-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_databricks_workspace - support for enhanced security compliance features #26606
azurerm_databricks_workspace - support for enhanced security compliance features #26606
Conversation
…_security_compliance' block
…bricks_workspace' resource
This PR needs work: it fails the acceptance test
(other response headers omitted for brevity)
I will push a commit to fix. Update 2024-10-30: fixed in 1b129ac0. It's still in my fork because I don't have permission to push into this branch yet. Will check with Hashicorp folks once I've completed review and testing. |
@ssouthcity I have made some bugfix and added test coverage. Can you please cherry pick the additional commits I made in this branch: #27870 back into this PR as I don't have maintainer permission to this repo. |
Thanks heaps @stephybun ! |
our databricks workspace created by terraform, had security and compliance enabled manually outside of terraform, but an update on terraform side is resulting in this error:
terraform plan shows nothing though:
|
Hi @manjinder-mckc , managing enhanced security and compliance feature outside of Terraform (while the rest of workspace config is in Terraform) is not supported. With this PR, enhanced security and compliance is now supported in Terraform. You need to upgrade the azurerm provider version to 4.12.0 or higher and run Please also refer to the |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Community Note
Description
Azure have recently introduced Enhanced Security Compliance features to Databricks Workspaces. This collection of features includes automatic updates of the workspace, security monitoring of activities within the workspace, as well as opting in to privacy and security standards. These features are now usable by everyone, as they have entered general availability. The only exception is automatic cluster updates, which is still in public preview. This PR addresses and adds these features to the Terraform provider schema.
After any of the Enhanced Security Compliance features have been activated on the workspace, the Azure API expects every subsequent PUT request to include the whole definition, including all of the features. My implementation solves this dilemma by always including the definition object with the create/update requests, using opt-out default values for all of the features. I would not consider this a breaking change, but users can now expect their POST/PUT requests to include this object.
PR Checklist
For example: “
resource_name_here
- description of change e.g. adding propertynew_property_name_here
”Changes to existing Resource / Data Source
Testing
I was not able to run the acceptance test due to my company's strict Azure policies. Due to this it was also difficult to write tests, as I couldn't see if they ran green. As a compromise I did thorough experimentation with my feature, testing several different permutations of attribute values to ensure an invalid state is unreachable.
Change Log
Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.
azurerm_databricks_workspace
- support for theenhanced_security_compliance
property [GH-00000]This is a (please select all that apply):
Related Issue(s)
Fixes #25700
Note
If this PR changes meaningfully during the course of review please update the title and description as required.