Skip to content

Latest commit

 

History

History
76 lines (53 loc) · 3.75 KB

mws_customer_managed_keys.md

File metadata and controls

76 lines (53 loc) · 3.75 KB
subcategory
AWS

databricks_mws_customer_managed_keys Resource

-> Note This resource has an evolving API, which will change in the upcoming versions of the provider in order to simplify user experience.

This resource to configure AWS KMS key for new workspaces within AWS. This KMS key will be used to encrypt your notebooks in your workspace.

It is important to understand that this will require you to configure your provider separately for the multiple workspaces resources. This will point to https://accounts.cloud.databricks.com for the HOST and it will use basic auth as that is the only authentication method available for multiple workspaces api.

Please follow this complete runnable example with new VPC and new workspace setup. Please pay special attention to the fact that there you have two different instances of a databricks provider - one for deploying workspaces (with host=https://accounts.cloud.databricks.com/) and another for the workspace you've created with databricks_mws_workspaces resource. If you want both creation of workspaces & clusters within workspace within the same terraform module (essentially same directory), you should use the provider aliasing feature of Terraform. We strongly recommend having one terraform module for creation of workspace + PAT token and the rest in different modules.

Example Usage

-> Note If you've used the resource before, please add use_cases = ["MANAGED_SERVICES"] to keep the previous behaviour.

variable "databricks_account_id" {
  description = "Account Id that could be found in the bottom left corner of https://accounts.cloud.databricks.com/"
}

resource "aws_kms_key" "customer_managed_key" {
}

resource "aws_kms_grant" "databricks-grant" {
  name = "databricks-grant"
  key_id  = aws_kms_key.customer_managed_key.key_id
  grantee_principal = "arn:aws:iam::414351767826:root"
  operations = ["Encrypt", "Decrypt", "DescribeKey", 
    "GenerateDataKey", "ReEncryptFrom", "ReEncryptTo", 
    "GenerateDataKeyWithoutPlaintext"]
}

resource "aws_kms_alias" "customer_managed_key_alias" {
  name          = "alias/customer-managed-key-alias"
  target_key_id = aws_kms_key.customer_managed_key.key_id
}

resource "databricks_mws_customer_managed_keys" "my_cmk" {
    account_id   = var.databricks_account_id
    aws_key_info {
        key_arn   = aws_kms_key.customer_managed_key.arn
        key_alias = aws_kms_alias.customer_managed_key_alias.name
    }
    use_cases = ["MANAGED_SERVICES", "STORAGE"]
}

Argument Reference

The following arguments are required:

  • aws_key_info - This field is a block and is documented below.
  • account_id - Account Id that could be found in the bottom left corner of Accounts Console
  • use_cases - (since v0.3.4) List of use cases for which this key will be used. If you've used the resource before, please add use_cases = ["MANAGED_SERVICES"] to keep the previous behaviour. Possible values are:
    • MANAGED_SERVICES - for encryption of the workspace objects (notebooks, secrets) that are stored in the control plane
    • STORAGE - for encryption of the DBFS Storage & Cluster EBS Volumes

aws_key_info Configuration Block

  • key_arn - The AWS KMS key's Amazon Resource Name (ARN).
  • key_alias - The AWS KMS key alias.
  • key_region - (Optional) (Computed) The AWS region in which KMS key is deployed to. This is not required.

Attribute Reference

In addition to all arguments above, the following attributes are exported:

  • id - Canonical unique identifier for the mws customer managed keys.
  • customer_managed_key_id - (String) ID of the notebook encryption key configuration object.
  • creation_time - (Integer) Time in epoch milliseconds when the customer key was created.