Terraform module for creation Azure Synapse Analytics
Name | Version |
---|---|
terraform | >= 1.5.0 |
azurerm | >= 4.0.1 |
http | >= 3.4 |
random | >= 3.5.1 |
time | ~> 0.9.2 |
Name | Version |
---|---|
azurerm | >= 4.0.1 |
http | >= 3.4 |
random | >= 3.5.1 |
time | ~> 0.9.2 |
No modules.
Name | Description | Type | Default | Required |
---|---|---|---|---|
add_storage_contributor_role | If true, add Storage Contributor Role to Synapse Workspace identity. | bool |
true |
no |
allow_azure_services_access | If true, allow Azure Services and Resources to access this workspace. | bool |
false |
no |
allow_own_ip | If true, create firewall rule to allow client IP to Synapse Workspace. | bool |
false |
no |
auth_sql_administrator | Specifies The login name of the SQL administrator. Changing this forces a new resource to be created. | string |
null |
no |
auth_sql_administrator_password | The Password associated with the sql_administrator_login for the SQL administrator. | string |
null |
no |
azure_devops_repo | Integrate Synapse Workspace with Azure DevOps. | object({ |
null |
no |
azure_integration_runtimes | Manages a Azure Synapse Azure Integration Runtimes. | map(object({ |
{} |
no |
azure_role_assignments | Manages a Azure Role Assignment to Synapse Workspace. | list(object({ |
[] |
no |
azuread_authentication_only | Azure Active Directory Authentication the only way to authenticate with resources inside this synapse Workspace. | bool |
false |
no |
firewall_rules | Allows you to Manages a Synapse Firewall Rules. | list(object({ |
[] |
no |
github | Integrate Synapse Workspace with Github. | object({ |
null |
no |
identity_ids | Specifies a list of User Assigned Managed Identity IDs to be assigned to this Synapse Workspace. | list(string) |
[] |
no |
identity_type | Specifies the type of Managed Service Identity that should be associated with this Logic App. | string |
"SystemAssigned" |
no |
linked_services | Manages a Synapse Linked Services. | map(object({ |
{} |
no |
location | Specifies the Azure Region where the synapse Workspace should exist. Changing this forces a new resource to be created. | string |
n/a | yes |
managed_resource_group_name | Specifies the name of the Managed Resource Group for the synapse Workspace. Changing this forces a new resource to be created. | string |
"" |
no |
managed_virtual_network_enabled | Identifyes if Virtual Network is enabled for all computes in this workspace | bool |
false |
no |
name | Specifies the name which should be used for this synapse Workspace. Changing this forces a new resource to be created. | string |
n/a | yes |
private_endpoints | A map of private endpoints to create on the resource. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. - name - (Optional) The name of the private endpoint. One will be generated if not set.- role_assignments - (Optional) A map of role assignments to create on the private endpoint. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. See var.role_assignments for more information.- lock - (Optional) The lock level to apply to the private endpoint. Default is None . Possible values are None , CanNotDelete , and ReadOnly .- tags - (Optional) A mapping of tags to assign to the private endpoint.- subnet_resource_id - The resource ID of the subnet to deploy the private endpoint in.- subresource_name - The service name of the private endpoint. Possible value are blob , 'dfs', 'file', queue , table , and web .- private_dns_zone_group_name - (Optional) The name of the private DNS zone group. One will be generated if not set.- private_dns_zone_resource_ids - (Optional) A set of resource IDs of private DNS zones to associate with the private endpoint. If not set, no zone groups will be created and the private endpoint will not be associated with any private DNS zones. DNS records must be managed external to this module.- application_security_group_resource_ids - (Optional) A map of resource IDs of application security groups to associate with the private endpoint. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time.- private_service_connection_name - (Optional) The name of the private service connection. One will be generated if not set.- network_interface_name - (Optional) The name of the network interface. One will be generated if not set.- location - (Optional) The Azure location where the resources will be deployed. Defaults to the location of the resource group.- resource_group_name - (Optional) The resource group where the resources will be deployed. Defaults to the resource group of the resource.- ip_configurations - (Optional) A map of IP configurations to create on the private endpoint. If not specified the platform will create one. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time.- name - The name of the IP configuration.- private_ip_address - The private IP address of the IP configuration. |
map(object({ |
{} |
no |
private_endpoints_manage_dns_zone_group | Whether to manage private DNS zone groups with this module. If set to false, you must manage private DNS zone groups externally, e.g. using Azure Policy. | bool |
true |
no |
private_link_hub_name | Name of the Private Link Hub | string |
null |
no |
private_links | A map of private endpoints to create on the resource. The map key is deliberately arbitrary to avoid issues where map keys maybe unknown at plan time. - name - (Optional) The name of the private link. One will be generated if not set.- target_resource_id - The resource ID of the target resource to be establish private link.- subresource_name - The service name of the private endpoint. Possible value are blob , 'dfs', 'file', queue , table , web , vault , etc. |
map(object({ |
{} |
no |
purview_id | The ID of purview account. | string |
null |
no |
resource_group_name | Specifies the name of the Resource Group where the synapse Workspace should exist. Changing this forces a new resource to be created. | string |
n/a | yes |
self_hosted_integration_runtimes | Manages a Self Hosted Synapse Azure Integration Runtimes. | map(object({ |
{} |
no |
spark_pools | Manages a Synapse Spark Pools. | map(object({ |
{} |
no |
sql_pools | Manages a Synapse SQL Pools. | map(object({ |
{} |
no |
storage_account_id | Storage Account ID used by Synapse Workspace. Necessary if add_storage_contributor_role is true. |
string |
false |
no |
storage_data_lake_gen2_filesystem_id | Specifies the ID of storage data lake gen2 filesystem resource. Changing this forces a new resource to be created. | string |
n/a | yes |
synapse_role_assignments | Manages a Synapse Role Assignment. | list(object({ |
[] |
no |
tags | A mapping of tags which should be assigned to the Synapse Workspace. | map(string) |
null |
no |
wait_for_firewall_operations | Timeout settings for firewall operations. | object({ |
{ |
no |
Name | Description |
---|---|
azure_integration_runtimes_id | The Azure Integration Runtimes ID. |
endpoints | A list of Connectivity endpoints for this Synapse Workspace. |
id | The ID of the synapse Workspace. |
identity | The Principal ID and Tenant ID for the Service Principal associated with the Managed Service Identity of this Synapse Workspace. |
linked_services_id | The Linked Services ID. |
self_hosted_integration_runtimes_id | The Self Hosted Integration Runtimes ID. |
spark_pools_id | The Spark Pools ID. |
sql_administrator_password | SQL administrator password. |
sql_pools_id | The SQL Pools ID. |
Apache 2 Licensed. For more information please see LICENSE