pulumi-databricks 1.78.0a1762407761__py3-none-any.whl → 1.79.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (86) hide show
  1. pulumi_databricks/__init__.py +23 -0
  2. pulumi_databricks/_inputs.py +1630 -181
  3. pulumi_databricks/access_control_rule_set.py +81 -0
  4. pulumi_databricks/account_federation_policy.py +24 -0
  5. pulumi_databricks/account_network_policy.py +50 -0
  6. pulumi_databricks/account_setting_v2.py +181 -12
  7. pulumi_databricks/alert_v2.py +74 -2
  8. pulumi_databricks/app.py +71 -7
  9. pulumi_databricks/apps_settings_custom_template.py +102 -0
  10. pulumi_databricks/catalog.py +8 -8
  11. pulumi_databricks/cluster_policy.py +120 -0
  12. pulumi_databricks/config/__init__.pyi +4 -0
  13. pulumi_databricks/config/vars.py +8 -0
  14. pulumi_databricks/credential.py +7 -7
  15. pulumi_databricks/dashboard.py +94 -0
  16. pulumi_databricks/data_quality_monitor.py +2 -2
  17. pulumi_databricks/data_quality_refresh.py +78 -2
  18. pulumi_databricks/database_synced_database_table.py +212 -0
  19. pulumi_databricks/external_location.py +131 -7
  20. pulumi_databricks/feature_engineering_feature.py +52 -19
  21. pulumi_databricks/feature_engineering_kafka_config.py +463 -0
  22. pulumi_databricks/feature_engineering_materialized_feature.py +47 -0
  23. pulumi_databricks/file.py +2 -2
  24. pulumi_databricks/get_account_setting_v2.py +16 -16
  25. pulumi_databricks/get_alert_v2.py +2 -2
  26. pulumi_databricks/get_alerts_v2.py +2 -2
  27. pulumi_databricks/get_aws_assume_role_policy.py +14 -14
  28. pulumi_databricks/get_aws_bucket_policy.py +10 -10
  29. pulumi_databricks/get_aws_unity_catalog_assume_role_policy.py +10 -10
  30. pulumi_databricks/get_aws_unity_catalog_policy.py +10 -10
  31. pulumi_databricks/get_cluster.py +54 -0
  32. pulumi_databricks/get_current_config.py +4 -4
  33. pulumi_databricks/get_dashboards.py +32 -0
  34. pulumi_databricks/get_data_quality_monitor.py +2 -2
  35. pulumi_databricks/get_data_quality_monitors.py +2 -2
  36. pulumi_databricks/get_data_quality_refresh.py +2 -2
  37. pulumi_databricks/get_data_quality_refreshes.py +2 -2
  38. pulumi_databricks/get_feature_engineering_feature.py +12 -1
  39. pulumi_databricks/get_feature_engineering_kafka_config.py +182 -0
  40. pulumi_databricks/get_feature_engineering_kafka_configs.py +103 -0
  41. pulumi_databricks/get_feature_engineering_materialized_feature.py +16 -2
  42. pulumi_databricks/get_metastore.py +6 -6
  43. pulumi_databricks/get_notebook.py +20 -1
  44. pulumi_databricks/get_policy_info.py +36 -2
  45. pulumi_databricks/get_policy_infos.py +34 -2
  46. pulumi_databricks/get_service_principals.py +93 -7
  47. pulumi_databricks/get_spark_version.py +2 -2
  48. pulumi_databricks/get_tag_policies.py +2 -2
  49. pulumi_databricks/get_tag_policy.py +2 -2
  50. pulumi_databricks/get_users.py +194 -0
  51. pulumi_databricks/get_workspace_entity_tag_assignment.py +180 -0
  52. pulumi_databricks/get_workspace_entity_tag_assignments.py +171 -0
  53. pulumi_databricks/get_workspace_setting_v2.py +16 -16
  54. pulumi_databricks/instance_profile.py +0 -182
  55. pulumi_databricks/lakehouse_monitor.py +2 -2
  56. pulumi_databricks/metastore.py +81 -7
  57. pulumi_databricks/metastore_data_access.py +48 -0
  58. pulumi_databricks/mlflow_webhook.py +4 -4
  59. pulumi_databricks/mws_credentials.py +10 -10
  60. pulumi_databricks/mws_customer_managed_keys.py +0 -288
  61. pulumi_databricks/mws_log_delivery.py +146 -0
  62. pulumi_databricks/mws_storage_configurations.py +16 -16
  63. pulumi_databricks/mws_vpc_endpoint.py +56 -56
  64. pulumi_databricks/mws_workspaces.py +115 -55
  65. pulumi_databricks/notebook.py +49 -0
  66. pulumi_databricks/outputs.py +2017 -240
  67. pulumi_databricks/permission_assignment.py +49 -0
  68. pulumi_databricks/permissions.py +6 -6
  69. pulumi_databricks/pipeline.py +7 -7
  70. pulumi_databricks/policy_info.py +122 -2
  71. pulumi_databricks/provider.py +36 -1
  72. pulumi_databricks/pulumi-plugin.json +1 -1
  73. pulumi_databricks/recipient.py +74 -0
  74. pulumi_databricks/registered_model.py +7 -7
  75. pulumi_databricks/rfa_access_request_destinations.py +86 -19
  76. pulumi_databricks/schema.py +7 -7
  77. pulumi_databricks/service_principal_federation_policy.py +28 -0
  78. pulumi_databricks/sql_table.py +7 -7
  79. pulumi_databricks/tag_policy.py +2 -2
  80. pulumi_databricks/volume.py +7 -7
  81. pulumi_databricks/workspace_entity_tag_assignment.py +375 -0
  82. pulumi_databricks/workspace_setting_v2.py +181 -12
  83. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/METADATA +1 -1
  84. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/RECORD +86 -79
  85. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/WHEEL +0 -0
  86. {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/top_level.txt +0 -0
@@ -33,6 +33,7 @@ class AccessControlRuleSetArgs:
33
33
  * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
34
34
  * `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
35
35
  * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
36
+ * `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
36
37
  """
37
38
  if grant_rules is not None:
38
39
  pulumi.set(__self__, "grant_rules", grant_rules)
@@ -62,6 +63,7 @@ class AccessControlRuleSetArgs:
62
63
  * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
63
64
  * `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
64
65
  * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
66
+ * `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
65
67
  """
66
68
  return pulumi.get(self, "name")
67
69
 
@@ -86,6 +88,7 @@ class _AccessControlRuleSetState:
86
88
  * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
87
89
  * `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
88
90
  * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
91
+ * `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
89
92
  """
90
93
  if etag is not None:
91
94
  pulumi.set(__self__, "etag", etag)
@@ -126,6 +129,7 @@ class _AccessControlRuleSetState:
126
129
  * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
127
130
  * `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
128
131
  * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
132
+ * `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
129
133
  """
130
134
  return pulumi.get(self, "name")
131
135
 
@@ -314,6 +318,43 @@ class AccessControlRuleSet(pulumi.CustomResource):
314
318
  ])
315
319
  ```
316
320
 
321
+ ## Tag policy usage
322
+
323
+ Access to tag policies could be controlled with this resource:
324
+
325
+ ```python
326
+ import pulumi
327
+ import pulumi_databricks as databricks
328
+
329
+ account_id = "00000000-0000-0000-0000-000000000000"
330
+ # account level group
331
+ ds = databricks.get_group(display_name="Data Science")
332
+ john = databricks.get_user(user_name="john.doe@example.com")
333
+ this = databricks.TagPolicy("this",
334
+ tag_key="example_tag_key",
335
+ description="Example description.",
336
+ values=[
337
+ {
338
+ "name": "example_value_2",
339
+ },
340
+ {
341
+ "name": "example_value_3",
342
+ },
343
+ ])
344
+ tag_policy_usage = databricks.AccessControlRuleSet("tag_policy_usage",
345
+ name=this.id.apply(lambda id: f"accounts/{account_id}/tagPolicies/{id}/ruleSets/default"),
346
+ grant_rules=[
347
+ {
348
+ "principals": [john.acl_principal_id],
349
+ "role": "roles/tagPolicy.manager",
350
+ },
351
+ {
352
+ "principals": [ds.acl_principal_id],
353
+ "role": "roles/tagPolicy.assigner",
354
+ },
355
+ ])
356
+ ```
357
+
317
358
  ## Related Resources
318
359
 
319
360
  The following resources are often used in the same context:
@@ -332,6 +373,7 @@ class AccessControlRuleSet(pulumi.CustomResource):
332
373
  * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
333
374
  * `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
334
375
  * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
376
+ * `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
335
377
  """
336
378
  ...
337
379
  @overload
@@ -510,6 +552,43 @@ class AccessControlRuleSet(pulumi.CustomResource):
510
552
  ])
511
553
  ```
512
554
 
555
+ ## Tag policy usage
556
+
557
+ Access to tag policies could be controlled with this resource:
558
+
559
+ ```python
560
+ import pulumi
561
+ import pulumi_databricks as databricks
562
+
563
+ account_id = "00000000-0000-0000-0000-000000000000"
564
+ # account level group
565
+ ds = databricks.get_group(display_name="Data Science")
566
+ john = databricks.get_user(user_name="john.doe@example.com")
567
+ this = databricks.TagPolicy("this",
568
+ tag_key="example_tag_key",
569
+ description="Example description.",
570
+ values=[
571
+ {
572
+ "name": "example_value_2",
573
+ },
574
+ {
575
+ "name": "example_value_3",
576
+ },
577
+ ])
578
+ tag_policy_usage = databricks.AccessControlRuleSet("tag_policy_usage",
579
+ name=this.id.apply(lambda id: f"accounts/{account_id}/tagPolicies/{id}/ruleSets/default"),
580
+ grant_rules=[
581
+ {
582
+ "principals": [john.acl_principal_id],
583
+ "role": "roles/tagPolicy.manager",
584
+ },
585
+ {
586
+ "principals": [ds.acl_principal_id],
587
+ "role": "roles/tagPolicy.assigner",
588
+ },
589
+ ])
590
+ ```
591
+
513
592
  ## Related Resources
514
593
 
515
594
  The following resources are often used in the same context:
@@ -575,6 +654,7 @@ class AccessControlRuleSet(pulumi.CustomResource):
575
654
  * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
576
655
  * `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
577
656
  * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
657
+ * `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
578
658
  """
579
659
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
580
660
 
@@ -609,6 +689,7 @@ class AccessControlRuleSet(pulumi.CustomResource):
609
689
  * `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
610
690
  * `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
611
691
  * `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
692
+ * `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
612
693
  """
613
694
  return pulumi.get(self, "name")
614
695
 
@@ -252,6 +252,18 @@ class AccountFederationPolicy(pulumi.CustomResource):
252
252
 
253
253
  ## Example Usage
254
254
 
255
+ ```python
256
+ import pulumi
257
+ import pulumi_databricks as databricks
258
+
259
+ this = databricks.AccountFederationPolicy("this",
260
+ policy_id="my-policy",
261
+ oidc_policy={
262
+ "issuer": "https://myidp.example.com",
263
+ "subject_claim": "sub",
264
+ })
265
+ ```
266
+
255
267
  ## Import
256
268
 
257
269
  As of Pulumi v1.5, resources can be imported through configuration.
@@ -297,6 +309,18 @@ class AccountFederationPolicy(pulumi.CustomResource):
297
309
 
298
310
  ## Example Usage
299
311
 
312
+ ```python
313
+ import pulumi
314
+ import pulumi_databricks as databricks
315
+
316
+ this = databricks.AccountFederationPolicy("this",
317
+ policy_id="my-policy",
318
+ oidc_policy={
319
+ "issuer": "https://myidp.example.com",
320
+ "subject_claim": "sub",
321
+ })
322
+ ```
323
+
300
324
  ## Import
301
325
 
302
326
  As of Pulumi v1.5, resources can be imported through configuration.
@@ -157,6 +157,31 @@ class AccountNetworkPolicy(pulumi.CustomResource):
157
157
 
158
158
  ## Example Usage
159
159
 
160
+ ```python
161
+ import pulumi
162
+ import pulumi_databricks as databricks
163
+
164
+ example_network_policy = databricks.AccountNetworkPolicy("example_network_policy",
165
+ network_policy_id="example-network-policy",
166
+ egress={
167
+ "network_access": {
168
+ "restriction_mode": "RESTRICTED_ACCESS",
169
+ "allowed_internet_destinations": [{
170
+ "destination": "example.com",
171
+ "internet_destination_type": "DNS_NAME",
172
+ }],
173
+ "allowed_storage_destinations": [{
174
+ "bucket_name": "example-aws-cloud-storage",
175
+ "region": "us-west-1",
176
+ "storage_destination_type": "AWS_S3",
177
+ }],
178
+ "policy_enforcement": {
179
+ "enforcement_mode": "ENFORCED",
180
+ },
181
+ },
182
+ })
183
+ ```
184
+
160
185
  ## Import
161
186
 
162
187
  As of Pulumi v1.5, resources can be imported through configuration.
@@ -206,6 +231,31 @@ class AccountNetworkPolicy(pulumi.CustomResource):
206
231
 
207
232
  ## Example Usage
208
233
 
234
+ ```python
235
+ import pulumi
236
+ import pulumi_databricks as databricks
237
+
238
+ example_network_policy = databricks.AccountNetworkPolicy("example_network_policy",
239
+ network_policy_id="example-network-policy",
240
+ egress={
241
+ "network_access": {
242
+ "restriction_mode": "RESTRICTED_ACCESS",
243
+ "allowed_internet_destinations": [{
244
+ "destination": "example.com",
245
+ "internet_destination_type": "DNS_NAME",
246
+ }],
247
+ "allowed_storage_destinations": [{
248
+ "bucket_name": "example-aws-cloud-storage",
249
+ "region": "us-west-1",
250
+ "storage_destination_type": "AWS_S3",
251
+ }],
252
+ "policy_enforcement": {
253
+ "enforcement_mode": "ENFORCED",
254
+ },
255
+ },
256
+ })
257
+ ```
258
+
209
259
  ## Import
210
260
 
211
261
  As of Pulumi v1.5, resources can be imported through configuration.