published on Thursday, Mar 12, 2026 by kong
published on Thursday, Mar 12, 2026 by kong
EventGatewayVirtualCluster Resource
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as konnect from "@pulumi/konnect";
const myEventgatewayvirtualcluster = new konnect.EventGatewayVirtualCluster("my_eventgatewayvirtualcluster", {
aclMode: "enforce_on_gateway",
authentications: [{
saslPlain: {
mediation: "passthrough",
principals: [{
password: "${vault.env['MY_ENV_VAR']}",
username: "...my_username...",
}],
},
}],
description: "...my_description...",
destination: {
id: "759b5471-3de4-485c-b7d3-6e8cb8929d81",
},
dnsLabel: "vcluster-1",
gatewayId: "9524ec7d-36d9-465d-a8c5-83a3c9390458",
labels: {
key: "value",
},
name: "...my_name...",
namespace: {
additional: {
consumerGroups: [{
glob: {
glob: "...my_glob...",
},
}],
topics: [{
exactList: {
conflict: "warn",
exactLists: [{
backend: "...my_backend...",
}],
},
}],
},
mode: "hide_prefix",
prefix: "...my_prefix...",
},
});
import pulumi
import pulumi_konnect as konnect
my_eventgatewayvirtualcluster = konnect.EventGatewayVirtualCluster("my_eventgatewayvirtualcluster",
acl_mode="enforce_on_gateway",
authentications=[{
"sasl_plain": {
"mediation": "passthrough",
"principals": [{
"password": "${vault.env['MY_ENV_VAR']}",
"username": "...my_username...",
}],
},
}],
description="...my_description...",
destination={
"id": "759b5471-3de4-485c-b7d3-6e8cb8929d81",
},
dns_label="vcluster-1",
gateway_id="9524ec7d-36d9-465d-a8c5-83a3c9390458",
labels={
"key": "value",
},
name="...my_name...",
namespace={
"additional": {
"consumer_groups": [{
"glob": {
"glob": "...my_glob...",
},
}],
"topics": [{
"exact_list": {
"conflict": "warn",
"exact_lists": [{
"backend": "...my_backend...",
}],
},
}],
},
"mode": "hide_prefix",
"prefix": "...my_prefix...",
})
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/konnect/v3/konnect"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := konnect.NewEventGatewayVirtualCluster(ctx, "my_eventgatewayvirtualcluster", &konnect.EventGatewayVirtualClusterArgs{
AclMode: pulumi.String("enforce_on_gateway"),
Authentications: konnect.EventGatewayVirtualClusterAuthenticationArray{
&konnect.EventGatewayVirtualClusterAuthenticationArgs{
SaslPlain: &konnect.EventGatewayVirtualClusterAuthenticationSaslPlainArgs{
Mediation: pulumi.String("passthrough"),
Principals: konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArray{
&konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs{
Password: pulumi.String("${vault.env['MY_ENV_VAR']}"),
Username: pulumi.String("...my_username..."),
},
},
},
},
},
Description: pulumi.String("...my_description..."),
Destination: &konnect.EventGatewayVirtualClusterDestinationArgs{
Id: pulumi.String("759b5471-3de4-485c-b7d3-6e8cb8929d81"),
},
DnsLabel: pulumi.String("vcluster-1"),
GatewayId: pulumi.String("9524ec7d-36d9-465d-a8c5-83a3c9390458"),
Labels: pulumi.StringMap{
"key": pulumi.String("value"),
},
Name: pulumi.String("...my_name..."),
Namespace: &konnect.EventGatewayVirtualClusterNamespaceArgs{
Additional: &konnect.EventGatewayVirtualClusterNamespaceAdditionalArgs{
ConsumerGroups: konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArray{
&konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs{
Glob: &konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs{
Glob: pulumi.String("...my_glob..."),
},
},
},
Topics: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArray{
&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs{
ExactList: &konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs{
Conflict: pulumi.String("warn"),
ExactLists: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArray{
&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs{
Backend: pulumi.String("...my_backend..."),
},
},
},
},
},
},
Mode: pulumi.String("hide_prefix"),
Prefix: pulumi.String("...my_prefix..."),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Konnect = Pulumi.Konnect;
return await Deployment.RunAsync(() =>
{
var myEventgatewayvirtualcluster = new Konnect.EventGatewayVirtualCluster("my_eventgatewayvirtualcluster", new()
{
AclMode = "enforce_on_gateway",
Authentications = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationArgs
{
SaslPlain = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainArgs
{
Mediation = "passthrough",
Principals = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs
{
Password = "${vault.env['MY_ENV_VAR']}",
Username = "...my_username...",
},
},
},
},
},
Description = "...my_description...",
Destination = new Konnect.Inputs.EventGatewayVirtualClusterDestinationArgs
{
Id = "759b5471-3de4-485c-b7d3-6e8cb8929d81",
},
DnsLabel = "vcluster-1",
GatewayId = "9524ec7d-36d9-465d-a8c5-83a3c9390458",
Labels =
{
{ "key", "value" },
},
Name = "...my_name...",
Namespace = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceArgs
{
Additional = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalArgs
{
ConsumerGroups = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs
{
Glob = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs
{
Glob = "...my_glob...",
},
},
},
Topics = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs
{
ExactList = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs
{
Conflict = "warn",
ExactLists = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs
{
Backend = "...my_backend...",
},
},
},
},
},
},
Mode = "hide_prefix",
Prefix = "...my_prefix...",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.konnect.EventGatewayVirtualCluster;
import com.pulumi.konnect.EventGatewayVirtualClusterArgs;
import com.pulumi.konnect.inputs.EventGatewayVirtualClusterAuthenticationArgs;
import com.pulumi.konnect.inputs.EventGatewayVirtualClusterAuthenticationSaslPlainArgs;
import com.pulumi.konnect.inputs.EventGatewayVirtualClusterDestinationArgs;
import com.pulumi.konnect.inputs.EventGatewayVirtualClusterNamespaceArgs;
import com.pulumi.konnect.inputs.EventGatewayVirtualClusterNamespaceAdditionalArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myEventgatewayvirtualcluster = new EventGatewayVirtualCluster("myEventgatewayvirtualcluster", EventGatewayVirtualClusterArgs.builder()
.aclMode("enforce_on_gateway")
.authentications(EventGatewayVirtualClusterAuthenticationArgs.builder()
.saslPlain(EventGatewayVirtualClusterAuthenticationSaslPlainArgs.builder()
.mediation("passthrough")
.principals(EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs.builder()
.password("${vault.env['MY_ENV_VAR']}")
.username("...my_username...")
.build())
.build())
.build())
.description("...my_description...")
.destination(EventGatewayVirtualClusterDestinationArgs.builder()
.id("759b5471-3de4-485c-b7d3-6e8cb8929d81")
.build())
.dnsLabel("vcluster-1")
.gatewayId("9524ec7d-36d9-465d-a8c5-83a3c9390458")
.labels(Map.of("key", "value"))
.name("...my_name...")
.namespace(EventGatewayVirtualClusterNamespaceArgs.builder()
.additional(EventGatewayVirtualClusterNamespaceAdditionalArgs.builder()
.consumerGroups(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs.builder()
.glob(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs.builder()
.glob("...my_glob...")
.build())
.build())
.topics(EventGatewayVirtualClusterNamespaceAdditionalTopicArgs.builder()
.exactList(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs.builder()
.conflict("warn")
.exactLists(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs.builder()
.backend("...my_backend...")
.build())
.build())
.build())
.build())
.mode("hide_prefix")
.prefix("...my_prefix...")
.build())
.build());
}
}
resources:
myEventgatewayvirtualcluster:
type: konnect:EventGatewayVirtualCluster
name: my_eventgatewayvirtualcluster
properties:
aclMode: enforce_on_gateway
authentications:
- saslPlain:
mediation: passthrough
principals:
- password: $${vault.env['MY_ENV_VAR']}
username: '...my_username...'
description: '...my_description...'
destination:
id: 759b5471-3de4-485c-b7d3-6e8cb8929d81
dnsLabel: vcluster-1
gatewayId: 9524ec7d-36d9-465d-a8c5-83a3c9390458
labels:
key: value
name: '...my_name...'
namespace:
additional:
consumerGroups:
- glob:
glob: '...my_glob...'
topics:
- exactList:
conflict: warn
exactLists:
- backend: '...my_backend...'
mode: hide_prefix
prefix: '...my_prefix...'
Create EventGatewayVirtualCluster Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new EventGatewayVirtualCluster(name: string, args: EventGatewayVirtualClusterArgs, opts?: CustomResourceOptions);@overload
def EventGatewayVirtualCluster(resource_name: str,
args: EventGatewayVirtualClusterArgs,
opts: Optional[ResourceOptions] = None)
@overload
def EventGatewayVirtualCluster(resource_name: str,
opts: Optional[ResourceOptions] = None,
acl_mode: Optional[str] = None,
authentications: Optional[Sequence[EventGatewayVirtualClusterAuthenticationArgs]] = None,
destination: Optional[EventGatewayVirtualClusterDestinationArgs] = None,
dns_label: Optional[str] = None,
gateway_id: Optional[str] = None,
description: Optional[str] = None,
labels: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
namespace: Optional[EventGatewayVirtualClusterNamespaceArgs] = None)func NewEventGatewayVirtualCluster(ctx *Context, name string, args EventGatewayVirtualClusterArgs, opts ...ResourceOption) (*EventGatewayVirtualCluster, error)public EventGatewayVirtualCluster(string name, EventGatewayVirtualClusterArgs args, CustomResourceOptions? opts = null)
public EventGatewayVirtualCluster(String name, EventGatewayVirtualClusterArgs args)
public EventGatewayVirtualCluster(String name, EventGatewayVirtualClusterArgs args, CustomResourceOptions options)
type: konnect:EventGatewayVirtualCluster
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args EventGatewayVirtualClusterArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args EventGatewayVirtualClusterArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args EventGatewayVirtualClusterArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args EventGatewayVirtualClusterArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args EventGatewayVirtualClusterArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var eventGatewayVirtualClusterResource = new Konnect.EventGatewayVirtualCluster("eventGatewayVirtualClusterResource", new()
{
AclMode = "string",
Authentications = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationArgs
{
Anonymous = null,
OauthBearer = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerArgs
{
ClaimsMapping = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs
{
Scope = "string",
Sub = "string",
},
Jwks = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs
{
CacheExpiration = "string",
Endpoint = "string",
Timeout = "string",
},
Mediation = "string",
Validate = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs
{
Audiences = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs
{
Name = "string",
},
},
Issuer = "string",
},
},
SaslPlain = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainArgs
{
Mediation = "string",
Principals = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs
{
Password = "string",
Username = "string",
},
},
},
SaslScram = new Konnect.Inputs.EventGatewayVirtualClusterAuthenticationSaslScramArgs
{
Algorithm = "string",
},
},
},
Destination = new Konnect.Inputs.EventGatewayVirtualClusterDestinationArgs
{
Id = "string",
Name = "string",
},
DnsLabel = "string",
GatewayId = "string",
Description = "string",
Labels =
{
{ "string", "string" },
},
Name = "string",
Namespace = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceArgs
{
Mode = "string",
Prefix = "string",
Additional = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalArgs
{
ConsumerGroups = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs
{
ExactList = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs
{
ExactLists = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs
{
Value = "string",
},
},
},
Glob = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs
{
Glob = "string",
},
},
},
Topics = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs
{
ExactList = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs
{
Conflict = "string",
ExactLists = new[]
{
new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs
{
Backend = "string",
},
},
},
Glob = new Konnect.Inputs.EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs
{
Conflict = "string",
Glob = "string",
},
},
},
},
},
});
example, err := konnect.NewEventGatewayVirtualCluster(ctx, "eventGatewayVirtualClusterResource", &konnect.EventGatewayVirtualClusterArgs{
AclMode: pulumi.String("string"),
Authentications: konnect.EventGatewayVirtualClusterAuthenticationArray{
&konnect.EventGatewayVirtualClusterAuthenticationArgs{
Anonymous: &konnect.EventGatewayVirtualClusterAuthenticationAnonymousArgs{},
OauthBearer: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerArgs{
ClaimsMapping: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs{
Scope: pulumi.String("string"),
Sub: pulumi.String("string"),
},
Jwks: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs{
CacheExpiration: pulumi.String("string"),
Endpoint: pulumi.String("string"),
Timeout: pulumi.String("string"),
},
Mediation: pulumi.String("string"),
Validate: &konnect.EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs{
Audiences: konnect.EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArray{
&konnect.EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs{
Name: pulumi.String("string"),
},
},
Issuer: pulumi.String("string"),
},
},
SaslPlain: &konnect.EventGatewayVirtualClusterAuthenticationSaslPlainArgs{
Mediation: pulumi.String("string"),
Principals: konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArray{
&konnect.EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs{
Password: pulumi.String("string"),
Username: pulumi.String("string"),
},
},
},
SaslScram: &konnect.EventGatewayVirtualClusterAuthenticationSaslScramArgs{
Algorithm: pulumi.String("string"),
},
},
},
Destination: &konnect.EventGatewayVirtualClusterDestinationArgs{
Id: pulumi.String("string"),
Name: pulumi.String("string"),
},
DnsLabel: pulumi.String("string"),
GatewayId: pulumi.String("string"),
Description: pulumi.String("string"),
Labels: pulumi.StringMap{
"string": pulumi.String("string"),
},
Name: pulumi.String("string"),
Namespace: &konnect.EventGatewayVirtualClusterNamespaceArgs{
Mode: pulumi.String("string"),
Prefix: pulumi.String("string"),
Additional: &konnect.EventGatewayVirtualClusterNamespaceAdditionalArgs{
ConsumerGroups: konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArray{
&konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs{
ExactList: &konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs{
ExactLists: konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArray{
&konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs{
Value: pulumi.String("string"),
},
},
},
Glob: &konnect.EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs{
Glob: pulumi.String("string"),
},
},
},
Topics: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArray{
&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicArgs{
ExactList: &konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs{
Conflict: pulumi.String("string"),
ExactLists: konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArray{
&konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs{
Backend: pulumi.String("string"),
},
},
},
Glob: &konnect.EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs{
Conflict: pulumi.String("string"),
Glob: pulumi.String("string"),
},
},
},
},
},
})
var eventGatewayVirtualClusterResource = new EventGatewayVirtualCluster("eventGatewayVirtualClusterResource", EventGatewayVirtualClusterArgs.builder()
.aclMode("string")
.authentications(EventGatewayVirtualClusterAuthenticationArgs.builder()
.anonymous(EventGatewayVirtualClusterAuthenticationAnonymousArgs.builder()
.build())
.oauthBearer(EventGatewayVirtualClusterAuthenticationOauthBearerArgs.builder()
.claimsMapping(EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs.builder()
.scope("string")
.sub("string")
.build())
.jwks(EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs.builder()
.cacheExpiration("string")
.endpoint("string")
.timeout("string")
.build())
.mediation("string")
.validate(EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs.builder()
.audiences(EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs.builder()
.name("string")
.build())
.issuer("string")
.build())
.build())
.saslPlain(EventGatewayVirtualClusterAuthenticationSaslPlainArgs.builder()
.mediation("string")
.principals(EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs.builder()
.password("string")
.username("string")
.build())
.build())
.saslScram(EventGatewayVirtualClusterAuthenticationSaslScramArgs.builder()
.algorithm("string")
.build())
.build())
.destination(EventGatewayVirtualClusterDestinationArgs.builder()
.id("string")
.name("string")
.build())
.dnsLabel("string")
.gatewayId("string")
.description("string")
.labels(Map.of("string", "string"))
.name("string")
.namespace(EventGatewayVirtualClusterNamespaceArgs.builder()
.mode("string")
.prefix("string")
.additional(EventGatewayVirtualClusterNamespaceAdditionalArgs.builder()
.consumerGroups(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs.builder()
.exactList(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs.builder()
.exactLists(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs.builder()
.value("string")
.build())
.build())
.glob(EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs.builder()
.glob("string")
.build())
.build())
.topics(EventGatewayVirtualClusterNamespaceAdditionalTopicArgs.builder()
.exactList(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs.builder()
.conflict("string")
.exactLists(EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs.builder()
.backend("string")
.build())
.build())
.glob(EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs.builder()
.conflict("string")
.glob("string")
.build())
.build())
.build())
.build())
.build());
event_gateway_virtual_cluster_resource = konnect.EventGatewayVirtualCluster("eventGatewayVirtualClusterResource",
acl_mode="string",
authentications=[{
"anonymous": {},
"oauth_bearer": {
"claims_mapping": {
"scope": "string",
"sub": "string",
},
"jwks": {
"cache_expiration": "string",
"endpoint": "string",
"timeout": "string",
},
"mediation": "string",
"validate": {
"audiences": [{
"name": "string",
}],
"issuer": "string",
},
},
"sasl_plain": {
"mediation": "string",
"principals": [{
"password": "string",
"username": "string",
}],
},
"sasl_scram": {
"algorithm": "string",
},
}],
destination={
"id": "string",
"name": "string",
},
dns_label="string",
gateway_id="string",
description="string",
labels={
"string": "string",
},
name="string",
namespace={
"mode": "string",
"prefix": "string",
"additional": {
"consumer_groups": [{
"exact_list": {
"exact_lists": [{
"value": "string",
}],
},
"glob": {
"glob": "string",
},
}],
"topics": [{
"exact_list": {
"conflict": "string",
"exact_lists": [{
"backend": "string",
}],
},
"glob": {
"conflict": "string",
"glob": "string",
},
}],
},
})
const eventGatewayVirtualClusterResource = new konnect.EventGatewayVirtualCluster("eventGatewayVirtualClusterResource", {
aclMode: "string",
authentications: [{
anonymous: {},
oauthBearer: {
claimsMapping: {
scope: "string",
sub: "string",
},
jwks: {
cacheExpiration: "string",
endpoint: "string",
timeout: "string",
},
mediation: "string",
validate: {
audiences: [{
name: "string",
}],
issuer: "string",
},
},
saslPlain: {
mediation: "string",
principals: [{
password: "string",
username: "string",
}],
},
saslScram: {
algorithm: "string",
},
}],
destination: {
id: "string",
name: "string",
},
dnsLabel: "string",
gatewayId: "string",
description: "string",
labels: {
string: "string",
},
name: "string",
namespace: {
mode: "string",
prefix: "string",
additional: {
consumerGroups: [{
exactList: {
exactLists: [{
value: "string",
}],
},
glob: {
glob: "string",
},
}],
topics: [{
exactList: {
conflict: "string",
exactLists: [{
backend: "string",
}],
},
glob: {
conflict: "string",
glob: "string",
},
}],
},
},
});
type: konnect:EventGatewayVirtualCluster
properties:
aclMode: string
authentications:
- anonymous: {}
oauthBearer:
claimsMapping:
scope: string
sub: string
jwks:
cacheExpiration: string
endpoint: string
timeout: string
mediation: string
validate:
audiences:
- name: string
issuer: string
saslPlain:
mediation: string
principals:
- password: string
username: string
saslScram:
algorithm: string
description: string
destination:
id: string
name: string
dnsLabel: string
gatewayId: string
labels:
string: string
name: string
namespace:
additional:
consumerGroups:
- exactList:
exactLists:
- value: string
glob:
glob: string
topics:
- exactList:
conflict: string
exactLists:
- backend: string
glob:
conflict: string
glob: string
mode: string
prefix: string
EventGatewayVirtualCluster Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The EventGatewayVirtualCluster resource accepts the following input properties:
- Acl
Mode string - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- Authentications
List<Event
Gateway Virtual Cluster Authentication> How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- Destination
Event
Gateway Virtual Cluster Destination The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- Dns
Label string - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- Gateway
Id string - The UUID of your Gateway.
- Description string
- A human-readable description of the virtual cluster. Default: ""
- Labels Dictionary<string, string>
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- Name string
- The name of the virtual cluster.
- Namespace
Event
Gateway Virtual Cluster Namespace - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- Acl
Mode string - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- Authentications
[]Event
Gateway Virtual Cluster Authentication Args How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- Destination
Event
Gateway Virtual Cluster Destination Args The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- Dns
Label string - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- Gateway
Id string - The UUID of your Gateway.
- Description string
- A human-readable description of the virtual cluster. Default: ""
- Labels map[string]string
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- Name string
- The name of the virtual cluster.
- Namespace
Event
Gateway Virtual Cluster Namespace Args - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- acl
Mode String - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications
List<Event
Gateway Virtual Cluster Authentication> How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- destination
Event
Gateway Virtual Cluster Destination The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns
Label String - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway
Id String - The UUID of your Gateway.
- description String
- A human-readable description of the virtual cluster. Default: ""
- labels Map<String,String>
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name String
- The name of the virtual cluster.
- namespace
Event
Gateway Virtual Cluster Namespace - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- acl
Mode string - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications
Event
Gateway Virtual Cluster Authentication[] How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- destination
Event
Gateway Virtual Cluster Destination The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns
Label string - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway
Id string - The UUID of your Gateway.
- description string
- A human-readable description of the virtual cluster. Default: ""
- labels {[key: string]: string}
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name string
- The name of the virtual cluster.
- namespace
Event
Gateway Virtual Cluster Namespace - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- acl_
mode str - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications
Sequence[Event
Gateway Virtual Cluster Authentication Args] How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- destination
Event
Gateway Virtual Cluster Destination Args The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns_
label str - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway_
id str - The UUID of your Gateway.
- description str
- A human-readable description of the virtual cluster. Default: ""
- labels Mapping[str, str]
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name str
- The name of the virtual cluster.
- namespace
Event
Gateway Virtual Cluster Namespace Args - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- acl
Mode String - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications List<Property Map>
How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- destination Property Map
The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns
Label String - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway
Id String - The UUID of your Gateway.
- description String
- A human-readable description of the virtual cluster. Default: ""
- labels Map<String>
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name String
- The name of the virtual cluster.
- namespace Property Map
- Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
Outputs
All input properties are implicitly available as output properties. Additionally, the EventGatewayVirtualCluster resource produces the following output properties:
- created_
at str - An ISO-8601 timestamp representation of entity creation date.
- id str
- The provider-assigned unique ID for this managed resource.
- updated_
at str - An ISO-8601 timestamp representation of entity update date.
Look up Existing EventGatewayVirtualCluster Resource
Get an existing EventGatewayVirtualCluster resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: EventGatewayVirtualClusterState, opts?: CustomResourceOptions): EventGatewayVirtualCluster@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
acl_mode: Optional[str] = None,
authentications: Optional[Sequence[EventGatewayVirtualClusterAuthenticationArgs]] = None,
created_at: Optional[str] = None,
description: Optional[str] = None,
destination: Optional[EventGatewayVirtualClusterDestinationArgs] = None,
dns_label: Optional[str] = None,
gateway_id: Optional[str] = None,
labels: Optional[Mapping[str, str]] = None,
name: Optional[str] = None,
namespace: Optional[EventGatewayVirtualClusterNamespaceArgs] = None,
updated_at: Optional[str] = None) -> EventGatewayVirtualClusterfunc GetEventGatewayVirtualCluster(ctx *Context, name string, id IDInput, state *EventGatewayVirtualClusterState, opts ...ResourceOption) (*EventGatewayVirtualCluster, error)public static EventGatewayVirtualCluster Get(string name, Input<string> id, EventGatewayVirtualClusterState? state, CustomResourceOptions? opts = null)public static EventGatewayVirtualCluster get(String name, Output<String> id, EventGatewayVirtualClusterState state, CustomResourceOptions options)resources: _: type: konnect:EventGatewayVirtualCluster get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Acl
Mode string - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- Authentications
List<Event
Gateway Virtual Cluster Authentication> How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- Created
At string - An ISO-8601 timestamp representation of entity creation date.
- Description string
- A human-readable description of the virtual cluster. Default: ""
- Destination
Event
Gateway Virtual Cluster Destination The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- Dns
Label string - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- Gateway
Id string - The UUID of your Gateway.
- Labels Dictionary<string, string>
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- Name string
- The name of the virtual cluster.
- Namespace
Event
Gateway Virtual Cluster Namespace - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- Updated
At string - An ISO-8601 timestamp representation of entity update date.
- Acl
Mode string - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- Authentications
[]Event
Gateway Virtual Cluster Authentication Args How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- Created
At string - An ISO-8601 timestamp representation of entity creation date.
- Description string
- A human-readable description of the virtual cluster. Default: ""
- Destination
Event
Gateway Virtual Cluster Destination Args The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- Dns
Label string - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- Gateway
Id string - The UUID of your Gateway.
- Labels map[string]string
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- Name string
- The name of the virtual cluster.
- Namespace
Event
Gateway Virtual Cluster Namespace Args - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- Updated
At string - An ISO-8601 timestamp representation of entity update date.
- acl
Mode String - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications
List<Event
Gateway Virtual Cluster Authentication> How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- created
At String - An ISO-8601 timestamp representation of entity creation date.
- description String
- A human-readable description of the virtual cluster. Default: ""
- destination
Event
Gateway Virtual Cluster Destination The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns
Label String - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway
Id String - The UUID of your Gateway.
- labels Map<String,String>
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name String
- The name of the virtual cluster.
- namespace
Event
Gateway Virtual Cluster Namespace - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- updated
At String - An ISO-8601 timestamp representation of entity update date.
- acl
Mode string - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications
Event
Gateway Virtual Cluster Authentication[] How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- created
At string - An ISO-8601 timestamp representation of entity creation date.
- description string
- A human-readable description of the virtual cluster. Default: ""
- destination
Event
Gateway Virtual Cluster Destination The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns
Label string - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway
Id string - The UUID of your Gateway.
- labels {[key: string]: string}
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name string
- The name of the virtual cluster.
- namespace
Event
Gateway Virtual Cluster Namespace - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- updated
At string - An ISO-8601 timestamp representation of entity update date.
- acl_
mode str - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications
Sequence[Event
Gateway Virtual Cluster Authentication Args] How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- created_
at str - An ISO-8601 timestamp representation of entity creation date.
- description str
- A human-readable description of the virtual cluster. Default: ""
- destination
Event
Gateway Virtual Cluster Destination Args The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns_
label str - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway_
id str - The UUID of your Gateway.
- labels Mapping[str, str]
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name str
- The name of the virtual cluster.
- namespace
Event
Gateway Virtual Cluster Namespace Args - Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- updated_
at str - An ISO-8601 timestamp representation of entity update date.
- acl
Mode String - Configures whether or not ACL policies are enforced on the gateway.
enforce_on_gatewaymeans the gateway enforces its own ACL policies for this virtual cluster and does not forward ACL-related commands to the backend cluster. Note that if there are no ACL policies configured, all access is denied.passthroughtells the gateway to forward all ACL-related commands. must be one of [<span pulumi-lang-nodejs=""enforceOnGateway"" pulumi-lang-dotnet=""EnforceOnGateway"" pulumi-lang-go=""enforceOnGateway"" pulumi-lang-python=""enforce_on_gateway"" pulumi-lang-yaml=""enforceOnGateway"" pulumi-lang-java=""enforceOnGateway"">"enforce_on_gateway", "passthrough"]
- authentications List<Property Map>
How to handle authentication from clients.
It tries to authenticate with every rule sequentially one by one. It succeeds on the first match, and fails if no rule matches.
- created
At String - An ISO-8601 timestamp representation of entity creation date.
- description String
- A human-readable description of the virtual cluster. Default: ""
- destination Property Map
The backend cluster associated with the virtual cluster.
Either
idornamemust be provided. Following changes to the backend cluster name won't affect the reference, as the system will create the entities relationship byid.- dns
Label String - The DNS label used in the bootstrap server URL to identify the virtual cluster when using SNI routing. The format follows the RFC1035: 1-63 chars, lowercase alphanumeric or '-', must start and end with an alphanumeric character.
- gateway
Id String - The UUID of your Gateway.
- labels Map<String>
Labels store metadata of an entity that can be used for filtering an entity list or for searching across entity types.
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
- name String
- The name of the virtual cluster.
- namespace Property Map
- Namespace allows to implement multitenancy using a single backend cluster. It allows to either hide or enforce a static prefix on resources (topics, consumer group IDs, transaction IDs).
- updated
At String - An ISO-8601 timestamp representation of entity update date.
Supporting Types
EventGatewayVirtualClusterAuthentication, EventGatewayVirtualClusterAuthenticationArgs
- Anonymous
Event
Gateway Virtual Cluster Authentication Anonymous - Oauth
Bearer EventGateway Virtual Cluster Authentication Oauth Bearer - Oauth Bearer authentication scheme for the virtual cluster.
- Sasl
Plain EventGateway Virtual Cluster Authentication Sasl Plain - SASL/PLAIN authentication scheme for the virtual cluster.
- Sasl
Scram EventGateway Virtual Cluster Authentication Sasl Scram - SASL/SCRAM authentication scheme for the virtual cluster.
- Anonymous
Event
Gateway Virtual Cluster Authentication Anonymous - Oauth
Bearer EventGateway Virtual Cluster Authentication Oauth Bearer - Oauth Bearer authentication scheme for the virtual cluster.
- Sasl
Plain EventGateway Virtual Cluster Authentication Sasl Plain - SASL/PLAIN authentication scheme for the virtual cluster.
- Sasl
Scram EventGateway Virtual Cluster Authentication Sasl Scram - SASL/SCRAM authentication scheme for the virtual cluster.
- anonymous
Event
Gateway Virtual Cluster Authentication Anonymous - oauth
Bearer EventGateway Virtual Cluster Authentication Oauth Bearer - Oauth Bearer authentication scheme for the virtual cluster.
- sasl
Plain EventGateway Virtual Cluster Authentication Sasl Plain - SASL/PLAIN authentication scheme for the virtual cluster.
- sasl
Scram EventGateway Virtual Cluster Authentication Sasl Scram - SASL/SCRAM authentication scheme for the virtual cluster.
- anonymous
Event
Gateway Virtual Cluster Authentication Anonymous - oauth
Bearer EventGateway Virtual Cluster Authentication Oauth Bearer - Oauth Bearer authentication scheme for the virtual cluster.
- sasl
Plain EventGateway Virtual Cluster Authentication Sasl Plain - SASL/PLAIN authentication scheme for the virtual cluster.
- sasl
Scram EventGateway Virtual Cluster Authentication Sasl Scram - SASL/SCRAM authentication scheme for the virtual cluster.
- anonymous
Event
Gateway Virtual Cluster Authentication Anonymous - oauth_
bearer EventGateway Virtual Cluster Authentication Oauth Bearer - Oauth Bearer authentication scheme for the virtual cluster.
- sasl_
plain EventGateway Virtual Cluster Authentication Sasl Plain - SASL/PLAIN authentication scheme for the virtual cluster.
- sasl_
scram EventGateway Virtual Cluster Authentication Sasl Scram - SASL/SCRAM authentication scheme for the virtual cluster.
- anonymous Property Map
- oauth
Bearer Property Map - Oauth Bearer authentication scheme for the virtual cluster.
- sasl
Plain Property Map - SASL/PLAIN authentication scheme for the virtual cluster.
- sasl
Scram Property Map - SASL/SCRAM authentication scheme for the virtual cluster.
EventGatewayVirtualClusterAuthenticationOauthBearer, EventGatewayVirtualClusterAuthenticationOauthBearerArgs
- Claims
Mapping EventGateway Virtual Cluster Authentication Oauth Bearer Claims Mapping - Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
- Jwks
Event
Gateway Virtual Cluster Authentication Oauth Bearer Jwks - JSON Web Key Set configuration for verifying token signatures.
- Mediation string
- Methods to mediate authentication:
- passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
- terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
- Validate
Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate - Validation rules.
- Claims
Mapping EventGateway Virtual Cluster Authentication Oauth Bearer Claims Mapping - Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
- Jwks
Event
Gateway Virtual Cluster Authentication Oauth Bearer Jwks - JSON Web Key Set configuration for verifying token signatures.
- Mediation string
- Methods to mediate authentication:
- passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
- terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
- Validate
Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate - Validation rules.
- claims
Mapping EventGateway Virtual Cluster Authentication Oauth Bearer Claims Mapping - Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
- jwks
Event
Gateway Virtual Cluster Authentication Oauth Bearer Jwks - JSON Web Key Set configuration for verifying token signatures.
- mediation String
- Methods to mediate authentication:
- passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
- terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
- validate
Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate - Validation rules.
- claims
Mapping EventGateway Virtual Cluster Authentication Oauth Bearer Claims Mapping - Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
- jwks
Event
Gateway Virtual Cluster Authentication Oauth Bearer Jwks - JSON Web Key Set configuration for verifying token signatures.
- mediation string
- Methods to mediate authentication:
- passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
- terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
- validate
Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate - Validation rules.
- claims_
mapping EventGateway Virtual Cluster Authentication Oauth Bearer Claims Mapping - Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
- jwks
Event
Gateway Virtual Cluster Authentication Oauth Bearer Jwks - JSON Web Key Set configuration for verifying token signatures.
- mediation str
- Methods to mediate authentication:
- passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
- terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
- validate
Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate - Validation rules.
- claims
Mapping Property Map - Maps JWT claims in the case when sub and scope are presented as different claims in your JWT token.
- jwks Property Map
- JSON Web Key Set configuration for verifying token signatures.
- mediation String
- Methods to mediate authentication:
- passthrough - pass authentication from the client through proxy to the backend cluster without any kind of validation * validate_forward - pass authentication from the client through proxy to the backend cluster. Proxy does the validation before forwarding it to the client.
- terminate - terminate authentication at the proxy level and originate authentication to the backend cluster using the configuration defined at BackendCluster's authentication. SASL auth is not originated if authentication on the backend_cluster is not configured. Not Null; must be one of ["passthrough", <span pulumi-lang-nodejs=""validateForward"" pulumi-lang-dotnet=""ValidateForward"" pulumi-lang-go=""validateForward"" pulumi-lang-python=""validate_forward"" pulumi-lang-yaml=""validateForward"" pulumi-lang-java=""validateForward"">"validate_forward", "terminate"]
- validate Property Map
- Validation rules.
EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMapping, EventGatewayVirtualClusterAuthenticationOauthBearerClaimsMappingArgs
EventGatewayVirtualClusterAuthenticationOauthBearerJwks, EventGatewayVirtualClusterAuthenticationOauthBearerJwksArgs
- Cache
Expiration string - Duration after which the gateway will fetch and cache JWKS. Default: "1h"
- Endpoint string
- URL for JWKS endpoint. Not Null
- Timeout string
- Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
- Cache
Expiration string - Duration after which the gateway will fetch and cache JWKS. Default: "1h"
- Endpoint string
- URL for JWKS endpoint. Not Null
- Timeout string
- Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
- cache
Expiration String - Duration after which the gateway will fetch and cache JWKS. Default: "1h"
- endpoint String
- URL for JWKS endpoint. Not Null
- timeout String
- Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
- cache
Expiration string - Duration after which the gateway will fetch and cache JWKS. Default: "1h"
- endpoint string
- URL for JWKS endpoint. Not Null
- timeout string
- Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
- cache_
expiration str - Duration after which the gateway will fetch and cache JWKS. Default: "1h"
- endpoint str
- URL for JWKS endpoint. Not Null
- timeout str
- Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
- cache
Expiration String - Duration after which the gateway will fetch and cache JWKS. Default: "1h"
- endpoint String
- URL for JWKS endpoint. Not Null
- timeout String
- Total time from establishing connection to receive a response from JWKS endpoint. Default: "10s"
EventGatewayVirtualClusterAuthenticationOauthBearerValidate, EventGatewayVirtualClusterAuthenticationOauthBearerValidateArgs
- Audiences
List<Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate Audience> - List of expected audience values. One of them has to match the audience claim in the token.
- Issuer string
- Expected token issuer in the token.
- Audiences
[]Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate Audience - List of expected audience values. One of them has to match the audience claim in the token.
- Issuer string
- Expected token issuer in the token.
- audiences
List<Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate Audience> - List of expected audience values. One of them has to match the audience claim in the token.
- issuer String
- Expected token issuer in the token.
- audiences
Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate Audience[] - List of expected audience values. One of them has to match the audience claim in the token.
- issuer string
- Expected token issuer in the token.
- audiences
Sequence[Event
Gateway Virtual Cluster Authentication Oauth Bearer Validate Audience] - List of expected audience values. One of them has to match the audience claim in the token.
- issuer str
- Expected token issuer in the token.
- audiences List<Property Map>
- List of expected audience values. One of them has to match the audience claim in the token.
- issuer String
- Expected token issuer in the token.
EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudience, EventGatewayVirtualClusterAuthenticationOauthBearerValidateAudienceArgs
- Name string
- Not Null
- Name string
- Not Null
- name String
- Not Null
- name string
- Not Null
- name str
- Not Null
- name String
- Not Null
EventGatewayVirtualClusterAuthenticationSaslPlain, EventGatewayVirtualClusterAuthenticationSaslPlainArgs
- Mediation string
- The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
- Principals
List<Event
Gateway Virtual Cluster Authentication Sasl Plain Principal> - List of principals to be able to authenticate with, used with
terminatemediation.
- Mediation string
- The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
- Principals
[]Event
Gateway Virtual Cluster Authentication Sasl Plain Principal - List of principals to be able to authenticate with, used with
terminatemediation.
- mediation String
- The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
- principals
List<Event
Gateway Virtual Cluster Authentication Sasl Plain Principal> - List of principals to be able to authenticate with, used with
terminatemediation.
- mediation string
- The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
- principals
Event
Gateway Virtual Cluster Authentication Sasl Plain Principal[] - List of principals to be able to authenticate with, used with
terminatemediation.
- mediation str
- The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
- principals
Sequence[Event
Gateway Virtual Cluster Authentication Sasl Plain Principal] - List of principals to be able to authenticate with, used with
terminatemediation.
- mediation String
- The mediation type for SASL/PLAIN authentication. Not Null; must be one of ["passthrough", "terminate"]
- principals List<Property Map>
- List of principals to be able to authenticate with, used with
terminatemediation.
EventGatewayVirtualClusterAuthenticationSaslPlainPrincipal, EventGatewayVirtualClusterAuthenticationSaslPlainPrincipalArgs
- Password string
- A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
- Username string
- A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
- Password string
- A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
- Username string
- A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
- password String
- A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
- username String
- A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
- password string
- A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
- username string
- A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
- password str
- A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
- username str
- A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
- password String
- A sensitive value containing the secret or a reference to a secret as a template string expression. If the value is provided as plain text, it is encrypted at rest and omitted from API responses. If provided as an expression, the expression itself is stored and returned by the API. Not Null
- username String
- A literal value or a reference to an existing secret as a template string expression. The value is stored and returned by the API as-is, not treated as sensitive information. Not Null
EventGatewayVirtualClusterAuthenticationSaslScram, EventGatewayVirtualClusterAuthenticationSaslScramArgs
- Algorithm string
- The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
- Algorithm string
- The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
- algorithm String
- The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
- algorithm string
- The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
- algorithm str
- The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
- algorithm String
- The algorithm used for SASL/SCRAM authentication. Not Null; must be one of ["sha256", "sha512"]
EventGatewayVirtualClusterDestination, EventGatewayVirtualClusterDestinationArgs
EventGatewayVirtualClusterNamespace, EventGatewayVirtualClusterNamespaceArgs
- Mode string
- * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
- Prefix string
- The namespace is differentiated by this chosen prefix.
For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients
of the virtual cluster. Topics without the prefix will be ignored unless added via
additional.topics. - Additional
Event
Gateway Virtual Cluster Namespace Additional
- Mode string
- * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
- Prefix string
- The namespace is differentiated by this chosen prefix.
For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients
of the virtual cluster. Topics without the prefix will be ignored unless added via
additional.topics. - Additional
Event
Gateway Virtual Cluster Namespace Additional
- mode String
- * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
- prefix String
- The namespace is differentiated by this chosen prefix.
For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients
of the virtual cluster. Topics without the prefix will be ignored unless added via
additional.topics. - additional
Event
Gateway Virtual Cluster Namespace Additional
- mode string
- * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
- prefix string
- The namespace is differentiated by this chosen prefix.
For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients
of the virtual cluster. Topics without the prefix will be ignored unless added via
additional.topics. - additional
Event
Gateway Virtual Cluster Namespace Additional
- mode str
- * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
- prefix str
- The namespace is differentiated by this chosen prefix.
For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients
of the virtual cluster. Topics without the prefix will be ignored unless added via
additional.topics. - additional
Event
Gateway Virtual Cluster Namespace Additional
- mode String
- * hide_prefix - the configured prefix is hidden from clients for topics and IDs when reading. Created resources are written with the prefix on the backend cluster. * enforce_prefix - the configured prefix remains visible to clients. Created resources must include the prefix or the request will fail. must be one of [<span pulumi-lang-nodejs=""hidePrefix"" pulumi-lang-dotnet=""HidePrefix"" pulumi-lang-go=""hidePrefix"" pulumi-lang-python=""hide_prefix"" pulumi-lang-yaml=""hidePrefix"" pulumi-lang-java=""hidePrefix"">"hide_prefix", <span pulumi-lang-nodejs=""enforcePrefix"" pulumi-lang-dotnet=""EnforcePrefix"" pulumi-lang-go=""enforcePrefix"" pulumi-lang-python=""enforce_prefix"" pulumi-lang-yaml=""enforcePrefix"" pulumi-lang-java=""enforcePrefix"">"enforce_prefix"]
- prefix String
- The namespace is differentiated by this chosen prefix.
For example, if the prefix is set to "analytics_" the topic named <span pulumi-lang-nodejs=""analyticsUserClicks"" pulumi-lang-dotnet=""AnalyticsUserClicks"" pulumi-lang-go=""analyticsUserClicks"" pulumi-lang-python=""analytics_user_clicks"" pulumi-lang-yaml=""analyticsUserClicks"" pulumi-lang-java=""analyticsUserClicks"">"analytics_user_clicks" is available to the clients
of the virtual cluster. Topics without the prefix will be ignored unless added via
additional.topics. - additional Property Map
EventGatewayVirtualClusterNamespaceAdditional, EventGatewayVirtualClusterNamespaceAdditionalArgs
- Consumer
Groups List<EventGateway Virtual Cluster Namespace Additional Consumer Group> - Consumer group IDs to expose even if they don't start with the namespace prefix.
- Topics
List<Event
Gateway Virtual Cluster Namespace Additional Topic> - Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
- Consumer
Groups []EventGateway Virtual Cluster Namespace Additional Consumer Group - Consumer group IDs to expose even if they don't start with the namespace prefix.
- Topics
[]Event
Gateway Virtual Cluster Namespace Additional Topic - Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
- consumer
Groups List<EventGateway Virtual Cluster Namespace Additional Consumer Group> - Consumer group IDs to expose even if they don't start with the namespace prefix.
- topics
List<Event
Gateway Virtual Cluster Namespace Additional Topic> - Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
- consumer
Groups EventGateway Virtual Cluster Namespace Additional Consumer Group[] - Consumer group IDs to expose even if they don't start with the namespace prefix.
- topics
Event
Gateway Virtual Cluster Namespace Additional Topic[] - Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
- consumer_
groups Sequence[EventGateway Virtual Cluster Namespace Additional Consumer Group] - Consumer group IDs to expose even if they don't start with the namespace prefix.
- topics
Sequence[Event
Gateway Virtual Cluster Namespace Additional Topic] - Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
- consumer
Groups List<Property Map> - Consumer group IDs to expose even if they don't start with the namespace prefix.
- topics List<Property Map>
- Additional backend topics to expose even if they don't match the namespace prefix. The topics are not affected by the hide/enforce prefix mode. If the client tries to create a topic that matches this list, the request is rejected.
EventGatewayVirtualClusterNamespaceAdditionalConsumerGroup, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupArgs
EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactList, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListArgs
EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactList, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupExactListExactListArgs
- Value string
- Not Null
- Value string
- Not Null
- value String
- Not Null
- value string
- Not Null
- value str
- Not Null
- value String
- Not Null
EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlob, EventGatewayVirtualClusterNamespaceAdditionalConsumerGroupGlobArgs
- Glob string
- Expose any id that matches this glob pattern (e.g.,
my_id_*). Not Null
- Glob string
- Expose any id that matches this glob pattern (e.g.,
my_id_*). Not Null
- glob String
- Expose any id that matches this glob pattern (e.g.,
my_id_*). Not Null
- glob string
- Expose any id that matches this glob pattern (e.g.,
my_id_*). Not Null
- glob str
- Expose any id that matches this glob pattern (e.g.,
my_id_*). Not Null
- glob String
- Expose any id that matches this glob pattern (e.g.,
my_id_*). Not Null
EventGatewayVirtualClusterNamespaceAdditionalTopic, EventGatewayVirtualClusterNamespaceAdditionalTopicArgs
EventGatewayVirtualClusterNamespaceAdditionalTopicExactList, EventGatewayVirtualClusterNamespaceAdditionalTopicExactListArgs
- Conflict string
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- Exact
Lists List<EventGateway Virtual Cluster Namespace Additional Topic Exact List Exact List> - Explicit allow-list of backend topic names.
- Conflict string
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- Exact
Lists []EventGateway Virtual Cluster Namespace Additional Topic Exact List Exact List - Explicit allow-list of backend topic names.
- conflict String
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- exact
Lists List<EventGateway Virtual Cluster Namespace Additional Topic Exact List Exact List> - Explicit allow-list of backend topic names.
- conflict string
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- exact
Lists EventGateway Virtual Cluster Namespace Additional Topic Exact List Exact List[] - Explicit allow-list of backend topic names.
- conflict str
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- exact_
lists Sequence[EventGateway Virtual Cluster Namespace Additional Topic Exact List Exact List] - Explicit allow-list of backend topic names.
- conflict String
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- exact
Lists List<Property Map> - Explicit allow-list of backend topic names.
EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactList, EventGatewayVirtualClusterNamespaceAdditionalTopicExactListExactListArgs
- Backend string
- Not Null
- Backend string
- Not Null
- backend String
- Not Null
- backend string
- Not Null
- backend str
- Not Null
- backend String
- Not Null
EventGatewayVirtualClusterNamespaceAdditionalTopicGlob, EventGatewayVirtualClusterNamespaceAdditionalTopicGlobArgs
- Conflict string
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- Glob string
- Expose any backend topic that matches this glob pattern (e.g.,
operations_data_*). Not Null
- Conflict string
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- Glob string
- Expose any backend topic that matches this glob pattern (e.g.,
operations_data_*). Not Null
- conflict String
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- glob String
- Expose any backend topic that matches this glob pattern (e.g.,
operations_data_*). Not Null
- conflict string
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- glob string
- Expose any backend topic that matches this glob pattern (e.g.,
operations_data_*). Not Null
- conflict str
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- glob str
- Expose any backend topic that matches this glob pattern (e.g.,
operations_data_*). Not Null
- conflict String
- How to inform the user about conflicts where multiple backend topics would map to the same virtual topic name.
- warn - log in the Event Gateway logs. Additionally, it sets knep_namespace_topic_conflict to 1.
- ignore - do not do anything. It does not cause knep_namespace_topic_conflict metric to be set to 1. Default: "warn"; must be one of ["warn", "ignore"]
- glob String
- Expose any backend topic that matches this glob pattern (e.g.,
operations_data_*). Not Null
Import
In Terraform v1.5.0 and later, the import block can be used with the id attribute, for example:
terraform
import {
to = konnect_event_gateway_virtual_cluster.my_konnect_event_gateway_virtual_cluster
id = jsonencode({
gateway_id = "9524ec7d-36d9-465d-a8c5-83a3c9390458"
id = "..."
})
}
The pulumi import command can be used, for example:
$ pulumi import konnect:index/eventGatewayVirtualCluster:EventGatewayVirtualCluster my_konnect_event_gateway_virtual_cluster '{"gateway_id": "9524ec7d-36d9-465d-a8c5-83a3c9390458", "id": "..."}'
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- konnect kong/terraform-provider-konnect
- License
- Notes
- This Pulumi package is based on the
konnectTerraform Provider.
published on Thursday, Mar 12, 2026 by kong
