fix comments
This commit is contained in:
@ -9,7 +9,6 @@ Network connectivity to the workspace is allowed over public endpoints, making t
|
||||
|
||||
## Resources
|
||||
|
||||
|
||||
| Terraform Resource Type | Description |
|
||||
| - | - |
|
||||
| `azurerm_resource_group` | The resource group all resources get deployed into. |
|
||||
@ -46,6 +45,6 @@ Network connectivity to the workspace is allowed over public endpoints, making t
|
||||
|
||||
## Learn more
|
||||
|
||||
- If you are new to Azure Synapse Analytics, see [Azure Synapse Analytics service](https://azure.microsoft.com/services/synapse-analytics/) and [Azure Synapse Analytics documentation](https://learn.microsoft.com/azure/synapse-analytics/overview-what-is).
|
||||
- To learn more about security configurations in Azure Synapse Analytics, see [Azure Synapse Analytics security white paper](https://learn.microsoft.com/azure/synapse-analytics/guidance/security-white-paper-introduction).
|
||||
- For all configurations of Azure Synapse Analytics in Terraform, see [Terraform Hashicorp AzureRM provider documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/synapse_workspace).
|
||||
- If you are new to Azure Synapse Analytics, see [Azure Synapse Analytics service](https://azure.microsoft.com/services/synapse-analytics/) and [Azure Synapse Analytics documentation](https://learn.microsoft.com/azure/synapse-analytics/guidance/success-by-design-introduction).
|
||||
- To learn more about security configurations in Azure Synapse Analytics, see [Azure Synapse Analytics security white paper](https://learn.microsoft.com/azure/synapse-analytics/guidance/security-white-paper-introduction) and watch [Success with Synapse - Security videos](https://www.youtube.com/playlist?list=PLzUAjXZBFU9OWYjSI5TdlpMV0ltAjLaNw).
|
||||
- For all configurations of Azure Synapse Analytics in Terraform, see [Terraform Hashicorp AzureRM provider documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/synapse_workspace).
|
@ -1,4 +1,4 @@
|
||||
locals {
|
||||
basename = "${var.name}-${var.environment}"
|
||||
basename = "${var.name}-${var.environment}"
|
||||
safe_basename = replace(local.basename, "-", "")
|
||||
}
|
@ -1,15 +1,3 @@
|
||||
terraform {
|
||||
required_providers {
|
||||
azurerm = {
|
||||
version = "= 3.30.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
provider "azurerm" {
|
||||
features {}
|
||||
}
|
||||
|
||||
data "azurerm_client_config" "current" {}
|
||||
|
||||
data "http" "ip" {
|
||||
|
11
quickstart/101-synapse/providers.tf
Normal file
11
quickstart/101-synapse/providers.tf
Normal file
@ -0,0 +1,11 @@
|
||||
terraform {
|
||||
required_providers {
|
||||
azurerm = {
|
||||
version = "= 3.32.0"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
provider "azurerm" {
|
||||
features {}
|
||||
}
|
@ -23,6 +23,6 @@ resource "azurerm_synapse_workspace" "default" {
|
||||
resource "azurerm_synapse_firewall_rule" "allow_my_ip" {
|
||||
name = "AllowMyPublicIp"
|
||||
synapse_workspace_id = azurerm_synapse_workspace.default.id
|
||||
start_ip_address = data.http.ip.body
|
||||
end_ip_address = data.http.ip.body
|
||||
start_ip_address = data.http.ip.response_body
|
||||
end_ip_address = data.http.ip.response_body
|
||||
}
|
||||
|
@ -32,13 +32,11 @@ variable "aad_login" {
|
||||
variable "synadmin_username" {
|
||||
type = string
|
||||
description = "Specifies The login name of the SQL administrator"
|
||||
default = "sqladminuser"
|
||||
}
|
||||
|
||||
variable "synadmin_password" {
|
||||
type = string
|
||||
description = "The Password associated with the sql_administrator_login for the SQL administrator"
|
||||
default = "ThisIsNotVerySecure!"
|
||||
}
|
||||
|
||||
variable "enable_syn_sparkpool" {
|
||||
|
Reference in New Issue
Block a user