Represents a {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory google_netapp_active_directory}.
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectory(
scope: Construct,
id: str,
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
count: typing.Union[typing.Union[int, float], TerraformCount] = None,
depends_on: typing.List[ITerraformDependable] = None,
for_each: ITerraformIterator = None,
lifecycle: TerraformResourceLifecycle = None,
provider: TerraformProvider = None,
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
dns: str,
domain: str,
location: str,
name: str,
net_bios_prefix: str,
password: str,
username: str,
administrators: typing.List[str] = None,
aes_encryption: typing.Union[bool, IResolvable] = None,
backup_operators: typing.List[str] = None,
description: str = None,
encrypt_dc_connections: typing.Union[bool, IResolvable] = None,
id: str = None,
kdc_hostname: str = None,
kdc_ip: str = None,
labels: typing.Mapping[str] = None,
ldap_signing: typing.Union[bool, IResolvable] = None,
nfs_users_with_ldap: typing.Union[bool, IResolvable] = None,
organizational_unit: str = None,
project: str = None,
security_operators: typing.List[str] = None,
site: str = None,
timeouts: NetappActiveDirectoryTimeouts = None
)
Name | Type | Description |
---|---|---|
scope |
constructs.Construct |
The scope in which to define this construct. |
id |
str |
The scoped construct ID. |
connection |
typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] |
No description. |
count |
typing.Union[typing.Union[int, float], cdktf.TerraformCount] |
No description. |
depends_on |
typing.List[cdktf.ITerraformDependable] |
No description. |
for_each |
cdktf.ITerraformIterator |
No description. |
lifecycle |
cdktf.TerraformResourceLifecycle |
No description. |
provider |
cdktf.TerraformProvider |
No description. |
provisioners |
typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] |
No description. |
dns |
str |
Comma separated list of DNS server IP addresses for the Active Directory domain. |
domain |
str |
Fully qualified domain name for the Active Directory domain. |
location |
str |
Name of the region for the policy to apply to. |
name |
str |
The resource name of the Active Directory pool. Needs to be unique per location. |
net_bios_prefix |
str |
NetBIOS name prefix of the server to be created. |
password |
str |
Password for specified username. |
username |
str |
Username for the Active Directory account with permissions to create the compute account within the specified organizational unit. |
administrators |
typing.List[str] |
Domain user accounts to be added to the local Administrators group of the SMB service. |
aes_encryption |
typing.Union[bool, cdktf.IResolvable] |
Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory. |
backup_operators |
typing.List[str] |
Domain user/group accounts to be added to the Backup Operators group of the SMB service. |
description |
str |
An optional description of this resource. |
encrypt_dc_connections |
typing.Union[bool, cdktf.IResolvable] |
If enabled, traffic between the SMB server to Domain Controller (DC) will be encrypted. |
id |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#id NetappActiveDirectory#id}. |
kdc_hostname |
str |
Hostname of the Active Directory server used as Kerberos Key Distribution Center. Only required for volumes using kerberized NFSv4.1. |
kdc_ip |
str |
IP address of the Active Directory server used as Kerberos Key Distribution Center. |
labels |
typing.Mapping[str] |
Labels as key value pairs. Example: '{ "owner": "Bob", "department": "finance", "purpose": "testing" }'. |
ldap_signing |
typing.Union[bool, cdktf.IResolvable] |
Specifies whether or not the LDAP traffic needs to be signed. |
nfs_users_with_ldap |
typing.Union[bool, cdktf.IResolvable] |
Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes. |
organizational_unit |
str |
Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes. |
project |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#project NetappActiveDirectory#project}. |
security_operators |
typing.List[str] |
Domain accounts that require elevated privileges such as 'SeSecurityPrivilege' to manage security logs. Comma-separated list. |
site |
str |
Specifies an Active Directory site to manage domain controller selection. |
timeouts |
NetappActiveDirectoryTimeouts |
timeouts block. |
- Type: constructs.Construct
The scope in which to define this construct.
- Type: str
The scoped construct ID.
Must be unique amongst siblings in the same scope
- Type: typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
- Type: typing.Union[typing.Union[int, float], cdktf.TerraformCount]
- Type: typing.List[cdktf.ITerraformDependable]
- Type: cdktf.ITerraformIterator
- Type: cdktf.TerraformResourceLifecycle
- Type: cdktf.TerraformProvider
- Type: typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
- Type: str
Comma separated list of DNS server IP addresses for the Active Directory domain.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#dns NetappActiveDirectory#dns}
- Type: str
Fully qualified domain name for the Active Directory domain.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#domain NetappActiveDirectory#domain}
- Type: str
Name of the region for the policy to apply to.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#location NetappActiveDirectory#location}
- Type: str
The resource name of the Active Directory pool. Needs to be unique per location.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#name NetappActiveDirectory#name}
- Type: str
NetBIOS name prefix of the server to be created.
A five-character random ID is generated automatically, for example, -6f9a, and appended to the prefix. The full UNC share path will have the following format: '\NetBIOS_PREFIX-ABCD.DOMAIN_NAME\SHARE_NAME'
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#net_bios_prefix NetappActiveDirectory#net_bios_prefix}
- Type: str
Password for specified username.
Note - Manual changes done to the password will not be detected. Terraform will not re-apply the password, unless you use a new password in Terraform.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#password NetappActiveDirectory#password}
- Type: str
Username for the Active Directory account with permissions to create the compute account within the specified organizational unit.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#username NetappActiveDirectory#username}
- Type: typing.List[str]
Domain user accounts to be added to the local Administrators group of the SMB service.
Comma-separated list of domain users or groups. The Domain Admin group is automatically added when the service joins your domain as a hidden group.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#administrators NetappActiveDirectory#administrators}
- Type: typing.Union[bool, cdktf.IResolvable]
Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#aes_encryption NetappActiveDirectory#aes_encryption}
- Type: typing.List[str]
Domain user/group accounts to be added to the Backup Operators group of the SMB service.
The Backup Operators group allows members to backup and restore files regardless of whether they have read or write access to the files. Comma-separated list.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#backup_operators NetappActiveDirectory#backup_operators}
- Type: str
An optional description of this resource.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#description NetappActiveDirectory#description}
- Type: typing.Union[bool, cdktf.IResolvable]
If enabled, traffic between the SMB server to Domain Controller (DC) will be encrypted.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#encrypt_dc_connections NetappActiveDirectory#encrypt_dc_connections}
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#id NetappActiveDirectory#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
- Type: str
Hostname of the Active Directory server used as Kerberos Key Distribution Center. Only required for volumes using kerberized NFSv4.1.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#kdc_hostname NetappActiveDirectory#kdc_hostname}
- Type: str
IP address of the Active Directory server used as Kerberos Key Distribution Center.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#kdc_ip NetappActiveDirectory#kdc_ip}
- Type: typing.Mapping[str]
Labels as key value pairs. Example: '{ "owner": "Bob", "department": "finance", "purpose": "testing" }'.
Note: This field is non-authoritative, and will only manage the labels present in your configuration. Please refer to the field 'effective_labels' for all of the labels present on the resource.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#labels NetappActiveDirectory#labels}
- Type: typing.Union[bool, cdktf.IResolvable]
Specifies whether or not the LDAP traffic needs to be signed.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#ldap_signing NetappActiveDirectory#ldap_signing}
- Type: typing.Union[bool, cdktf.IResolvable]
Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes.
This option can be used to temporarily switch such volumes to AUTH_SYS authentication (user ID + 1-16 groups).
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#nfs_users_with_ldap NetappActiveDirectory#nfs_users_with_ldap}
- Type: str
Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes.
Defaults to 'CN=Computers' if left empty.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#organizational_unit NetappActiveDirectory#organizational_unit}
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#project NetappActiveDirectory#project}.
- Type: typing.List[str]
Domain accounts that require elevated privileges such as 'SeSecurityPrivilege' to manage security logs. Comma-separated list.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#security_operators NetappActiveDirectory#security_operators}
- Type: str
Specifies an Active Directory site to manage domain controller selection.
Use when Active Directory domain controllers in multiple regions are configured. Defaults to 'Default-First-Site-Name' if left empty.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#site NetappActiveDirectory#site}
timeouts block.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#timeouts NetappActiveDirectory#timeouts}
Name | Description |
---|---|
to_string |
Returns a string representation of this construct. |
add_override |
No description. |
override_logical_id |
Overrides the auto-generated logical ID with a specific ID. |
reset_override_logical_id |
Resets a previously passed logical Id to use the auto-generated logical id again. |
to_hcl_terraform |
No description. |
to_metadata |
No description. |
to_terraform |
Adds this resource to the terraform JSON output. |
add_move_target |
Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. |
get_any_map_attribute |
No description. |
get_boolean_attribute |
No description. |
get_boolean_map_attribute |
No description. |
get_list_attribute |
No description. |
get_number_attribute |
No description. |
get_number_list_attribute |
No description. |
get_number_map_attribute |
No description. |
get_string_attribute |
No description. |
get_string_map_attribute |
No description. |
has_resource_move |
No description. |
import_from |
No description. |
interpolation_for_attribute |
No description. |
move_from_id |
Move the resource corresponding to "id" to this resource. |
move_to |
Moves this resource to the target resource given by moveTarget. |
move_to_id |
Moves this resource to the resource corresponding to "id". |
put_timeouts |
No description. |
reset_administrators |
No description. |
reset_aes_encryption |
No description. |
reset_backup_operators |
No description. |
reset_description |
No description. |
reset_encrypt_dc_connections |
No description. |
reset_id |
No description. |
reset_kdc_hostname |
No description. |
reset_kdc_ip |
No description. |
reset_labels |
No description. |
reset_ldap_signing |
No description. |
reset_nfs_users_with_ldap |
No description. |
reset_organizational_unit |
No description. |
reset_project |
No description. |
reset_security_operators |
No description. |
reset_site |
No description. |
reset_timeouts |
No description. |
def to_string() -> str
Returns a string representation of this construct.
def add_override(
path: str,
value: typing.Any
) -> None
- Type: str
- Type: typing.Any
def override_logical_id(
new_logical_id: str
) -> None
Overrides the auto-generated logical ID with a specific ID.
- Type: str
The new logical ID to use for this stack element.
def reset_override_logical_id() -> None
Resets a previously passed logical Id to use the auto-generated logical id again.
def to_hcl_terraform() -> typing.Any
def to_metadata() -> typing.Any
def to_terraform() -> typing.Any
Adds this resource to the terraform JSON output.
def add_move_target(
move_target: str
) -> None
Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move.
- Type: str
The string move target that will correspond to this resource.
def get_any_map_attribute(
terraform_attribute: str
) -> typing.Mapping[typing.Any]
- Type: str
def get_boolean_attribute(
terraform_attribute: str
) -> IResolvable
- Type: str
def get_boolean_map_attribute(
terraform_attribute: str
) -> typing.Mapping[bool]
- Type: str
def get_list_attribute(
terraform_attribute: str
) -> typing.List[str]
- Type: str
def get_number_attribute(
terraform_attribute: str
) -> typing.Union[int, float]
- Type: str
def get_number_list_attribute(
terraform_attribute: str
) -> typing.List[typing.Union[int, float]]
- Type: str
def get_number_map_attribute(
terraform_attribute: str
) -> typing.Mapping[typing.Union[int, float]]
- Type: str
def get_string_attribute(
terraform_attribute: str
) -> str
- Type: str
def get_string_map_attribute(
terraform_attribute: str
) -> typing.Mapping[str]
- Type: str
def has_resource_move() -> typing.Union[TerraformResourceMoveByTarget, TerraformResourceMoveById]
def import_from(
id: str,
provider: TerraformProvider = None
) -> None
- Type: str
- Type: cdktf.TerraformProvider
def interpolation_for_attribute(
terraform_attribute: str
) -> IResolvable
- Type: str
def move_from_id(
id: str
) -> None
Move the resource corresponding to "id" to this resource.
Note that the resource being moved from must be marked as moved using it's instance function.
- Type: str
Full id of resource being moved from, e.g. "aws_s3_bucket.example".
def move_to(
move_target: str,
index: typing.Union[str, typing.Union[int, float]] = None
) -> None
Moves this resource to the target resource given by moveTarget.
- Type: str
The previously set user defined string set by .addMoveTarget() corresponding to the resource to move to.
- Type: typing.Union[str, typing.Union[int, float]]
Optional The index corresponding to the key the resource is to appear in the foreach of a resource to move to.
def move_to_id(
id: str
) -> None
Moves this resource to the resource corresponding to "id".
- Type: str
Full id of resource to move to, e.g. "aws_s3_bucket.example".
def put_timeouts(
create: str = None,
delete: str = None,
update: str = None
) -> None
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#create NetappActiveDirectory#create}.
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#delete NetappActiveDirectory#delete}.
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#update NetappActiveDirectory#update}.
def reset_administrators() -> None
def reset_aes_encryption() -> None
def reset_backup_operators() -> None
def reset_description() -> None
def reset_encrypt_dc_connections() -> None
def reset_id() -> None
def reset_kdc_hostname() -> None
def reset_kdc_ip() -> None
def reset_labels() -> None
def reset_ldap_signing() -> None
def reset_nfs_users_with_ldap() -> None
def reset_organizational_unit() -> None
def reset_project() -> None
def reset_security_operators() -> None
def reset_site() -> None
def reset_timeouts() -> None
Name | Description |
---|---|
is_construct |
Checks if x is a construct. |
is_terraform_element |
No description. |
is_terraform_resource |
No description. |
generate_config_for_import |
Generates CDKTF code for importing a NetappActiveDirectory resource upon running "cdktf plan ". |
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectory.is_construct(
x: typing.Any
)
Checks if x
is a construct.
Use this method instead of instanceof
to properly detect Construct
instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the constructs
library on
disk are seen as independent, completely different libraries. As a
consequence, the class Construct
in each copy of the constructs
library
is seen as a different class, and an instance of one class will not test as
instanceof
the other class. npm install
will not create installations
like this, but users may manually symlink construct libraries together or
use a monorepo tool: in those cases, multiple copies of the constructs
library can be accidentally installed, and instanceof
will behave
unpredictably. It is safest to avoid using instanceof
, and using
this type-testing method instead.
- Type: typing.Any
Any object.
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectory.is_terraform_element(
x: typing.Any
)
- Type: typing.Any
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectory.is_terraform_resource(
x: typing.Any
)
- Type: typing.Any
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectory.generate_config_for_import(
scope: Construct,
import_to_id: str,
import_from_id: str,
provider: TerraformProvider = None
)
Generates CDKTF code for importing a NetappActiveDirectory resource upon running "cdktf plan ".
- Type: constructs.Construct
The scope in which to define this construct.
- Type: str
The construct id used in the generated config for the NetappActiveDirectory to import.
- Type: str
The id of the existing NetappActiveDirectory that should be imported.
Refer to the {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#import import section} in the documentation of this resource for the id to use
- Type: cdktf.TerraformProvider
? Optional instance of the provider where the NetappActiveDirectory to import is found.
Name | Type | Description |
---|---|---|
node |
constructs.Node |
The tree node. |
cdktf_stack |
cdktf.TerraformStack |
No description. |
fqn |
str |
No description. |
friendly_unique_id |
str |
No description. |
terraform_meta_arguments |
typing.Mapping[typing.Any] |
No description. |
terraform_resource_type |
str |
No description. |
terraform_generator_metadata |
cdktf.TerraformProviderGeneratorMetadata |
No description. |
connection |
typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] |
No description. |
count |
typing.Union[typing.Union[int, float], cdktf.TerraformCount] |
No description. |
depends_on |
typing.List[str] |
No description. |
for_each |
cdktf.ITerraformIterator |
No description. |
lifecycle |
cdktf.TerraformResourceLifecycle |
No description. |
provider |
cdktf.TerraformProvider |
No description. |
provisioners |
typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] |
No description. |
create_time |
str |
No description. |
effective_labels |
cdktf.StringMap |
No description. |
state |
str |
No description. |
state_details |
str |
No description. |
terraform_labels |
cdktf.StringMap |
No description. |
timeouts |
NetappActiveDirectoryTimeoutsOutputReference |
No description. |
administrators_input |
typing.List[str] |
No description. |
aes_encryption_input |
typing.Union[bool, cdktf.IResolvable] |
No description. |
backup_operators_input |
typing.List[str] |
No description. |
description_input |
str |
No description. |
dns_input |
str |
No description. |
domain_input |
str |
No description. |
encrypt_dc_connections_input |
typing.Union[bool, cdktf.IResolvable] |
No description. |
id_input |
str |
No description. |
kdc_hostname_input |
str |
No description. |
kdc_ip_input |
str |
No description. |
labels_input |
typing.Mapping[str] |
No description. |
ldap_signing_input |
typing.Union[bool, cdktf.IResolvable] |
No description. |
location_input |
str |
No description. |
name_input |
str |
No description. |
net_bios_prefix_input |
str |
No description. |
nfs_users_with_ldap_input |
typing.Union[bool, cdktf.IResolvable] |
No description. |
organizational_unit_input |
str |
No description. |
password_input |
str |
No description. |
project_input |
str |
No description. |
security_operators_input |
typing.List[str] |
No description. |
site_input |
str |
No description. |
timeouts_input |
typing.Union[cdktf.IResolvable, NetappActiveDirectoryTimeouts] |
No description. |
username_input |
str |
No description. |
administrators |
typing.List[str] |
No description. |
aes_encryption |
typing.Union[bool, cdktf.IResolvable] |
No description. |
backup_operators |
typing.List[str] |
No description. |
description |
str |
No description. |
dns |
str |
No description. |
domain |
str |
No description. |
encrypt_dc_connections |
typing.Union[bool, cdktf.IResolvable] |
No description. |
id |
str |
No description. |
kdc_hostname |
str |
No description. |
kdc_ip |
str |
No description. |
labels |
typing.Mapping[str] |
No description. |
ldap_signing |
typing.Union[bool, cdktf.IResolvable] |
No description. |
location |
str |
No description. |
name |
str |
No description. |
net_bios_prefix |
str |
No description. |
nfs_users_with_ldap |
typing.Union[bool, cdktf.IResolvable] |
No description. |
organizational_unit |
str |
No description. |
password |
str |
No description. |
project |
str |
No description. |
security_operators |
typing.List[str] |
No description. |
site |
str |
No description. |
username |
str |
No description. |
node: Node
- Type: constructs.Node
The tree node.
cdktf_stack: TerraformStack
- Type: cdktf.TerraformStack
fqn: str
- Type: str
friendly_unique_id: str
- Type: str
terraform_meta_arguments: typing.Mapping[typing.Any]
- Type: typing.Mapping[typing.Any]
terraform_resource_type: str
- Type: str
terraform_generator_metadata: TerraformProviderGeneratorMetadata
- Type: cdktf.TerraformProviderGeneratorMetadata
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
- Type: typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
count: typing.Union[typing.Union[int, float], TerraformCount]
- Type: typing.Union[typing.Union[int, float], cdktf.TerraformCount]
depends_on: typing.List[str]
- Type: typing.List[str]
for_each: ITerraformIterator
- Type: cdktf.ITerraformIterator
lifecycle: TerraformResourceLifecycle
- Type: cdktf.TerraformResourceLifecycle
provider: TerraformProvider
- Type: cdktf.TerraformProvider
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
- Type: typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
create_time: str
- Type: str
effective_labels: StringMap
- Type: cdktf.StringMap
state: str
- Type: str
state_details: str
- Type: str
terraform_labels: StringMap
- Type: cdktf.StringMap
timeouts: NetappActiveDirectoryTimeoutsOutputReference
administrators_input: typing.List[str]
- Type: typing.List[str]
aes_encryption_input: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
backup_operators_input: typing.List[str]
- Type: typing.List[str]
description_input: str
- Type: str
dns_input: str
- Type: str
domain_input: str
- Type: str
encrypt_dc_connections_input: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
id_input: str
- Type: str
kdc_hostname_input: str
- Type: str
kdc_ip_input: str
- Type: str
labels_input: typing.Mapping[str]
- Type: typing.Mapping[str]
ldap_signing_input: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
location_input: str
- Type: str
name_input: str
- Type: str
net_bios_prefix_input: str
- Type: str
nfs_users_with_ldap_input: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
organizational_unit_input: str
- Type: str
password_input: str
- Type: str
project_input: str
- Type: str
security_operators_input: typing.List[str]
- Type: typing.List[str]
site_input: str
- Type: str
timeouts_input: typing.Union[IResolvable, NetappActiveDirectoryTimeouts]
- Type: typing.Union[cdktf.IResolvable, NetappActiveDirectoryTimeouts]
username_input: str
- Type: str
administrators: typing.List[str]
- Type: typing.List[str]
aes_encryption: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
backup_operators: typing.List[str]
- Type: typing.List[str]
description: str
- Type: str
dns: str
- Type: str
domain: str
- Type: str
encrypt_dc_connections: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
id: str
- Type: str
kdc_hostname: str
- Type: str
kdc_ip: str
- Type: str
labels: typing.Mapping[str]
- Type: typing.Mapping[str]
ldap_signing: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
location: str
- Type: str
name: str
- Type: str
net_bios_prefix: str
- Type: str
nfs_users_with_ldap: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
organizational_unit: str
- Type: str
password: str
- Type: str
project: str
- Type: str
security_operators: typing.List[str]
- Type: typing.List[str]
site: str
- Type: str
username: str
- Type: str
Name | Type | Description |
---|---|---|
tfResourceType |
str |
No description. |
tfResourceType: str
- Type: str
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectoryConfig(
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection] = None,
count: typing.Union[typing.Union[int, float], TerraformCount] = None,
depends_on: typing.List[ITerraformDependable] = None,
for_each: ITerraformIterator = None,
lifecycle: TerraformResourceLifecycle = None,
provider: TerraformProvider = None,
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]] = None,
dns: str,
domain: str,
location: str,
name: str,
net_bios_prefix: str,
password: str,
username: str,
administrators: typing.List[str] = None,
aes_encryption: typing.Union[bool, IResolvable] = None,
backup_operators: typing.List[str] = None,
description: str = None,
encrypt_dc_connections: typing.Union[bool, IResolvable] = None,
id: str = None,
kdc_hostname: str = None,
kdc_ip: str = None,
labels: typing.Mapping[str] = None,
ldap_signing: typing.Union[bool, IResolvable] = None,
nfs_users_with_ldap: typing.Union[bool, IResolvable] = None,
organizational_unit: str = None,
project: str = None,
security_operators: typing.List[str] = None,
site: str = None,
timeouts: NetappActiveDirectoryTimeouts = None
)
Name | Type | Description |
---|---|---|
connection |
typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection] |
No description. |
count |
typing.Union[typing.Union[int, float], cdktf.TerraformCount] |
No description. |
depends_on |
typing.List[cdktf.ITerraformDependable] |
No description. |
for_each |
cdktf.ITerraformIterator |
No description. |
lifecycle |
cdktf.TerraformResourceLifecycle |
No description. |
provider |
cdktf.TerraformProvider |
No description. |
provisioners |
typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] |
No description. |
dns |
str |
Comma separated list of DNS server IP addresses for the Active Directory domain. |
domain |
str |
Fully qualified domain name for the Active Directory domain. |
location |
str |
Name of the region for the policy to apply to. |
name |
str |
The resource name of the Active Directory pool. Needs to be unique per location. |
net_bios_prefix |
str |
NetBIOS name prefix of the server to be created. |
password |
str |
Password for specified username. |
username |
str |
Username for the Active Directory account with permissions to create the compute account within the specified organizational unit. |
administrators |
typing.List[str] |
Domain user accounts to be added to the local Administrators group of the SMB service. |
aes_encryption |
typing.Union[bool, cdktf.IResolvable] |
Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory. |
backup_operators |
typing.List[str] |
Domain user/group accounts to be added to the Backup Operators group of the SMB service. |
description |
str |
An optional description of this resource. |
encrypt_dc_connections |
typing.Union[bool, cdktf.IResolvable] |
If enabled, traffic between the SMB server to Domain Controller (DC) will be encrypted. |
id |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#id NetappActiveDirectory#id}. |
kdc_hostname |
str |
Hostname of the Active Directory server used as Kerberos Key Distribution Center. Only required for volumes using kerberized NFSv4.1. |
kdc_ip |
str |
IP address of the Active Directory server used as Kerberos Key Distribution Center. |
labels |
typing.Mapping[str] |
Labels as key value pairs. Example: '{ "owner": "Bob", "department": "finance", "purpose": "testing" }'. |
ldap_signing |
typing.Union[bool, cdktf.IResolvable] |
Specifies whether or not the LDAP traffic needs to be signed. |
nfs_users_with_ldap |
typing.Union[bool, cdktf.IResolvable] |
Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes. |
organizational_unit |
str |
Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes. |
project |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#project NetappActiveDirectory#project}. |
security_operators |
typing.List[str] |
Domain accounts that require elevated privileges such as 'SeSecurityPrivilege' to manage security logs. Comma-separated list. |
site |
str |
Specifies an Active Directory site to manage domain controller selection. |
timeouts |
NetappActiveDirectoryTimeouts |
timeouts block. |
connection: typing.Union[SSHProvisionerConnection, WinrmProvisionerConnection]
- Type: typing.Union[cdktf.SSHProvisionerConnection, cdktf.WinrmProvisionerConnection]
count: typing.Union[typing.Union[int, float], TerraformCount]
- Type: typing.Union[typing.Union[int, float], cdktf.TerraformCount]
depends_on: typing.List[ITerraformDependable]
- Type: typing.List[cdktf.ITerraformDependable]
for_each: ITerraformIterator
- Type: cdktf.ITerraformIterator
lifecycle: TerraformResourceLifecycle
- Type: cdktf.TerraformResourceLifecycle
provider: TerraformProvider
- Type: cdktf.TerraformProvider
provisioners: typing.List[typing.Union[FileProvisioner, LocalExecProvisioner, RemoteExecProvisioner]]
- Type: typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]]
dns: str
- Type: str
Comma separated list of DNS server IP addresses for the Active Directory domain.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#dns NetappActiveDirectory#dns}
domain: str
- Type: str
Fully qualified domain name for the Active Directory domain.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#domain NetappActiveDirectory#domain}
location: str
- Type: str
Name of the region for the policy to apply to.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#location NetappActiveDirectory#location}
name: str
- Type: str
The resource name of the Active Directory pool. Needs to be unique per location.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#name NetappActiveDirectory#name}
net_bios_prefix: str
- Type: str
NetBIOS name prefix of the server to be created.
A five-character random ID is generated automatically, for example, -6f9a, and appended to the prefix. The full UNC share path will have the following format: '\NetBIOS_PREFIX-ABCD.DOMAIN_NAME\SHARE_NAME'
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#net_bios_prefix NetappActiveDirectory#net_bios_prefix}
password: str
- Type: str
Password for specified username.
Note - Manual changes done to the password will not be detected. Terraform will not re-apply the password, unless you use a new password in Terraform.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#password NetappActiveDirectory#password}
username: str
- Type: str
Username for the Active Directory account with permissions to create the compute account within the specified organizational unit.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#username NetappActiveDirectory#username}
administrators: typing.List[str]
- Type: typing.List[str]
Domain user accounts to be added to the local Administrators group of the SMB service.
Comma-separated list of domain users or groups. The Domain Admin group is automatically added when the service joins your domain as a hidden group.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#administrators NetappActiveDirectory#administrators}
aes_encryption: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#aes_encryption NetappActiveDirectory#aes_encryption}
backup_operators: typing.List[str]
- Type: typing.List[str]
Domain user/group accounts to be added to the Backup Operators group of the SMB service.
The Backup Operators group allows members to backup and restore files regardless of whether they have read or write access to the files. Comma-separated list.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#backup_operators NetappActiveDirectory#backup_operators}
description: str
- Type: str
An optional description of this resource.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#description NetappActiveDirectory#description}
encrypt_dc_connections: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
If enabled, traffic between the SMB server to Domain Controller (DC) will be encrypted.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#encrypt_dc_connections NetappActiveDirectory#encrypt_dc_connections}
id: str
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#id NetappActiveDirectory#id}.
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
kdc_hostname: str
- Type: str
Hostname of the Active Directory server used as Kerberos Key Distribution Center. Only required for volumes using kerberized NFSv4.1.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#kdc_hostname NetappActiveDirectory#kdc_hostname}
kdc_ip: str
- Type: str
IP address of the Active Directory server used as Kerberos Key Distribution Center.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#kdc_ip NetappActiveDirectory#kdc_ip}
labels: typing.Mapping[str]
- Type: typing.Mapping[str]
Labels as key value pairs. Example: '{ "owner": "Bob", "department": "finance", "purpose": "testing" }'.
Note: This field is non-authoritative, and will only manage the labels present in your configuration. Please refer to the field 'effective_labels' for all of the labels present on the resource.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#labels NetappActiveDirectory#labels}
ldap_signing: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
Specifies whether or not the LDAP traffic needs to be signed.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#ldap_signing NetappActiveDirectory#ldap_signing}
nfs_users_with_ldap: typing.Union[bool, IResolvable]
- Type: typing.Union[bool, cdktf.IResolvable]
Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes.
This option can be used to temporarily switch such volumes to AUTH_SYS authentication (user ID + 1-16 groups).
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#nfs_users_with_ldap NetappActiveDirectory#nfs_users_with_ldap}
organizational_unit: str
- Type: str
Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes.
Defaults to 'CN=Computers' if left empty.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#organizational_unit NetappActiveDirectory#organizational_unit}
project: str
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#project NetappActiveDirectory#project}.
security_operators: typing.List[str]
- Type: typing.List[str]
Domain accounts that require elevated privileges such as 'SeSecurityPrivilege' to manage security logs. Comma-separated list.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#security_operators NetappActiveDirectory#security_operators}
site: str
- Type: str
Specifies an Active Directory site to manage domain controller selection.
Use when Active Directory domain controllers in multiple regions are configured. Defaults to 'Default-First-Site-Name' if left empty.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#site NetappActiveDirectory#site}
timeouts: NetappActiveDirectoryTimeouts
timeouts block.
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#timeouts NetappActiveDirectory#timeouts}
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectoryTimeouts(
create: str = None,
delete: str = None,
update: str = None
)
Name | Type | Description |
---|---|---|
create |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#create NetappActiveDirectory#create}. |
delete |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#delete NetappActiveDirectory#delete}. |
update |
str |
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#update NetappActiveDirectory#update}. |
create: str
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#create NetappActiveDirectory#create}.
delete: str
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#delete NetappActiveDirectory#delete}.
update: str
- Type: str
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.14.1/docs/resources/netapp_active_directory#update NetappActiveDirectory#update}.
from cdktf_cdktf_provider_google import netapp_active_directory
netappActiveDirectory.NetappActiveDirectoryTimeoutsOutputReference(
terraform_resource: IInterpolatingParent,
terraform_attribute: str
)
Name | Type | Description |
---|---|---|
terraform_resource |
cdktf.IInterpolatingParent |
The parent resource. |
terraform_attribute |
str |
The attribute on the parent resource this class is referencing. |
- Type: cdktf.IInterpolatingParent
The parent resource.
- Type: str
The attribute on the parent resource this class is referencing.
Name | Description |
---|---|
compute_fqn |
No description. |
get_any_map_attribute |
No description. |
get_boolean_attribute |
No description. |
get_boolean_map_attribute |
No description. |
get_list_attribute |
No description. |
get_number_attribute |
No description. |
get_number_list_attribute |
No description. |
get_number_map_attribute |
No description. |
get_string_attribute |
No description. |
get_string_map_attribute |
No description. |
interpolation_for_attribute |
No description. |
resolve |
Produce the Token's value at resolution time. |
to_string |
Return a string representation of this resolvable object. |
reset_create |
No description. |
reset_delete |
No description. |
reset_update |
No description. |
def compute_fqn() -> str
def get_any_map_attribute(
terraform_attribute: str
) -> typing.Mapping[typing.Any]
- Type: str
def get_boolean_attribute(
terraform_attribute: str
) -> IResolvable
- Type: str
def get_boolean_map_attribute(
terraform_attribute: str
) -> typing.Mapping[bool]
- Type: str
def get_list_attribute(
terraform_attribute: str
) -> typing.List[str]
- Type: str
def get_number_attribute(
terraform_attribute: str
) -> typing.Union[int, float]
- Type: str
def get_number_list_attribute(
terraform_attribute: str
) -> typing.List[typing.Union[int, float]]
- Type: str
def get_number_map_attribute(
terraform_attribute: str
) -> typing.Mapping[typing.Union[int, float]]
- Type: str
def get_string_attribute(
terraform_attribute: str
) -> str
- Type: str
def get_string_map_attribute(
terraform_attribute: str
) -> typing.Mapping[str]
- Type: str
def interpolation_for_attribute(
property: str
) -> IResolvable
- Type: str
def resolve(
_context: IResolveContext
) -> typing.Any
Produce the Token's value at resolution time.
- Type: cdktf.IResolveContext
def to_string() -> str
Return a string representation of this resolvable object.
Returns a reversible string representation.
def reset_create() -> None
def reset_delete() -> None
def reset_update() -> None
Name | Type | Description |
---|---|---|
creation_stack |
typing.List[str] |
The creation stack of this resolvable which will be appended to errors thrown during resolution. |
fqn |
str |
No description. |
create_input |
str |
No description. |
delete_input |
str |
No description. |
update_input |
str |
No description. |
create |
str |
No description. |
delete |
str |
No description. |
update |
str |
No description. |
internal_value |
typing.Union[cdktf.IResolvable, NetappActiveDirectoryTimeouts] |
No description. |
creation_stack: typing.List[str]
- Type: typing.List[str]
The creation stack of this resolvable which will be appended to errors thrown during resolution.
If this returns an empty array the stack will not be attached.
fqn: str
- Type: str
create_input: str
- Type: str
delete_input: str
- Type: str
update_input: str
- Type: str
create: str
- Type: str
delete: str
- Type: str
update: str
- Type: str
internal_value: typing.Union[IResolvable, NetappActiveDirectoryTimeouts]
- Type: typing.Union[cdktf.IResolvable, NetappActiveDirectoryTimeouts]