pulumi-databricks 1.78.0a1762407761__py3-none-any.whl → 1.79.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (86) hide show
  1. pulumi_databricks/__init__.py +23 -0
  2. pulumi_databricks/_inputs.py +1630 -181
  3. pulumi_databricks/access_control_rule_set.py +81 -0
  4. pulumi_databricks/account_federation_policy.py +24 -0
  5. pulumi_databricks/account_network_policy.py +50 -0
  6. pulumi_databricks/account_setting_v2.py +181 -12
  7. pulumi_databricks/alert_v2.py +74 -2
  8. pulumi_databricks/app.py +71 -7
  9. pulumi_databricks/apps_settings_custom_template.py +102 -0
  10. pulumi_databricks/catalog.py +8 -8
  11. pulumi_databricks/cluster_policy.py +120 -0
  12. pulumi_databricks/config/__init__.pyi +4 -0
  13. pulumi_databricks/config/vars.py +8 -0
  14. pulumi_databricks/credential.py +7 -7
  15. pulumi_databricks/dashboard.py +94 -0
  16. pulumi_databricks/data_quality_monitor.py +2 -2
  17. pulumi_databricks/data_quality_refresh.py +78 -2
  18. pulumi_databricks/database_synced_database_table.py +212 -0
  19. pulumi_databricks/external_location.py +131 -7
  20. pulumi_databricks/feature_engineering_feature.py +52 -19
  21. pulumi_databricks/feature_engineering_kafka_config.py +463 -0
  22. pulumi_databricks/feature_engineering_materialized_feature.py +47 -0
  23. pulumi_databricks/file.py +2 -2
  24. pulumi_databricks/get_account_setting_v2.py +16 -16
  25. pulumi_databricks/get_alert_v2.py +2 -2
  26. pulumi_databricks/get_alerts_v2.py +2 -2
  27. pulumi_databricks/get_aws_assume_role_policy.py +14 -14
  28. pulumi_databricks/get_aws_bucket_policy.py +10 -10
  29. pulumi_databricks/get_aws_unity_catalog_assume_role_policy.py +10 -10
  30. pulumi_databricks/get_aws_unity_catalog_policy.py +10 -10
  31. pulumi_databricks/get_cluster.py +54 -0
  32. pulumi_databricks/get_current_config.py +4 -4
  33. pulumi_databricks/get_dashboards.py +32 -0
  34. pulumi_databricks/get_data_quality_monitor.py +2 -2
  35. pulumi_databricks/get_data_quality_monitors.py +2 -2
  36. pulumi_databricks/get_data_quality_refresh.py +2 -2
  37. pulumi_databricks/get_data_quality_refreshes.py +2 -2
  38. pulumi_databricks/get_feature_engineering_feature.py +12 -1
  39. pulumi_databricks/get_feature_engineering_kafka_config.py +182 -0
  40. pulumi_databricks/get_feature_engineering_kafka_configs.py +103 -0
  41. pulumi_databricks/get_feature_engineering_materialized_feature.py +16 -2
  42. pulumi_databricks/get_metastore.py +6 -6
  43. pulumi_databricks/get_notebook.py +20 -1
  44. pulumi_databricks/get_policy_info.py +36 -2
  45. pulumi_databricks/get_policy_infos.py +34 -2
  46. pulumi_databricks/get_service_principals.py +93 -7
  47. pulumi_databricks/get_spark_version.py +2 -2
  48. pulumi_databricks/get_tag_policies.py +2 -2
  49. pulumi_databricks/get_tag_policy.py +2 -2
  50. pulumi_databricks/get_users.py +194 -0
  51. pulumi_databricks/get_workspace_entity_tag_assignment.py +180 -0
  52. pulumi_databricks/get_workspace_entity_tag_assignments.py +171 -0
  53. pulumi_databricks/get_workspace_setting_v2.py +16 -16
  54. pulumi_databricks/instance_profile.py +0 -182
  55. pulumi_databricks/lakehouse_monitor.py +2 -2
  56. pulumi_databricks/metastore.py +81 -7
  57. pulumi_databricks/metastore_data_access.py +48 -0
  58. pulumi_databricks/mlflow_webhook.py +4 -4
  59. pulumi_databricks/mws_credentials.py +10 -10
  60. pulumi_databricks/mws_customer_managed_keys.py +0 -288
  61. pulumi_databricks/mws_log_delivery.py +146 -0
  62. pulumi_databricks/mws_storage_configurations.py +16 -16
  63. pulumi_databricks/mws_vpc_endpoint.py +56 -56
  64. pulumi_databricks/mws_workspaces.py +115 -55
  65. pulumi_databricks/notebook.py +49 -0
  66. pulumi_databricks/outputs.py +2017 -240
  67. pulumi_databricks/permission_assignment.py +49 -0
  68. pulumi_databricks/permissions.py +6 -6
  69. pulumi_databricks/pipeline.py +7 -7
  70. pulumi_databricks/policy_info.py +122 -2
  71. pulumi_databricks/provider.py +36 -1
  72. pulumi_databricks/pulumi-plugin.json +1 -1
  73. pulumi_databricks/recipient.py +74 -0
  74. pulumi_databricks/registered_model.py +7 -7
  75. pulumi_databricks/rfa_access_request_destinations.py +86 -19
  76. pulumi_databricks/schema.py +7 -7
  77. pulumi_databricks/service_principal_federation_policy.py +28 -0
  78. pulumi_databricks/sql_table.py +7 -7
  79. pulumi_databricks/tag_policy.py +2 -2
  80. pulumi_databricks/volume.py +7 -7
  81. pulumi_databricks/workspace_entity_tag_assignment.py +375 -0
  82. pulumi_databricks/workspace_setting_v2.py +181 -12
  83. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/METADATA +1 -1
  84. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/RECORD +86 -79
  85. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/WHEEL +0 -0
  86. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/top_level.txt +0 -0
@@ -404,6 +404,79 @@ class MwsLogDelivery(pulumi.CustomResource):
404
404
 
405
405
  You cannot delete a log delivery configuration, but you can disable it when you no longer need it. This fact is important because there is a limit to the number of enabled log delivery configurations that you can create for an account. You can create a maximum of two enabled configurations that use the account level (no workspace filter) and two enabled configurations for every specific workspace (a workspaceId can occur in the workspace filter for two configurations). You can re-enable a disabled configuration, but the request fails if it violates the limits previously described.
406
406
 
407
+ ## Example Usage
408
+
409
+ End-to-end example of usage and audit log delivery:
410
+
411
+ ```python
412
+ import pulumi
413
+ import pulumi_aws as aws
414
+ import pulumi_databricks as databricks
415
+ import pulumi_std as std
416
+ import pulumiverse_time as time
417
+
418
+ config = pulumi.Config()
419
+ # Account Id that could be found in the top right corner of https://accounts.cloud.databricks.com/
420
+ databricks_account_id = config.require_object("databricksAccountId")
421
+ logdelivery_s3_bucket = aws.index.S3Bucket("logdelivery",
422
+ bucket=f{prefix}-logdelivery,
423
+ acl=private,
424
+ force_destroy=True,
425
+ tags=std.merge(input=[
426
+ tags,
427
+ {
428
+ name: f{prefix}-logdelivery,
429
+ },
430
+ ]).result)
431
+ logdelivery_s3_bucket_public_access_block = aws.index.S3BucketPublicAccessBlock("logdelivery",
432
+ bucket=logdelivery_s3_bucket.id,
433
+ ignore_public_acls=True)
434
+ logdelivery = databricks.get_aws_assume_role_policy(external_id=databricks_account_id,
435
+ for_log_delivery=True)
436
+ logdelivery_versioning = aws.index.S3BucketVersioning("logdelivery_versioning",
437
+ bucket=logdelivery_s3_bucket.id,
438
+ versioning_configuration=[{
439
+ status: Disabled,
440
+ }])
441
+ logdelivery_iam_role = aws.index.IamRole("logdelivery",
442
+ name=f{prefix}-logdelivery,
443
+ description=f({prefix}) UsageDelivery role,
444
+ assume_role_policy=logdelivery.json,
445
+ tags=tags)
446
+ logdelivery_get_aws_bucket_policy = databricks.get_aws_bucket_policy(full_access_role=logdelivery_iam_role["arn"],
447
+ bucket=logdelivery_s3_bucket["bucket"])
448
+ logdelivery_s3_bucket_policy = aws.index.S3BucketPolicy("logdelivery",
449
+ bucket=logdelivery_s3_bucket.id,
450
+ policy=logdelivery_get_aws_bucket_policy.json)
451
+ wait = time.Sleep("wait", create_duration="10s",
452
+ opts = pulumi.ResourceOptions(depends_on=[logdelivery_iam_role]))
453
+ log_writer = databricks.MwsCredentials("log_writer",
454
+ account_id=databricks_account_id,
455
+ credentials_name="Usage Delivery",
456
+ role_arn=logdelivery_iam_role["arn"],
457
+ opts = pulumi.ResourceOptions(depends_on=[wait]))
458
+ log_bucket = databricks.MwsStorageConfigurations("log_bucket",
459
+ account_id=databricks_account_id,
460
+ storage_configuration_name="Usage Logs",
461
+ bucket_name=logdelivery_s3_bucket["bucket"])
462
+ usage_logs = databricks.MwsLogDelivery("usage_logs",
463
+ account_id=databricks_account_id,
464
+ credentials_id=log_writer.credentials_id,
465
+ storage_configuration_id=log_bucket.storage_configuration_id,
466
+ delivery_path_prefix="billable-usage",
467
+ config_name="Usage Logs",
468
+ log_type="BILLABLE_USAGE",
469
+ output_format="CSV")
470
+ audit_logs = databricks.MwsLogDelivery("audit_logs",
471
+ account_id=databricks_account_id,
472
+ credentials_id=log_writer.credentials_id,
473
+ storage_configuration_id=log_bucket.storage_configuration_id,
474
+ delivery_path_prefix="audit-logs",
475
+ config_name="Audit Logs",
476
+ log_type="AUDIT_LOGS",
477
+ output_format="JSON")
478
+ ```
479
+
407
480
  ## Billable Usage
408
481
 
409
482
  CSV files are delivered to `<delivery_path_prefix>/billable-usage/csv/` and are named `workspaceId=<workspace-id>-usageMonth=<month>.csv`, which are delivered daily by overwriting the month's CSV file for each workspace. Format of CSV file, as well as some usage examples, can be found [here](https://docs.databricks.com/administration-guide/account-settings/usage.html#download-usage-as-a-csv-file).
@@ -484,6 +557,79 @@ class MwsLogDelivery(pulumi.CustomResource):
484
557
 
485
558
  You cannot delete a log delivery configuration, but you can disable it when you no longer need it. This fact is important because there is a limit to the number of enabled log delivery configurations that you can create for an account. You can create a maximum of two enabled configurations that use the account level (no workspace filter) and two enabled configurations for every specific workspace (a workspaceId can occur in the workspace filter for two configurations). You can re-enable a disabled configuration, but the request fails if it violates the limits previously described.
486
559
 
560
+ ## Example Usage
561
+
562
+ End-to-end example of usage and audit log delivery:
563
+
564
+ ```python
565
+ import pulumi
566
+ import pulumi_aws as aws
567
+ import pulumi_databricks as databricks
568
+ import pulumi_std as std
569
+ import pulumiverse_time as time
570
+
571
+ config = pulumi.Config()
572
+ # Account Id that could be found in the top right corner of https://accounts.cloud.databricks.com/
573
+ databricks_account_id = config.require_object("databricksAccountId")
574
+ logdelivery_s3_bucket = aws.index.S3Bucket("logdelivery",
575
+ bucket=f{prefix}-logdelivery,
576
+ acl=private,
577
+ force_destroy=True,
578
+ tags=std.merge(input=[
579
+ tags,
580
+ {
581
+ name: f{prefix}-logdelivery,
582
+ },
583
+ ]).result)
584
+ logdelivery_s3_bucket_public_access_block = aws.index.S3BucketPublicAccessBlock("logdelivery",
585
+ bucket=logdelivery_s3_bucket.id,
586
+ ignore_public_acls=True)
587
+ logdelivery = databricks.get_aws_assume_role_policy(external_id=databricks_account_id,
588
+ for_log_delivery=True)
589
+ logdelivery_versioning = aws.index.S3BucketVersioning("logdelivery_versioning",
590
+ bucket=logdelivery_s3_bucket.id,
591
+ versioning_configuration=[{
592
+ status: Disabled,
593
+ }])
594
+ logdelivery_iam_role = aws.index.IamRole("logdelivery",
595
+ name=f{prefix}-logdelivery,
596
+ description=f({prefix}) UsageDelivery role,
597
+ assume_role_policy=logdelivery.json,
598
+ tags=tags)
599
+ logdelivery_get_aws_bucket_policy = databricks.get_aws_bucket_policy(full_access_role=logdelivery_iam_role["arn"],
600
+ bucket=logdelivery_s3_bucket["bucket"])
601
+ logdelivery_s3_bucket_policy = aws.index.S3BucketPolicy("logdelivery",
602
+ bucket=logdelivery_s3_bucket.id,
603
+ policy=logdelivery_get_aws_bucket_policy.json)
604
+ wait = time.Sleep("wait", create_duration="10s",
605
+ opts = pulumi.ResourceOptions(depends_on=[logdelivery_iam_role]))
606
+ log_writer = databricks.MwsCredentials("log_writer",
607
+ account_id=databricks_account_id,
608
+ credentials_name="Usage Delivery",
609
+ role_arn=logdelivery_iam_role["arn"],
610
+ opts = pulumi.ResourceOptions(depends_on=[wait]))
611
+ log_bucket = databricks.MwsStorageConfigurations("log_bucket",
612
+ account_id=databricks_account_id,
613
+ storage_configuration_name="Usage Logs",
614
+ bucket_name=logdelivery_s3_bucket["bucket"])
615
+ usage_logs = databricks.MwsLogDelivery("usage_logs",
616
+ account_id=databricks_account_id,
617
+ credentials_id=log_writer.credentials_id,
618
+ storage_configuration_id=log_bucket.storage_configuration_id,
619
+ delivery_path_prefix="billable-usage",
620
+ config_name="Usage Logs",
621
+ log_type="BILLABLE_USAGE",
622
+ output_format="CSV")
623
+ audit_logs = databricks.MwsLogDelivery("audit_logs",
624
+ account_id=databricks_account_id,
625
+ credentials_id=log_writer.credentials_id,
626
+ storage_configuration_id=log_bucket.storage_configuration_id,
627
+ delivery_path_prefix="audit-logs",
628
+ config_name="Audit Logs",
629
+ log_type="AUDIT_LOGS",
630
+ output_format="JSON")
631
+ ```
632
+
487
633
  ## Billable Usage
488
634
 
489
635
  CSV files are delivered to `<delivery_path_prefix>/billable-usage/csv/` and are named `workspaceId=<workspace-id>-usageMonth=<month>.csv`, which are delivered daily by overwriting the month's CSV file for each workspace. Format of CSV file, as well as some usage examples, can be found [here](https://docs.databricks.com/administration-guide/account-settings/usage.html#download-usage-as-a-csv-file).
@@ -174,18 +174,18 @@ class MwsStorageConfigurations(pulumi.CustomResource):
174
174
  config = pulumi.Config()
175
175
  # Account Id that could be found in the top right corner of https://accounts.cloud.databricks.com/
176
176
  databricks_account_id = config.require_object("databricksAccountId")
177
- root_storage_bucket = aws.s3.Bucket("root_storage_bucket",
178
- bucket=f"{prefix}-rootbucket",
179
- acl=aws.s3.CannedAcl.PRIVATE)
180
- root_versioning = aws.s3.BucketVersioning("root_versioning",
177
+ root_storage_bucket = aws.index.S3Bucket("root_storage_bucket",
178
+ bucket=f{prefix}-rootbucket,
179
+ acl=private)
180
+ root_versioning = aws.index.S3BucketVersioning("root_versioning",
181
181
  bucket=root_storage_bucket.id,
182
- versioning_configuration={
183
- "status": "Disabled",
184
- })
182
+ versioning_configuration=[{
183
+ status: Disabled,
184
+ }])
185
185
  this = databricks.MwsStorageConfigurations("this",
186
186
  account_id=databricks_account_id,
187
187
  storage_configuration_name=f"{prefix}-storage",
188
- bucket_name=root_storage_bucket.bucket)
188
+ bucket_name=root_storage_bucket["bucket"])
189
189
  ```
190
190
 
191
191
  ## Related Resources
@@ -251,18 +251,18 @@ class MwsStorageConfigurations(pulumi.CustomResource):
251
251
  config = pulumi.Config()
252
252
  # Account Id that could be found in the top right corner of https://accounts.cloud.databricks.com/
253
253
  databricks_account_id = config.require_object("databricksAccountId")
254
- root_storage_bucket = aws.s3.Bucket("root_storage_bucket",
255
- bucket=f"{prefix}-rootbucket",
256
- acl=aws.s3.CannedAcl.PRIVATE)
257
- root_versioning = aws.s3.BucketVersioning("root_versioning",
254
+ root_storage_bucket = aws.index.S3Bucket("root_storage_bucket",
255
+ bucket=f{prefix}-rootbucket,
256
+ acl=private)
257
+ root_versioning = aws.index.S3BucketVersioning("root_versioning",
258
258
  bucket=root_storage_bucket.id,
259
- versioning_configuration={
260
- "status": "Disabled",
261
- })
259
+ versioning_configuration=[{
260
+ status: Disabled,
261
+ }])
262
262
  this = databricks.MwsStorageConfigurations("this",
263
263
  account_id=databricks_account_id,
264
264
  storage_configuration_name=f"{prefix}-storage",
265
- bucket_name=root_storage_bucket.bucket)
265
+ bucket_name=root_storage_bucket["bucket"])
266
266
  ```
267
267
 
268
268
  ## Related Resources
@@ -371,20 +371,20 @@ class MwsVpcEndpoint(pulumi.CustomResource):
371
371
  import pulumi
372
372
  import pulumi_aws as aws
373
373
 
374
- workspace = aws.ec2.VpcEndpoint("workspace",
375
- vpc_id=vpc["vpcId"],
376
- service_name=private_link["workspaceService"],
377
- vpc_endpoint_type="Interface",
378
- security_group_ids=[vpc["defaultSecurityGroupId"]],
379
- subnet_ids=[pl_subnet["id"]],
374
+ workspace = aws.index.VpcEndpoint("workspace",
375
+ vpc_id=vpc.vpc_id,
376
+ service_name=private_link.workspace_service,
377
+ vpc_endpoint_type=Interface,
378
+ security_group_ids=[vpc.default_security_group_id],
379
+ subnet_ids=[pl_subnet.id],
380
380
  private_dns_enabled=True,
381
381
  opts = pulumi.ResourceOptions(depends_on=[pl_subnet]))
382
- relay = aws.ec2.VpcEndpoint("relay",
383
- vpc_id=vpc["vpcId"],
384
- service_name=private_link["relayService"],
385
- vpc_endpoint_type="Interface",
386
- security_group_ids=[vpc["defaultSecurityGroupId"]],
387
- subnet_ids=[pl_subnet["id"]],
382
+ relay = aws.index.VpcEndpoint("relay",
383
+ vpc_id=vpc.vpc_id,
384
+ service_name=private_link.relay_service,
385
+ vpc_endpoint_type=Interface,
386
+ security_group_ids=[vpc.default_security_group_id],
387
+ subnet_ids=[pl_subnet.id],
388
388
  private_dns_enabled=True,
389
389
  opts = pulumi.ResourceOptions(depends_on=[pl_subnet]))
390
390
  ```
@@ -396,25 +396,25 @@ class MwsVpcEndpoint(pulumi.CustomResource):
396
396
  import pulumi
397
397
  import pulumi_aws as aws
398
398
 
399
- s3 = aws.ec2.VpcEndpoint("s3",
400
- vpc_id=vpc["vpcId"],
401
- route_table_ids=vpc["privateRouteTableIds"],
402
- service_name=f"com.amazonaws.{region}.s3",
399
+ s3 = aws.index.VpcEndpoint("s3",
400
+ vpc_id=vpc.vpc_id,
401
+ route_table_ids=vpc.private_route_table_ids,
402
+ service_name=fcom.amazonaws.{region}.s3,
403
403
  opts = pulumi.ResourceOptions(depends_on=[vpc]))
404
- sts = aws.ec2.VpcEndpoint("sts",
405
- vpc_id=vpc["vpcId"],
406
- service_name=f"com.amazonaws.{region}.sts",
407
- vpc_endpoint_type="Interface",
408
- subnet_ids=vpc["privateSubnets"],
409
- security_group_ids=[vpc["defaultSecurityGroupId"]],
404
+ sts = aws.index.VpcEndpoint("sts",
405
+ vpc_id=vpc.vpc_id,
406
+ service_name=fcom.amazonaws.{region}.sts,
407
+ vpc_endpoint_type=Interface,
408
+ subnet_ids=vpc.private_subnets,
409
+ security_group_ids=[vpc.default_security_group_id],
410
410
  private_dns_enabled=True,
411
411
  opts = pulumi.ResourceOptions(depends_on=[vpc]))
412
- kinesis_streams = aws.ec2.VpcEndpoint("kinesis-streams",
413
- vpc_id=vpc["vpcId"],
414
- service_name=f"com.amazonaws.{region}.kinesis-streams",
415
- vpc_endpoint_type="Interface",
416
- subnet_ids=vpc["privateSubnets"],
417
- security_group_ids=[vpc["defaultSecurityGroupId"]],
412
+ kinesis_streams = aws.index.VpcEndpoint("kinesis-streams",
413
+ vpc_id=vpc.vpc_id,
414
+ service_name=fcom.amazonaws.{region}.kinesis-streams,
415
+ vpc_endpoint_type=Interface,
416
+ subnet_ids=vpc.private_subnets,
417
+ security_group_ids=[vpc.default_security_group_id],
418
418
  opts = pulumi.ResourceOptions(depends_on=[vpc]))
419
419
  ```
420
420
 
@@ -565,20 +565,20 @@ class MwsVpcEndpoint(pulumi.CustomResource):
565
565
  import pulumi
566
566
  import pulumi_aws as aws
567
567
 
568
- workspace = aws.ec2.VpcEndpoint("workspace",
569
- vpc_id=vpc["vpcId"],
570
- service_name=private_link["workspaceService"],
571
- vpc_endpoint_type="Interface",
572
- security_group_ids=[vpc["defaultSecurityGroupId"]],
573
- subnet_ids=[pl_subnet["id"]],
568
+ workspace = aws.index.VpcEndpoint("workspace",
569
+ vpc_id=vpc.vpc_id,
570
+ service_name=private_link.workspace_service,
571
+ vpc_endpoint_type=Interface,
572
+ security_group_ids=[vpc.default_security_group_id],
573
+ subnet_ids=[pl_subnet.id],
574
574
  private_dns_enabled=True,
575
575
  opts = pulumi.ResourceOptions(depends_on=[pl_subnet]))
576
- relay = aws.ec2.VpcEndpoint("relay",
577
- vpc_id=vpc["vpcId"],
578
- service_name=private_link["relayService"],
579
- vpc_endpoint_type="Interface",
580
- security_group_ids=[vpc["defaultSecurityGroupId"]],
581
- subnet_ids=[pl_subnet["id"]],
576
+ relay = aws.index.VpcEndpoint("relay",
577
+ vpc_id=vpc.vpc_id,
578
+ service_name=private_link.relay_service,
579
+ vpc_endpoint_type=Interface,
580
+ security_group_ids=[vpc.default_security_group_id],
581
+ subnet_ids=[pl_subnet.id],
582
582
  private_dns_enabled=True,
583
583
  opts = pulumi.ResourceOptions(depends_on=[pl_subnet]))
584
584
  ```
@@ -590,25 +590,25 @@ class MwsVpcEndpoint(pulumi.CustomResource):
590
590
  import pulumi
591
591
  import pulumi_aws as aws
592
592
 
593
- s3 = aws.ec2.VpcEndpoint("s3",
594
- vpc_id=vpc["vpcId"],
595
- route_table_ids=vpc["privateRouteTableIds"],
596
- service_name=f"com.amazonaws.{region}.s3",
593
+ s3 = aws.index.VpcEndpoint("s3",
594
+ vpc_id=vpc.vpc_id,
595
+ route_table_ids=vpc.private_route_table_ids,
596
+ service_name=fcom.amazonaws.{region}.s3,
597
597
  opts = pulumi.ResourceOptions(depends_on=[vpc]))
598
- sts = aws.ec2.VpcEndpoint("sts",
599
- vpc_id=vpc["vpcId"],
600
- service_name=f"com.amazonaws.{region}.sts",
601
- vpc_endpoint_type="Interface",
602
- subnet_ids=vpc["privateSubnets"],
603
- security_group_ids=[vpc["defaultSecurityGroupId"]],
598
+ sts = aws.index.VpcEndpoint("sts",
599
+ vpc_id=vpc.vpc_id,
600
+ service_name=fcom.amazonaws.{region}.sts,
601
+ vpc_endpoint_type=Interface,
602
+ subnet_ids=vpc.private_subnets,
603
+ security_group_ids=[vpc.default_security_group_id],
604
604
  private_dns_enabled=True,
605
605
  opts = pulumi.ResourceOptions(depends_on=[vpc]))
606
- kinesis_streams = aws.ec2.VpcEndpoint("kinesis-streams",
607
- vpc_id=vpc["vpcId"],
608
- service_name=f"com.amazonaws.{region}.kinesis-streams",
609
- vpc_endpoint_type="Interface",
610
- subnet_ids=vpc["privateSubnets"],
611
- security_group_ids=[vpc["defaultSecurityGroupId"]],
606
+ kinesis_streams = aws.index.VpcEndpoint("kinesis-streams",
607
+ vpc_id=vpc.vpc_id,
608
+ service_name=fcom.amazonaws.{region}.kinesis-streams,
609
+ vpc_endpoint_type=Interface,
610
+ subnet_ids=vpc.private_subnets,
611
+ security_group_ids=[vpc.default_security_group_id],
612
612
  opts = pulumi.ResourceOptions(depends_on=[vpc]))
613
613
  ```
614
614