List of expected audience values. One of them has to match the audience claim in the token.
    issuer String
    Expected token issuer in the token.

    EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudience, EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs

    Name string
    Not Null
    Name string
    Not Null
    name String
    Not Null
    name string
    Not Null
    name str
    Not Null
    name String
    Not Null

    EventGatewayVirtualClusterAuthenticationSaslPlain, EventGatewayVirtualClusterAuthenticationSaslPlainArgs

    Mediation string
    The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
    Principals List<EventGatewayVirtualClusterAuthenticationSaslPlainPrincipal>
    List of principals to be able to authenticate with, used with terminate mediation.
    Mediation string
    The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
    Principals []EventGatewayVirtualClusterAuthenticationSaslPlainPrincipal
    List of principals to be able to authenticate with, used with terminate mediation.
    mediation String
    The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
    principals List<EventGatewayVirtualClusterAuthenticationSaslPlainPrincipal>
    List of principals to be able to authenticate with, used with terminate mediation.
    mediation string
    The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
    principals EventGatewayVirtualClusterAuthenticationSaslPlainPrincipal[]
    List of principals to be able to authenticate with, used with terminate mediation.
    mediation str
    The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
    principals Sequence[EventGatewayVirtualClusterAuthenticationSaslPlainPrincipal]
    List of principals to be able to authenticate with, used with terminate mediation.
    mediation String
    The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
    principals List<Property Map>
    List of principals to be able to authenticate with, used with terminate mediation.

    EventGatewayVirtualClusterAuthenticationSaslPlainPrincipal, EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs

    Password string
    A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
    Username string
    A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
    Password string
    A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
    Username string
    A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
    password String
    A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
    username String
    A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
    password string
    A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
    username string
    A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
    password str
    A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
    username str
    A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
    password String
    A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
    username String
    A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null

    EventGatewayVirtualClusterAuthenticationSaslScram, EventGatewayVirtualClusterAuthenticationSaslScramArgs

    Algorithm string
    The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
    Algorithm string
    The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
    algorithm String
    The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
    algorithm string
    The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
    algorithm str
    The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
    algorithm String
    The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]

    EventGatewayVirtualClusterDestination, EventGatewayVirtualClusterDestinationArgs

    Id string
    The unique identifier of the backend cluster.
    Name string
    The unique name of the backend cluster.
    Id string
    The unique identifier of the backend cluster.
    Name string
    The unique name of the backend cluster.
    id String
    The unique identifier of the backend cluster.
    name String
    The unique name of the backend cluster.
    id string
    The unique identifier of the backend cluster.
    name string
    The unique name of the backend cluster.
    id str
    The unique identifier of the backend cluster.
    name str
    The unique name of the backend cluster.
    id String
    The unique identifier of the backend cluster.
    name String
    The unique name of the backend cluster.

    EventGatewayVirtualClusterNamespace, EventGatewayVirtualClusterNamespaceArgs

    Mode string
    * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
    Prefix string
    The namespace is differentiated by this chosen prefix. For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients of the virtual cluster. Topics without the prefix will be ignored unless added via additional.topics.
    Additional EventGatewayVirtualClusterNamespaceAdditional
    Mode string
    * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
    Prefix string
    The namespace is differentiated by this chosen prefix. For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients of the virtual cluster. Topics without the prefix will be ignored unless added via additional.topics.
    Additional EventGatewayVirtualClusterNamespaceAdditional
    mode String
    * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
    prefix String
    The namespace is differentiated by this chosen prefix. For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients of the virtual cluster. Topics without the prefix will be ignored unless added via additional.topics.
    additional EventGatewayVirtualClusterNamespaceAdditional
    mode string
    * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
    prefix string
    The namespace is differentiated by this chosen prefix. For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients of the virtual cluster. Topics without the prefix will be ignored unless added via additional.topics.
    additional EventGatewayVirtualClusterNamespaceAdditional
    mode str
    * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
    prefix str
    The namespace is differentiated by this chosen prefix. For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients of the virtual cluster. Topics without the prefix will be ignored unless added via additional.topics.
    additional EventGatewayVirtualClusterNamespaceAdditional
    mode String
    * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
    prefix String
    The namespace is differentiated by this chosen prefix. For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients of the virtual cluster. Topics without the prefix will be ignored unless added via additional.topics.
    additional Property Map

    EventGatewayVirtualClusterNamespaceAdditional, EventGatewayVirtualClusterNamespaceAdditionalArgs

    ConsumerGroups List<EventGatewayVirtualClusterNamespaceAdditionalConsumerGroup>
    Consumer group IDs to expose even if they don't start with the namespace prefix.
    Topics List<EventGatewayVirtualClusterNamespaceAdditionalTopic>
    Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
    ConsumerGroups []EventGatewayVirtualClusterNamespaceAdditionalConsumerGroup
    Consumer group IDs to expose even if they don't start with the namespace prefix.
    Topics []EventGatewayVirtualClusterNamespaceAdditionalTopic
    Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
    consumerGroups List<EventGatewayVirtualClusterNamespaceAdditionalConsumerGroup>
    Consumer group IDs to expose even if they don't start with the namespace prefix.
    topics List<EventGatewayVirtualClusterNamespaceAdditionalTopic>
    Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
    consumerGroups EventGatewayVirtualClusterNamespaceAdditionalConsumerGroup[]
    Consumer group IDs to expose even if they don't start with the namespace prefix.
    topics EventGatewayVirtualClusterNamespaceAdditionalTopic[]
    Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
    consumer_groups Sequence[EventGatewayVirtualClusterNamespaceAdditionalConsumerGroup]
    Consumer group IDs to expose even if they don't start with the namespace prefix.
    topics Sequence[EventGatewayVirtualClusterNamespaceAdditionalTopic]
    Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
    consumerGroups List<Property Map>
    Consumer group IDs to expose even if they don't start with the namespace prefix.
    topics List<Property Map>
    Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.

    EventGatewayVirtualClusterNamespaceAdditionalConsumerGroup, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs

    EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactList, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs

    EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactList, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs

    Value string
    Not Null
    Value string
    Not Null
    value String
    Not Null
    value string
    Not Null
    value str
    Not Null
    value String
    Not Null

    EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlob, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs

    Glob string
    Expose any id that matches this glob pattern (e.g., my_id_*). Not Null
    Glob string
    Expose any id that matches this glob pattern (e.g., my_id_*). Not Null
    glob String
    Expose any id that matches this glob pattern (e.g., my_id_*). Not Null
    glob string
    Expose any id that matches this glob pattern (e.g., my_id_*). Not Null
    glob str
    Expose any id that matches this glob pattern (e.g., my_id_*). Not Null
    glob String
    Expose any id that matches this glob pattern (e.g., my_id_*). Not Null

    EventGatewayVirtualClusterNamespaceAdditionalTopic, EventGatewayVirtualClusterNamespaceAdditionalTopicArgs

    EventGatewayVirtualClusterNamespaceAdditionalTopicExactList, EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs

    Conflict string
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    ExactLists List<EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactList>
    Explicit allow-list of backend topic names.
    Conflict string
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    ExactLists []EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactList
    Explicit allow-list of backend topic names.
    conflict String
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    exactLists List<EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactList>
    Explicit allow-list of backend topic names.
    conflict string
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    exactLists EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactList[]
    Explicit allow-list of backend topic names.
    conflict str
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    exact_lists Sequence[EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactList]
    Explicit allow-list of backend topic names.
    conflict String
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    exactLists List<Property Map>
    Explicit allow-list of backend topic names.

    EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactList, EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs

    Backend string
    Not Null
    Backend string
    Not Null
    backend String
    Not Null
    backend string
    Not Null
    backend str
    Not Null
    backend String
    Not Null

    EventGatewayVirtualClusterNamespaceAdditionalTopicGlob, EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs

    Conflict string
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    Glob string
    Expose any backend topic that matches this glob pattern (e.g., operations_data_*). Not Null
    Conflict string
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    Glob string
    Expose any backend topic that matches this glob pattern (e.g., operations_data_*). Not Null
    conflict String
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    glob String
    Expose any backend topic that matches this glob pattern (e.g., operations_data_*). Not Null
    conflict string
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    glob string
    Expose any backend topic that matches this glob pattern (e.g., operations_data_*). Not Null
    conflict str
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    glob str
    Expose any backend topic that matches this glob pattern (e.g., operations_data_*). Not Null
    conflict String
    How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.

    • warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
    • ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
    glob String
    Expose any backend topic that matches this glob pattern (e.g., operations_data_*). Not Null

    Import

    In Terraform v1.5.0 and later, the import block can be used with the id attribute, for example:

    terraform

    import {

    to = konnect_event_gateway_virtual_cluster.my_konnect_event_gateway_virtual_cluster

    id = jsonencode({

    gateway_id = "9524ec7d-36d9-465d-a8c5-83a3c9390458"
    
    id = "..."
    

    })

    }

    The pulumi import command can be used, for example:

    $ pulumi import konnect:index/eventGatewayVirtualCluster:EventGatewayVirtualCluster my_konnect_event_gateway_virtual_cluster '{"gateway_id": "9524ec7d-36d9-465d-a8c5-83a3c9390458", "id": "..."}'
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    konnect kong/terraform-provider-konnect
    License
    Notes
    This Pulumi package is based on the konnect Terraform Provider.
    konnect logo
    Viewing docs for konnect 3.11.0
    published on Thursday, Mar 12, 2026 by kong
      Try Pulumi Cloud free. Your team will thank you.