Workspace is the Schema for the Workspaces API. Manages a Synapse Workspace.
Type
CRD
Group
synapse.azure.upbound.io
Version
v1beta1
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
WorkspaceSpec defines the desired state of Workspace
No description provided.
An azure_devops_repo block as defined below.
Reference to a Subnet in network to populate computeSubnetId.
Policies for referencing.
Selector for a Subnet in network to populate computeSubnetId.
Policies for selection.
A customer_managed_key block as defined below. Conflicts with aad_admin.
Reference to a Key in keyvault to populate keyVersionlessId.
Policies for referencing.
Selector for a Key in keyvault to populate keyVersionlessId.
Policies for selection.
A github_repo block as defined below.
An identity block as defined below.
Specifies a list of User Assigned Managed Identity IDs to be assigned to this Synapse Workspace.
Allowed AAD Tenant Ids For Linking.
Reference to a ResourceGroup in azure to populate managedResourceGroupName.
Policies for referencing.
Selector for a ResourceGroup in azure to populate managedResourceGroupName.
Policies for selection.
Reference to a ResourceGroup in azure to populate resourceGroupName.
Policies for referencing.
Selector for a ResourceGroup in azure to populate resourceGroupName.
Policies for selection.
Reference to a DataLakeGen2FileSystem in storage to populate storageDataLakeGen2FilesystemId.
Policies for referencing.
Selector for a DataLakeGen2FileSystem in storage to populate storageDataLakeGen2FilesystemId.
Policies for selection.
THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored unless the relevant Crossplane feature flag is enabled, and may be changed or removed without notice. InitProvider holds the same fields as ForProvider, with the exception of Identifier and other resource reference fields. The fields that are in InitProvider are merged into ForProvider when the resource is created. The same fields are also added to the terraform ignore_changes hook, to avoid updating them after creation. This is useful for fields that are required on creation, but we do not desire to update them after creation, for example because of an external controller is managing them, like an autoscaler.
An azure_devops_repo block as defined below.
A customer_managed_key block as defined below. Conflicts with aad_admin.
A github_repo block as defined below.
An identity block as defined below.
Specifies a list of User Assigned Managed Identity IDs to be assigned to this Synapse Workspace.
Allowed AAD Tenant Ids For Linking.
THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored unless the relevant Crossplane feature flag is enabled, and may be changed or removed without notice. ManagementPolicies specify the array of actions Crossplane is allowed to take on the managed and external resources. This field is planned to replace the DeletionPolicy field in a future release. Currently, both could be set independently and non-default values would be honored if the feature flag is enabled. If both are custom, the DeletionPolicy field will be ignored. See the design doc for more information: https://github.com/crossplane/crossplane/blob/499895a25d1a1a0ba1604944ef98ac7a1a71f197/design/design-doc-observe-only-resources.md?plain=1#L223 and this one: https://github.com/crossplane/crossplane/blob/444267e84783136daa93568b364a5f01228cacbe/design/one-pager-ignore-changes.md
ProviderConfigReference specifies how the provider that will be used to create, observe, update, and delete this managed resource should be configured.
Policies for referencing.
ProviderReference specifies the provider that will be used to create, observe, update, and delete this managed resource. Deprecated: Please use ProviderConfigReference, i.e. providerConfigRef
Policies for referencing.
PublishConnectionDetailsTo specifies the connection secret config which contains a name, metadata and a reference to secret store config to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource.
WriteConnectionSecretToReference specifies the namespace and name of a Secret to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource. This field is planned to be replaced in a future release in favor of PublishConnectionDetailsTo. Currently, both could be set independently and connection details would be published to both without affecting each other.
WorkspaceStatus defines the observed state of Workspace.
No description provided.
An azure_devops_repo block as defined below.
A customer_managed_key block as defined below. Conflicts with aad_admin.
A github_repo block as defined below.
An identity block as defined below.
Specifies a list of User Assigned Managed Identity IDs to be assigned to this Synapse Workspace.
Allowed AAD Tenant Ids For Linking.
Conditions of the resource.
synapse-workspace-123
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/workspace
labels:
testing.upbound.io/example-name: example
name: synapse-workspace-123
spec:
forProvider:
identity:
- type: SystemAssigned
location: West Europe
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: synapse-resource-group-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
exampleworkspace001
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: machinelearningservices/v1beta1/synapsespark
labels:
testing.upbound.io/example-name: exampleworkspace001
name: exampleworkspace001
spec:
forProvider:
identity:
- type: SystemAssigned
location: West Europe
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: rgsynapsespark
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: datalakegenfs
privateendpoint-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/managedprivateendpoint
labels:
testing.upbound.io/example-name: privateendpoint-ws-label
name: privateendpoint-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: Qatar Central
managedVirtualNetworkEnabled: true
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: privateendpoint-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
sqlpool-workload-ws-1
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/sqlpoolworkloadclassifier
labels:
testing.upbound.io/example-name: sqlpool-workload-ws-label
name: sqlpool-workload-ws-1
spec:
forProvider:
identity:
- type: SystemAssigned
location: Norway East
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: sqlpool-workload-group-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
sqlpool-workload-ws-1
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/sqlpoolworkloadgroup
labels:
testing.upbound.io/example-name: sqlpool-workload-ws-label
name: sqlpool-workload-ws-1
spec:
forProvider:
identity:
- type: SystemAssigned
location: Norway East
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: sqlpool-workload-group-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
firewall-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/integrationruntimeazure
labels:
testing.upbound.io/example-name: firewall-ws-label
name: firewall-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: North Central US
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: firewall-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
linkedservice-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/linkedservice
labels:
testing.upbound.io/example-name: linkedservice-ws-label
name: linkedservice-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: West Europe
managedVirtualNetworkEnabled: true
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: linkedservice-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
auditing-policy-synapse-ws-123456
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/sqlpoolextendedauditingpolicy
labels:
testing.upbound.io/example-name: auditing-policy-synapse-ws-label
name: auditing-policy-synapse-ws-123456
spec:
forProvider:
identity:
- type: SystemAssigned
location: West US 2
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: auditing-resource-group-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
role-workspace
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/roleassignment
labels:
testing.upbound.io/example-name: role-workspace-label
name: role-workspace
spec:
forProvider:
identity:
- type: SystemAssigned
location: West Europe
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: roleassignment-rg-label
sqlAdministratorLogin: sqladminuser
sqlAdministratorLoginPasswordSecretRef:
key: example-key
name: example-secret
namespace: upbound-system
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
sqlpool-synapse-ws-12345
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/sqlpool
labels:
testing.upbound.io/example-name: sqlkpool-synapse-ws-label
name: sqlpool-synapse-ws-12345
spec:
forProvider:
identity:
- type: SystemAssigned
location: South Central US
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: security-alert-resource-group-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
policy-synapse-ws-1
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/workspacesecurityalertpolicy
labels:
testing.upbound.io/example-name: policy-synapse-workspace-label
name: policy-synapse-ws-1
spec:
forProvider:
identity:
- type: SystemAssigned
location: UK South
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: security-alert-resource-group-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
tags:
Env: Production
sparkpool-synapse-ws-1234
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/sparkpool
labels:
testing.upbound.io/example-name: sparkpool-synapse-ws-label
name: sparkpool-synapse-ws-1234
spec:
forProvider:
identity:
- type: SystemAssigned
location: East US 2
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: security-alert-resource-group-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
auditing-synapse-ws-123
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/workspaceextendedauditingpolicy
labels:
testing.upbound.io/example-name: auditing-synapse-workspace-label
name: auditing-synapse-ws-123
spec:
forProvider:
identity:
- type: SystemAssigned
location: East US
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: security-alert-resource-group-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
integration-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/integrationruntimeselfhosted
labels:
testing.upbound.io/example-name: integration-ws-label
name: integration-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: UAE North
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: integration-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
sqlpool-securityalert-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/sqlpoolsecurityalertpolicy
labels:
testing.upbound.io/example-name: sqlpool-securityalert-ws-label
name: sqlpool-securityalert-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: West US 3
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: sqlpool-security-alert-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
tags:
Env: production
integration-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/integrationruntimeazure
labels:
testing.upbound.io/example-name: integration-ws-label
name: integration-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: South Africa North
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: integration-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
wssqlaadadmin-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/workspacesqlaadadmin
upjet.upbound.io/manual-intervention: This resource requires one more Access Policy with real ID
labels:
testing.upbound.io/example-name: wssqlaadadmin-ws
name: wssqlaadadmin-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: West Europe
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: wssqlaadadmin-rg
sqlAdministratorLogin: sqladminuser
sqlAdministratorLoginPasswordSecretRef:
key: example-key
name: example-secret
namespace: upbound-system
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: wssqlaadadmin-datalake
tags:
Env: production
assessment-ws
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/workspacevulnerabilityassessment
labels:
testing.upbound.io/example-name: assessment-ws-label
name: assessment-ws
spec:
forProvider:
identity:
- type: SystemAssigned
location: West Europe
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: ws-vulnerability-rg-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
tags:
Env: production
synapse-workspace-123
apiVersion: synapse.azure.upbound.io/v1beta1
kind: Workspace
metadata:
annotations:
meta.upbound.io/example-id: synapse/v1beta1/workspaceaadadmin
labels:
testing.upbound.io/example-name: workspace-label
name: synapse-workspace-123
spec:
forProvider:
identity:
- type: SystemAssigned
location: West Europe
resourceGroupNameSelector:
matchLabels:
testing.upbound.io/example-name: synapse-resource-group-label
sqlAdministratorLogin: sqladminuser
storageDataLakeGen2FilesystemIdSelector:
matchLabels:
testing.upbound.io/example-name: file-system-label
© 2022 Upbound, Inc.
Discover the building blocksfor your internal cloud platform.