From ea046f086973d77fb4c7b74133afb2eb2bbc0ffa Mon Sep 17 00:00:00 2001 From: Jim Enright Date: Thu, 1 Aug 2024 17:21:40 +0100 Subject: [PATCH 1/3] Add Azure cdw-permissions module Signed-off-by: Jim Enright --- README.md | 1 + .../.terraform-docs.yaml | 21 +++++ .../terraform-azure-cdw-permissions/README.md | 60 +++++++++++++ .../terraform-azure-cdw-permissions/data.tf | 27 ++++++ .../doc_fragments/header.md | 11 +++ .../ex01-aks_managed_identity/main.tf | 87 +++++++++++++++++++ .../terraform.tfvars.sample | 37 ++++++++ .../ex01-aks_managed_identity/variables.tf | 48 ++++++++++ .../terraform-azure-cdw-permissions/main.tf | 36 ++++++++ .../outputs.tf | 25 ++++++ .../provider.tf | 23 +++++ .../variables.tf | 85 ++++++++++++++++++ 12 files changed, 461 insertions(+) create mode 100644 modules/terraform-azure-cdw-permissions/.terraform-docs.yaml create mode 100644 modules/terraform-azure-cdw-permissions/README.md create mode 100644 modules/terraform-azure-cdw-permissions/data.tf create mode 100644 modules/terraform-azure-cdw-permissions/doc_fragments/header.md create mode 100755 modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf create mode 100644 modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/terraform.tfvars.sample create mode 100755 modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/variables.tf create mode 100644 modules/terraform-azure-cdw-permissions/main.tf create mode 100644 modules/terraform-azure-cdw-permissions/outputs.tf create mode 100644 modules/terraform-azure-cdw-permissions/provider.tf create mode 100644 modules/terraform-azure-cdw-permissions/variables.tf diff --git a/README.md b/README.md index 1d5fd51..63a3c1a 100644 --- a/README.md +++ b/README.md @@ -14,6 +14,7 @@ This repository contains a number of Terraform modules for creation of the pre-r | [terraform-aws-tgw](modules/terraform-aws-tgw/README.md) | Module for creation of AWS Transity Gateway (TGW) and attaching a specified list of VPCs via the TGW. This module can be used to assist in deploying Cloudera Data Platform (CDP) Public Cloud in a fully private networking configuration where a CDP VPC and Networking VPC are connected using the Transit Gateway. | | [terraform-aws-proxy](modules/terraform-aws-proxy/README.md) | Module to create and configure and EC2 Auto-Scaling Group for a highly available Squid Proxy service with Network Load Balancer (NLB) to forward traffic to the proxy instances. This module can be used to assist in deploying Cloudera Data Platform (CDP) Public Cloud in a fully private networking configuration where a the CDP Environments uses a proxy config via the NLB. | | [terraform-azure-nfs](modules/terraform-azure-nfs/README.md) | Module for creation of Azure NFS File Share required for Cloudera Machine Learning (CML) Public Cloud. Also optionally creates a Virtual Machine which can be used to mount and set the required ownership for CML workspace's projects folder.| +| [terraform-azure-cdw-permissions](modules/terraform-azure-cdw-permissions/README.md) | Module for creation of the Azure Kubernetes Service (AKS) managed identity required for the Cloudera Data Warehouse (CDW) service.| Each module contains Terraform resource configuration and example variable definition files. diff --git a/modules/terraform-azure-cdw-permissions/.terraform-docs.yaml b/modules/terraform-azure-cdw-permissions/.terraform-docs.yaml new file mode 100644 index 0000000..0936036 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/.terraform-docs.yaml @@ -0,0 +1,21 @@ +formatter: markdown +header-from: doc_fragments/header.md +settings: + anchor: true + color: true + default: true + escape: true + html: true + indent: 2 + required: true + sensitive: true + type: true + + +sort: + enabled: true + by: required + +output: + file: README.md + mode: replace \ No newline at end of file diff --git a/modules/terraform-azure-cdw-permissions/README.md b/modules/terraform-azure-cdw-permissions/README.md new file mode 100644 index 0000000..cd414d9 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/README.md @@ -0,0 +1,60 @@ + +# Terraform Module for Azure AKS Managed Identity for CDW + +This module contains resource files and example variable definition files for creation of the Azure Kubernetes Service (AKS) managed identity required for the Cloudera Data Warehouse (CDW) service. This requirement is described [in this section](https://docs.cloudera.com/data-warehouse/cloud/azure-environments/topics/dw-azure-environment-requirements-checklist.html#pnavId5) of the CDW documentation. + +## Usage + +The [examples](./examples) directory has example Azure AKS Managed Identity creation: + +* `ex01-aks_managed_identity` uses a set of inputs for the module. + +An example `terraform.tfvars.sample` values file is included to show input variable values. + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 1.5.7 | +| [azurerm](#requirement\_azurerm) | 3.84.0 | + +## Providers + +| Name | Version | +|------|---------| +| [azurerm](#provider\_azurerm) | 3.84.0 | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [azurerm_role_assignment.cdp_cdw_aks_cred_storage_assign](https://registry.terraform.io/providers/hashicorp/azurerm/3.84.0/docs/resources/role_assignment) | resource | +| [azurerm_role_assignment.cdp_cdw_aks_cred_subscription_assign](https://registry.terraform.io/providers/hashicorp/azurerm/3.84.0/docs/resources/role_assignment) | resource | +| [azurerm_user_assigned_identity.cdp_cdw_aks_cred](https://registry.terraform.io/providers/hashicorp/azurerm/3.84.0/docs/resources/user_assigned_identity) | resource | +| [azurerm_resource_group.cdp_ds_rmgp](https://registry.terraform.io/providers/hashicorp/azurerm/3.84.0/docs/data-sources/resource_group) | data source | +| [azurerm_storage_account.data_storage_account](https://registry.terraform.io/providers/hashicorp/azurerm/3.84.0/docs/data-sources/storage_account) | data source | +| [azurerm_subscription.current](https://registry.terraform.io/providers/hashicorp/azurerm/3.84.0/docs/data-sources/subscription) | data source | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [azure\_aks\_credential\_managed\_identity\_name](#input\_azure\_aks\_credential\_managed\_identity\_name) | Name of the Managed Identity for the AKS Credential | `string` | n/a | yes | +| [azure\_data\_storage\_account](#input\_azure\_data\_storage\_account) | Name of the Azure Storage Account used for CDP Data | `string` | n/a | yes | +| [azure\_resource\_group\_name](#input\_azure\_resource\_group\_name) | Azrue Resource Group for CDP environment. | `string` | n/a | yes | +| [azure\_region](#input\_azure\_region) | Region which Cloud resources will be created | `string` | `null` | no | +| [cdw\_aks\_cred\_storage\_role\_assignments](#input\_cdw\_aks\_cred\_storage\_role\_assignments) | List of Role Assignments for the AKS Credential at Data Storage Account scope. |
list(object({
role = string
description = optional(string)
})
)
|
[
{
"description": "Assign Storage Blob Data Owner assignment to CDP Data Storage Container to AKS Credential",
"role": "Storage Blob Data Owner"
}
]
| no | +| [cdw\_aks\_cred\_subscription\_role\_assignments](#input\_cdw\_aks\_cred\_subscription\_role\_assignments) | List of Role Assignments for the AKS Credential at subscription scope |
list(object({
role = string
description = optional(string)
})
)
|
[
{
"description": "Assign Contributor Role to AKS Credential",
"role": "Contributor"
}
]
| no | +| [tags](#input\_tags) | Tags applied to provised resources | `map(any)` | `null` | no | + +## Outputs + +| Name | Description | +|------|-------------| +| [azure\_aks\_managed\_identity\_id](#output\_azure\_aks\_managed\_identity\_id) | ID of the Azure AKS managed identity | +| [azure\_subscription\_id](#output\_azure\_subscription\_id) | Subscription ID where the Azure AKS managed identity is created | + \ No newline at end of file diff --git a/modules/terraform-azure-cdw-permissions/data.tf b/modules/terraform-azure-cdw-permissions/data.tf new file mode 100644 index 0000000..4c03222 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/data.tf @@ -0,0 +1,27 @@ +# Copyright 2024 Cloudera, Inc. All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# Access information about Azure Subscription +data "azurerm_subscription" "current" {} + +# Find details of the Azure Resource group +data "azurerm_resource_group" "cdp_ds_rmgp" { + name = var.azure_resource_group_name +} + +# Find details about the data storage account +data "azurerm_storage_account" "data_storage_account" { + name = var.azure_data_storage_account + resource_group_name = var.azure_resource_group_name +} diff --git a/modules/terraform-azure-cdw-permissions/doc_fragments/header.md b/modules/terraform-azure-cdw-permissions/doc_fragments/header.md new file mode 100644 index 0000000..ae51556 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/doc_fragments/header.md @@ -0,0 +1,11 @@ +# Terraform Module for Azure AKS Managed Identity for CDW + +This module contains resource files and example variable definition files for creation of the Azure Kubernetes Service (AKS) managed identity required for the Cloudera Data Warehouse (CDW) service. This requirement is described [in this section](https://docs.cloudera.com/data-warehouse/cloud/azure-environments/topics/dw-azure-environment-requirements-checklist.html#pnavId5) of the CDW documentation. + +## Usage + +The [examples](./examples) directory has example Azure AKS Managed Identity creation: + +* `ex01-aks_managed_identity` uses a set of inputs for the module. + +An example `terraform.tfvars.sample` values file is included to show input variable values. diff --git a/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf new file mode 100755 index 0000000..b599084 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf @@ -0,0 +1,87 @@ +# Copyright 2024 Cloudera, Inc. All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +terraform { + required_version = ">= 1.5.7" + required_providers { + azurerm = { + source = "hashicorp/azurerm" + version = "3.84.0" + } + azuread = { + source = "hashicorp/azuread" + version = "2.46.0" + } + tls = { + source = "hashicorp/tls" + version = "~> 4.0.5" + } + local = { + source = "hashicorp/local" + version = "~> 2.5.1" + } + http = { + source = "hashicorp/http" + version = "~> 3.2.1" + } + } +} + +provider "azurerm" { + features { + resource_group { + prevent_deletion_if_contains_resources = false + } + } + +} + +provider "azuread" { +} + +module "cdp_azure_prereqs" { + source = "../../../terraform-cdp-azure-pre-reqs" + + env_prefix = var.env_prefix + azure_region = var.azure_region + + deployment_template = var.deployment_template + ingress_extra_cidrs_and_ports = var.ingress_extra_cidrs_and_ports + + # Tags to apply resources (omitted by default) + env_tags = var.env_tags + +} + +module "cdp_azure_cdw_aks" { + source = "../.." + + azure_resource_group_name = module.cdp_azure_prereqs.azure_resource_group_name + azure_region = var.azure_region + + azure_aks_credential_managed_identity_name = "${var.env_prefix}-aks-credential-identity" + azure_data_storage_account = module.cdp_azure_prereqs.azure_data_storage_account + + tags = var.env_tags + + depends_on = [ + module.cdp_azure_prereqs + ] +} + +output "azure_aks_managed_identity_id" { + value = module.cdp_azure_cdw_aks.azure_aks_managed_identity_id + + description = "ID of the Azure AKS managed identity" +} \ No newline at end of file diff --git a/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/terraform.tfvars.sample b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/terraform.tfvars.sample new file mode 100644 index 0000000..f6f543a --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/terraform.tfvars.sample @@ -0,0 +1,37 @@ +# Copyright 2024 Cloudera, Inc. All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# ------- Global settings ------- +env_prefix = "" # Required name prefix for cloud and CDP resources, e.g. cldr1 + +# ------- Cloud Settings ------- +azure_region = "" # Change this to specify Cloud Provider region, e.g. eastus + +# ------- CDP Environment Deployment ------- +deployment_template = "" # Specify the deployment pattern below. Options are public, semi-private or private + +# ------- Resource Tagging ------- +# **NOTE: An example of how to specify tags is below; uncomment & edit if required +# env_tags = { +# owner = "" +# project = "" +# enddate = "" +# } + +# ------- Network Settings ------- +# **NOTE: If required change the values below any additional CIDRs to add the the AWS Security Groups** +ingress_extra_cidrs_and_ports = { + cidrs = ["/32", "/32"], + ports = [443, 22] +} diff --git a/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/variables.tf b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/variables.tf new file mode 100755 index 0000000..17408f7 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/variables.tf @@ -0,0 +1,48 @@ +# Copyright 2024 Cloudera, Inc. All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# ------- Global settings ------- +variable "env_prefix" { + type = string + description = "Shorthand name for the environment. Used in resource descriptions" +} + +variable "azure_region" { + type = string + description = "Region which Cloud resources will be created" +} + +variable "env_tags" { + type = map(any) + description = "Tags applied to pvovisioned resources" + + default = null +} + +# ------- CDP Environment Deployment ------- +variable "deployment_template" { + type = string + + description = "Deployment Pattern to use for Cloud resources and CDP" +} + +# ------- Network Resources ------- +variable "ingress_extra_cidrs_and_ports" { + type = object({ + cidrs = list(string) + ports = list(number) + }) + description = "List of extra CIDR blocks and ports to include in Security Group Ingress rules" +} + diff --git a/modules/terraform-azure-cdw-permissions/main.tf b/modules/terraform-azure-cdw-permissions/main.tf new file mode 100644 index 0000000..a49094d --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/main.tf @@ -0,0 +1,36 @@ +# Create Azure Managed Identity +resource "azurerm_user_assigned_identity" "cdp_cdw_aks_cred" { + + location = var.azure_region + name = var.azure_aks_credential_managed_identity_name + resource_group_name = var.azure_resource_group_name + + tags = merge(var.tags, { Name = var.azure_aks_credential_managed_identity_name }) +} + +# Assign the required roles to the AKS credential managed identity +resource "azurerm_role_assignment" "cdp_cdw_aks_cred_subscription_assign" { + + for_each = { + for idx, role in var.cdw_aks_cred_subscription_role_assignments : idx => role + } + + scope = data.azurerm_subscription.current.id + role_definition_name = each.value.role + principal_id = azurerm_user_assigned_identity.cdp_cdw_aks_cred.principal_id + + description = each.value.description +} + +resource "azurerm_role_assignment" "cdp_cdw_aks_cred_storage_assign" { + + for_each = { + for idx, role in var.cdw_aks_cred_storage_role_assignments : idx => role + } + + scope = data.azurerm_storage_account.data_storage_account.id + role_definition_name = each.value.role + principal_id = azurerm_user_assigned_identity.cdp_cdw_aks_cred.principal_id + + description = each.value.description +} diff --git a/modules/terraform-azure-cdw-permissions/outputs.tf b/modules/terraform-azure-cdw-permissions/outputs.tf new file mode 100644 index 0000000..6a4f192 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/outputs.tf @@ -0,0 +1,25 @@ +# Copyright 2024 Cloudera, Inc. All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +output "azure_subscription_id" { + value = data.azurerm_subscription.current.subscription_id + + description = "Subscription ID where the Azure AKS managed identity is created" +} + +output "azure_aks_managed_identity_id" { + value = azurerm_user_assigned_identity.cdp_cdw_aks_cred.id + + description = "ID of the Azure AKS managed identity" +} diff --git a/modules/terraform-azure-cdw-permissions/provider.tf b/modules/terraform-azure-cdw-permissions/provider.tf new file mode 100644 index 0000000..5df2f8b --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/provider.tf @@ -0,0 +1,23 @@ +# Copyright 2024 Cloudera, Inc. All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +terraform { + required_version = ">= 1.5.7" + required_providers { + azurerm = { + source = "hashicorp/azurerm" + version = "3.84.0" + } + } +} \ No newline at end of file diff --git a/modules/terraform-azure-cdw-permissions/variables.tf b/modules/terraform-azure-cdw-permissions/variables.tf new file mode 100644 index 0000000..e6efd32 --- /dev/null +++ b/modules/terraform-azure-cdw-permissions/variables.tf @@ -0,0 +1,85 @@ +# Copyright 2024 Cloudera, Inc. All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# ------- Global settings ------- +variable "azure_region" { + type = string + description = "Region which Cloud resources will be created" + + default = null +} + +variable "tags" { + type = map(any) + description = "Tags applied to provised resources" + + default = null +} + +# ------- Azure specific settings ------- +variable "azure_resource_group_name" { + type = string + description = "Azrue Resource Group for CDP environment." + +} + +variable "azure_aks_credential_managed_identity_name" { + type = string + + description = "Name of the Managed Identity for the AKS Credential" + +} + +variable "azure_data_storage_account" { + type = string + + description = "Name of the Azure Storage Account used for CDP Data" + +} + +variable "cdw_aks_cred_subscription_role_assignments" { + type = list(object({ + role = string + description = optional(string) + }) + ) + + description = "List of Role Assignments for the AKS Credential at subscription scope" + + default = [ + { + "description" : "Assign Contributor Role to AKS Credential", + "role" : "Contributor" + } + ] + +} + +variable "cdw_aks_cred_storage_role_assignments" { + type = list(object({ + role = string + description = optional(string) + }) + ) + + description = "List of Role Assignments for the AKS Credential at Data Storage Account scope." + + default = [ + { + "description" : "Assign Storage Blob Data Owner assignment to CDP Data Storage Container to AKS Credential", + "role" : "Storage Blob Data Owner" + } + ] + +} \ No newline at end of file From 60bc0fcdbe2decf5310e8b03e9e463378edde533 Mon Sep 17 00:00:00 2001 From: Jim Enright Date: Thu, 1 Aug 2024 17:25:35 +0100 Subject: [PATCH 2/3] Fix formatting Signed-off-by: Jim Enright --- .../examples/ex01-aks_managed_identity/main.tf | 4 ++-- modules/terraform-azure-cdw-permissions/variables.tf | 8 ++++---- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf index b599084..e75c459 100755 --- a/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf +++ b/modules/terraform-azure-cdw-permissions/examples/ex01-aks_managed_identity/main.tf @@ -69,9 +69,9 @@ module "cdp_azure_cdw_aks" { azure_resource_group_name = module.cdp_azure_prereqs.azure_resource_group_name azure_region = var.azure_region - + azure_aks_credential_managed_identity_name = "${var.env_prefix}-aks-credential-identity" - azure_data_storage_account = module.cdp_azure_prereqs.azure_data_storage_account + azure_data_storage_account = module.cdp_azure_prereqs.azure_data_storage_account tags = var.env_tags diff --git a/modules/terraform-azure-cdw-permissions/variables.tf b/modules/terraform-azure-cdw-permissions/variables.tf index e6efd32..1179efa 100644 --- a/modules/terraform-azure-cdw-permissions/variables.tf +++ b/modules/terraform-azure-cdw-permissions/variables.tf @@ -35,16 +35,16 @@ variable "azure_resource_group_name" { } variable "azure_aks_credential_managed_identity_name" { - type = string + type = string - description = "Name of the Managed Identity for the AKS Credential" + description = "Name of the Managed Identity for the AKS Credential" } variable "azure_data_storage_account" { - type = string + type = string - description = "Name of the Azure Storage Account used for CDP Data" + description = "Name of the Azure Storage Account used for CDP Data" } From 3d7886753bc1092618477138a204d463da982f20 Mon Sep 17 00:00:00 2001 From: Jim Enright Date: Thu, 1 Aug 2024 17:52:46 +0100 Subject: [PATCH 3/3] Fix tflint errors Signed-off-by: Jim Enright --- modules/terraform-azure-cdw-permissions/data.tf | 5 ----- 1 file changed, 5 deletions(-) diff --git a/modules/terraform-azure-cdw-permissions/data.tf b/modules/terraform-azure-cdw-permissions/data.tf index 4c03222..6dbce6c 100644 --- a/modules/terraform-azure-cdw-permissions/data.tf +++ b/modules/terraform-azure-cdw-permissions/data.tf @@ -15,11 +15,6 @@ # Access information about Azure Subscription data "azurerm_subscription" "current" {} -# Find details of the Azure Resource group -data "azurerm_resource_group" "cdp_ds_rmgp" { - name = var.azure_resource_group_name -} - # Find details about the data storage account data "azurerm_storage_account" "data_storage_account" { name = var.azure_data_storage_account