Skip to content

Commit

Permalink
Added databricks_mws_log_delivery resource for billing & audit logs (#…
Browse files Browse the repository at this point in the history
…343)

* Initial commit for log delivery resource
* Applied review comments and added unit tests
* Added integration tests for log delivery resource
* Added changelog

Co-authored-by: Serge Smertin <serge.smertin@databricks.com>
  • Loading branch information
nfx and nfx authored Nov 3, 2020
1 parent 2b03da5 commit 6f29524
Show file tree
Hide file tree
Showing 11 changed files with 698 additions and 7 deletions.
6 changes: 6 additions & 0 deletions .github/ISSUE_TEMPLATE/provider-issue.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,12 @@ To get relevant environment variable _names_ please copypaste the output of the
### Debug Output
Please add turn on logging, e.g. `TF_LOG=DEBUG terraform apply` and run command again, paste it to gist & provide the link to gist. If you're still willing to paste in log output, make sure you provide only relevant log lines with requests.

It would make it more readable, if you pipe the log through `| grep databricks | sed -E 's/^.* plugin[^:]+: (.*)$/\1/'`, e.g.:

```
TF_LOG=DEBUG terraform plan 2>&1 | grep databricks | sed -E 's/^.* plugin[^:]+: (.*)$/\1/'
```

### Panic Output
If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`.

Expand Down
16 changes: 13 additions & 3 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,19 @@

## 0.2.8

* Added [Azure Key Vault support](https://github.com/databrickslabs/terraform-provider-databricks/pull/381) for databricks_secret_scope for Azure CLI authenticated users
* Added support for pinning clusters (issue #113)
* Internal: API for retrieval of the cluster events
* Added [databricks_mws_log_delivery](https://github.com/databrickslabs/terraform-provider-databricks/pull/343) resource for billable usage & audit logs consumption.
* Added [databricks_node_type](https://github.com/databrickslabs/terraform-provider-databricks/pull/376) data source for simpler selection of node types across AWS & Azure.
* Added [Azure Key Vault support](https://github.com/databrickslabs/terraform-provider-databricks/pull/381) for databricks_secret_scope for Azure CLI authenticated users.
* Added [is_pinned](https://github.com/databrickslabs/terraform-provider-databricks/pull/348) support for `databricks_cluster` resource.
* Internal: API for retrieval of the cluster events.

Updated dependency versions:

* github.com/Azure/go-autorest/autorest v0.11.9
* github.com/Azure/go-autorest/autorest/adal v0.9.5
* github.com/Azure/go-autorest/autorest/azure/auth v0.5.3
* github.com/Azure/go-autorest/autorest/azure/cli v0.4.2
* gopkg.in/ini.v1 1.62.0

## 0.2.7

Expand Down
2 changes: 2 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,9 +25,11 @@ End-to-end workspace creation on [AWS](scripts/awsmt-integration) or [Azure](scr
| [databricks_job](docs/resources/job.md)
| [databricks_mws_credentials](docs/resources/mws_credentials.md)
| [databricks_mws_customer_managed_keys](docs/resources/mws_customer_managed_keys.md)
| [databricks_mws_log_delivery](docs/resources/mws_log_delivery.md)
| [databricks_mws_networks](docs/resources/mws_networks.md)
| [databricks_mws_storage_configurations](docs/resources/mws_storage_configurations.md)
| [databricks_mws_workspaces](docs/resources/mws_workspaces.md)
| [databricks_node_type](docs/data-sources/node_type.md) data
| [databricks_notebook](docs/resources/notebook.md)
| [databricks_notebook](docs/data-sources/notebook.md) data
| [databricks_notebook_paths](docs/data-sources/notebook_paths.md) data
Expand Down
18 changes: 16 additions & 2 deletions access/data_aws_policies.go
Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@ func DataAwsAssumeRolePolicy() *schema.Resource {
return &schema.Resource{
Read: func(d *schema.ResourceData, m interface{}) error {
externalID := d.Get("external_id").(string)
policyJSON, err := json.MarshalIndent(awsIamPolicy{
policy := awsIamPolicy{
Version: "2008-10-17",
Statements: []*awsIamPolicyStatement{
{
Expand All @@ -169,7 +169,15 @@ func DataAwsAssumeRolePolicy() *schema.Resource {
},
},
},
}, "", " ")
}
if v, ok := d.GetOk("for_log_delivery"); ok {
if v.(bool) {
// this is production UsageDelivery IAM role, that is considered a constant
logDeliveryARN := "arn:aws:iam::414351767826:role/SaasUsageDeliveryRole-prod-IAMRole-3PLHICCRR1TK"
policy.Statements[0].Principal["AWS"] = logDeliveryARN
}
}
policyJSON, err := json.MarshalIndent(policy, "", " ")
if err != nil {
return err
}
Expand All @@ -182,6 +190,12 @@ func DataAwsAssumeRolePolicy() *schema.Resource {
Default: "414351767826",
Optional: true,
},
"for_log_delivery": {
Type: schema.TypeBool,
Description: "Grant AssumeRole to Databricks SaasUsageDeliveryRole instead of root account",
Optional: true,
Default: false,
},
"external_id": {
Type: schema.TypeString,
Required: true,
Expand Down
1 change: 1 addition & 0 deletions docs/data-sources/aws_assume_role_policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ resource "databricks_mws_credentials" "this" {
## Argument Reference

* `external_id` (Required) (String) External ID that can be found at http://accounts.cloud.databricks.com/#aws
* `for_log_delivery` (Optional) Either or not this assume role policy should be created for usage log delivery. Defaults to false.

## Attribute Reference

Expand Down
140 changes: 140 additions & 0 deletions docs/resources/mws_log_delivery.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,140 @@
# databricks_mws_log_delivery Resource

-> **Note** This resource has an evolving API, which may change in future versions of the provider.

This resource configures the delivery of the two supported log types from Databricks workspaces: [billable usage logs](https://docs.databricks.com/administration-guide/account-settings/billable-usage-delivery.html) and [audit logs](https://docs.databricks.com/administration-guide/account-settings/audit-logs.html). You cannot delete a log delivery configuration, but you can disable it when you no longer need it. This fact is important because there is a limit to the number of enabled log delivery configurations that you can create for an account. You can create a maximum of two enabled using the account level *(without workspace filter)* and two that use the workspace filter. There is an additional uniqueness constraint that two enabled configurations cannot share all their fields (not including the `config_name`). Re-enabling may fail when there's a violation of limit or uniqueness constraints.

## Example Usage

End-to-end example of usage and audit log delivery:

```hcl
resource "aws_s3_bucket" "logdelivery" {
bucket = "${var.prefix}-logdelivery"
acl = "private"
versioning {
enabled = false
}
force_destroy = true
tags = merge(var.tags, {
Name = "${var.prefix}-logdelivery"
})
}
resource "aws_s3_bucket_public_access_block" "logdelivery" {
bucket = aws_s3_bucket.logdelivery.id
ignore_public_acls = true
}
data "databricks_aws_assume_role_policy" "logdelivery" {
external_id = var.account_id
for_log_delivery = true
}
resource "aws_iam_role" "logdelivery" {
name = "${var.prefix}-logdelivery"
description = "(${var.prefix}) UsageDelivery role"
assume_role_policy = data.databricks_aws_assume_role_policy.logdelivery.json
tags = var.tags
}
data "databricks_aws_bucket_policy" "logdelivery" {
full_access_role = aws_iam_role.logdelivery.arn
bucket = aws_s3_bucket.logdelivery.bucket
}
resource "aws_s3_bucket_policy" "logdelivery" {
bucket = aws_s3_bucket.logdelivery.id
policy = data.databricks_aws_bucket_policy.logdelivery.json
}
resource "databricks_mws_credentials" "log_writer" {
account_id = var.account_id
credentials_name = "Usage Delivery"
role_arn = aws_iam_role.logdelivery.arn
}
resource "databricks_mws_storage_configurations" "log_bucket" {
account_id = var.account_id
storage_configuration_name = "Usage Logs"
bucket_name = aws_s3_bucket.logdelivery.bucket
}
resource "databricks_mws_log_delivery" "usage_logs" {
account_id = var.account_id
credentials_id = databricks_mws_credentials.log_writer.credentials_id
storage_configuration_id = databricks_mws_storage_configurations.log_bucket.storage_configuration_id
delivery_path_prefix = "billable-usage"
config_name = "Usage Logs"
log_type = "BILLABLE_USAGE"
output_format = "CSV"
}
resource "databricks_mws_log_delivery" "audit_logs" {
account_id = var.account_id
credentials_id = databricks_mws_credentials.log_writer.credentials_id
storage_configuration_id = databricks_mws_storage_configurations.log_bucket.storage_configuration_id
delivery_path_prefix = "audit-logs"
config_name = "Audit Logs"
log_type = "AUDIT_LOGS"
output_format = "JSON"
}
```

## Billable Usage

CSV files with [static schema](https://docs.databricks.com/administration-guide/account-settings/usage.html) are delivered to `<delivery_path_prefix>/billable-usage/csv/`. Files are named `workspaceId=<workspace-id>-usageMonth=<month>.csv`, which are delivered daily by overwriting the month's CSV file for each workspace.

```hcl
resource "databricks_mws_log_delivery" "usage_logs" {
account_id = var.account_id
credentials_id = databricks_mws_credentials.log_writer.credentials_id
storage_configuration_id = databricks_mws_storage_configurations.log_bucket.storage_configuration_id
delivery_path_prefix = "billable-usage"
config_name = "Usage Logs"
log_type = "BILLABLE_USAGE"
output_format = "CSV"
}
```

## Audit Logs

JSON files with [static schema](https://docs.databricks.com/administration-guide/account-settings/audit-logs.html#audit-log-schema) are delivered to `<delivery_path_prefix>/workspaceId=<workspaceId>/date=<yyyy-mm-dd>/auditlogs_<internal-id>.json`. Logs are available within 15 minutes of activation for audit logs. New JSON files are delivered every few minutes, potentially overwriting existing files for each workspace. Sometimes data may arrive later than 15 minutes. Databricks can overwrite the delivered log files in your bucket at any time. If a file is overwritten, the existing content remains, but there may be additional lines for more auditable events. Overwriting ensures exactly-once semantics without requiring read or delete access to your account.

```hcl
resource "databricks_mws_log_delivery" "audit_logs" {
account_id = var.account_id
credentials_id = databricks_mws_credentials.log_writer.credentials_id
storage_configuration_id = databricks_mws_storage_configurations.log_bucket.storage_configuration_id
delivery_path_prefix = "audit-logs"
config_name = "Audit Logs"
log_type = "AUDIT_LOGS"
output_format = "JSON"
}
```

## Argument reference

* `account_id` - The Databricks account ID that hosts the log delivery configuration.
* `config_name` - The optional human-readable name of the log delivery configuration. Defaults to empty.
* `log_type` - The type of log delivery. `BILLABLE_USAGE` and `AUDIT_LOGS` are supported.
* `output_format` - The file type of log delivery. Currently `CSV` (for `BILLABLE_USAGE`) and `JSON` (for `AUDIT_LOGS`) are supported.
* `credentials_id` - The ID for a Databricks [credential configuration](mws_credentials.md) that represents the AWS IAM role [with policy](../data-sources/aws_assume_role_policy.md) and [trust relationship](../data-sources/aws_assume_role_policy.md) as described in the main billable usage documentation page.
* `storage_configuration_id` - The ID for a Databricks [storage configuration](mws_storage_configurations.md) that represents the S3 bucket with [bucket policy](../data-sources/aws_bucket_policy.md) as described in the main billable usage documentation page.
* `workspace_ids_filter` - (Optional) By default, this log configuration applies to all workspaces associated with your account ID. If your account is on the E2 version of the platform or on a select custom plan that allows multiple workspaces per account, you may have multiple workspaces associated with your account ID. You can optionally set the field as mentioned earlier to an array of workspace IDs. If you plan to use different log delivery configurations for several workspaces, set this explicitly rather than leaving it blank. If you leave this blank and your account ID gets additional workspaces in the future, this configuration will also apply to the new workspaces.
* `delivery_path_prefix` - (Optional) Defaults to empty, which means that logs delivered to the root of the bucket. The value must be a valid S3 object key. It must not start or end with a slash character.
* `delivery_start_time` - (Optional) The optional start month and year for delivery, specified in YYYY-MM format. Defaults to current year and month. Usage is not available before 2019-03.

## Attribute reference

Resource exports the following attributes:

* `config_id` - Databricks log delivery configuration ID.

## Import

This resource can be imported by specifying a combination of an account id and log config id separated by `|`:

```bash
$ terraform import databricks_mws_log_delivery.usage "<account-id>|<log-config-id>"
```
60 changes: 60 additions & 0 deletions mws/acceptance/log_delivery_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
package acceptance

import (
"os"
"testing"

"github.com/databrickslabs/databricks-terraform/internal/acceptance"
"github.com/databrickslabs/databricks-terraform/internal/qa"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
)

func TestMwsAccLogDelivery(t *testing.T) {
if os.Getenv("CLOUD_ENV") != "MWS" {
t.Skip("Cannot run test on non-MWS environment")
}
acceptance.AccTest(t, resource.TestCase{
Steps: []resource.TestStep{
{
Config: qa.EnvironmentTemplate(t, `
provider "databricks" {
host = "{env.DATABRICKS_HOST}"
username = "{env.DATABRICKS_USERNAME}"
password = "{env.DATABRICKS_PASSWORD}"
}
resource "databricks_mws_credentials" "ld" {
account_id = "{env.DATABRICKS_ACCOUNT_ID}"
credentials_name = "tf-acceptance-logdelivery-{var.RANDOM}"
role_arn = "{env.TEST_LOGDELIVERY_ARN}"
}
resource "databricks_mws_storage_configurations" "ld" {
account_id = "{env.DATABRICKS_ACCOUNT_ID}"
storage_configuration_name = "tf-acceptance-logdelivery-{var.RANDOM}"
bucket_name = "{env.TEST_LOGDELIVERY_BUCKET}"
}
resource "databricks_mws_log_delivery" "usage_logs" {
account_id = "{env.DATABRICKS_ACCOUNT_ID}"
credentials_id = databricks_mws_credentials.ld.credentials_id
storage_configuration_id = databricks_mws_storage_configurations.ld.storage_configuration_id
delivery_path_prefix = "tf-{var.RANDOM}/billable-usage"
config_name = "Usage {var.RANDOM}"
log_type = "BILLABLE_USAGE"
output_format = "CSV"
}
resource "databricks_mws_log_delivery" "audit_logs" {
account_id = "{env.DATABRICKS_ACCOUNT_ID}"
credentials_id = databricks_mws_credentials.ld.credentials_id
storage_configuration_id = databricks_mws_storage_configurations.ld.storage_configuration_id
delivery_path_prefix = "tf-{var.RANDOM}/audit-logs"
config_name = "Audit {var.RANDOM}"
log_type = "AUDIT_LOGS"
output_format = "JSON"
}`),
},
},
})
}
Loading

0 comments on commit 6f29524

Please sign in to comment.