Skip to content

Commit 8743d03

Browse files
author
dmytro_velychko3
committed
docs: changed Readme.md
1 parent 27d38e1 commit 8743d03

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

README.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,13 @@ Terraform module used for managment of Databricks Premium Resources
99
| Name | Version |
1010
| ---------------------------------------------------------------------------- | -------- |
1111
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0.0 |
12-
| <a name="requirement_databricks"></a> [databricks](#requirement\_databricks) | >= 1.4.0 |
12+
| <a name="requirement_databricks"></a> [databricks](#requirement\_databricks) | >= 1.9.0 |
1313

1414
## Providers
1515

1616
| Name | Version |
1717
| ---------------------------------------------------------------------- | ------- |
18-
| <a name="provider_databricks"></a> [databricks](#provider\_databricks) | 1.4.0 |
18+
| <a name="provider_databricks"></a> [databricks](#provider\_databricks) | 1.9.0 |
1919

2020
## Modules
2121

@@ -25,32 +25,32 @@ No modules.
2525

2626
| Name | Type |
2727
| ---------------------------------------------------------------------------------------------------------------------------------------------------- | -------- |
28-
| [databricks_group.admins](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/group) | data |
2928
| [databricks_group.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/group) | resource |
3029
| [databricks_user.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/user) | resource |
3130
| [databricks_service_principal.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/service_principal) | resource |
32-
| [databricks_group_member.admin_users](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/group_member) | resource |
33-
| [databricks_group_member.admin_service_principals](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/group_member) | resource |
34-
| [databricks_group_member.users](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/group_member) | resource |
35-
| [databricks_group_member.service_principals](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/group_member) | resource |
31+
| [databricks_permission_assignment.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/permission_assignment) | resource |
32+
| [databricks_group_member.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/group_member) | resource |
33+
| [databricks_entitlements.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/entitlements) | resource |
3634
| [databricks_permissions.sql_endpoint](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/permissions) | resource |
3735
| [databricks_permissions.token](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/permissions) | resource |
3836
| [databricks_workspace_conf.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/workspace_conf) | resource |
3937
| [databricks_ip_access_list.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/ip_access_list) | resource |
4038
| [databricks_sql_endpoint.this](https://registry.terraform.io/providers/databricks/databricks/latest/docs/resources/sql_endpoint) | resource |
4139

40+
4241
## Inputs
4342

4443
| Name | Description | Type | Default | Required |
4544
| ------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | :------: |
46-
| <a name="input_env"></a> [env](#input\_env) | Environment name | `string` | n/a | yes |
47-
| <a name="input_project"></a> [project](#input\_project) | Project name | `string` | n/a | yes |
48-
| <a name="input_user_object_ids"></a> [user_object_ids](#input\_user\_object\_ids) | Map of AD usernames and corresponding object IDs | `map(string)` | {} | no |
49-
| <a name="input_iam"></a> [iam](#input\_iam) | Map of groups and members of users and service principals to be created. You can add you own groups and members. E.g., `'group' = { user = ['user1','user2'] service_principal = ['sp1']}` and etc | <pre> map(object({ <br> user = list(string) <br> service_principal = list(string) <br> }))</pre> | <pre> { <br> "admins" = { <br> "user" = [] <br> "service_principal" = [] <br> } <br> "default" = { <br> "user" = [] <br> "service_principal" = [] <br> } <br> } </pre> | no |
50-
| <a name="input_iam_permissions"></a> [iam\_permissions](#input\_iam\_permissions) | Map of permission for groups. You can provide certain permission on services to groups. E.g., 'sql_endpoint'={'CAN_USE'=['group1', 'group2'] CAN_MANAGE=['group3']} | <pre> map(object({ <br> CAN_USE = list(string) <br> CAN_MANAGE = list(string)<br> })) </pre> | <pre> { <br> "sql_endpoint" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> "token" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> } </pre> | no |
51-
| <a name="input_ip_rules"></a> [ip\_rules](#input\_ip\_rules) | Map of IP addresses permitted for access to DB | `map(string)` | {} | no |
52-
| <a name="input_sql_endpoint"></a> [sql\_endpoint](#input\_sql\_endpoint) | Map of SQL Endoints to be deployed in Databricks Workspace | `map(map(string))` | {} | no |
53-
| <a name="input_default_values_sql_endpoint"></a> [default\_values\_sql\_endpoint](#input\_default\_values\_sql\_endpoint) | Default values for SQL Endpoint | <pre> object({ <br> cluster_size = string <br> min_num_clusters = number <br> max_num_clusters = number <br> auto_stop_mins = string <br> enable_photon = bool <br> enable_serverless_compute = bool <br> }) </pre> | <pre> { <br> cluster_size = "2X-Small" <br> min_num_clusters = 0 <br> max_num_clusters = 1 <br> auto_stop_mins = "30" <br> enable_photon = false <br> enable_serverless_compute = false <br> } </pre> | no |
45+
| <a name="input_env"></a> [env](#input\_env) | Environment name | `string` | n/a | yes |
46+
| <a name="input_project"></a> [project](#input\_project) | Project name | `string` | n/a | yes |
47+
| <a name="input_user_object_ids"></a> [user\_object\_ids](#input\_user\_object\_ids) | Map of AD usernames and corresponding object IDs | `map(string)` | {} | no |
48+
| <a name="input_workspace_admins"></a> [workspace\_admins](#input\_workspace\_admins) | Provide users or service principals to grant them Admin permissions. | <pre> object({ <br> user = list(string) <br> service_principal = list(string)<br> }) </pre> |<pre> { <br> user = null <br> service_principal = null <br> } </pre> | no |
49+
| <a name="input_iam"></a> [iam](#input\_iam) | Used to create workspace group. Map of group name and its parameters, such as users and service principals added to the group. Also possible to configure group entitlements. | <pre> map(object({ <br> user = optional(list(string)) <br> service_principal = optional(list(string)) <br> entitlements = optional(list(string)) <br> }))</pre> | {} | no |
50+
| <a name="input_iam_permissions"></a> [iam\_permissions](#input\_iam\_permissions) | Map of permission for groups. You can provide certain permission on services to groups. E.g., `'sql_endpoint'={'CAN_USE'=['group1', 'group2'] CAN_MANAGE=['group3']} | <pre> map(object({ <br> CAN_USE = list(string) <br> CAN_MANAGE = list(string)<br> })) </pre> | <pre> { <br> "sql_endpoint" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> "token" = { <br> "CAN_USE" = ["default"] <br> "CAN_MANAGE" = [] <br> } <br> } </pre> | no |
51+
| <a name="input_ip_rules"></a> [ip\_rules](#input\_ip\_rules)| Map of IP addresses permitted for access to DB | `map(string)` | {} | no |
52+
| <a name="input_sql_endpoint"></a> [sql\_endpoint](#input\_sql\_endpoint) | Map of SQL Endoints to be deployed in Databricks Workspace | `map(map(string))` | {} | no |
53+
| <a name="input_default_values_sql_endpoint"></a> [default\_values\_sql\_endpoint](#input\_default\_values\_sql\_endpoint) | Default values for SQL Endpoint | <pre> object({ <br> cluster_size = string <br> min_num_clusters = number <br> max_num_clusters = number <br> auto_stop_mins = string <br> enable_photon = bool <br> enable_serverless_compute = bool <br> }) </pre> | <pre> { <br> cluster_size = "2X-Small" <br> min_num_clusters = 0 <br> max_num_clusters = 1 <br> auto_stop_mins = "30" <br> enable_photon = false <br> enable_serverless_compute = false <br> } </pre> | no |
5454

5555
## Outputs
5656

0 commit comments

Comments
 (0)