The network access type for accessing workspace. Set value to disabled to access workspace only via private link.
'Disabled' 'Enabled'
requiredNsgRules
Gets or sets a value indicating whether data plane (clusters) to control plane communication happen over private endpoint. Supported values are 'AllRules' and 'NoAzureDatabricksRules'. 'NoAzureServiceRules' value is for internal use only.
The provider's principal identifier. This is the identity that the provider will use to call ARM to manage the workspace resources.
string (required)
roleDefinitionId
The provider's role definition identifier. This role will define all the permissions that the provider must have on the workspace's container resource group. This role definition cannot have permission to delete the resource group.
string (required)
CreatedBy
This object doesn't contain any properties to set during deployment. All properties are ReadOnly.
A boolean indicating whether or not the DBFS root file system will be enabled with secondary layer of encryption with platform managed keys for data at rest.
Creates an Azure storage account with ADLS Gen 2 enabled, an Azure Data Factory instance with linked services for the storage account (an the Azure SQL Database if deployed), and an Azure Databricks instance. The AAD identity for the user deploying the template and the managed identity for the ADF instance will be granted the Storage Blob Data Contributor role on the storage account. There are also options to deploy an Azure Key Vault instance, an Azure SQL Database, and an Azure Event Hub (for streaming use cases). When an Azure Key Vault is deployed, the data factory managed identity and the AAD identity for the user deploying the template will be granted the Key Vault Secrets User role.
This template allows you to create a network security group, a virtual network and an Azure Databricks workspace with the virtual network, and Private Endpoint.
This template allows you to create a a load balancer, network security group, a virtual network and an Azure Databricks workspace with the virtual network.
This template allows you to create a NAT gateway, network security group, a virtual network and an Azure Databricks workspace with the virtual network.
The network access type for accessing workspace. Set value to disabled to access workspace only via private link.
'Disabled' 'Enabled'
requiredNsgRules
Gets or sets a value indicating whether data plane (clusters) to control plane communication happen over private endpoint. Supported values are 'AllRules' and 'NoAzureDatabricksRules'. 'NoAzureServiceRules' value is for internal use only.
The provider's principal identifier. This is the identity that the provider will use to call ARM to manage the workspace resources.
string (required)
roleDefinitionId
The provider's role definition identifier. This role will define all the permissions that the provider must have on the workspace's container resource group. This role definition cannot have permission to delete the resource group.
string (required)
CreatedBy
This object doesn't contain any properties to set during deployment. All properties are ReadOnly.
A boolean indicating whether or not the DBFS root file system will be enabled with secondary layer of encryption with platform managed keys for data at rest.
Creates an Azure storage account with ADLS Gen 2 enabled, an Azure Data Factory instance with linked services for the storage account (an the Azure SQL Database if deployed), and an Azure Databricks instance. The AAD identity for the user deploying the template and the managed identity for the ADF instance will be granted the Storage Blob Data Contributor role on the storage account. There are also options to deploy an Azure Key Vault instance, an Azure SQL Database, and an Azure Event Hub (for streaming use cases). When an Azure Key Vault is deployed, the data factory managed identity and the AAD identity for the user deploying the template will be granted the Key Vault Secrets User role.
This template allows you to create a network security group, a virtual network and an Azure Databricks workspace with the virtual network, and Private Endpoint.
This template allows you to create a a load balancer, network security group, a virtual network and an Azure Databricks workspace with the virtual network.
This template allows you to create a NAT gateway, network security group, a virtual network and an Azure Databricks workspace with the virtual network.
The network access type for accessing workspace. Set value to disabled to access workspace only via private link.
"Disabled" "Enabled"
requiredNsgRules
Gets or sets a value indicating whether data plane (clusters) to control plane communication happen over private endpoint. Supported values are 'AllRules' and 'NoAzureDatabricksRules'. 'NoAzureServiceRules' value is for internal use only.
The provider's principal identifier. This is the identity that the provider will use to call ARM to manage the workspace resources.
string (required)
roleDefinitionId
The provider's role definition identifier. This role will define all the permissions that the provider must have on the workspace's container resource group. This role definition cannot have permission to delete the resource group.
string (required)
CreatedBy
This object doesn't contain any properties to set during deployment. All properties are ReadOnly.
A boolean indicating whether or not the DBFS root file system will be enabled with secondary layer of encryption with platform managed keys for data at rest.
The encryption keySource (provider). Possible values (case-insensitive): Default, Microsoft.Keyvault
"Default" "Microsoft.Keyvault"
keyvaulturi
The Uri of KeyVault.
string
keyversion
The version of KeyVault key.
string
ManagedIdentityConfiguration
This object doesn't contain any properties to set during deployment. All properties are ReadOnly.
Sku
Name
Description
Value
name
The SKU name.
string (required)
tier
The SKU tier.
string
Feedback
Was this page helpful?
Feedback
Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see: https://aka.ms/ContentUserFeedback.