@pulumi/databricks
Version:
A Pulumi package for creating and managing databricks cloud resources.
293 lines • 12.4 kB
JavaScript
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.MwsCustomerManagedKeys = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("./utilities");
/**
* ## Example Usage
*
* > If you've used the resource before, please add `useCases = ["MANAGED_SERVICES"]` to keep the previous behaviour.
*
* ### Customer-managed key for managed services
*
* You must configure this during workspace creation
*
* ### For AWS
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as aws from "@pulumi/aws";
* import * as databricks from "@pulumi/databricks";
*
* const config = new pulumi.Config();
* // Account Id that could be found in the top right corner of https://accounts.cloud.databricks.com/
* const databricksAccountId = config.requireObject("databricksAccountId");
* const current = aws.getCallerIdentity({});
* const databricksManagedServicesCmk = current.then(current => aws.iam.getPolicyDocument({
* version: "2012-10-17",
* statements: [
* {
* sid: "Enable IAM User Permissions",
* effect: "Allow",
* principals: [{
* type: "AWS",
* identifiers: [current.accountId],
* }],
* actions: ["kms:*"],
* resources: ["*"],
* },
* {
* sid: "Allow Databricks to use KMS key for control plane managed services",
* effect: "Allow",
* principals: [{
* type: "AWS",
* identifiers: ["arn:aws:iam::414351767826:root"],
* }],
* actions: [
* "kms:Encrypt",
* "kms:Decrypt",
* ],
* resources: ["*"],
* },
* ],
* }));
* const managedServicesCustomerManagedKey = new aws.kms.Key("managed_services_customer_managed_key", {policy: databricksManagedServicesCmk.then(databricksManagedServicesCmk => databricksManagedServicesCmk.json)});
* const managedServicesCustomerManagedKeyAlias = new aws.kms.Alias("managed_services_customer_managed_key_alias", {
* name: "alias/managed-services-customer-managed-key-alias",
* targetKeyId: managedServicesCustomerManagedKey.keyId,
* });
* const managedServices = new databricks.MwsCustomerManagedKeys("managed_services", {
* accountId: databricksAccountId,
* awsKeyInfo: {
* keyArn: managedServicesCustomerManagedKey.arn,
* keyAlias: managedServicesCustomerManagedKeyAlias.name,
* },
* useCases: ["MANAGED_SERVICES"],
* });
* ```
*
* ### For GCP
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as databricks from "@pulumi/databricks";
*
* const config = new pulumi.Config();
* // Account Id that could be found in the top right corner of https://accounts.gcp.databricks.com/
* const databricksAccountId = config.requireObject("databricksAccountId");
* // Id of a google_kms_crypto_key
* const cmekResourceId = config.requireObject("cmekResourceId");
* const managedServices = new databricks.MwsCustomerManagedKeys("managed_services", {
* accountId: databricksAccountId,
* gcpKeyInfo: {
* kmsKeyId: cmekResourceId,
* },
* useCases: ["MANAGED_SERVICES"],
* });
* ```
*
* ### Customer-managed key for workspace storage
*
* ### For AWS
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as aws from "@pulumi/aws";
* import * as databricks from "@pulumi/databricks";
*
* const config = new pulumi.Config();
* // Account Id that could be found in the top right corner of https://accounts.cloud.databricks.com/
* const databricksAccountId = config.requireObject("databricksAccountId");
* // AWS ARN for the Databricks cross account role
* const databricksCrossAccountRole = config.requireObject("databricksCrossAccountRole");
* const current = aws.getCallerIdentity({});
* const databricksStorageCmk = current.then(current => aws.iam.getPolicyDocument({
* version: "2012-10-17",
* statements: [
* {
* sid: "Enable IAM User Permissions",
* effect: "Allow",
* principals: [{
* type: "AWS",
* identifiers: [current.accountId],
* }],
* actions: ["kms:*"],
* resources: ["*"],
* },
* {
* sid: "Allow Databricks to use KMS key for DBFS",
* effect: "Allow",
* principals: [{
* type: "AWS",
* identifiers: ["arn:aws:iam::414351767826:root"],
* }],
* actions: [
* "kms:Encrypt",
* "kms:Decrypt",
* "kms:ReEncrypt*",
* "kms:GenerateDataKey*",
* "kms:DescribeKey",
* ],
* resources: ["*"],
* },
* {
* sid: "Allow Databricks to use KMS key for DBFS (Grants)",
* effect: "Allow",
* principals: [{
* type: "AWS",
* identifiers: ["arn:aws:iam::414351767826:root"],
* }],
* actions: [
* "kms:CreateGrant",
* "kms:ListGrants",
* "kms:RevokeGrant",
* ],
* resources: ["*"],
* conditions: [{
* test: "Bool",
* variable: "kms:GrantIsForAWSResource",
* values: ["true"],
* }],
* },
* {
* sid: "Allow Databricks to use KMS key for EBS",
* effect: "Allow",
* principals: [{
* type: "AWS",
* identifiers: [databricksCrossAccountRole],
* }],
* actions: [
* "kms:Decrypt",
* "kms:GenerateDataKey*",
* "kms:CreateGrant",
* "kms:DescribeKey",
* ],
* resources: ["*"],
* conditions: [{
* test: "ForAnyValue:StringLike",
* variable: "kms:ViaService",
* values: ["ec2.*.amazonaws.com"],
* }],
* },
* ],
* }));
* const storageCustomerManagedKey = new aws.kms.Key("storage_customer_managed_key", {policy: databricksStorageCmk.then(databricksStorageCmk => databricksStorageCmk.json)});
* const storageCustomerManagedKeyAlias = new aws.kms.Alias("storage_customer_managed_key_alias", {
* name: "alias/storage-customer-managed-key-alias",
* targetKeyId: storageCustomerManagedKey.keyId,
* });
* const storage = new databricks.MwsCustomerManagedKeys("storage", {
* accountId: databricksAccountId,
* awsKeyInfo: {
* keyArn: storageCustomerManagedKey.arn,
* keyAlias: storageCustomerManagedKeyAlias.name,
* },
* useCases: ["STORAGE"],
* });
* ```
*
* ### For GCP
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as databricks from "@pulumi/databricks";
*
* const config = new pulumi.Config();
* // Account Id that could be found in the top right corner of https://accounts.gcp.databricks.com/
* const databricksAccountId = config.requireObject("databricksAccountId");
* // Id of a google_kms_crypto_key
* const cmekResourceId = config.requireObject("cmekResourceId");
* const storage = new databricks.MwsCustomerManagedKeys("storage", {
* accountId: databricksAccountId,
* gcpKeyInfo: {
* kmsKeyId: cmekResourceId,
* },
* useCases: ["STORAGE"],
* });
* ```
*
* ## Related Resources
*
* The following resources are used in the same context:
*
* * Provisioning Databricks on AWS guide.
* * databricks.MwsCredentials to configure the cross-account role for creation of new workspaces within AWS.
* * databricks.MwsLogDelivery to configure delivery of [billable usage logs](https://docs.databricks.com/administration-guide/account-settings/billable-usage-delivery.html) and [audit logs](https://docs.databricks.com/administration-guide/account-settings/audit-logs.html).
* * databricks.MwsNetworks to [configure VPC](https://docs.databricks.com/administration-guide/cloud-configurations/aws/customer-managed-vpc.html) & subnets for new workspaces within AWS.
* * databricks.MwsStorageConfigurations to configure root bucket new workspaces within AWS.
* * databricks.MwsWorkspaces to set up [AWS and GCP workspaces](https://docs.databricks.com/getting-started/overview.html#e2-architecture-1).
*
* ## Import
*
* This resource can be imported by Databricks account ID and customer managed key ID.
*
* ```sh
* $ pulumi import databricks:index/mwsCustomerManagedKeys:MwsCustomerManagedKeys this '<account_id>/<customer_managed_key_id>'
* ```
*
* ~> This resource does not support updates. If your configuration does not match the existing resource,
*
* the next `pulumi up` will cause the resource to be destroyed and recreated. After importing,
*
* verify that the configuration matches the existing resource by running `pulumi preview`.
*/
class MwsCustomerManagedKeys extends pulumi.CustomResource {
/**
* Get an existing MwsCustomerManagedKeys resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new MwsCustomerManagedKeys(name, state, Object.assign(Object.assign({}, opts), { id: id }));
}
/**
* Returns true if the given object is an instance of MwsCustomerManagedKeys. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === MwsCustomerManagedKeys.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["accountId"] = state ? state.accountId : undefined;
resourceInputs["awsKeyInfo"] = state ? state.awsKeyInfo : undefined;
resourceInputs["creationTime"] = state ? state.creationTime : undefined;
resourceInputs["customerManagedKeyId"] = state ? state.customerManagedKeyId : undefined;
resourceInputs["gcpKeyInfo"] = state ? state.gcpKeyInfo : undefined;
resourceInputs["useCases"] = state ? state.useCases : undefined;
}
else {
const args = argsOrState;
if ((!args || args.accountId === undefined) && !opts.urn) {
throw new Error("Missing required property 'accountId'");
}
if ((!args || args.useCases === undefined) && !opts.urn) {
throw new Error("Missing required property 'useCases'");
}
resourceInputs["accountId"] = args ? args.accountId : undefined;
resourceInputs["awsKeyInfo"] = args ? args.awsKeyInfo : undefined;
resourceInputs["creationTime"] = args ? args.creationTime : undefined;
resourceInputs["customerManagedKeyId"] = args ? args.customerManagedKeyId : undefined;
resourceInputs["gcpKeyInfo"] = args ? args.gcpKeyInfo : undefined;
resourceInputs["useCases"] = args ? args.useCases : undefined;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
super(MwsCustomerManagedKeys.__pulumiType, name, resourceInputs, opts);
}
}
exports.MwsCustomerManagedKeys = MwsCustomerManagedKeys;
/** @internal */
MwsCustomerManagedKeys.__pulumiType = 'databricks:index/mwsCustomerManagedKeys:MwsCustomerManagedKeys';
//# sourceMappingURL=mwsCustomerManagedKeys.js.map
;