diff --git a/docs/guides/azure-private-link-workspace-simplified.md b/docs/guides/azure-private-link-workspace-simplified.md index 6025a30671..8a55bb6843 100644 --- a/docs/guides/azure-private-link-workspace-simplified.md +++ b/docs/guides/azure-private-link-workspace-simplified.md @@ -68,15 +68,15 @@ Define the required variables ```hcl variable "cidr" { - type = string + type = string } variable "rg_name" { - type = string + type = string } variable "location" { - type = string + type = string } data "azurerm_client_config" "current" { @@ -206,7 +206,7 @@ resource "azurerm_subnet" "plsubnet" { resource_group_name = var.rg_name virtual_network_name = azurerm_virtual_network.this.name address_prefixes = [cidrsubnet(var.cidr, 3, 2)] - enforce_private_link_endpoint_network_policies = true + enforce_private_link_endpoint_network_policies = true } ``` @@ -223,7 +223,7 @@ resource "azurerm_private_endpoint" "uiapi" { name = "uiapipvtendpoint" location = var.location resource_group_name = var.rg_name - subnet_id = azurerm_subnet.plsubnet.id + subnet_id = azurerm_subnet.plsubnet.id private_service_connection { name = "ple-${var.workspace_prefix}-uiapi" @@ -260,7 +260,7 @@ resource "azurerm_private_endpoint" "auth" { name = "aadauthpvtendpoint" location = var.location resource_group_name = var.rg_name - subnet_id = azurerm_subnet.plsubnet.id + subnet_id = azurerm_subnet.plsubnet.id private_service_connection { name = "ple-${var.workspace_prefix}-auth" @@ -299,7 +299,7 @@ resource "azurerm_databricks_workspace" "this" { private_subnet_network_security_group_association_id = azurerm_subnet_network_security_group_association.private.id storage_account_name = "dbfs" } - + depends_on = [ azurerm_subnet_network_security_group_association.public, azurerm_subnet_network_security_group_association.private @@ -307,4 +307,4 @@ resource "azurerm_databricks_workspace" "this" { } ``` --> **Note** The public network access to the workspace is disabled. You can access the workspace only through the private connectivity to the on-premises user environment. For testing purposes, you can deploy an Azure VM in the same vnet in order to test the frontend connectivity. \ No newline at end of file +-> **Note** The public network access to the workspace is disabled. You can access the workspace only through the private connectivity to the on-premises user environment. For testing purposes, you can deploy an Azure VM in the same vnet in order to test the frontend connectivity. diff --git a/docs/guides/gcp-private-service-connect-workspace.md b/docs/guides/gcp-private-service-connect-workspace.md index 195d1cf457..022b70c199 100644 --- a/docs/guides/gcp-private-service-connect-workspace.md +++ b/docs/guides/gcp-private-service-connect-workspace.md @@ -58,8 +58,8 @@ resource "google_compute_router_nat" "nat" { } resource "databricks_mws_vpc_endpoint" "backend_rest_vpce" { - account_id = var.databricks_account_id - vpc_endpoint_name = "vpce-backend-rest-${random_string.suffix.result}" + account_id = var.databricks_account_id + vpc_endpoint_name = "vpce-backend-rest-${random_string.suffix.result}" gcp_vpc_endpoint_info { project_id = var.google_project psc_endpoint_name = var.backend_rest_psce @@ -68,8 +68,8 @@ resource "databricks_mws_vpc_endpoint" "backend_rest_vpce" { } resource "databricks_mws_vpc_endpoint" "relay_vpce" { - account_id = var.databricks_account_id - vpc_endpoint_name = "vpce-relay-${random_string.suffix.result}" + account_id = var.databricks_account_id + vpc_endpoint_name = "vpce-relay-${random_string.suffix.result}" gcp_vpc_endpoint_info { project_id = var.google_project psc_endpoint_name = var.relay_psce @@ -127,7 +127,7 @@ resource "databricks_mws_workspaces" "this" { } private_service_connect_id = databricks_mws_private_access_settings.pas.private_access_settings_id - network_id = databricks_mws_networks.this.network_id + network_id = databricks_mws_networks.this.network_id gke_config { connectivity_type = "PRIVATE_NODE_PUBLIC_MASTER" master_ip_range = "10.3.0.0/28" diff --git a/docs/guides/unity-catalog-gcp.md b/docs/guides/unity-catalog-gcp.md index 656e648842..662e7dc4e0 100644 --- a/docs/guides/unity-catalog-gcp.md +++ b/docs/guides/unity-catalog-gcp.md @@ -59,11 +59,11 @@ terraform { source = "databricks/databricks" } google = { - source = "hashicorp/google" + source = "hashicorp/google" } random = { source = "hashicorp/random" - } + } } } @@ -104,7 +104,7 @@ resource "databricks_metastore" "this" { resource "databricks_metastore_data_access" "first" { metastore_id = databricks_metastore.this.id databricks_gcp_service_account {} - name = "the-keys" + name = "the-keys" is_default = true } @@ -297,8 +297,8 @@ resource "databricks_cluster" "dev" { node_type_id = data.databricks_node_type.smallest.id autotermination_minutes = 10 num_workers = 2 - data_security_mode = "SINGLE_USER" - single_user_name = each.value.user_name + data_security_mode = "SINGLE_USER" + single_user_name = each.value.user_name # need to wait until the metastore is assigned depends_on = [ databricks_metastore_assignment.this diff --git a/docs/resources/model_serving.md b/docs/resources/model_serving.md index a25e17cdb4..b0c85d25b0 100644 --- a/docs/resources/model_serving.md +++ b/docs/resources/model_serving.md @@ -12,26 +12,26 @@ resource "databricks_model_serving" "this" { name = "ads-serving-endpoint" config { served_models { - name = "prod_model" - model_name = "ads-model" - model_version = "2" - workload_size = "Small" + name = "prod_model" + model_name = "ads-model" + model_version = "2" + workload_size = "Small" scale_to_zero_enabled = true } served_models { - name = "candidate_model" - model_name = "ads-model" - model_version = "4" - workload_size = "Small" + name = "candidate_model" + model_name = "ads-model" + model_version = "4" + workload_size = "Small" scale_to_zero_enabled = false } traffic_config { routes { - served_model_name = "prod_model" + served_model_name = "prod_model" traffic_percentage = 90 } routes { - served_model_name = "candidate_model" + served_model_name = "candidate_model" traffic_percentage = 10 } } diff --git a/docs/resources/mws_private_access_settings.md b/docs/resources/mws_private_access_settings.md index ab10283959..47d40ceafd 100644 --- a/docs/resources/mws_private_access_settings.md +++ b/docs/resources/mws_private_access_settings.md @@ -43,10 +43,10 @@ resource "databricks_mws_workspaces" "this" { or ```hcl resource "databricks_mws_workspaces" "this" { - provider = databricks.mws - account_id = var.databricks_account_id - workspace_name = "gcp-workspace" - location = var.subnet_region + provider = databricks.mws + account_id = var.databricks_account_id + workspace_name = "gcp-workspace" + location = var.subnet_region cloud_resource_container { gcp { project_id = var.google_project diff --git a/docs/resources/mws_vpc_endpoint.md b/docs/resources/mws_vpc_endpoint.md index bcc759d80a..b54b1cf954 100644 --- a/docs/resources/mws_vpc_endpoint.md +++ b/docs/resources/mws_vpc_endpoint.md @@ -129,9 +129,9 @@ provider "databricks" { } resource "databricks_mws_vpc_endpoint" "workspace" { - provider = databricks.mws - account_id = var.databricks_account_id - vpc_endpoint_name = "PSC Rest API endpoint" + provider = databricks.mws + account_id = var.databricks_account_id + vpc_endpoint_name = "PSC Rest API endpoint" gcp_vpc_endpoint_info { project_id = var.google_project psc_endpoint_name = "PSC Rest API endpoint" @@ -140,9 +140,9 @@ resource "databricks_mws_vpc_endpoint" "workspace" { } resource "databricks_mws_vpc_endpoint" "relay" { - provider = databricks.mws - account_id = var.databricks_account_id - vpc_endpoint_name = "PSC Relay endpoint" + provider = databricks.mws + account_id = var.databricks_account_id + vpc_endpoint_name = "PSC Relay endpoint" gcp_vpc_endpoint_info { project_id = var.google_project psc_endpoint_name = "PSC Relay endpoint" @@ -155,10 +155,10 @@ Typically the next steps after this would be to create a [databricks_mws_private ```hcl resource "databricks_mws_workspaces" "this" { - provider = databricks.mws - account_id = var.databricks_account_id - workspace_name = "gcp workspace" - location = var.subnet_region + provider = databricks.mws + account_id = var.databricks_account_id + workspace_name = "gcp workspace" + location = var.subnet_region cloud_resource_container { gcp { project_id = var.google_project diff --git a/docs/resources/share.md b/docs/resources/share.md index 321717d75f..3730922df6 100644 --- a/docs/resources/share.md +++ b/docs/resources/share.md @@ -40,24 +40,24 @@ resource "databricks_share" "some" { history_data_sharing_status = "ENABLED" partition { value { - name = "year" - op = "EQUAL" - value = "2009" + name = "year" + op = "EQUAL" + value = "2009" } value { - name = "month" - op = "EQUAL" - value = "12" + name = "month" + op = "EQUAL" + value = "12" } - } + } partition { value { - name = "year" - op = "EQUAL" - value = "2010" + name = "year" + op = "EQUAL" + value = "2010" } - } - } + } + } } ```