Cluster Args
Uses Azure REST API version 2025-02-01. In version 2.x of the Azure Native provider, it used API version 2023-10-01-preview. Other available API versions: 2023-10-01-preview, 2024-06-01-preview, 2024-07-01, 2024-10-01-preview. These can be accessed by generating a local SDK package using the CLI command pulumi package add azure-native networkcloud [ApiVersion]
. See the ../../../version-guide/#accessing-any-api-version-via-local-packages for details.
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:networkcloud:Cluster clusterName /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetworkCloud/clusters/{clusterName}
Constructors
Properties
The rack definition that is intended to reflect only a single rack in a single rack cluster, or an aggregator rack in a multi-rack cluster.
The settings for the log analytics workspace used for output of logs from this cluster.
Field Deprecated. The resource ID of the Log Analytics Workspace that will be used for storing relevant logs.
The customer-provided location information to identify where the cluster resides.
The name of the cluster.
The service principal to be used by the cluster during Arc Appliance installation.
The type of rack configuration for the cluster.
The current runtime version of the cluster.
The settings for commands run in this cluster, such as bare metal machine run read only commands and data extracts.
The validation threshold indicating the allowable failures of compute machines during environment validation and deployment.
The list of rack definitions for the compute racks in a multi-rack cluster, or an empty list in a single-rack cluster.
The extended location of the cluster manager associated with the cluster.
The identity for the resource.
The configuration of the managed resource group associated with the resource.
The resource ID of the Network Fabric associated with the cluster.
The name of the resource group. The name is case insensitive.
The settings for cluster runtime protection.
The configuration for use of a key vault to store secrets for later retrieval by the operator.
The settings for the secret archive used to hold credentials for the cluster.
The strategy for updating the cluster.
The settings for how security vulnerability scanning is applied to the cluster.