@@ -41,12 +41,13 @@ data "azurerm_key_vault" "example" {
41
41
resource_group_name = "example-rg"
42
42
}
43
43
44
- # Given module is tightly coupled with this " Runtime Premium" module, it's usage is prerequisite .
44
+ # Example usage of module for Runtime Premium resources .
45
45
module "databricks_runtime_premium" {
46
46
source = "data-platform-hq/databricks-runtime-premium/databricks"
47
47
48
- sku = data.databricks_workspace.example.sku
49
- workspace_id = data.databricks_workspace.example.workspace_id
48
+ project = "datahq"
49
+ env = "example"
50
+ location = "eastus"
50
51
51
52
# Parameters of Service principal used for ADLS mount
52
53
# Imports App ID and Secret of Service Principal from target Key Vault
@@ -76,32 +77,6 @@ module "databricks_runtime_premium" {
76
77
},
77
78
}
78
79
}]
79
-
80
- # Additional Secret Scope
81
- secret_scope = [{
82
- scope_name = "extra-scope"
83
- # Only custom workspace group names are allowed. If left empty then only Workspace admins could access these keys
84
- acl = [
85
- { principal = "DEVELOPERS", permission = "READ" }
86
- ]
87
- secrets = [
88
- { key = "secret-name", string_value = "secret-value"}
89
- ]
90
- }]
91
-
92
- providers = {
93
- databricks = databricks.main
94
- }
95
- }
96
-
97
- # Example usage of module for Runtime Premium resources.
98
- module "databricks_runtime_premium" {
99
- source = "data-platform-hq/databricks-runtime-premium/databricks"
100
-
101
- project = "datahq"
102
- env = "example"
103
- location = "eastus"
104
-
105
80
# Workspace could be accessed only from these IP Addresses:
106
81
ip_rules = {
107
82
"ip_range_1" = "10.128.0.0/16",
@@ -129,12 +104,8 @@ module "databricks_runtime_premium" {
129
104
130
105
# Workspace admins
131
106
workspace_admins = {
132
- user = [
133
- "user1@example.com"
134
- ]
135
- service_principal = [
136
- "example-app-id"
137
- ]
107
+ user = ["user1@example.com"]
108
+ service_principal = ["example-app-id"]
138
109
}
139
110
140
111
# Custom Workspace group with assigned users/service_principals.
@@ -149,6 +120,13 @@ module "databricks_runtime_premium" {
149
120
entitlements = ["allow_instance_pool_create","allow_cluster_create","databricks_sql_access"]
150
121
}
151
122
}
123
+
124
+ # Additional Secret Scope
125
+ secret_scope = [{
126
+ scope_name = "extra-scope"
127
+ acl = [{ principal = "DEVELOPERS", permission = "READ" }] # Only custom workspace group names are allowed. If left empty then only Workspace admins could access these keys
128
+ secrets = [{ key = "secret-name", string_value = "secret-value"}]
129
+ }]
152
130
153
131
providers = {
154
132
databricks = databricks.main
@@ -249,13 +227,16 @@ module "databricks_runtime_premium" {
249
227
250
228
# Permissions
251
229
workspace_admins = {
252
- user = [
253
- "user1@example.com",
254
- ]
255
- service_principal = [
256
- "example-app-id"
257
- ]
230
+ user = ["user1@example.com"]
231
+ service_principal = ["example-app-id"]
258
232
}
233
+
234
+ # Cluster for Unity Catalog access
235
+ databricks_cluster_configs = [{
236
+ cluster_name = "Unity Catalog"
237
+ availability = "SPOT_AZURE"
238
+ spot_bid_max_price = -1
239
+ }]
259
240
260
241
providers = {
261
242
databricks = databricks.main
0 commit comments