rotatedSecretCreateSplunk is a command that creates a rotated secret for a Splunk target. Currently we support target-rotator behavior (rotate credentials on the target itself).
| Name | Type | Description | Notes |
|---|---|---|---|
| audience | str | Token audience for Splunk token creation (required for rotator-type=token) | [optional] |
| authentication_credentials | str | The credentials to connect with use-user-creds/use-target-creds | [optional] [default to 'use-user-creds'] |
| auto_rotate | str | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] | [optional] |
| delete_protection | str | Protection from accidental deletion of this object [true/false] | [optional] |
| description | str | Description of the object | [optional] |
| expiration_date | str | Token expiration date in YYYY-MM-DD format (required for rotator-type=token when manual rotation is selected and no existing token is provided). Time will be set to 00:00 UTC. | [optional] |
| hec_token | str | Current Splunk HEC token value to store (relevant only for rotator-type=hec-token). If not provided, a new HEC input will be created in Splunk. | [optional] |
| hec_token_name | str | Splunk HEC input name to manage (required for rotator-type=hec-token) | [optional] |
| item_custom_fields | dict(str, str) | Additional custom fields to associate with the item | [optional] |
| json | bool | Set output format to JSON | [optional] [default to False] |
| key | str | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
| max_versions | str | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
| name | str | Rotated secret name | |
| password_length | str | The length of the password to be generated | [optional] |
| rotated_password | str | rotated-username password (relevant only for rotator-type=password) | [optional] |
| rotated_username | str | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
| rotation_event_in | list[str] | How many days before the rotation of the item would you like to be notified | [optional] |
| rotation_hour | int | The Hour of the rotation in UTC | [optional] |
| rotation_interval | str | The number of days to wait between every automatic key rotation (1-365) | [optional] |
| rotator_type | str | The rotator type. options: [target/password/token/hec-token] | |
| splunk_token | str | Current Splunk authentication token to store (relevant only for rotator-type=token). If not provided, a new token will be created in Splunk. | [optional] |
| tags | list[str] | Add tags attached to this object | [optional] |
| target_name | str | The target name to associate | |
| token | str | Authentication token (see `/auth` and `/configure`) | [optional] |
| token_owner | str | Splunk token owner username (relevant only for rotator-type=token) | [optional] |
| uid_token | str | The universal identity token, Required only for universal_identity authentication | [optional] |