Account Args
data class AccountArgs(val accountName: Output<String>? = null, val defaultGroup: Output<String>? = null, val encryptionConfig: Output<EncryptionConfigArgs>? = null, val encryptionState: Output<EncryptionState>? = null, val firewallAllowAzureIps: Output<FirewallAllowAzureIpsState>? = null, val firewallRules: Output<List<CreateFirewallRuleWithAccountParametersArgs>>? = null, val firewallState: Output<FirewallState>? = null, val identity: Output<EncryptionIdentityArgs>? = null, val location: Output<String>? = null, val newTier: Output<TierType>? = null, val resourceGroupName: Output<String>? = null, val tags: Output<Map<String, String>>? = null, val trustedIdProviderState: Output<TrustedIdProviderState>? = null, val trustedIdProviders: Output<List<CreateTrustedIdProviderWithAccountParametersArgs>>? = null, val virtualNetworkRules: Output<List<CreateVirtualNetworkRuleWithAccountParametersArgs>>? = null) : ConvertibleToJava<AccountArgs>
Data Lake Store account information. API Version: 2016-11-01.
Example Usage
Creates the specified Data Lake Store account
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var account = new AzureNative.DataLakeStore.Account("account", new()
{
AccountName = "contosoadla",
DefaultGroup = "test_default_group",
EncryptionConfig = new AzureNative.DataLakeStore.Inputs.EncryptionConfigArgs
{
KeyVaultMetaInfo = new AzureNative.DataLakeStore.Inputs.KeyVaultMetaInfoArgs
{
EncryptionKeyName = "test_encryption_key_name",
EncryptionKeyVersion = "encryption_key_version",
KeyVaultResourceId = "34adfa4f-cedf-4dc0-ba29-b6d1a69ab345",
},
Type = AzureNative.DataLakeStore.EncryptionConfigType.UserManaged,
},
EncryptionState = AzureNative.DataLakeStore.EncryptionState.Enabled,
FirewallAllowAzureIps = AzureNative.DataLakeStore.FirewallAllowAzureIpsState.Enabled,
FirewallRules = new[]
{
new AzureNative.DataLakeStore.Inputs.CreateFirewallRuleWithAccountParametersArgs
{
EndIpAddress = "2.2.2.2",
Name = "test_rule",
StartIpAddress = "1.1.1.1",
},
},
FirewallState = AzureNative.DataLakeStore.FirewallState.Enabled,
Identity = new AzureNative.DataLakeStore.Inputs.EncryptionIdentityArgs
{
Type = AzureNative.DataLakeStore.EncryptionIdentityType.SystemAssigned,
},
Location = "eastus2",
NewTier = AzureNative.DataLakeStore.TierType.Consumption,
ResourceGroupName = "contosorg",
Tags =
{
{ "test_key", "test_value" },
},
TrustedIdProviderState = AzureNative.DataLakeStore.TrustedIdProviderState.Enabled,
TrustedIdProviders = new[]
{
new AzureNative.DataLakeStore.Inputs.CreateTrustedIdProviderWithAccountParametersArgs
{
IdProvider = "https://sts.windows.net/ea9ec534-a3e3-4e45-ad36-3afc5bb291c1",
Name = "test_trusted_id_provider_name",
},
},
});
});
Content copied to clipboard
package main
import (
datalakestore "github.com/pulumi/pulumi-azure-native-sdk/datalakestore"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := datalakestore.NewAccount(ctx, "account", &datalakestore.AccountArgs{
AccountName: pulumi.String("contosoadla"),
DefaultGroup: pulumi.String("test_default_group"),
EncryptionConfig: datalakestore.EncryptionConfigResponse{
KeyVaultMetaInfo: &datalakestore.KeyVaultMetaInfoArgs{
EncryptionKeyName: pulumi.String("test_encryption_key_name"),
EncryptionKeyVersion: pulumi.String("encryption_key_version"),
KeyVaultResourceId: pulumi.String("34adfa4f-cedf-4dc0-ba29-b6d1a69ab345"),
},
Type: datalakestore.EncryptionConfigTypeUserManaged,
},
EncryptionState: datalakestore.EncryptionStateEnabled,
FirewallAllowAzureIps: datalakestore.FirewallAllowAzureIpsStateEnabled,
FirewallRules: []datalakestore.CreateFirewallRuleWithAccountParametersArgs{
{
EndIpAddress: pulumi.String("2.2.2.2"),
Name: pulumi.String("test_rule"),
StartIpAddress: pulumi.String("1.1.1.1"),
},
},
FirewallState: datalakestore.FirewallStateEnabled,
Identity: &datalakestore.EncryptionIdentityArgs{
Type: datalakestore.EncryptionIdentityTypeSystemAssigned,
},
Location: pulumi.String("eastus2"),
NewTier: datalakestore.TierTypeConsumption,
ResourceGroupName: pulumi.String("contosorg"),
Tags: pulumi.StringMap{
"test_key": pulumi.String("test_value"),
},
TrustedIdProviderState: datalakestore.TrustedIdProviderStateEnabled,
TrustedIdProviders: []datalakestore.CreateTrustedIdProviderWithAccountParametersArgs{
{
IdProvider: pulumi.String("https://sts.windows.net/ea9ec534-a3e3-4e45-ad36-3afc5bb291c1"),
Name: pulumi.String("test_trusted_id_provider_name"),
},
},
})
if err != nil {
return err
}
return nil
})
}
Content copied to clipboard
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.datalakestore.Account;
import com.pulumi.azurenative.datalakestore.AccountArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var account = new Account("account", AccountArgs.builder()
.accountName("contosoadla")
.defaultGroup("test_default_group")
.encryptionConfig(Map.ofEntries(
Map.entry("keyVaultMetaInfo", Map.ofEntries(
Map.entry("encryptionKeyName", "test_encryption_key_name"),
Map.entry("encryptionKeyVersion", "encryption_key_version"),
Map.entry("keyVaultResourceId", "34adfa4f-cedf-4dc0-ba29-b6d1a69ab345")
)),
Map.entry("type", "UserManaged")
))
.encryptionState("Enabled")
.firewallAllowAzureIps("Enabled")
.firewallRules(Map.ofEntries(
Map.entry("endIpAddress", "2.2.2.2"),
Map.entry("name", "test_rule"),
Map.entry("startIpAddress", "1.1.1.1")
))
.firewallState("Enabled")
.identity(Map.of("type", "SystemAssigned"))
.location("eastus2")
.newTier("Consumption")
.resourceGroupName("contosorg")
.tags(Map.of("test_key", "test_value"))
.trustedIdProviderState("Enabled")
.trustedIdProviders(Map.ofEntries(
Map.entry("idProvider", "https://sts.windows.net/ea9ec534-a3e3-4e45-ad36-3afc5bb291c1"),
Map.entry("name", "test_trusted_id_provider_name")
))
.build());
}
}
Content copied to clipboard
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:datalakestore:Account contosoadla 34adfa4f-cedf-4dc0-ba29-b6d1a69ab345
Content copied to clipboard
Constructors
Link copied to clipboard
fun AccountArgs(accountName: Output<String>? = null, defaultGroup: Output<String>? = null, encryptionConfig: Output<EncryptionConfigArgs>? = null, encryptionState: Output<EncryptionState>? = null, firewallAllowAzureIps: Output<FirewallAllowAzureIpsState>? = null, firewallRules: Output<List<CreateFirewallRuleWithAccountParametersArgs>>? = null, firewallState: Output<FirewallState>? = null, identity: Output<EncryptionIdentityArgs>? = null, location: Output<String>? = null, newTier: Output<TierType>? = null, resourceGroupName: Output<String>? = null, tags: Output<Map<String, String>>? = null, trustedIdProviderState: Output<TrustedIdProviderState>? = null, trustedIdProviders: Output<List<CreateTrustedIdProviderWithAccountParametersArgs>>? = null, virtualNetworkRules: Output<List<CreateVirtualNetworkRuleWithAccountParametersArgs>>? = null)