1. Packages
  2. HashiCorp Vault Provider
  3. API Docs
  4. pkiSecret
  5. BackendConfigAutoTidy
HashiCorp Vault v6.6.0 published on Thursday, Mar 13, 2025 by Pulumi

vault.pkiSecret.BackendConfigAutoTidy

Explore with Pulumi AI

vault logo
HashiCorp Vault v6.6.0 published on Thursday, Mar 13, 2025 by Pulumi

    Allows setting the Auto Tidy configuration on a PKI Secret Backend

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as vault from "@pulumi/vault";
    
    const pki = new vault.Mount("pki", {
        path: "pki",
        type: "pki",
        defaultLeaseTtlSeconds: 3600,
        maxLeaseTtlSeconds: 86400,
    });
    const test = new vault.pkisecret.BackendConfigAutoTidy("test", {
        backend: pki.path,
        enabled: true,
        tidyCertStore: true,
        intervalDuration: "1h",
    });
    
    import pulumi
    import pulumi_vault as vault
    
    pki = vault.Mount("pki",
        path="pki",
        type="pki",
        default_lease_ttl_seconds=3600,
        max_lease_ttl_seconds=86400)
    test = vault.pki_secret.BackendConfigAutoTidy("test",
        backend=pki.path,
        enabled=True,
        tidy_cert_store=True,
        interval_duration="1h")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
    	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkisecret"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		pki, err := vault.NewMount(ctx, "pki", &vault.MountArgs{
    			Path:                   pulumi.String("pki"),
    			Type:                   pulumi.String("pki"),
    			DefaultLeaseTtlSeconds: pulumi.Int(3600),
    			MaxLeaseTtlSeconds:     pulumi.Int(86400),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = pkisecret.NewBackendConfigAutoTidy(ctx, "test", &pkisecret.BackendConfigAutoTidyArgs{
    			Backend:          pki.Path,
    			Enabled:          pulumi.Bool(true),
    			TidyCertStore:    pulumi.Bool(true),
    			IntervalDuration: pulumi.String("1h"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Vault = Pulumi.Vault;
    
    return await Deployment.RunAsync(() => 
    {
        var pki = new Vault.Mount("pki", new()
        {
            Path = "pki",
            Type = "pki",
            DefaultLeaseTtlSeconds = 3600,
            MaxLeaseTtlSeconds = 86400,
        });
    
        var test = new Vault.PkiSecret.BackendConfigAutoTidy("test", new()
        {
            Backend = pki.Path,
            Enabled = true,
            TidyCertStore = true,
            IntervalDuration = "1h",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.vault.Mount;
    import com.pulumi.vault.MountArgs;
    import com.pulumi.vault.pkiSecret.BackendConfigAutoTidy;
    import com.pulumi.vault.pkiSecret.BackendConfigAutoTidyArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var pki = new Mount("pki", MountArgs.builder()
                .path("pki")
                .type("pki")
                .defaultLeaseTtlSeconds(3600)
                .maxLeaseTtlSeconds(86400)
                .build());
    
            var test = new BackendConfigAutoTidy("test", BackendConfigAutoTidyArgs.builder()
                .backend(pki.path())
                .enabled(true)
                .tidyCertStore(true)
                .intervalDuration("1h")
                .build());
    
        }
    }
    
    resources:
      pki:
        type: vault:Mount
        properties:
          path: pki
          type: pki
          defaultLeaseTtlSeconds: 3600
          maxLeaseTtlSeconds: 86400
      test:
        type: vault:pkiSecret:BackendConfigAutoTidy
        properties:
          backend: ${pki.path}
          enabled: true
          tidyCertStore: true
          intervalDuration: 1h
    

    Create BackendConfigAutoTidy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new BackendConfigAutoTidy(name: string, args: BackendConfigAutoTidyArgs, opts?: CustomResourceOptions);
    @overload
    def BackendConfigAutoTidy(resource_name: str,
                              args: BackendConfigAutoTidyArgs,
                              opts: Optional[ResourceOptions] = None)
    
    @overload
    def BackendConfigAutoTidy(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              enabled: Optional[bool] = None,
                              backend: Optional[str] = None,
                              publish_stored_certificate_count_metrics: Optional[bool] = None,
                              interval_duration: Optional[str] = None,
                              issuer_safety_buffer: Optional[str] = None,
                              maintain_stored_certificate_counts: Optional[bool] = None,
                              max_startup_backoff_duration: Optional[str] = None,
                              min_startup_backoff_duration: Optional[str] = None,
                              namespace: Optional[str] = None,
                              pause_duration: Optional[str] = None,
                              acme_account_safety_buffer: Optional[str] = None,
                              revocation_queue_safety_buffer: Optional[str] = None,
                              safety_buffer: Optional[str] = None,
                              tidy_acme: Optional[bool] = None,
                              tidy_cert_metadata: Optional[bool] = None,
                              tidy_cert_store: Optional[bool] = None,
                              tidy_cmpv2_nonce_store: Optional[bool] = None,
                              tidy_cross_cluster_revoked_certs: Optional[bool] = None,
                              tidy_expired_issuers: Optional[bool] = None,
                              tidy_move_legacy_ca_bundle: Optional[bool] = None,
                              tidy_revocation_queue: Optional[bool] = None,
                              tidy_revoked_cert_issuer_associations: Optional[bool] = None,
                              tidy_revoked_certs: Optional[bool] = None)
    func NewBackendConfigAutoTidy(ctx *Context, name string, args BackendConfigAutoTidyArgs, opts ...ResourceOption) (*BackendConfigAutoTidy, error)
    public BackendConfigAutoTidy(string name, BackendConfigAutoTidyArgs args, CustomResourceOptions? opts = null)
    public BackendConfigAutoTidy(String name, BackendConfigAutoTidyArgs args)
    public BackendConfigAutoTidy(String name, BackendConfigAutoTidyArgs args, CustomResourceOptions options)
    
    type: vault:pkiSecret:BackendConfigAutoTidy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args BackendConfigAutoTidyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args BackendConfigAutoTidyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args BackendConfigAutoTidyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args BackendConfigAutoTidyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args BackendConfigAutoTidyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var backendConfigAutoTidyResource = new Vault.PkiSecret.BackendConfigAutoTidy("backendConfigAutoTidyResource", new()
    {
        Enabled = false,
        Backend = "string",
        PublishStoredCertificateCountMetrics = false,
        IntervalDuration = "string",
        IssuerSafetyBuffer = "string",
        MaintainStoredCertificateCounts = false,
        MaxStartupBackoffDuration = "string",
        MinStartupBackoffDuration = "string",
        Namespace = "string",
        PauseDuration = "string",
        AcmeAccountSafetyBuffer = "string",
        RevocationQueueSafetyBuffer = "string",
        SafetyBuffer = "string",
        TidyAcme = false,
        TidyCertMetadata = false,
        TidyCertStore = false,
        TidyCmpv2NonceStore = false,
        TidyCrossClusterRevokedCerts = false,
        TidyExpiredIssuers = false,
        TidyMoveLegacyCaBundle = false,
        TidyRevocationQueue = false,
        TidyRevokedCertIssuerAssociations = false,
        TidyRevokedCerts = false,
    });
    
    example, err := pkiSecret.NewBackendConfigAutoTidy(ctx, "backendConfigAutoTidyResource", &pkiSecret.BackendConfigAutoTidyArgs{
    	Enabled:                              pulumi.Bool(false),
    	Backend:                              pulumi.String("string"),
    	PublishStoredCertificateCountMetrics: pulumi.Bool(false),
    	IntervalDuration:                     pulumi.String("string"),
    	IssuerSafetyBuffer:                   pulumi.String("string"),
    	MaintainStoredCertificateCounts:      pulumi.Bool(false),
    	MaxStartupBackoffDuration:            pulumi.String("string"),
    	MinStartupBackoffDuration:            pulumi.String("string"),
    	Namespace:                            pulumi.String("string"),
    	PauseDuration:                        pulumi.String("string"),
    	AcmeAccountSafetyBuffer:              pulumi.String("string"),
    	RevocationQueueSafetyBuffer:          pulumi.String("string"),
    	SafetyBuffer:                         pulumi.String("string"),
    	TidyAcme:                             pulumi.Bool(false),
    	TidyCertMetadata:                     pulumi.Bool(false),
    	TidyCertStore:                        pulumi.Bool(false),
    	TidyCmpv2NonceStore:                  pulumi.Bool(false),
    	TidyCrossClusterRevokedCerts:         pulumi.Bool(false),
    	TidyExpiredIssuers:                   pulumi.Bool(false),
    	TidyMoveLegacyCaBundle:               pulumi.Bool(false),
    	TidyRevocationQueue:                  pulumi.Bool(false),
    	TidyRevokedCertIssuerAssociations:    pulumi.Bool(false),
    	TidyRevokedCerts:                     pulumi.Bool(false),
    })
    
    var backendConfigAutoTidyResource = new BackendConfigAutoTidy("backendConfigAutoTidyResource", BackendConfigAutoTidyArgs.builder()
        .enabled(false)
        .backend("string")
        .publishStoredCertificateCountMetrics(false)
        .intervalDuration("string")
        .issuerSafetyBuffer("string")
        .maintainStoredCertificateCounts(false)
        .maxStartupBackoffDuration("string")
        .minStartupBackoffDuration("string")
        .namespace("string")
        .pauseDuration("string")
        .acmeAccountSafetyBuffer("string")
        .revocationQueueSafetyBuffer("string")
        .safetyBuffer("string")
        .tidyAcme(false)
        .tidyCertMetadata(false)
        .tidyCertStore(false)
        .tidyCmpv2NonceStore(false)
        .tidyCrossClusterRevokedCerts(false)
        .tidyExpiredIssuers(false)
        .tidyMoveLegacyCaBundle(false)
        .tidyRevocationQueue(false)
        .tidyRevokedCertIssuerAssociations(false)
        .tidyRevokedCerts(false)
        .build());
    
    backend_config_auto_tidy_resource = vault.pki_secret.BackendConfigAutoTidy("backendConfigAutoTidyResource",
        enabled=False,
        backend="string",
        publish_stored_certificate_count_metrics=False,
        interval_duration="string",
        issuer_safety_buffer="string",
        maintain_stored_certificate_counts=False,
        max_startup_backoff_duration="string",
        min_startup_backoff_duration="string",
        namespace="string",
        pause_duration="string",
        acme_account_safety_buffer="string",
        revocation_queue_safety_buffer="string",
        safety_buffer="string",
        tidy_acme=False,
        tidy_cert_metadata=False,
        tidy_cert_store=False,
        tidy_cmpv2_nonce_store=False,
        tidy_cross_cluster_revoked_certs=False,
        tidy_expired_issuers=False,
        tidy_move_legacy_ca_bundle=False,
        tidy_revocation_queue=False,
        tidy_revoked_cert_issuer_associations=False,
        tidy_revoked_certs=False)
    
    const backendConfigAutoTidyResource = new vault.pkisecret.BackendConfigAutoTidy("backendConfigAutoTidyResource", {
        enabled: false,
        backend: "string",
        publishStoredCertificateCountMetrics: false,
        intervalDuration: "string",
        issuerSafetyBuffer: "string",
        maintainStoredCertificateCounts: false,
        maxStartupBackoffDuration: "string",
        minStartupBackoffDuration: "string",
        namespace: "string",
        pauseDuration: "string",
        acmeAccountSafetyBuffer: "string",
        revocationQueueSafetyBuffer: "string",
        safetyBuffer: "string",
        tidyAcme: false,
        tidyCertMetadata: false,
        tidyCertStore: false,
        tidyCmpv2NonceStore: false,
        tidyCrossClusterRevokedCerts: false,
        tidyExpiredIssuers: false,
        tidyMoveLegacyCaBundle: false,
        tidyRevocationQueue: false,
        tidyRevokedCertIssuerAssociations: false,
        tidyRevokedCerts: false,
    });
    
    type: vault:pkiSecret:BackendConfigAutoTidy
    properties:
        acmeAccountSafetyBuffer: string
        backend: string
        enabled: false
        intervalDuration: string
        issuerSafetyBuffer: string
        maintainStoredCertificateCounts: false
        maxStartupBackoffDuration: string
        minStartupBackoffDuration: string
        namespace: string
        pauseDuration: string
        publishStoredCertificateCountMetrics: false
        revocationQueueSafetyBuffer: string
        safetyBuffer: string
        tidyAcme: false
        tidyCertMetadata: false
        tidyCertStore: false
        tidyCmpv2NonceStore: false
        tidyCrossClusterRevokedCerts: false
        tidyExpiredIssuers: false
        tidyMoveLegacyCaBundle: false
        tidyRevocationQueue: false
        tidyRevokedCertIssuerAssociations: false
        tidyRevokedCerts: false
    

    BackendConfigAutoTidy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The BackendConfigAutoTidy resource accepts the following input properties:

    Backend string
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    Enabled bool
    Specifies whether automatic tidy is enabled or not.
    AcmeAccountSafetyBuffer string
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    IntervalDuration string
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    IssuerSafetyBuffer string
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    MaintainStoredCertificateCounts bool
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    MaxStartupBackoffDuration string
    The maximum amount of time auto-tidy will be delayed after startup.
    MinStartupBackoffDuration string
    The minimum amount of time auto-tidy will be delayed after startup.
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PauseDuration string
    The amount of time to wait between processing certificates.
    PublishStoredCertificateCountMetrics bool
    This configures whether the stored certificate count is published to the metrics consumer.
    RevocationQueueSafetyBuffer string
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    SafetyBuffer string
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    TidyAcme bool
    Set to true to enable tidying ACME accounts, orders and authorizations.
    TidyCertMetadata bool
    Set to true to enable tidying up certificate metadata.
    TidyCertStore bool
    Set to true to enable tidying up the certificate store
    TidyCmpv2NonceStore bool
    Set to true to enable tidying up the CMPv2 nonce store.
    TidyCrossClusterRevokedCerts bool
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    TidyExpiredIssuers bool
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    TidyMoveLegacyCaBundle bool
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    TidyRevocationQueue bool
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    TidyRevokedCertIssuerAssociations bool
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    TidyRevokedCerts bool
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    Backend string
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    Enabled bool
    Specifies whether automatic tidy is enabled or not.
    AcmeAccountSafetyBuffer string
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    IntervalDuration string
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    IssuerSafetyBuffer string
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    MaintainStoredCertificateCounts bool
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    MaxStartupBackoffDuration string
    The maximum amount of time auto-tidy will be delayed after startup.
    MinStartupBackoffDuration string
    The minimum amount of time auto-tidy will be delayed after startup.
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PauseDuration string
    The amount of time to wait between processing certificates.
    PublishStoredCertificateCountMetrics bool
    This configures whether the stored certificate count is published to the metrics consumer.
    RevocationQueueSafetyBuffer string
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    SafetyBuffer string
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    TidyAcme bool
    Set to true to enable tidying ACME accounts, orders and authorizations.
    TidyCertMetadata bool
    Set to true to enable tidying up certificate metadata.
    TidyCertStore bool
    Set to true to enable tidying up the certificate store
    TidyCmpv2NonceStore bool
    Set to true to enable tidying up the CMPv2 nonce store.
    TidyCrossClusterRevokedCerts bool
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    TidyExpiredIssuers bool
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    TidyMoveLegacyCaBundle bool
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    TidyRevocationQueue bool
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    TidyRevokedCertIssuerAssociations bool
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    TidyRevokedCerts bool
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    backend String
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled Boolean
    Specifies whether automatic tidy is enabled or not.
    acmeAccountSafetyBuffer String
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    intervalDuration String
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuerSafetyBuffer String
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintainStoredCertificateCounts Boolean
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    maxStartupBackoffDuration String
    The maximum amount of time auto-tidy will be delayed after startup.
    minStartupBackoffDuration String
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pauseDuration String
    The amount of time to wait between processing certificates.
    publishStoredCertificateCountMetrics Boolean
    This configures whether the stored certificate count is published to the metrics consumer.
    revocationQueueSafetyBuffer String
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safetyBuffer String
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidyAcme Boolean
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidyCertMetadata Boolean
    Set to true to enable tidying up certificate metadata.
    tidyCertStore Boolean
    Set to true to enable tidying up the certificate store
    tidyCmpv2NonceStore Boolean
    Set to true to enable tidying up the CMPv2 nonce store.
    tidyCrossClusterRevokedCerts Boolean
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidyExpiredIssuers Boolean
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidyMoveLegacyCaBundle Boolean
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidyRevocationQueue Boolean
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidyRevokedCertIssuerAssociations Boolean
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidyRevokedCerts Boolean
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    backend string
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled boolean
    Specifies whether automatic tidy is enabled or not.
    acmeAccountSafetyBuffer string
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    intervalDuration string
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuerSafetyBuffer string
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintainStoredCertificateCounts boolean
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    maxStartupBackoffDuration string
    The maximum amount of time auto-tidy will be delayed after startup.
    minStartupBackoffDuration string
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pauseDuration string
    The amount of time to wait between processing certificates.
    publishStoredCertificateCountMetrics boolean
    This configures whether the stored certificate count is published to the metrics consumer.
    revocationQueueSafetyBuffer string
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safetyBuffer string
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidyAcme boolean
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidyCertMetadata boolean
    Set to true to enable tidying up certificate metadata.
    tidyCertStore boolean
    Set to true to enable tidying up the certificate store
    tidyCmpv2NonceStore boolean
    Set to true to enable tidying up the CMPv2 nonce store.
    tidyCrossClusterRevokedCerts boolean
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidyExpiredIssuers boolean
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidyMoveLegacyCaBundle boolean
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidyRevocationQueue boolean
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidyRevokedCertIssuerAssociations boolean
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidyRevokedCerts boolean
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    backend str
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled bool
    Specifies whether automatic tidy is enabled or not.
    acme_account_safety_buffer str
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    interval_duration str
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuer_safety_buffer str
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintain_stored_certificate_counts bool
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    max_startup_backoff_duration str
    The maximum amount of time auto-tidy will be delayed after startup.
    min_startup_backoff_duration str
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace str
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pause_duration str
    The amount of time to wait between processing certificates.
    publish_stored_certificate_count_metrics bool
    This configures whether the stored certificate count is published to the metrics consumer.
    revocation_queue_safety_buffer str
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safety_buffer str
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidy_acme bool
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidy_cert_metadata bool
    Set to true to enable tidying up certificate metadata.
    tidy_cert_store bool
    Set to true to enable tidying up the certificate store
    tidy_cmpv2_nonce_store bool
    Set to true to enable tidying up the CMPv2 nonce store.
    tidy_cross_cluster_revoked_certs bool
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidy_expired_issuers bool
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidy_move_legacy_ca_bundle bool
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidy_revocation_queue bool
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidy_revoked_cert_issuer_associations bool
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidy_revoked_certs bool
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    backend String
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled Boolean
    Specifies whether automatic tidy is enabled or not.
    acmeAccountSafetyBuffer String
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    intervalDuration String
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuerSafetyBuffer String
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintainStoredCertificateCounts Boolean
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    maxStartupBackoffDuration String
    The maximum amount of time auto-tidy will be delayed after startup.
    minStartupBackoffDuration String
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pauseDuration String
    The amount of time to wait between processing certificates.
    publishStoredCertificateCountMetrics Boolean
    This configures whether the stored certificate count is published to the metrics consumer.
    revocationQueueSafetyBuffer String
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safetyBuffer String
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidyAcme Boolean
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidyCertMetadata Boolean
    Set to true to enable tidying up certificate metadata.
    tidyCertStore Boolean
    Set to true to enable tidying up the certificate store
    tidyCmpv2NonceStore Boolean
    Set to true to enable tidying up the CMPv2 nonce store.
    tidyCrossClusterRevokedCerts Boolean
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidyExpiredIssuers Boolean
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidyMoveLegacyCaBundle Boolean
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidyRevocationQueue Boolean
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidyRevokedCertIssuerAssociations Boolean
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidyRevokedCerts Boolean
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the BackendConfigAutoTidy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing BackendConfigAutoTidy Resource

    Get an existing BackendConfigAutoTidy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: BackendConfigAutoTidyState, opts?: CustomResourceOptions): BackendConfigAutoTidy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            acme_account_safety_buffer: Optional[str] = None,
            backend: Optional[str] = None,
            enabled: Optional[bool] = None,
            interval_duration: Optional[str] = None,
            issuer_safety_buffer: Optional[str] = None,
            maintain_stored_certificate_counts: Optional[bool] = None,
            max_startup_backoff_duration: Optional[str] = None,
            min_startup_backoff_duration: Optional[str] = None,
            namespace: Optional[str] = None,
            pause_duration: Optional[str] = None,
            publish_stored_certificate_count_metrics: Optional[bool] = None,
            revocation_queue_safety_buffer: Optional[str] = None,
            safety_buffer: Optional[str] = None,
            tidy_acme: Optional[bool] = None,
            tidy_cert_metadata: Optional[bool] = None,
            tidy_cert_store: Optional[bool] = None,
            tidy_cmpv2_nonce_store: Optional[bool] = None,
            tidy_cross_cluster_revoked_certs: Optional[bool] = None,
            tidy_expired_issuers: Optional[bool] = None,
            tidy_move_legacy_ca_bundle: Optional[bool] = None,
            tidy_revocation_queue: Optional[bool] = None,
            tidy_revoked_cert_issuer_associations: Optional[bool] = None,
            tidy_revoked_certs: Optional[bool] = None) -> BackendConfigAutoTidy
    func GetBackendConfigAutoTidy(ctx *Context, name string, id IDInput, state *BackendConfigAutoTidyState, opts ...ResourceOption) (*BackendConfigAutoTidy, error)
    public static BackendConfigAutoTidy Get(string name, Input<string> id, BackendConfigAutoTidyState? state, CustomResourceOptions? opts = null)
    public static BackendConfigAutoTidy get(String name, Output<String> id, BackendConfigAutoTidyState state, CustomResourceOptions options)
    resources:  _:    type: vault:pkiSecret:BackendConfigAutoTidy    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AcmeAccountSafetyBuffer string
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    Backend string
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    Enabled bool
    Specifies whether automatic tidy is enabled or not.
    IntervalDuration string
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    IssuerSafetyBuffer string
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    MaintainStoredCertificateCounts bool
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    MaxStartupBackoffDuration string
    The maximum amount of time auto-tidy will be delayed after startup.
    MinStartupBackoffDuration string
    The minimum amount of time auto-tidy will be delayed after startup.
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PauseDuration string
    The amount of time to wait between processing certificates.
    PublishStoredCertificateCountMetrics bool
    This configures whether the stored certificate count is published to the metrics consumer.
    RevocationQueueSafetyBuffer string
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    SafetyBuffer string
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    TidyAcme bool
    Set to true to enable tidying ACME accounts, orders and authorizations.
    TidyCertMetadata bool
    Set to true to enable tidying up certificate metadata.
    TidyCertStore bool
    Set to true to enable tidying up the certificate store
    TidyCmpv2NonceStore bool
    Set to true to enable tidying up the CMPv2 nonce store.
    TidyCrossClusterRevokedCerts bool
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    TidyExpiredIssuers bool
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    TidyMoveLegacyCaBundle bool
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    TidyRevocationQueue bool
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    TidyRevokedCertIssuerAssociations bool
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    TidyRevokedCerts bool
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    AcmeAccountSafetyBuffer string
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    Backend string
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    Enabled bool
    Specifies whether automatic tidy is enabled or not.
    IntervalDuration string
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    IssuerSafetyBuffer string
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    MaintainStoredCertificateCounts bool
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    MaxStartupBackoffDuration string
    The maximum amount of time auto-tidy will be delayed after startup.
    MinStartupBackoffDuration string
    The minimum amount of time auto-tidy will be delayed after startup.
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    PauseDuration string
    The amount of time to wait between processing certificates.
    PublishStoredCertificateCountMetrics bool
    This configures whether the stored certificate count is published to the metrics consumer.
    RevocationQueueSafetyBuffer string
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    SafetyBuffer string
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    TidyAcme bool
    Set to true to enable tidying ACME accounts, orders and authorizations.
    TidyCertMetadata bool
    Set to true to enable tidying up certificate metadata.
    TidyCertStore bool
    Set to true to enable tidying up the certificate store
    TidyCmpv2NonceStore bool
    Set to true to enable tidying up the CMPv2 nonce store.
    TidyCrossClusterRevokedCerts bool
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    TidyExpiredIssuers bool
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    TidyMoveLegacyCaBundle bool
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    TidyRevocationQueue bool
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    TidyRevokedCertIssuerAssociations bool
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    TidyRevokedCerts bool
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    acmeAccountSafetyBuffer String
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    backend String
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled Boolean
    Specifies whether automatic tidy is enabled or not.
    intervalDuration String
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuerSafetyBuffer String
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintainStoredCertificateCounts Boolean
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    maxStartupBackoffDuration String
    The maximum amount of time auto-tidy will be delayed after startup.
    minStartupBackoffDuration String
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pauseDuration String
    The amount of time to wait between processing certificates.
    publishStoredCertificateCountMetrics Boolean
    This configures whether the stored certificate count is published to the metrics consumer.
    revocationQueueSafetyBuffer String
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safetyBuffer String
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidyAcme Boolean
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidyCertMetadata Boolean
    Set to true to enable tidying up certificate metadata.
    tidyCertStore Boolean
    Set to true to enable tidying up the certificate store
    tidyCmpv2NonceStore Boolean
    Set to true to enable tidying up the CMPv2 nonce store.
    tidyCrossClusterRevokedCerts Boolean
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidyExpiredIssuers Boolean
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidyMoveLegacyCaBundle Boolean
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidyRevocationQueue Boolean
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidyRevokedCertIssuerAssociations Boolean
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidyRevokedCerts Boolean
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    acmeAccountSafetyBuffer string
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    backend string
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled boolean
    Specifies whether automatic tidy is enabled or not.
    intervalDuration string
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuerSafetyBuffer string
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintainStoredCertificateCounts boolean
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    maxStartupBackoffDuration string
    The maximum amount of time auto-tidy will be delayed after startup.
    minStartupBackoffDuration string
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pauseDuration string
    The amount of time to wait between processing certificates.
    publishStoredCertificateCountMetrics boolean
    This configures whether the stored certificate count is published to the metrics consumer.
    revocationQueueSafetyBuffer string
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safetyBuffer string
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidyAcme boolean
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidyCertMetadata boolean
    Set to true to enable tidying up certificate metadata.
    tidyCertStore boolean
    Set to true to enable tidying up the certificate store
    tidyCmpv2NonceStore boolean
    Set to true to enable tidying up the CMPv2 nonce store.
    tidyCrossClusterRevokedCerts boolean
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidyExpiredIssuers boolean
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidyMoveLegacyCaBundle boolean
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidyRevocationQueue boolean
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidyRevokedCertIssuerAssociations boolean
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidyRevokedCerts boolean
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    acme_account_safety_buffer str
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    backend str
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled bool
    Specifies whether automatic tidy is enabled or not.
    interval_duration str
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuer_safety_buffer str
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintain_stored_certificate_counts bool
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    max_startup_backoff_duration str
    The maximum amount of time auto-tidy will be delayed after startup.
    min_startup_backoff_duration str
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace str
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pause_duration str
    The amount of time to wait between processing certificates.
    publish_stored_certificate_count_metrics bool
    This configures whether the stored certificate count is published to the metrics consumer.
    revocation_queue_safety_buffer str
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safety_buffer str
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidy_acme bool
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidy_cert_metadata bool
    Set to true to enable tidying up certificate metadata.
    tidy_cert_store bool
    Set to true to enable tidying up the certificate store
    tidy_cmpv2_nonce_store bool
    Set to true to enable tidying up the CMPv2 nonce store.
    tidy_cross_cluster_revoked_certs bool
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidy_expired_issuers bool
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidy_move_legacy_ca_bundle bool
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidy_revocation_queue bool
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidy_revoked_cert_issuer_associations bool
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidy_revoked_certs bool
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.
    acmeAccountSafetyBuffer String
    The amount of time that must pass after creation that an account with no orders is marked revoked, and the amount of time after being marked revoked or deactivated.
    backend String
    The path to the PKI secret backend to read the configuration from, with no leading or trailing /s.
    enabled Boolean
    Specifies whether automatic tidy is enabled or not.
    intervalDuration String
    Interval at which to run an auto-tidy operation. This is the time between tidy invocations (after one finishes to the start of the next).
    issuerSafetyBuffer String
    The amount of extra time that must have passed beyond issuer's expiration before it is removed from the backend storage.
    maintainStoredCertificateCounts Boolean
    This configures whether stored certificate are counted upon initialization of the backend, and whether during normal operation, a running count of certificates stored is maintained.
    maxStartupBackoffDuration String
    The maximum amount of time auto-tidy will be delayed after startup.
    minStartupBackoffDuration String
    The minimum amount of time auto-tidy will be delayed after startup.
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    pauseDuration String
    The amount of time to wait between processing certificates.
    publishStoredCertificateCountMetrics Boolean
    This configures whether the stored certificate count is published to the metrics consumer.
    revocationQueueSafetyBuffer String
    The amount of time that must pass from the cross-cluster revocation request being initiated to when it will be slated for removal.
    safetyBuffer String
    The amount of extra time that must have passed beyond certificate expiration before it is removed from the backend storage and/or revocation list.
    tidyAcme Boolean
    Set to true to enable tidying ACME accounts, orders and authorizations.
    tidyCertMetadata Boolean
    Set to true to enable tidying up certificate metadata.
    tidyCertStore Boolean
    Set to true to enable tidying up the certificate store
    tidyCmpv2NonceStore Boolean
    Set to true to enable tidying up the CMPv2 nonce store.
    tidyCrossClusterRevokedCerts Boolean
    Set to true to enable tidying up the cross-cluster revoked certificate store.
    tidyExpiredIssuers Boolean
    Set to true to automatically remove expired issuers past the issuer_safety_buffer. No keys will be removed as part of this operation.
    tidyMoveLegacyCaBundle Boolean
    Set to true to move the legacy ca_bundle from /config/ca_bundle to /config/ca_bundle.bak.
    tidyRevocationQueue Boolean
    Set to true to remove stale revocation queue entries that haven't been confirmed by any active cluster.
    tidyRevokedCertIssuerAssociations Boolean
    Set to true to validate issuer associations on revocation entries. This helps increase the performance of CRL building and OCSP responses.
    tidyRevokedCerts Boolean
    Set to true to remove all invalid and expired certificates from storage. A revoked storage entry is considered invalid if the entry is empty, or the value within the entry is empty. If a certificate is removed due to expiry, the entry will also be removed from the CRL, and the CRL will be rotated.

    Package Details

    Repository
    Vault pulumi/pulumi-vault
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the vault Terraform Provider.
    vault logo
    HashiCorp Vault v6.6.0 published on Thursday, Mar 13, 2025 by Pulumi