Skip to content

Commit 29b5505

Browse files
committed
docs: updated example in readme
1 parent 7789718 commit 29b5505

File tree

1 file changed

+22
-41
lines changed

1 file changed

+22
-41
lines changed

README.md

Lines changed: 22 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -41,12 +41,13 @@ data "azurerm_key_vault" "example" {
4141
resource_group_name = "example-rg"
4242
}
4343
44-
# Given module is tightly coupled with this "Runtime Premium" module, it's usage is prerequisite.
44+
# Example usage of module for Runtime Premium resources.
4545
module "databricks_runtime_premium" {
4646
source = "data-platform-hq/databricks-runtime-premium/databricks"
4747
48-
sku = data.databricks_workspace.example.sku
49-
workspace_id = data.databricks_workspace.example.workspace_id
48+
project = "datahq"
49+
env = "example"
50+
location = "eastus"
5051
5152
# Parameters of Service principal used for ADLS mount
5253
# Imports App ID and Secret of Service Principal from target Key Vault
@@ -76,32 +77,6 @@ module "databricks_runtime_premium" {
7677
},
7778
}
7879
}]
79-
80-
# Additional Secret Scope
81-
secret_scope = [{
82-
scope_name = "extra-scope"
83-
# Only custom workspace group names are allowed. If left empty then only Workspace admins could access these keys
84-
acl = [
85-
{ principal = "DEVELOPERS", permission = "READ" }
86-
]
87-
secrets = [
88-
{ key = "secret-name", string_value = "secret-value"}
89-
]
90-
}]
91-
92-
providers = {
93-
databricks = databricks.main
94-
}
95-
}
96-
97-
# Example usage of module for Runtime Premium resources.
98-
module "databricks_runtime_premium" {
99-
source = "data-platform-hq/databricks-runtime-premium/databricks"
100-
101-
project = "datahq"
102-
env = "example"
103-
location = "eastus"
104-
10580
# Workspace could be accessed only from these IP Addresses:
10681
ip_rules = {
10782
"ip_range_1" = "10.128.0.0/16",
@@ -129,12 +104,8 @@ module "databricks_runtime_premium" {
129104
130105
# Workspace admins
131106
workspace_admins = {
132-
user = [
133-
"user1@example.com"
134-
]
135-
service_principal = [
136-
"example-app-id"
137-
]
107+
user = ["user1@example.com"]
108+
service_principal = ["example-app-id"]
138109
}
139110
140111
# Custom Workspace group with assigned users/service_principals.
@@ -149,6 +120,13 @@ module "databricks_runtime_premium" {
149120
entitlements = ["allow_instance_pool_create","allow_cluster_create","databricks_sql_access"]
150121
}
151122
}
123+
124+
# Additional Secret Scope
125+
secret_scope = [{
126+
scope_name = "extra-scope"
127+
acl = [{ principal = "DEVELOPERS", permission = "READ" }] # Only custom workspace group names are allowed. If left empty then only Workspace admins could access these keys
128+
secrets = [{ key = "secret-name", string_value = "secret-value"}]
129+
}]
152130
153131
providers = {
154132
databricks = databricks.main
@@ -249,13 +227,16 @@ module "databricks_runtime_premium" {
249227
250228
# Permissions
251229
workspace_admins = {
252-
user = [
253-
"user1@example.com",
254-
]
255-
service_principal = [
256-
"example-app-id"
257-
]
230+
user = ["user1@example.com"]
231+
service_principal = ["example-app-id"]
258232
}
233+
234+
# Cluster for Unity Catalog access
235+
databricks_cluster_configs = [{
236+
cluster_name = "Unity Catalog"
237+
availability = "SPOT_AZURE"
238+
spot_bid_max_price = -1
239+
}]
259240
260241
providers = {
261242
databricks = databricks.main

0 commit comments

Comments
 (0)