Account Args
Data Lake Store account information. Uses Azure REST API version 2016-11-01. In version 2.x of the Azure Native provider, it used API version 2016-11-01.
Example Usage
Creates the specified Data Lake Store account
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var account = new AzureNative.DataLakeStore.Account("account", new()
{
AccountName = "contosoadla",
DefaultGroup = "test_default_group",
EncryptionConfig = new AzureNative.DataLakeStore.Inputs.EncryptionConfigArgs
{
KeyVaultMetaInfo = new AzureNative.DataLakeStore.Inputs.KeyVaultMetaInfoArgs
{
EncryptionKeyName = "test_encryption_key_name",
EncryptionKeyVersion = "encryption_key_version",
KeyVaultResourceId = "34adfa4f-cedf-4dc0-ba29-b6d1a69ab345",
},
Type = AzureNative.DataLakeStore.EncryptionConfigType.UserManaged,
},
EncryptionState = AzureNative.DataLakeStore.EncryptionState.Enabled,
FirewallAllowAzureIps = AzureNative.DataLakeStore.FirewallAllowAzureIpsState.Enabled,
FirewallRules = new[]
{
new AzureNative.DataLakeStore.Inputs.CreateFirewallRuleWithAccountParametersArgs
{
EndIpAddress = "2.2.2.2",
Name = "test_rule",
StartIpAddress = "1.1.1.1",
},
},
FirewallState = AzureNative.DataLakeStore.FirewallState.Enabled,
Identity = new AzureNative.DataLakeStore.Inputs.EncryptionIdentityArgs
{
Type = AzureNative.DataLakeStore.EncryptionIdentityType.SystemAssigned,
},
Location = "eastus2",
NewTier = AzureNative.DataLakeStore.TierType.Consumption,
ResourceGroupName = "contosorg",
Tags =
{
{ "test_key", "test_value" },
},
TrustedIdProviderState = AzureNative.DataLakeStore.TrustedIdProviderState.Enabled,
TrustedIdProviders = new[]
{
new AzureNative.DataLakeStore.Inputs.CreateTrustedIdProviderWithAccountParametersArgs
{
IdProvider = "https://sts.windows.net/ea9ec534-a3e3-4e45-ad36-3afc5bb291c1",
Name = "test_trusted_id_provider_name",
},
},
});
});
package main
import (
datalakestore "github.com/pulumi/pulumi-azure-native-sdk/datalakestore/v3"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := datalakestore.NewAccount(ctx, "account", &datalakestore.AccountArgs{
AccountName: pulumi.String("contosoadla"),
DefaultGroup: pulumi.String("test_default_group"),
EncryptionConfig: &datalakestore.EncryptionConfigArgs{
KeyVaultMetaInfo: &datalakestore.KeyVaultMetaInfoArgs{
EncryptionKeyName: pulumi.String("test_encryption_key_name"),
EncryptionKeyVersion: pulumi.String("encryption_key_version"),
KeyVaultResourceId: pulumi.String("34adfa4f-cedf-4dc0-ba29-b6d1a69ab345"),
},
Type: datalakestore.EncryptionConfigTypeUserManaged,
},
EncryptionState: datalakestore.EncryptionStateEnabled,
FirewallAllowAzureIps: datalakestore.FirewallAllowAzureIpsStateEnabled,
FirewallRules: datalakestore.CreateFirewallRuleWithAccountParametersArray{
&datalakestore.CreateFirewallRuleWithAccountParametersArgs{
EndIpAddress: pulumi.String("2.2.2.2"),
Name: pulumi.String("test_rule"),
StartIpAddress: pulumi.String("1.1.1.1"),
},
},
FirewallState: datalakestore.FirewallStateEnabled,
Identity: &datalakestore.EncryptionIdentityArgs{
Type: datalakestore.EncryptionIdentityTypeSystemAssigned,
},
Location: pulumi.String("eastus2"),
NewTier: datalakestore.TierTypeConsumption,
ResourceGroupName: pulumi.String("contosorg"),
Tags: pulumi.StringMap{
"test_key": pulumi.String("test_value"),
},
TrustedIdProviderState: datalakestore.TrustedIdProviderStateEnabled,
TrustedIdProviders: datalakestore.CreateTrustedIdProviderWithAccountParametersArray{
&datalakestore.CreateTrustedIdProviderWithAccountParametersArgs{
IdProvider: pulumi.String("https://sts.windows.net/ea9ec534-a3e3-4e45-ad36-3afc5bb291c1"),
Name: pulumi.String("test_trusted_id_provider_name"),
},
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.datalakestore.Account;
import com.pulumi.azurenative.datalakestore.AccountArgs;
import com.pulumi.azurenative.datalakestore.inputs.EncryptionConfigArgs;
import com.pulumi.azurenative.datalakestore.inputs.KeyVaultMetaInfoArgs;
import com.pulumi.azurenative.datalakestore.inputs.CreateFirewallRuleWithAccountParametersArgs;
import com.pulumi.azurenative.datalakestore.inputs.EncryptionIdentityArgs;
import com.pulumi.azurenative.datalakestore.inputs.CreateTrustedIdProviderWithAccountParametersArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var account = new Account("account", AccountArgs.builder()
.accountName("contosoadla")
.defaultGroup("test_default_group")
.encryptionConfig(EncryptionConfigArgs.builder()
.keyVaultMetaInfo(KeyVaultMetaInfoArgs.builder()
.encryptionKeyName("test_encryption_key_name")
.encryptionKeyVersion("encryption_key_version")
.keyVaultResourceId("34adfa4f-cedf-4dc0-ba29-b6d1a69ab345")
.build())
.type("UserManaged")
.build())
.encryptionState("Enabled")
.firewallAllowAzureIps("Enabled")
.firewallRules(CreateFirewallRuleWithAccountParametersArgs.builder()
.endIpAddress("2.2.2.2")
.name("test_rule")
.startIpAddress("1.1.1.1")
.build())
.firewallState("Enabled")
.identity(EncryptionIdentityArgs.builder()
.type("SystemAssigned")
.build())
.location("eastus2")
.newTier("Consumption")
.resourceGroupName("contosorg")
.tags(Map.of("test_key", "test_value"))
.trustedIdProviderState("Enabled")
.trustedIdProviders(CreateTrustedIdProviderWithAccountParametersArgs.builder()
.idProvider("https://sts.windows.net/ea9ec534-a3e3-4e45-ad36-3afc5bb291c1")
.name("test_trusted_id_provider_name")
.build())
.build());
}
}
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:datalakestore:Account contosoadla /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DataLakeStore/accounts/{accountName}
Constructors
Properties
The name of the Data Lake Store account.
The default owner group for all new folders and files created in the Data Lake Store account.
The Key Vault encryption configuration.
The current state of encryption for this Data Lake Store account.
The current state of allowing or disallowing IPs originating within Azure through the firewall. If the firewall is disabled, this is not enforced.
The list of firewall rules associated with this Data Lake Store account.
The current state of the IP address firewall for this Data Lake Store account.
The Key Vault encryption identity, if any.
The name of the Azure resource group.
The list of trusted identity providers associated with this Data Lake Store account.
The current state of the trusted identity provider feature for this Data Lake Store account.
The list of virtual network rules associated with this Data Lake Store account.