pulumi-azure 6.27.0a1758695020__py3-none-any.whl → 6.27.0a1759511969__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-azure might be problematic. Click here for more details.

Files changed (169) hide show
  1. pulumi_azure/__init__.py +32 -0
  2. pulumi_azure/apimanagement/backend.py +2 -2
  3. pulumi_azure/appservice/_inputs.py +78 -6
  4. pulumi_azure/appservice/app_flex_consumption.py +61 -0
  5. pulumi_azure/appservice/outputs.py +52 -4
  6. pulumi_azure/appservice/service_plan.py +14 -14
  7. pulumi_azure/billing/account_cost_management_export.py +2 -2
  8. pulumi_azure/cdn/_inputs.py +57 -95
  9. pulumi_azure/cdn/frontdoor_firewall_policy.py +34 -107
  10. pulumi_azure/cdn/frontdoor_profile.py +87 -2
  11. pulumi_azure/cdn/frontdoor_security_policy.py +7 -7
  12. pulumi_azure/cdn/get_frontdoor_firewall_policy.py +15 -1
  13. pulumi_azure/cdn/get_frontdoor_profile.py +25 -11
  14. pulumi_azure/cdn/outputs.py +79 -21
  15. pulumi_azure/cognitive/account.py +7 -7
  16. pulumi_azure/compute/__init__.py +1 -0
  17. pulumi_azure/compute/_inputs.py +79 -47
  18. pulumi_azure/compute/get_managed_disks.py +140 -0
  19. pulumi_azure/compute/linux_virtual_machine.py +97 -23
  20. pulumi_azure/compute/outputs.py +362 -34
  21. pulumi_azure/compute/windows_virtual_machine.py +172 -42
  22. pulumi_azure/containerservice/_inputs.py +209 -17
  23. pulumi_azure/containerservice/cluster_trusted_access_role_binding.py +2 -2
  24. pulumi_azure/containerservice/get_cluster_node_pool.py +14 -3
  25. pulumi_azure/containerservice/get_kubernetes_cluster.py +2 -2
  26. pulumi_azure/containerservice/get_kubernetes_node_pool_snapshot.py +2 -2
  27. pulumi_azure/containerservice/kubernetes_cluster.py +49 -2
  28. pulumi_azure/containerservice/kubernetes_cluster_node_pool.py +49 -2
  29. pulumi_azure/containerservice/outputs.py +173 -11
  30. pulumi_azure/core/_inputs.py +0 -54
  31. pulumi_azure/core/outputs.py +0 -36
  32. pulumi_azure/core/resource_group_cost_management_export.py +2 -2
  33. pulumi_azure/core/resource_group_policy_assignment.py +7 -7
  34. pulumi_azure/core/resource_policy_assignment.py +7 -7
  35. pulumi_azure/core/subscription_cost_management_export.py +2 -2
  36. pulumi_azure/core/subscription_policy_assignment.py +7 -7
  37. pulumi_azure/datafactory/__init__.py +1 -0
  38. pulumi_azure/datafactory/customer_managed_key.py +439 -0
  39. pulumi_azure/datafactory/factory.py +2 -2
  40. pulumi_azure/dataprotection/_inputs.py +36 -6
  41. pulumi_azure/dataprotection/backup_policy_blob_storage.py +76 -2
  42. pulumi_azure/dataprotection/outputs.py +24 -4
  43. pulumi_azure/devcenter/get_project_pool.py +15 -1
  44. pulumi_azure/devcenter/project_pool.py +47 -0
  45. pulumi_azure/eventgrid/domain.py +2 -2
  46. pulumi_azure/eventgrid/domain_topic.py +2 -2
  47. pulumi_azure/eventgrid/event_subscription.py +2 -2
  48. pulumi_azure/eventgrid/get_domain.py +2 -2
  49. pulumi_azure/eventgrid/get_domain_topic.py +2 -2
  50. pulumi_azure/eventgrid/get_partner_namespace.py +2 -2
  51. pulumi_azure/eventgrid/get_partner_registration.py +2 -2
  52. pulumi_azure/eventgrid/get_system_topic.py +28 -6
  53. pulumi_azure/eventgrid/get_topic.py +2 -2
  54. pulumi_azure/eventgrid/partner_configuration.py +2 -2
  55. pulumi_azure/eventgrid/partner_namespace.py +2 -2
  56. pulumi_azure/eventgrid/partner_registration.py +2 -2
  57. pulumi_azure/eventgrid/system_topic.py +97 -35
  58. pulumi_azure/eventgrid/system_topic_event_subscription.py +4 -4
  59. pulumi_azure/eventgrid/topic.py +2 -2
  60. pulumi_azure/eventhub/domain.py +2 -2
  61. pulumi_azure/eventhub/event_grid_topic.py +2 -2
  62. pulumi_azure/eventhub/event_subscription.py +2 -2
  63. pulumi_azure/hpc/cache_blob_target.py +2 -2
  64. pulumi_azure/iot/_inputs.py +27 -1
  65. pulumi_azure/iot/endpoint_cosmosdb_account.py +64 -3
  66. pulumi_azure/iot/endpoint_eventhub.py +64 -3
  67. pulumi_azure/iot/endpoint_servicebus_queue.py +64 -3
  68. pulumi_azure/iot/endpoint_servicebus_topic.py +64 -3
  69. pulumi_azure/iot/endpoint_storage_container.py +64 -3
  70. pulumi_azure/iot/outputs.py +19 -1
  71. pulumi_azure/keyvault/_inputs.py +3 -17
  72. pulumi_azure/keyvault/get_key_vault.py +13 -1
  73. pulumi_azure/keyvault/key_vault.py +78 -35
  74. pulumi_azure/keyvault/outputs.py +2 -10
  75. pulumi_azure/kusto/_inputs.py +16 -6
  76. pulumi_azure/kusto/cluster.py +95 -66
  77. pulumi_azure/kusto/outputs.py +10 -4
  78. pulumi_azure/lb/get_lb_outbound_rule.py +12 -1
  79. pulumi_azure/lb/get_lb_rule.py +28 -4
  80. pulumi_azure/lb/load_balancer.py +94 -0
  81. pulumi_azure/lb/nat_rule.py +115 -29
  82. pulumi_azure/lb/outbound_rule.py +60 -17
  83. pulumi_azure/lb/rule.py +116 -30
  84. pulumi_azure/loadtest/_inputs.py +6 -3
  85. pulumi_azure/loadtest/load_test.py +0 -4
  86. pulumi_azure/loadtest/outputs.py +4 -2
  87. pulumi_azure/logicapps/_inputs.py +46 -987
  88. pulumi_azure/logicapps/get_standard.py +0 -7
  89. pulumi_azure/logicapps/outputs.py +117 -101
  90. pulumi_azure/logicapps/standard.py +7 -7
  91. pulumi_azure/machinelearning/_inputs.py +24 -4
  92. pulumi_azure/machinelearning/compute_instance.py +35 -7
  93. pulumi_azure/machinelearning/datastore_blobstorage.py +2 -2
  94. pulumi_azure/machinelearning/datastore_datalake_gen2.py +2 -2
  95. pulumi_azure/machinelearning/inference_cluster.py +2 -2
  96. pulumi_azure/machinelearning/outputs.py +17 -3
  97. pulumi_azure/machinelearning/workspace.py +61 -0
  98. pulumi_azure/management/_inputs.py +0 -18
  99. pulumi_azure/management/group_policy_assignment.py +7 -7
  100. pulumi_azure/management/outputs.py +0 -12
  101. pulumi_azure/management/private_link_association.py +0 -70
  102. pulumi_azure/mobile/_inputs.py +14 -6
  103. pulumi_azure/mobile/network_sim.py +2 -6
  104. pulumi_azure/mobile/network_sim_policy.py +2 -6
  105. pulumi_azure/mobile/network_slice.py +116 -31
  106. pulumi_azure/mobile/outputs.py +6 -4
  107. pulumi_azure/monitoring/_inputs.py +15 -9
  108. pulumi_azure/monitoring/activity_log_alert.py +7 -7
  109. pulumi_azure/monitoring/outputs.py +10 -6
  110. pulumi_azure/mssql/job_step.py +11 -11
  111. pulumi_azure/mysql/_inputs.py +20 -0
  112. pulumi_azure/mysql/outputs.py +14 -0
  113. pulumi_azure/netapp/_inputs.py +18 -6
  114. pulumi_azure/netapp/account.py +2 -2
  115. pulumi_azure/netapp/account_encryption.py +132 -4
  116. pulumi_azure/netapp/backup_policy.py +2 -2
  117. pulumi_azure/netapp/backup_vault.py +2 -2
  118. pulumi_azure/netapp/get_account.py +2 -2
  119. pulumi_azure/netapp/get_account_encryption.py +25 -3
  120. pulumi_azure/netapp/get_backup_policy.py +2 -2
  121. pulumi_azure/netapp/get_backup_vault.py +2 -2
  122. pulumi_azure/netapp/get_pool.py +17 -3
  123. pulumi_azure/netapp/get_snapshot.py +2 -2
  124. pulumi_azure/netapp/get_snapshot_policy.py +2 -2
  125. pulumi_azure/netapp/get_volume.py +17 -3
  126. pulumi_azure/netapp/get_volume_group_oracle.py +2 -2
  127. pulumi_azure/netapp/get_volume_group_sap_hana.py +2 -2
  128. pulumi_azure/netapp/get_volume_quota_rule.py +2 -2
  129. pulumi_azure/netapp/outputs.py +12 -4
  130. pulumi_azure/netapp/pool.py +104 -9
  131. pulumi_azure/netapp/snapshot.py +2 -2
  132. pulumi_azure/netapp/snapshot_policy.py +2 -2
  133. pulumi_azure/netapp/volume.py +82 -7
  134. pulumi_azure/netapp/volume_group_oracle.py +2 -2
  135. pulumi_azure/netapp/volume_group_sap_hana.py +2 -2
  136. pulumi_azure/netapp/volume_quota_rule.py +2 -2
  137. pulumi_azure/network/__init__.py +2 -0
  138. pulumi_azure/network/network_manager_ipam_pool_static_cidr.py +415 -0
  139. pulumi_azure/network/network_manager_routing_configuration.py +7 -7
  140. pulumi_azure/network/network_manager_routing_rule_collection.py +429 -0
  141. pulumi_azure/network/subnet.py +76 -1
  142. pulumi_azure/oracle/__init__.py +3 -0
  143. pulumi_azure/oracle/autonomous_database_backup.py +310 -0
  144. pulumi_azure/oracle/get_autonomous_database_backup.py +347 -0
  145. pulumi_azure/oracle/get_autonomous_database_backups.py +138 -0
  146. pulumi_azure/oracle/outputs.py +191 -0
  147. pulumi_azure/paloalto/next_generation_firewall_virtual_hub_local_rulestack.py +2 -2
  148. pulumi_azure/paloalto/next_generation_firewall_virtual_hub_panorama.py +2 -2
  149. pulumi_azure/paloalto/next_generation_firewall_virtual_network_local_rulestack.py +2 -2
  150. pulumi_azure/paloalto/next_generation_firewall_virtual_network_panorama.py +2 -2
  151. pulumi_azure/policy/_inputs.py +6 -0
  152. pulumi_azure/policy/outputs.py +4 -0
  153. pulumi_azure/postgresql/flexible_server.py +7 -7
  154. pulumi_azure/postgresql/flexible_server_firewall_rule.py +14 -14
  155. pulumi_azure/pulumi-plugin.json +1 -1
  156. pulumi_azure/search/service.py +7 -7
  157. pulumi_azure/sentinel/_inputs.py +144 -0
  158. pulumi_azure/sentinel/authomation_rule.py +47 -0
  159. pulumi_azure/sentinel/automation_rule.py +47 -0
  160. pulumi_azure/sentinel/outputs.py +84 -0
  161. pulumi_azure/storage/_inputs.py +3 -3
  162. pulumi_azure/storage/container_immutability_policy.py +2 -2
  163. pulumi_azure/storage/get_queue.py +59 -8
  164. pulumi_azure/storage/outputs.py +2 -2
  165. pulumi_azure/storage/queue.py +159 -27
  166. {pulumi_azure-6.27.0a1758695020.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/METADATA +1 -1
  167. {pulumi_azure-6.27.0a1758695020.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/RECORD +169 -162
  168. {pulumi_azure-6.27.0a1758695020.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/WHEEL +0 -0
  169. {pulumi_azure-6.27.0a1758695020.dist-info → pulumi_azure-6.27.0a1759511969.dist-info}/top_level.txt +0 -0
@@ -29,6 +29,7 @@ class KubernetesClusterArgs:
29
29
  automatic_upgrade_channel: Optional[pulumi.Input[_builtins.str]] = None,
30
30
  azure_active_directory_role_based_access_control: Optional[pulumi.Input['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs']] = None,
31
31
  azure_policy_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ bootstrap_profile: Optional[pulumi.Input['KubernetesClusterBootstrapProfileArgs']] = None,
32
33
  confidential_computing: Optional[pulumi.Input['KubernetesClusterConfidentialComputingArgs']] = None,
33
34
  cost_analysis_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
34
35
  custom_ca_trust_certificates_base64s: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -91,6 +92,7 @@ class KubernetesClusterArgs:
91
92
  > **Note:** Cluster Auto-Upgrade only updates to GA versions of Kubernetes and will not update to Preview versions.
92
93
  :param pulumi.Input['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs'] azure_active_directory_role_based_access_control: A `azure_active_directory_role_based_access_control` block as defined below.
93
94
  :param pulumi.Input[_builtins.bool] azure_policy_enabled: Should the Azure Policy Add-On be enabled? For more details please visit [Understand Azure Policy for Azure Kubernetes Service](https://docs.microsoft.com/en-ie/azure/governance/policy/concepts/rego-for-aks)
95
+ :param pulumi.Input['KubernetesClusterBootstrapProfileArgs'] bootstrap_profile: A `bootstrap_profile` block as defined below.
94
96
  :param pulumi.Input['KubernetesClusterConfidentialComputingArgs'] confidential_computing: A `confidential_computing` block as defined below. For more details please [the documentation](https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-overview)
95
97
  :param pulumi.Input[_builtins.bool] cost_analysis_enabled: Should cost analysis be enabled for this Kubernetes Cluster? Defaults to `false`. The `sku_tier` must be set to `Standard` or `Premium` to enable this feature. Enabling this will add Kubernetes Namespace and Deployment details to the Cost Analysis views in the Azure portal.
96
98
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] custom_ca_trust_certificates_base64s: A list of up to 10 base64 encoded CA certificates that will be added to the trust store on nodes.
@@ -214,6 +216,8 @@ class KubernetesClusterArgs:
214
216
  pulumi.set(__self__, "azure_active_directory_role_based_access_control", azure_active_directory_role_based_access_control)
215
217
  if azure_policy_enabled is not None:
216
218
  pulumi.set(__self__, "azure_policy_enabled", azure_policy_enabled)
219
+ if bootstrap_profile is not None:
220
+ pulumi.set(__self__, "bootstrap_profile", bootstrap_profile)
217
221
  if confidential_computing is not None:
218
222
  pulumi.set(__self__, "confidential_computing", confidential_computing)
219
223
  if cost_analysis_enabled is not None:
@@ -411,6 +415,18 @@ class KubernetesClusterArgs:
411
415
  def azure_policy_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
412
416
  pulumi.set(self, "azure_policy_enabled", value)
413
417
 
418
+ @_builtins.property
419
+ @pulumi.getter(name="bootstrapProfile")
420
+ def bootstrap_profile(self) -> Optional[pulumi.Input['KubernetesClusterBootstrapProfileArgs']]:
421
+ """
422
+ A `bootstrap_profile` block as defined below.
423
+ """
424
+ return pulumi.get(self, "bootstrap_profile")
425
+
426
+ @bootstrap_profile.setter
427
+ def bootstrap_profile(self, value: Optional[pulumi.Input['KubernetesClusterBootstrapProfileArgs']]):
428
+ pulumi.set(self, "bootstrap_profile", value)
429
+
414
430
  @_builtins.property
415
431
  @pulumi.getter(name="confidentialComputing")
416
432
  def confidential_computing(self) -> Optional[pulumi.Input['KubernetesClusterConfidentialComputingArgs']]:
@@ -1057,6 +1073,7 @@ class _KubernetesClusterState:
1057
1073
  automatic_upgrade_channel: Optional[pulumi.Input[_builtins.str]] = None,
1058
1074
  azure_active_directory_role_based_access_control: Optional[pulumi.Input['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs']] = None,
1059
1075
  azure_policy_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1076
+ bootstrap_profile: Optional[pulumi.Input['KubernetesClusterBootstrapProfileArgs']] = None,
1060
1077
  confidential_computing: Optional[pulumi.Input['KubernetesClusterConfidentialComputingArgs']] = None,
1061
1078
  cost_analysis_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1062
1079
  current_kubernetes_version: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1130,6 +1147,7 @@ class _KubernetesClusterState:
1130
1147
  > **Note:** Cluster Auto-Upgrade only updates to GA versions of Kubernetes and will not update to Preview versions.
1131
1148
  :param pulumi.Input['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs'] azure_active_directory_role_based_access_control: A `azure_active_directory_role_based_access_control` block as defined below.
1132
1149
  :param pulumi.Input[_builtins.bool] azure_policy_enabled: Should the Azure Policy Add-On be enabled? For more details please visit [Understand Azure Policy for Azure Kubernetes Service](https://docs.microsoft.com/en-ie/azure/governance/policy/concepts/rego-for-aks)
1150
+ :param pulumi.Input['KubernetesClusterBootstrapProfileArgs'] bootstrap_profile: A `bootstrap_profile` block as defined below.
1133
1151
  :param pulumi.Input['KubernetesClusterConfidentialComputingArgs'] confidential_computing: A `confidential_computing` block as defined below. For more details please [the documentation](https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-overview)
1134
1152
  :param pulumi.Input[_builtins.bool] cost_analysis_enabled: Should cost analysis be enabled for this Kubernetes Cluster? Defaults to `false`. The `sku_tier` must be set to `Standard` or `Premium` to enable this feature. Enabling this will add Kubernetes Namespace and Deployment details to the Cost Analysis views in the Azure portal.
1135
1153
  :param pulumi.Input[_builtins.str] current_kubernetes_version: The current version running on the Azure Kubernetes Managed Cluster.
@@ -1264,6 +1282,8 @@ class _KubernetesClusterState:
1264
1282
  pulumi.set(__self__, "azure_active_directory_role_based_access_control", azure_active_directory_role_based_access_control)
1265
1283
  if azure_policy_enabled is not None:
1266
1284
  pulumi.set(__self__, "azure_policy_enabled", azure_policy_enabled)
1285
+ if bootstrap_profile is not None:
1286
+ pulumi.set(__self__, "bootstrap_profile", bootstrap_profile)
1267
1287
  if confidential_computing is not None:
1268
1288
  pulumi.set(__self__, "confidential_computing", confidential_computing)
1269
1289
  if cost_analysis_enabled is not None:
@@ -1463,6 +1483,18 @@ class _KubernetesClusterState:
1463
1483
  def azure_policy_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
1464
1484
  pulumi.set(self, "azure_policy_enabled", value)
1465
1485
 
1486
+ @_builtins.property
1487
+ @pulumi.getter(name="bootstrapProfile")
1488
+ def bootstrap_profile(self) -> Optional[pulumi.Input['KubernetesClusterBootstrapProfileArgs']]:
1489
+ """
1490
+ A `bootstrap_profile` block as defined below.
1491
+ """
1492
+ return pulumi.get(self, "bootstrap_profile")
1493
+
1494
+ @bootstrap_profile.setter
1495
+ def bootstrap_profile(self, value: Optional[pulumi.Input['KubernetesClusterBootstrapProfileArgs']]):
1496
+ pulumi.set(self, "bootstrap_profile", value)
1497
+
1466
1498
  @_builtins.property
1467
1499
  @pulumi.getter(name="confidentialComputing")
1468
1500
  def confidential_computing(self) -> Optional[pulumi.Input['KubernetesClusterConfidentialComputingArgs']]:
@@ -2268,6 +2300,7 @@ class KubernetesCluster(pulumi.CustomResource):
2268
2300
  automatic_upgrade_channel: Optional[pulumi.Input[_builtins.str]] = None,
2269
2301
  azure_active_directory_role_based_access_control: Optional[pulumi.Input[Union['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs', 'KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgsDict']]] = None,
2270
2302
  azure_policy_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
2303
+ bootstrap_profile: Optional[pulumi.Input[Union['KubernetesClusterBootstrapProfileArgs', 'KubernetesClusterBootstrapProfileArgsDict']]] = None,
2271
2304
  confidential_computing: Optional[pulumi.Input[Union['KubernetesClusterConfidentialComputingArgs', 'KubernetesClusterConfidentialComputingArgsDict']]] = None,
2272
2305
  cost_analysis_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
2273
2306
  custom_ca_trust_certificates_base64s: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -2360,7 +2393,7 @@ class KubernetesCluster(pulumi.CustomResource):
2360
2393
  <!-- This section is generated, changes will be overwritten -->
2361
2394
  This resource uses the following Azure API Providers:
2362
2395
 
2363
- * `Microsoft.ContainerService` - 2025-02-01
2396
+ * `Microsoft.ContainerService` - 2025-05-01
2364
2397
 
2365
2398
  ## Import
2366
2399
 
@@ -2382,6 +2415,7 @@ class KubernetesCluster(pulumi.CustomResource):
2382
2415
  > **Note:** Cluster Auto-Upgrade only updates to GA versions of Kubernetes and will not update to Preview versions.
2383
2416
  :param pulumi.Input[Union['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs', 'KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgsDict']] azure_active_directory_role_based_access_control: A `azure_active_directory_role_based_access_control` block as defined below.
2384
2417
  :param pulumi.Input[_builtins.bool] azure_policy_enabled: Should the Azure Policy Add-On be enabled? For more details please visit [Understand Azure Policy for Azure Kubernetes Service](https://docs.microsoft.com/en-ie/azure/governance/policy/concepts/rego-for-aks)
2418
+ :param pulumi.Input[Union['KubernetesClusterBootstrapProfileArgs', 'KubernetesClusterBootstrapProfileArgsDict']] bootstrap_profile: A `bootstrap_profile` block as defined below.
2385
2419
  :param pulumi.Input[Union['KubernetesClusterConfidentialComputingArgs', 'KubernetesClusterConfidentialComputingArgsDict']] confidential_computing: A `confidential_computing` block as defined below. For more details please [the documentation](https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-overview)
2386
2420
  :param pulumi.Input[_builtins.bool] cost_analysis_enabled: Should cost analysis be enabled for this Kubernetes Cluster? Defaults to `false`. The `sku_tier` must be set to `Standard` or `Premium` to enable this feature. Enabling this will add Kubernetes Namespace and Deployment details to the Cost Analysis views in the Azure portal.
2387
2421
  :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] custom_ca_trust_certificates_base64s: A list of up to 10 base64 encoded CA certificates that will be added to the trust store on nodes.
@@ -2540,7 +2574,7 @@ class KubernetesCluster(pulumi.CustomResource):
2540
2574
  <!-- This section is generated, changes will be overwritten -->
2541
2575
  This resource uses the following Azure API Providers:
2542
2576
 
2543
- * `Microsoft.ContainerService` - 2025-02-01
2577
+ * `Microsoft.ContainerService` - 2025-05-01
2544
2578
 
2545
2579
  ## Import
2546
2580
 
@@ -2571,6 +2605,7 @@ class KubernetesCluster(pulumi.CustomResource):
2571
2605
  automatic_upgrade_channel: Optional[pulumi.Input[_builtins.str]] = None,
2572
2606
  azure_active_directory_role_based_access_control: Optional[pulumi.Input[Union['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs', 'KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgsDict']]] = None,
2573
2607
  azure_policy_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
2608
+ bootstrap_profile: Optional[pulumi.Input[Union['KubernetesClusterBootstrapProfileArgs', 'KubernetesClusterBootstrapProfileArgsDict']]] = None,
2574
2609
  confidential_computing: Optional[pulumi.Input[Union['KubernetesClusterConfidentialComputingArgs', 'KubernetesClusterConfidentialComputingArgsDict']]] = None,
2575
2610
  cost_analysis_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
2576
2611
  custom_ca_trust_certificates_base64s: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
@@ -2636,6 +2671,7 @@ class KubernetesCluster(pulumi.CustomResource):
2636
2671
  __props__.__dict__["automatic_upgrade_channel"] = automatic_upgrade_channel
2637
2672
  __props__.__dict__["azure_active_directory_role_based_access_control"] = azure_active_directory_role_based_access_control
2638
2673
  __props__.__dict__["azure_policy_enabled"] = azure_policy_enabled
2674
+ __props__.__dict__["bootstrap_profile"] = bootstrap_profile
2639
2675
  __props__.__dict__["confidential_computing"] = confidential_computing
2640
2676
  __props__.__dict__["cost_analysis_enabled"] = cost_analysis_enabled
2641
2677
  __props__.__dict__["custom_ca_trust_certificates_base64s"] = custom_ca_trust_certificates_base64s
@@ -2719,6 +2755,7 @@ class KubernetesCluster(pulumi.CustomResource):
2719
2755
  automatic_upgrade_channel: Optional[pulumi.Input[_builtins.str]] = None,
2720
2756
  azure_active_directory_role_based_access_control: Optional[pulumi.Input[Union['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs', 'KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgsDict']]] = None,
2721
2757
  azure_policy_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
2758
+ bootstrap_profile: Optional[pulumi.Input[Union['KubernetesClusterBootstrapProfileArgs', 'KubernetesClusterBootstrapProfileArgsDict']]] = None,
2722
2759
  confidential_computing: Optional[pulumi.Input[Union['KubernetesClusterConfidentialComputingArgs', 'KubernetesClusterConfidentialComputingArgsDict']]] = None,
2723
2760
  cost_analysis_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
2724
2761
  current_kubernetes_version: Optional[pulumi.Input[_builtins.str]] = None,
@@ -2797,6 +2834,7 @@ class KubernetesCluster(pulumi.CustomResource):
2797
2834
  > **Note:** Cluster Auto-Upgrade only updates to GA versions of Kubernetes and will not update to Preview versions.
2798
2835
  :param pulumi.Input[Union['KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgs', 'KubernetesClusterAzureActiveDirectoryRoleBasedAccessControlArgsDict']] azure_active_directory_role_based_access_control: A `azure_active_directory_role_based_access_control` block as defined below.
2799
2836
  :param pulumi.Input[_builtins.bool] azure_policy_enabled: Should the Azure Policy Add-On be enabled? For more details please visit [Understand Azure Policy for Azure Kubernetes Service](https://docs.microsoft.com/en-ie/azure/governance/policy/concepts/rego-for-aks)
2837
+ :param pulumi.Input[Union['KubernetesClusterBootstrapProfileArgs', 'KubernetesClusterBootstrapProfileArgsDict']] bootstrap_profile: A `bootstrap_profile` block as defined below.
2800
2838
  :param pulumi.Input[Union['KubernetesClusterConfidentialComputingArgs', 'KubernetesClusterConfidentialComputingArgsDict']] confidential_computing: A `confidential_computing` block as defined below. For more details please [the documentation](https://learn.microsoft.com/en-us/azure/confidential-computing/confidential-nodes-aks-overview)
2801
2839
  :param pulumi.Input[_builtins.bool] cost_analysis_enabled: Should cost analysis be enabled for this Kubernetes Cluster? Defaults to `false`. The `sku_tier` must be set to `Standard` or `Premium` to enable this feature. Enabling this will add Kubernetes Namespace and Deployment details to the Cost Analysis views in the Azure portal.
2802
2840
  :param pulumi.Input[_builtins.str] current_kubernetes_version: The current version running on the Azure Kubernetes Managed Cluster.
@@ -2929,6 +2967,7 @@ class KubernetesCluster(pulumi.CustomResource):
2929
2967
  __props__.__dict__["automatic_upgrade_channel"] = automatic_upgrade_channel
2930
2968
  __props__.__dict__["azure_active_directory_role_based_access_control"] = azure_active_directory_role_based_access_control
2931
2969
  __props__.__dict__["azure_policy_enabled"] = azure_policy_enabled
2970
+ __props__.__dict__["bootstrap_profile"] = bootstrap_profile
2932
2971
  __props__.__dict__["confidential_computing"] = confidential_computing
2933
2972
  __props__.__dict__["cost_analysis_enabled"] = cost_analysis_enabled
2934
2973
  __props__.__dict__["current_kubernetes_version"] = current_kubernetes_version
@@ -3044,6 +3083,14 @@ class KubernetesCluster(pulumi.CustomResource):
3044
3083
  """
3045
3084
  return pulumi.get(self, "azure_policy_enabled")
3046
3085
 
3086
+ @_builtins.property
3087
+ @pulumi.getter(name="bootstrapProfile")
3088
+ def bootstrap_profile(self) -> pulumi.Output['outputs.KubernetesClusterBootstrapProfile']:
3089
+ """
3090
+ A `bootstrap_profile` block as defined below.
3091
+ """
3092
+ return pulumi.get(self, "bootstrap_profile")
3093
+
3047
3094
  @_builtins.property
3048
3095
  @pulumi.getter(name="confidentialComputing")
3049
3096
  def confidential_computing(self) -> pulumi.Output[Optional['outputs.KubernetesClusterConfidentialComputing']]:
@@ -26,6 +26,7 @@ class KubernetesClusterNodePoolArgs:
26
26
  capacity_reservation_group_id: Optional[pulumi.Input[_builtins.str]] = None,
27
27
  eviction_policy: Optional[pulumi.Input[_builtins.str]] = None,
28
28
  fips_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
29
+ gpu_driver: Optional[pulumi.Input[_builtins.str]] = None,
29
30
  gpu_instance: Optional[pulumi.Input[_builtins.str]] = None,
30
31
  host_encryption_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
31
32
  host_group_id: Optional[pulumi.Input[_builtins.str]] = None,
@@ -76,6 +77,7 @@ class KubernetesClusterNodePoolArgs:
76
77
  :param pulumi.Input[_builtins.bool] fips_enabled: Should the nodes in this Node Pool have Federal Information Processing Standard enabled? Changing this property requires specifying `temporary_name_for_rotation`.
77
78
 
78
79
  > **Note:** FIPS support is in Public Preview - more information and details on how to opt into the Preview can be found in [this article](https://docs.microsoft.com/azure/aks/use-multiple-node-pools#add-a-fips-enabled-node-pool-preview).
80
+ :param pulumi.Input[_builtins.str] gpu_driver: Specifies whether to install the GPU Driver for the nodes. Possible values are `Install` and `None`. Changing this forces a new resource to be created.
79
81
  :param pulumi.Input[_builtins.str] gpu_instance: Specifies the GPU MIG instance profile for supported GPU VM SKU. The allowed values are `MIG1g`, `MIG2g`, `MIG3g`, `MIG4g` and `MIG7g`. Changing this forces a new resource to be created.
80
82
  :param pulumi.Input[_builtins.bool] host_encryption_enabled: Should the nodes in this Node Pool have host encryption enabled? Changing this property requires specifying `temporary_name_for_rotation`.
81
83
 
@@ -136,6 +138,8 @@ class KubernetesClusterNodePoolArgs:
136
138
  pulumi.set(__self__, "eviction_policy", eviction_policy)
137
139
  if fips_enabled is not None:
138
140
  pulumi.set(__self__, "fips_enabled", fips_enabled)
141
+ if gpu_driver is not None:
142
+ pulumi.set(__self__, "gpu_driver", gpu_driver)
139
143
  if gpu_instance is not None:
140
144
  pulumi.set(__self__, "gpu_instance", gpu_instance)
141
145
  if host_encryption_enabled is not None:
@@ -277,6 +281,18 @@ class KubernetesClusterNodePoolArgs:
277
281
  def fips_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
278
282
  pulumi.set(self, "fips_enabled", value)
279
283
 
284
+ @_builtins.property
285
+ @pulumi.getter(name="gpuDriver")
286
+ def gpu_driver(self) -> Optional[pulumi.Input[_builtins.str]]:
287
+ """
288
+ Specifies whether to install the GPU Driver for the nodes. Possible values are `Install` and `None`. Changing this forces a new resource to be created.
289
+ """
290
+ return pulumi.get(self, "gpu_driver")
291
+
292
+ @gpu_driver.setter
293
+ def gpu_driver(self, value: Optional[pulumi.Input[_builtins.str]]):
294
+ pulumi.set(self, "gpu_driver", value)
295
+
280
296
  @_builtins.property
281
297
  @pulumi.getter(name="gpuInstance")
282
298
  def gpu_instance(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -736,6 +752,7 @@ class _KubernetesClusterNodePoolState:
736
752
  capacity_reservation_group_id: Optional[pulumi.Input[_builtins.str]] = None,
737
753
  eviction_policy: Optional[pulumi.Input[_builtins.str]] = None,
738
754
  fips_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
755
+ gpu_driver: Optional[pulumi.Input[_builtins.str]] = None,
739
756
  gpu_instance: Optional[pulumi.Input[_builtins.str]] = None,
740
757
  host_encryption_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
741
758
  host_group_id: Optional[pulumi.Input[_builtins.str]] = None,
@@ -784,6 +801,7 @@ class _KubernetesClusterNodePoolState:
784
801
  :param pulumi.Input[_builtins.bool] fips_enabled: Should the nodes in this Node Pool have Federal Information Processing Standard enabled? Changing this property requires specifying `temporary_name_for_rotation`.
785
802
 
786
803
  > **Note:** FIPS support is in Public Preview - more information and details on how to opt into the Preview can be found in [this article](https://docs.microsoft.com/azure/aks/use-multiple-node-pools#add-a-fips-enabled-node-pool-preview).
804
+ :param pulumi.Input[_builtins.str] gpu_driver: Specifies whether to install the GPU Driver for the nodes. Possible values are `Install` and `None`. Changing this forces a new resource to be created.
787
805
  :param pulumi.Input[_builtins.str] gpu_instance: Specifies the GPU MIG instance profile for supported GPU VM SKU. The allowed values are `MIG1g`, `MIG2g`, `MIG3g`, `MIG4g` and `MIG7g`. Changing this forces a new resource to be created.
788
806
  :param pulumi.Input[_builtins.bool] host_encryption_enabled: Should the nodes in this Node Pool have host encryption enabled? Changing this property requires specifying `temporary_name_for_rotation`.
789
807
 
@@ -846,6 +864,8 @@ class _KubernetesClusterNodePoolState:
846
864
  pulumi.set(__self__, "eviction_policy", eviction_policy)
847
865
  if fips_enabled is not None:
848
866
  pulumi.set(__self__, "fips_enabled", fips_enabled)
867
+ if gpu_driver is not None:
868
+ pulumi.set(__self__, "gpu_driver", gpu_driver)
849
869
  if gpu_instance is not None:
850
870
  pulumi.set(__self__, "gpu_instance", gpu_instance)
851
871
  if host_encryption_enabled is not None:
@@ -975,6 +995,18 @@ class _KubernetesClusterNodePoolState:
975
995
  def fips_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
976
996
  pulumi.set(self, "fips_enabled", value)
977
997
 
998
+ @_builtins.property
999
+ @pulumi.getter(name="gpuDriver")
1000
+ def gpu_driver(self) -> Optional[pulumi.Input[_builtins.str]]:
1001
+ """
1002
+ Specifies whether to install the GPU Driver for the nodes. Possible values are `Install` and `None`. Changing this forces a new resource to be created.
1003
+ """
1004
+ return pulumi.get(self, "gpu_driver")
1005
+
1006
+ @gpu_driver.setter
1007
+ def gpu_driver(self, value: Optional[pulumi.Input[_builtins.str]]):
1008
+ pulumi.set(self, "gpu_driver", value)
1009
+
978
1010
  @_builtins.property
979
1011
  @pulumi.getter(name="gpuInstance")
980
1012
  def gpu_instance(self) -> Optional[pulumi.Input[_builtins.str]]:
@@ -1451,6 +1483,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1451
1483
  capacity_reservation_group_id: Optional[pulumi.Input[_builtins.str]] = None,
1452
1484
  eviction_policy: Optional[pulumi.Input[_builtins.str]] = None,
1453
1485
  fips_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1486
+ gpu_driver: Optional[pulumi.Input[_builtins.str]] = None,
1454
1487
  gpu_instance: Optional[pulumi.Input[_builtins.str]] = None,
1455
1488
  host_encryption_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1456
1489
  host_group_id: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1537,7 +1570,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1537
1570
  <!-- This section is generated, changes will be overwritten -->
1538
1571
  This resource uses the following Azure API Providers:
1539
1572
 
1540
- * `Microsoft.ContainerService` - 2025-02-01
1573
+ * `Microsoft.ContainerService` - 2025-05-01
1541
1574
 
1542
1575
  ## Import
1543
1576
 
@@ -1557,6 +1590,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1557
1590
  :param pulumi.Input[_builtins.bool] fips_enabled: Should the nodes in this Node Pool have Federal Information Processing Standard enabled? Changing this property requires specifying `temporary_name_for_rotation`.
1558
1591
 
1559
1592
  > **Note:** FIPS support is in Public Preview - more information and details on how to opt into the Preview can be found in [this article](https://docs.microsoft.com/azure/aks/use-multiple-node-pools#add-a-fips-enabled-node-pool-preview).
1593
+ :param pulumi.Input[_builtins.str] gpu_driver: Specifies whether to install the GPU Driver for the nodes. Possible values are `Install` and `None`. Changing this forces a new resource to be created.
1560
1594
  :param pulumi.Input[_builtins.str] gpu_instance: Specifies the GPU MIG instance profile for supported GPU VM SKU. The allowed values are `MIG1g`, `MIG2g`, `MIG3g`, `MIG4g` and `MIG7g`. Changing this forces a new resource to be created.
1561
1595
  :param pulumi.Input[_builtins.bool] host_encryption_enabled: Should the nodes in this Node Pool have host encryption enabled? Changing this property requires specifying `temporary_name_for_rotation`.
1562
1596
 
@@ -1664,7 +1698,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1664
1698
  <!-- This section is generated, changes will be overwritten -->
1665
1699
  This resource uses the following Azure API Providers:
1666
1700
 
1667
- * `Microsoft.ContainerService` - 2025-02-01
1701
+ * `Microsoft.ContainerService` - 2025-05-01
1668
1702
 
1669
1703
  ## Import
1670
1704
 
@@ -1693,6 +1727,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1693
1727
  capacity_reservation_group_id: Optional[pulumi.Input[_builtins.str]] = None,
1694
1728
  eviction_policy: Optional[pulumi.Input[_builtins.str]] = None,
1695
1729
  fips_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1730
+ gpu_driver: Optional[pulumi.Input[_builtins.str]] = None,
1696
1731
  gpu_instance: Optional[pulumi.Input[_builtins.str]] = None,
1697
1732
  host_encryption_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1698
1733
  host_group_id: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1744,6 +1779,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1744
1779
  __props__.__dict__["capacity_reservation_group_id"] = capacity_reservation_group_id
1745
1780
  __props__.__dict__["eviction_policy"] = eviction_policy
1746
1781
  __props__.__dict__["fips_enabled"] = fips_enabled
1782
+ __props__.__dict__["gpu_driver"] = gpu_driver
1747
1783
  __props__.__dict__["gpu_instance"] = gpu_instance
1748
1784
  __props__.__dict__["host_encryption_enabled"] = host_encryption_enabled
1749
1785
  __props__.__dict__["host_group_id"] = host_group_id
@@ -1798,6 +1834,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1798
1834
  capacity_reservation_group_id: Optional[pulumi.Input[_builtins.str]] = None,
1799
1835
  eviction_policy: Optional[pulumi.Input[_builtins.str]] = None,
1800
1836
  fips_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1837
+ gpu_driver: Optional[pulumi.Input[_builtins.str]] = None,
1801
1838
  gpu_instance: Optional[pulumi.Input[_builtins.str]] = None,
1802
1839
  host_encryption_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1803
1840
  host_group_id: Optional[pulumi.Input[_builtins.str]] = None,
@@ -1851,6 +1888,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1851
1888
  :param pulumi.Input[_builtins.bool] fips_enabled: Should the nodes in this Node Pool have Federal Information Processing Standard enabled? Changing this property requires specifying `temporary_name_for_rotation`.
1852
1889
 
1853
1890
  > **Note:** FIPS support is in Public Preview - more information and details on how to opt into the Preview can be found in [this article](https://docs.microsoft.com/azure/aks/use-multiple-node-pools#add-a-fips-enabled-node-pool-preview).
1891
+ :param pulumi.Input[_builtins.str] gpu_driver: Specifies whether to install the GPU Driver for the nodes. Possible values are `Install` and `None`. Changing this forces a new resource to be created.
1854
1892
  :param pulumi.Input[_builtins.str] gpu_instance: Specifies the GPU MIG instance profile for supported GPU VM SKU. The allowed values are `MIG1g`, `MIG2g`, `MIG3g`, `MIG4g` and `MIG7g`. Changing this forces a new resource to be created.
1855
1893
  :param pulumi.Input[_builtins.bool] host_encryption_enabled: Should the nodes in this Node Pool have host encryption enabled? Changing this property requires specifying `temporary_name_for_rotation`.
1856
1894
 
@@ -1913,6 +1951,7 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1913
1951
  __props__.__dict__["capacity_reservation_group_id"] = capacity_reservation_group_id
1914
1952
  __props__.__dict__["eviction_policy"] = eviction_policy
1915
1953
  __props__.__dict__["fips_enabled"] = fips_enabled
1954
+ __props__.__dict__["gpu_driver"] = gpu_driver
1916
1955
  __props__.__dict__["gpu_instance"] = gpu_instance
1917
1956
  __props__.__dict__["host_encryption_enabled"] = host_encryption_enabled
1918
1957
  __props__.__dict__["host_group_id"] = host_group_id
@@ -1989,6 +2028,14 @@ class KubernetesClusterNodePool(pulumi.CustomResource):
1989
2028
  """
1990
2029
  return pulumi.get(self, "fips_enabled")
1991
2030
 
2031
+ @_builtins.property
2032
+ @pulumi.getter(name="gpuDriver")
2033
+ def gpu_driver(self) -> pulumi.Output[Optional[_builtins.str]]:
2034
+ """
2035
+ Specifies whether to install the GPU Driver for the nodes. Possible values are `Install` and `None`. Changing this forces a new resource to be created.
2036
+ """
2037
+ return pulumi.get(self, "gpu_driver")
2038
+
1992
2039
  @_builtins.property
1993
2040
  @pulumi.getter(name="gpuInstance")
1994
2041
  def gpu_instance(self) -> pulumi.Output[Optional[_builtins.str]]: