pulumi-databricks 1.78.0a1762407761__py3-none-any.whl → 1.79.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_databricks/__init__.py +23 -0
- pulumi_databricks/_inputs.py +1630 -181
- pulumi_databricks/access_control_rule_set.py +81 -0
- pulumi_databricks/account_federation_policy.py +24 -0
- pulumi_databricks/account_network_policy.py +50 -0
- pulumi_databricks/account_setting_v2.py +181 -12
- pulumi_databricks/alert_v2.py +74 -2
- pulumi_databricks/app.py +71 -7
- pulumi_databricks/apps_settings_custom_template.py +102 -0
- pulumi_databricks/catalog.py +8 -8
- pulumi_databricks/cluster_policy.py +120 -0
- pulumi_databricks/config/__init__.pyi +4 -0
- pulumi_databricks/config/vars.py +8 -0
- pulumi_databricks/credential.py +7 -7
- pulumi_databricks/dashboard.py +94 -0
- pulumi_databricks/data_quality_monitor.py +2 -2
- pulumi_databricks/data_quality_refresh.py +78 -2
- pulumi_databricks/database_synced_database_table.py +212 -0
- pulumi_databricks/external_location.py +131 -7
- pulumi_databricks/feature_engineering_feature.py +52 -19
- pulumi_databricks/feature_engineering_kafka_config.py +463 -0
- pulumi_databricks/feature_engineering_materialized_feature.py +47 -0
- pulumi_databricks/file.py +2 -2
- pulumi_databricks/get_account_setting_v2.py +16 -16
- pulumi_databricks/get_alert_v2.py +2 -2
- pulumi_databricks/get_alerts_v2.py +2 -2
- pulumi_databricks/get_aws_assume_role_policy.py +14 -14
- pulumi_databricks/get_aws_bucket_policy.py +10 -10
- pulumi_databricks/get_aws_unity_catalog_assume_role_policy.py +10 -10
- pulumi_databricks/get_aws_unity_catalog_policy.py +10 -10
- pulumi_databricks/get_cluster.py +54 -0
- pulumi_databricks/get_current_config.py +4 -4
- pulumi_databricks/get_dashboards.py +32 -0
- pulumi_databricks/get_data_quality_monitor.py +2 -2
- pulumi_databricks/get_data_quality_monitors.py +2 -2
- pulumi_databricks/get_data_quality_refresh.py +2 -2
- pulumi_databricks/get_data_quality_refreshes.py +2 -2
- pulumi_databricks/get_feature_engineering_feature.py +12 -1
- pulumi_databricks/get_feature_engineering_kafka_config.py +182 -0
- pulumi_databricks/get_feature_engineering_kafka_configs.py +103 -0
- pulumi_databricks/get_feature_engineering_materialized_feature.py +16 -2
- pulumi_databricks/get_metastore.py +6 -6
- pulumi_databricks/get_notebook.py +20 -1
- pulumi_databricks/get_policy_info.py +36 -2
- pulumi_databricks/get_policy_infos.py +34 -2
- pulumi_databricks/get_service_principals.py +93 -7
- pulumi_databricks/get_spark_version.py +2 -2
- pulumi_databricks/get_tag_policies.py +2 -2
- pulumi_databricks/get_tag_policy.py +2 -2
- pulumi_databricks/get_users.py +194 -0
- pulumi_databricks/get_workspace_entity_tag_assignment.py +180 -0
- pulumi_databricks/get_workspace_entity_tag_assignments.py +171 -0
- pulumi_databricks/get_workspace_setting_v2.py +16 -16
- pulumi_databricks/instance_profile.py +0 -182
- pulumi_databricks/lakehouse_monitor.py +2 -2
- pulumi_databricks/metastore.py +81 -7
- pulumi_databricks/metastore_data_access.py +48 -0
- pulumi_databricks/mlflow_webhook.py +4 -4
- pulumi_databricks/mws_credentials.py +10 -10
- pulumi_databricks/mws_customer_managed_keys.py +0 -288
- pulumi_databricks/mws_log_delivery.py +146 -0
- pulumi_databricks/mws_storage_configurations.py +16 -16
- pulumi_databricks/mws_vpc_endpoint.py +56 -56
- pulumi_databricks/mws_workspaces.py +115 -55
- pulumi_databricks/notebook.py +49 -0
- pulumi_databricks/outputs.py +2017 -240
- pulumi_databricks/permission_assignment.py +49 -0
- pulumi_databricks/permissions.py +6 -6
- pulumi_databricks/pipeline.py +7 -7
- pulumi_databricks/policy_info.py +122 -2
- pulumi_databricks/provider.py +36 -1
- pulumi_databricks/pulumi-plugin.json +1 -1
- pulumi_databricks/recipient.py +74 -0
- pulumi_databricks/registered_model.py +7 -7
- pulumi_databricks/rfa_access_request_destinations.py +86 -19
- pulumi_databricks/schema.py +7 -7
- pulumi_databricks/service_principal_federation_policy.py +28 -0
- pulumi_databricks/sql_table.py +7 -7
- pulumi_databricks/tag_policy.py +2 -2
- pulumi_databricks/volume.py +7 -7
- pulumi_databricks/workspace_entity_tag_assignment.py +375 -0
- pulumi_databricks/workspace_setting_v2.py +181 -12
- {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/METADATA +1 -1
- {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/RECORD +86 -79
- {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/WHEEL +0 -0
- {pulumi_databricks-1.78.0a1762407761.dist-info → pulumi_databricks-1.79.0.dist-info}/top_level.txt +0 -0
|
@@ -33,6 +33,7 @@ class AccessControlRuleSetArgs:
|
|
|
33
33
|
* `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
|
|
34
34
|
* `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
|
|
35
35
|
* `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
|
|
36
|
+
* `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
|
|
36
37
|
"""
|
|
37
38
|
if grant_rules is not None:
|
|
38
39
|
pulumi.set(__self__, "grant_rules", grant_rules)
|
|
@@ -62,6 +63,7 @@ class AccessControlRuleSetArgs:
|
|
|
62
63
|
* `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
|
|
63
64
|
* `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
|
|
64
65
|
* `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
|
|
66
|
+
* `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
|
|
65
67
|
"""
|
|
66
68
|
return pulumi.get(self, "name")
|
|
67
69
|
|
|
@@ -86,6 +88,7 @@ class _AccessControlRuleSetState:
|
|
|
86
88
|
* `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
|
|
87
89
|
* `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
|
|
88
90
|
* `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
|
|
91
|
+
* `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
|
|
89
92
|
"""
|
|
90
93
|
if etag is not None:
|
|
91
94
|
pulumi.set(__self__, "etag", etag)
|
|
@@ -126,6 +129,7 @@ class _AccessControlRuleSetState:
|
|
|
126
129
|
* `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
|
|
127
130
|
* `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
|
|
128
131
|
* `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
|
|
132
|
+
* `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
|
|
129
133
|
"""
|
|
130
134
|
return pulumi.get(self, "name")
|
|
131
135
|
|
|
@@ -314,6 +318,43 @@ class AccessControlRuleSet(pulumi.CustomResource):
|
|
|
314
318
|
])
|
|
315
319
|
```
|
|
316
320
|
|
|
321
|
+
## Tag policy usage
|
|
322
|
+
|
|
323
|
+
Access to tag policies could be controlled with this resource:
|
|
324
|
+
|
|
325
|
+
```python
|
|
326
|
+
import pulumi
|
|
327
|
+
import pulumi_databricks as databricks
|
|
328
|
+
|
|
329
|
+
account_id = "00000000-0000-0000-0000-000000000000"
|
|
330
|
+
# account level group
|
|
331
|
+
ds = databricks.get_group(display_name="Data Science")
|
|
332
|
+
john = databricks.get_user(user_name="john.doe@example.com")
|
|
333
|
+
this = databricks.TagPolicy("this",
|
|
334
|
+
tag_key="example_tag_key",
|
|
335
|
+
description="Example description.",
|
|
336
|
+
values=[
|
|
337
|
+
{
|
|
338
|
+
"name": "example_value_2",
|
|
339
|
+
},
|
|
340
|
+
{
|
|
341
|
+
"name": "example_value_3",
|
|
342
|
+
},
|
|
343
|
+
])
|
|
344
|
+
tag_policy_usage = databricks.AccessControlRuleSet("tag_policy_usage",
|
|
345
|
+
name=this.id.apply(lambda id: f"accounts/{account_id}/tagPolicies/{id}/ruleSets/default"),
|
|
346
|
+
grant_rules=[
|
|
347
|
+
{
|
|
348
|
+
"principals": [john.acl_principal_id],
|
|
349
|
+
"role": "roles/tagPolicy.manager",
|
|
350
|
+
},
|
|
351
|
+
{
|
|
352
|
+
"principals": [ds.acl_principal_id],
|
|
353
|
+
"role": "roles/tagPolicy.assigner",
|
|
354
|
+
},
|
|
355
|
+
])
|
|
356
|
+
```
|
|
357
|
+
|
|
317
358
|
## Related Resources
|
|
318
359
|
|
|
319
360
|
The following resources are often used in the same context:
|
|
@@ -332,6 +373,7 @@ class AccessControlRuleSet(pulumi.CustomResource):
|
|
|
332
373
|
* `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
|
|
333
374
|
* `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
|
|
334
375
|
* `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
|
|
376
|
+
* `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
|
|
335
377
|
"""
|
|
336
378
|
...
|
|
337
379
|
@overload
|
|
@@ -510,6 +552,43 @@ class AccessControlRuleSet(pulumi.CustomResource):
|
|
|
510
552
|
])
|
|
511
553
|
```
|
|
512
554
|
|
|
555
|
+
## Tag policy usage
|
|
556
|
+
|
|
557
|
+
Access to tag policies could be controlled with this resource:
|
|
558
|
+
|
|
559
|
+
```python
|
|
560
|
+
import pulumi
|
|
561
|
+
import pulumi_databricks as databricks
|
|
562
|
+
|
|
563
|
+
account_id = "00000000-0000-0000-0000-000000000000"
|
|
564
|
+
# account level group
|
|
565
|
+
ds = databricks.get_group(display_name="Data Science")
|
|
566
|
+
john = databricks.get_user(user_name="john.doe@example.com")
|
|
567
|
+
this = databricks.TagPolicy("this",
|
|
568
|
+
tag_key="example_tag_key",
|
|
569
|
+
description="Example description.",
|
|
570
|
+
values=[
|
|
571
|
+
{
|
|
572
|
+
"name": "example_value_2",
|
|
573
|
+
},
|
|
574
|
+
{
|
|
575
|
+
"name": "example_value_3",
|
|
576
|
+
},
|
|
577
|
+
])
|
|
578
|
+
tag_policy_usage = databricks.AccessControlRuleSet("tag_policy_usage",
|
|
579
|
+
name=this.id.apply(lambda id: f"accounts/{account_id}/tagPolicies/{id}/ruleSets/default"),
|
|
580
|
+
grant_rules=[
|
|
581
|
+
{
|
|
582
|
+
"principals": [john.acl_principal_id],
|
|
583
|
+
"role": "roles/tagPolicy.manager",
|
|
584
|
+
},
|
|
585
|
+
{
|
|
586
|
+
"principals": [ds.acl_principal_id],
|
|
587
|
+
"role": "roles/tagPolicy.assigner",
|
|
588
|
+
},
|
|
589
|
+
])
|
|
590
|
+
```
|
|
591
|
+
|
|
513
592
|
## Related Resources
|
|
514
593
|
|
|
515
594
|
The following resources are often used in the same context:
|
|
@@ -575,6 +654,7 @@ class AccessControlRuleSet(pulumi.CustomResource):
|
|
|
575
654
|
* `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
|
|
576
655
|
* `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
|
|
577
656
|
* `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
|
|
657
|
+
* `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
|
|
578
658
|
"""
|
|
579
659
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
580
660
|
|
|
@@ -609,6 +689,7 @@ class AccessControlRuleSet(pulumi.CustomResource):
|
|
|
609
689
|
* `accounts/{account_id}/servicePrincipals/{service_principal_application_id}/ruleSets/default` - access control for a specific service principal.
|
|
610
690
|
* `accounts/{account_id}/groups/{group_id}/ruleSets/default` - access control for a specific group.
|
|
611
691
|
* `accounts/{account_id}/budgetPolicies/{budget_policy_id}/ruleSets/default` - access control for a specific budget policy.
|
|
692
|
+
* `accounts/{account_id}/tagPolicies/{tag_policy_id}/ruleSets/default` - access control for a specific tag policy.
|
|
612
693
|
"""
|
|
613
694
|
return pulumi.get(self, "name")
|
|
614
695
|
|
|
@@ -252,6 +252,18 @@ class AccountFederationPolicy(pulumi.CustomResource):
|
|
|
252
252
|
|
|
253
253
|
## Example Usage
|
|
254
254
|
|
|
255
|
+
```python
|
|
256
|
+
import pulumi
|
|
257
|
+
import pulumi_databricks as databricks
|
|
258
|
+
|
|
259
|
+
this = databricks.AccountFederationPolicy("this",
|
|
260
|
+
policy_id="my-policy",
|
|
261
|
+
oidc_policy={
|
|
262
|
+
"issuer": "https://myidp.example.com",
|
|
263
|
+
"subject_claim": "sub",
|
|
264
|
+
})
|
|
265
|
+
```
|
|
266
|
+
|
|
255
267
|
## Import
|
|
256
268
|
|
|
257
269
|
As of Pulumi v1.5, resources can be imported through configuration.
|
|
@@ -297,6 +309,18 @@ class AccountFederationPolicy(pulumi.CustomResource):
|
|
|
297
309
|
|
|
298
310
|
## Example Usage
|
|
299
311
|
|
|
312
|
+
```python
|
|
313
|
+
import pulumi
|
|
314
|
+
import pulumi_databricks as databricks
|
|
315
|
+
|
|
316
|
+
this = databricks.AccountFederationPolicy("this",
|
|
317
|
+
policy_id="my-policy",
|
|
318
|
+
oidc_policy={
|
|
319
|
+
"issuer": "https://myidp.example.com",
|
|
320
|
+
"subject_claim": "sub",
|
|
321
|
+
})
|
|
322
|
+
```
|
|
323
|
+
|
|
300
324
|
## Import
|
|
301
325
|
|
|
302
326
|
As of Pulumi v1.5, resources can be imported through configuration.
|
|
@@ -157,6 +157,31 @@ class AccountNetworkPolicy(pulumi.CustomResource):
|
|
|
157
157
|
|
|
158
158
|
## Example Usage
|
|
159
159
|
|
|
160
|
+
```python
|
|
161
|
+
import pulumi
|
|
162
|
+
import pulumi_databricks as databricks
|
|
163
|
+
|
|
164
|
+
example_network_policy = databricks.AccountNetworkPolicy("example_network_policy",
|
|
165
|
+
network_policy_id="example-network-policy",
|
|
166
|
+
egress={
|
|
167
|
+
"network_access": {
|
|
168
|
+
"restriction_mode": "RESTRICTED_ACCESS",
|
|
169
|
+
"allowed_internet_destinations": [{
|
|
170
|
+
"destination": "example.com",
|
|
171
|
+
"internet_destination_type": "DNS_NAME",
|
|
172
|
+
}],
|
|
173
|
+
"allowed_storage_destinations": [{
|
|
174
|
+
"bucket_name": "example-aws-cloud-storage",
|
|
175
|
+
"region": "us-west-1",
|
|
176
|
+
"storage_destination_type": "AWS_S3",
|
|
177
|
+
}],
|
|
178
|
+
"policy_enforcement": {
|
|
179
|
+
"enforcement_mode": "ENFORCED",
|
|
180
|
+
},
|
|
181
|
+
},
|
|
182
|
+
})
|
|
183
|
+
```
|
|
184
|
+
|
|
160
185
|
## Import
|
|
161
186
|
|
|
162
187
|
As of Pulumi v1.5, resources can be imported through configuration.
|
|
@@ -206,6 +231,31 @@ class AccountNetworkPolicy(pulumi.CustomResource):
|
|
|
206
231
|
|
|
207
232
|
## Example Usage
|
|
208
233
|
|
|
234
|
+
```python
|
|
235
|
+
import pulumi
|
|
236
|
+
import pulumi_databricks as databricks
|
|
237
|
+
|
|
238
|
+
example_network_policy = databricks.AccountNetworkPolicy("example_network_policy",
|
|
239
|
+
network_policy_id="example-network-policy",
|
|
240
|
+
egress={
|
|
241
|
+
"network_access": {
|
|
242
|
+
"restriction_mode": "RESTRICTED_ACCESS",
|
|
243
|
+
"allowed_internet_destinations": [{
|
|
244
|
+
"destination": "example.com",
|
|
245
|
+
"internet_destination_type": "DNS_NAME",
|
|
246
|
+
}],
|
|
247
|
+
"allowed_storage_destinations": [{
|
|
248
|
+
"bucket_name": "example-aws-cloud-storage",
|
|
249
|
+
"region": "us-west-1",
|
|
250
|
+
"storage_destination_type": "AWS_S3",
|
|
251
|
+
}],
|
|
252
|
+
"policy_enforcement": {
|
|
253
|
+
"enforcement_mode": "ENFORCED",
|
|
254
|
+
},
|
|
255
|
+
},
|
|
256
|
+
})
|
|
257
|
+
```
|
|
258
|
+
|
|
209
259
|
## Import
|
|
210
260
|
|
|
211
261
|
As of Pulumi v1.5, resources can be imported through configuration.
|