1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88
|
# coding=utf-8
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# Code generated by Microsoft (R) AutoRest Code Generator.
# Changes may cause incorrect behavior and will be lost if the code is regenerated.
# --------------------------------------------------------------------------
from typing import Any, IO, Union
from azure.identity import DefaultAzureCredential
from azure.mgmt.hdinsightcontainers import HDInsightContainersMgmtClient
"""
# PREREQUISITES
pip install azure-identity
pip install azure-mgmt-hdinsightcontainers
# USAGE
python create_ranger_cluster.py
Before run the sample, please set the values of the client ID, tenant ID and client secret
of the AAD application as environment variables: AZURE_CLIENT_ID, AZURE_TENANT_ID,
AZURE_CLIENT_SECRET. For more info about how to get the value, please see:
https://docs.microsoft.com/azure/active-directory/develop/howto-create-service-principal-portal
"""
def main():
client = HDInsightContainersMgmtClient(
credential=DefaultAzureCredential(),
subscription_id="10e32bab-26da-4cc4-a441-52b318f824e6",
)
response = client.clusters.begin_create(
resource_group_name="hiloResourcegroup",
cluster_pool_name="clusterpool1",
cluster_name="cluster1",
hd_insight_cluster={
"location": "West US 2",
"properties": {
"clusterProfile": {
"authorizationProfile": {"userIds": ["testuser1", "testuser2"]},
"clusterVersion": "0.0.1",
"managedIdentityProfile": {
"identityList": [
{
"clientId": "de91f1d8-767f-460a-ac11-3cf103f74b34",
"objectId": "40491351-c240-4042-91e0-f644a1d2b441",
"resourceId": "/subscriptions/subid/resourceGroups/hiloResourcegroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/test-msi",
"type": "cluster",
}
]
},
"ossVersion": "2.2.3",
"rangerProfile": {
"rangerAdmin": {
"admins": ["testuser1@contoso.com", "testuser2@contoso.com"],
"database": {
"host": "testsqlserver.database.windows.net",
"name": "testdb",
"passwordSecretRef": "https://testkv.vault.azure.net/secrets/mysecret/5df6584d9c25418c8d900240aa6c3452",
"username": "admin",
},
},
"rangerAudit": {"storageAccount": "https://teststorage.blob.core.windows.net/testblob"},
"rangerUsersync": {
"enabled": True,
"groups": ["0a53828f-36c9-44c3-be3d-99a7fce977ad", "13be6971-79db-4f33-9d41-b25589ca25ac"],
"mode": "automatic",
"users": ["testuser1@contoso.com", "testuser2@contoso.com"],
},
},
},
"clusterType": "ranger",
"computeProfile": {
"availabilityZones": ["1", "2", "3"],
"nodes": [{"count": 2, "type": "head", "vmSize": "Standard_D3_v2"}],
},
},
},
).result()
print(response)
# x-ms-original-file: specification/hdinsight/resource-manager/Microsoft.HDInsight/HDInsightOnAks/preview/2024-05-01-preview/examples/CreateRangerCluster.json
if __name__ == "__main__":
main()
|