UNPKG

@pulumi/databricks

Version:

A Pulumi package for creating and managing databricks cloud resources.

86 lines 4.15 kB
"use strict"; // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.getAwsCrossAccountPolicyOutput = exports.getAwsCrossAccountPolicy = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("./utilities"); /** * > **Note** This data source can only be used with an account-level provider! * * This data source constructs necessary AWS cross-account policy for you, which is based on [official documentation](https://docs.databricks.com/administration-guide/account-api/iam-role.html#language-Your%C2%A0VPC,%C2%A0default). * * ## Example Usage * * For more detailed usage please see databricks.getAwsAssumeRolePolicy or databricksAwsS3Mount pages. * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as databricks from "@pulumi/databricks"; * * const _this = databricks.getAwsCrossAccountPolicy({}); * ``` * * ## Related Resources * * The following resources are used in the same context: * * * Provisioning AWS Databricks workspaces with a Hub & Spoke firewall for data exfiltration protection guide * * databricks.getAwsAssumeRolePolicy data to construct the necessary AWS STS assume role policy. * * databricks.getAwsBucketPolicy data to configure a simple access policy for AWS S3 buckets, so that Databricks can access data in it. * * databricks.InstanceProfile to manage AWS EC2 instance profiles that users can launch databricks.Cluster and access data, like databricks_mount. */ function getAwsCrossAccountPolicy(args, opts) { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invoke("databricks:index/getAwsCrossAccountPolicy:getAwsCrossAccountPolicy", { "awsAccountId": args.awsAccountId, "awsPartition": args.awsPartition, "passRoles": args.passRoles, "policyType": args.policyType, "region": args.region, "securityGroupId": args.securityGroupId, "vpcId": args.vpcId, }, opts); } exports.getAwsCrossAccountPolicy = getAwsCrossAccountPolicy; /** * > **Note** This data source can only be used with an account-level provider! * * This data source constructs necessary AWS cross-account policy for you, which is based on [official documentation](https://docs.databricks.com/administration-guide/account-api/iam-role.html#language-Your%C2%A0VPC,%C2%A0default). * * ## Example Usage * * For more detailed usage please see databricks.getAwsAssumeRolePolicy or databricksAwsS3Mount pages. * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as databricks from "@pulumi/databricks"; * * const _this = databricks.getAwsCrossAccountPolicy({}); * ``` * * ## Related Resources * * The following resources are used in the same context: * * * Provisioning AWS Databricks workspaces with a Hub & Spoke firewall for data exfiltration protection guide * * databricks.getAwsAssumeRolePolicy data to construct the necessary AWS STS assume role policy. * * databricks.getAwsBucketPolicy data to configure a simple access policy for AWS S3 buckets, so that Databricks can access data in it. * * databricks.InstanceProfile to manage AWS EC2 instance profiles that users can launch databricks.Cluster and access data, like databricks_mount. */ function getAwsCrossAccountPolicyOutput(args, opts) { args = args || {}; opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {}); return pulumi.runtime.invokeOutput("databricks:index/getAwsCrossAccountPolicy:getAwsCrossAccountPolicy", { "awsAccountId": args.awsAccountId, "awsPartition": args.awsPartition, "passRoles": args.passRoles, "policyType": args.policyType, "region": args.region, "securityGroupId": args.securityGroupId, "vpcId": args.vpcId, }, opts); } exports.getAwsCrossAccountPolicyOutput = getAwsCrossAccountPolicyOutput; //# sourceMappingURL=getAwsCrossAccountPolicy.js.map