From 112329d310108929e26588f981758b1adf597bf1 Mon Sep 17 00:00:00 2001 From: Austin Cheung Date: Mon, 24 Feb 2020 00:14:45 -0800 Subject: [PATCH 1/6] add enable_disk_encryption to azurerm_kusto_cluster --- .../kusto/resource_arm_kusto_cluster.go | 11 ++++- .../tests/resource_arm_kusto_cluster_test.go | 47 +++++++++++++++++++ website/docs/r/kusto_cluster.html.markdown | 2 + 3 files changed, 59 insertions(+), 1 deletion(-) diff --git a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go index 9dd4c0e4589a..67be71203d54 100644 --- a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go +++ b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go @@ -83,6 +83,11 @@ func resourceArmKustoCluster() *schema.Resource { }, }, + "enable_disk_encryption": { + Type: schema.TypeBool, + Optional: true, + }, + "uri": { Type: schema.TypeString, Computed: true, @@ -107,6 +112,7 @@ func resourceArmKustoClusterCreateUpdate(d *schema.ResourceData, meta interface{ name := d.Get("name").(string) resourceGroup := d.Get("resource_group_name").(string) + enableDiskEncryption := d.Get("enable_disk_encryption").(bool) if features.ShouldResourcesBeImported() && d.IsNewResource() { server, err := client.Get(ctx, resourceGroup, name) @@ -128,7 +134,9 @@ func resourceArmKustoClusterCreateUpdate(d *schema.ResourceData, meta interface{ return err } - clusterProperties := kusto.ClusterProperties{} + clusterProperties := kusto.ClusterProperties{ + EnableDiskEncryption: utils.Bool(enableDiskEncryption), + } t := d.Get("tags").(map[string]interface{}) @@ -200,6 +208,7 @@ func resourceArmKustoClusterRead(d *schema.ResourceData, meta interface{}) error if clusterProperties := clusterResponse.ClusterProperties; clusterProperties != nil { d.Set("uri", clusterProperties.URI) d.Set("data_ingestion_uri", clusterProperties.DataIngestionURI) + d.Set("enable_disk_encryption", clusterProperties.EnableDiskEncryption) } return tags.FlattenAndSet(d, clusterResponse.Tags) diff --git a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go index 5e6634c48e0f..8ba80a433c1a 100644 --- a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go +++ b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go @@ -87,6 +87,32 @@ func TestAccAzureRMKustoCluster_sku(t *testing.T) { }) } +func TestAccAzureRMKustoCluster_enableDiskEncryption(t *testing.T) { + data := acceptance.BuildTestData(t, "azurerm_kusto_cluster", "test") + + resource.ParallelTest(t, resource.TestCase{ + PreCheck: func() { acceptance.PreCheck(t) }, + Providers: acceptance.SupportedProviders, + CheckDestroy: testCheckAzureRMKustoClusterDestroy, + Steps: []resource.TestStep{ + { + Config: testAccAzureRMKustoCluster_enableDiskEncryption(data, true), + Check: resource.ComposeTestCheckFunc( + testCheckAzureRMKustoClusterExists(data.ResourceName), + resource.TestCheckResourceAttr(data.ResourceName, "enable_disk_encryption", "true"), + ), + }, + { + Config: testAccAzureRMKustoCluster_enableDiskEncryption(data, false), + Check: resource.ComposeTestCheckFunc( + testCheckAzureRMKustoClusterExists(data.ResourceName), + resource.TestCheckResourceAttr(data.ResourceName, "enable_disk_encryption", "false"), + ), + }, + }, + }) +} + func testAccAzureRMKustoCluster_basic(data acceptance.TestData) string { return fmt.Sprintf(` resource "azurerm_resource_group" "test" { @@ -176,6 +202,27 @@ resource "azurerm_kusto_cluster" "test" { `, data.RandomInteger, data.Locations.Primary, data.RandomString) } +func testAccAzureRMKustoCluster_enableDiskEncryption(data acceptance.TestData, enableDiskEncryption bool) string { + return fmt.Sprintf(` +resource "azurerm_resource_group" "test" { + name = "acctestRG-%d" + location = "%s" +} + +resource "azurerm_kusto_cluster" "test" { + name = "acctestkc%s" + location = "${azurerm_resource_group.test.location}" + resource_group_name = "${azurerm_resource_group.test.name}" + enable_disk_encryption = %t + + sku { + name = "Dev(No SLA)_Standard_D11_v2" + capacity = 1 + } +} +`, data.RandomInteger, data.Locations.Primary, data.RandomString, enableDiskEncryption) +} + func testCheckAzureRMKustoClusterDestroy(s *terraform.State) error { client := acceptance.AzureProvider.Meta().(*clients.Client).Kusto.ClustersClient ctx := acceptance.AzureProvider.Meta().(*clients.Client).StopContext diff --git a/website/docs/r/kusto_cluster.html.markdown b/website/docs/r/kusto_cluster.html.markdown index a5a40cda6579..c850f3e6e976 100644 --- a/website/docs/r/kusto_cluster.html.markdown +++ b/website/docs/r/kusto_cluster.html.markdown @@ -46,6 +46,8 @@ The following arguments are supported: * `sku` - (Required) A `sku` block as defined below. +* `enable_disk_encryption` - (Options) Indicates if the cluster's disks are encrypted + * `tags` - (Optional) A mapping of tags to assign to the resource. --- From 12cde409ad9a6cf29f5134dffed8331caac95903 Mon Sep 17 00:00:00 2001 From: njucz <740360112@qq.com> Date: Mon, 24 Feb 2020 17:24:38 +0800 Subject: [PATCH 2/6] more fields support for `azurerm_kusto_cluster` --- .../kusto/resource_arm_kusto_cluster.go | 21 +++++++- .../tests/resource_arm_kusto_cluster_test.go | 54 +++++++++++++++++++ website/docs/r/kusto_cluster.html.markdown | 4 ++ 3 files changed, 78 insertions(+), 1 deletion(-) diff --git a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go index 9dd4c0e4589a..09d8748a4962 100644 --- a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go +++ b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go @@ -83,6 +83,18 @@ func resourceArmKustoCluster() *schema.Resource { }, }, + "enable_disk_encryption": { + Type: schema.TypeBool, + Optional: true, + Default: false, + }, + + "enable_streaming_ingest": { + Type: schema.TypeBool, + Optional: true, + Default: false, + }, + "uri": { Type: schema.TypeString, Computed: true, @@ -122,13 +134,18 @@ func resourceArmKustoClusterCreateUpdate(d *schema.ResourceData, meta interface{ } location := azure.NormalizeLocation(d.Get("location").(string)) + enableDiskEncryption := d.Get("enable_disk_encryption").(bool) + enableStreamingIngest := d.Get("enable_streaming_ingest").(bool) sku, err := expandKustoClusterSku(d) if err != nil { return err } - clusterProperties := kusto.ClusterProperties{} + clusterProperties := kusto.ClusterProperties{ + EnableDiskEncryption: utils.Bool(enableDiskEncryption), + EnableStreamingIngest: utils.Bool(enableStreamingIngest), + } t := d.Get("tags").(map[string]interface{}) @@ -198,6 +215,8 @@ func resourceArmKustoClusterRead(d *schema.ResourceData, meta interface{}) error } if clusterProperties := clusterResponse.ClusterProperties; clusterProperties != nil { + d.Set("enable_disk_encryption", clusterProperties.EnableDiskEncryption) + d.Set("enable_streaming_ingest", clusterProperties.EnableStreamingIngest) d.Set("uri", clusterProperties.URI) d.Set("data_ingestion_uri", clusterProperties.DataIngestionURI) } diff --git a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go index 5e6634c48e0f..1a5f16034208 100644 --- a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go +++ b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go @@ -23,6 +23,37 @@ func TestAccAzureRMKustoCluster_basic(t *testing.T) { Config: testAccAzureRMKustoCluster_basic(data), Check: resource.ComposeTestCheckFunc( testCheckAzureRMKustoClusterExists(data.ResourceName), + resource.TestCheckResourceAttr(data.ResourceName, "enable_disk_encryption", "false"), + resource.TestCheckResourceAttr(data.ResourceName, "enable_streaming_ingest", "false"), + ), + }, + data.ImportStep(), + }, + }) +} + +func TestAccAzureRMKustoCluster_propsUpdate(t *testing.T) { + data := acceptance.BuildTestData(t, "azurerm_kusto_cluster", "test") + + resource.ParallelTest(t, resource.TestCase{ + PreCheck: func() { acceptance.PreCheck(t) }, + Providers: acceptance.SupportedProviders, + CheckDestroy: testCheckAzureRMKustoClusterDestroy, + Steps: []resource.TestStep{ + { + Config: testAccAzureRMKustoCluster_basic(data), + Check: resource.ComposeTestCheckFunc( + testCheckAzureRMKustoClusterExists(data.ResourceName), + resource.TestCheckResourceAttr(data.ResourceName, "enable_disk_encryption", "false"), + resource.TestCheckResourceAttr(data.ResourceName, "enable_streaming_ingest", "false"), + ), + }, + { + Config: testAccAzureRMKustoCluster_propsUpdate(data), + Check: resource.ComposeTestCheckFunc( + testCheckAzureRMKustoClusterExists(data.ResourceName), + resource.TestCheckResourceAttr(data.ResourceName, "enable_disk_encryption", "true"), + resource.TestCheckResourceAttr(data.ResourceName, "enable_streaming_ingest", "true"), ), }, data.ImportStep(), @@ -176,6 +207,29 @@ resource "azurerm_kusto_cluster" "test" { `, data.RandomInteger, data.Locations.Primary, data.RandomString) } +func testAccAzureRMKustoCluster_propsUpdate(data acceptance.TestData) string { + return fmt.Sprintf(` +resource "azurerm_resource_group" "test" { + name = "acctestRG-%d" + location = "%s" +} + +resource "azurerm_kusto_cluster" "test" { + name = "acctestkc%s" + location = "${azurerm_resource_group.test.location}" + resource_group_name = "${azurerm_resource_group.test.name}" + + enable_disk_encryption = true + enable_streaming_ingest = true + + sku { + name = "Dev(No SLA)_Standard_D11_v2" + capacity = 1 + } +} +`, data.RandomInteger, data.Locations.Primary, data.RandomString) +} + func testCheckAzureRMKustoClusterDestroy(s *terraform.State) error { client := acceptance.AzureProvider.Meta().(*clients.Client).Kusto.ClustersClient ctx := acceptance.AzureProvider.Meta().(*clients.Client).StopContext diff --git a/website/docs/r/kusto_cluster.html.markdown b/website/docs/r/kusto_cluster.html.markdown index a5a40cda6579..1edaedafbe25 100644 --- a/website/docs/r/kusto_cluster.html.markdown +++ b/website/docs/r/kusto_cluster.html.markdown @@ -46,6 +46,10 @@ The following arguments are supported: * `sku` - (Required) A `sku` block as defined below. +* `enable_disk_encryption` - (Optional) Specifies if the cluster's disks are encrypted. Defaults to `false` + +* `enable_streaming_ingest` - (Optional) Specifies if the streaming ingest is enabled. Defaults to `false` + * `tags` - (Optional) A mapping of tags to assign to the resource. --- From 5397d96e0a6efc1588a63479073b9dcd2232802e Mon Sep 17 00:00:00 2001 From: Austin Cheung Date: Mon, 24 Feb 2020 17:31:39 -0800 Subject: [PATCH 3/6] remove duplicate set and undo changes from prettier --- .../kusto/resource_arm_kusto_cluster.go | 1 - website/docs/r/kusto_cluster.html.markdown | 32 +++++++++---------- 2 files changed, 16 insertions(+), 17 deletions(-) diff --git a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go index 48e8ff327068..0361a8fe1a31 100644 --- a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go +++ b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go @@ -217,7 +217,6 @@ func resourceArmKustoClusterRead(d *schema.ResourceData, meta interface{}) error d.Set("enable_streaming_ingest", clusterProperties.EnableStreamingIngest) d.Set("uri", clusterProperties.URI) d.Set("data_ingestion_uri", clusterProperties.DataIngestionURI) - d.Set("enable_disk_encryption", clusterProperties.EnableDiskEncryption) } return tags.FlattenAndSet(d, clusterResponse.Tags) diff --git a/website/docs/r/kusto_cluster.html.markdown b/website/docs/r/kusto_cluster.html.markdown index 95a51839c8c7..e3589ab74f0e 100644 --- a/website/docs/r/kusto_cluster.html.markdown +++ b/website/docs/r/kusto_cluster.html.markdown @@ -38,46 +38,46 @@ resource "azurerm_kusto_cluster" "example" { The following arguments are supported: -- `name` - (Required) The name of the Kusto Cluster to create. Changing this forces a new resource to be created. +* `name` - (Required) The name of the Kusto Cluster to create. Changing this forces a new resource to be created. -- `location` - (Required) The location where the Kusto Cluster should be created. Changing this forces a new resource to be created. +* `location` - (Required) The location where the Kusto Cluster should be created. Changing this forces a new resource to be created. -- `resource_group_name` - (Required) Specifies the Resource Group where the Kusto Cluster should exist. Changing this forces a new resource to be created. +* `resource_group_name` - (Required) Specifies the Resource Group where the Kusto Cluster should exist. Changing this forces a new resource to be created. -- `sku` - (Required) A `sku` block as defined below. +* `sku` - (Required) A `sku` block as defined below. -- `enable_disk_encryption` - (Optional) Specifies if the cluster's disks are encrypted. +* `enable_disk_encryption` - (Optional) Specifies if the cluster's disks are encrypted. -- `enable_streaming_ingest` - (Optional) Specifies if the streaming ingest is enabled. +* `enable_streaming_ingest` - (Optional) Specifies if the streaming ingest is enabled. -- `tags` - (Optional) A mapping of tags to assign to the resource. +* `tags` - (Optional) A mapping of tags to assign to the resource. --- A `sku` block supports the following: -- `name` - (Required) The name of the SKU. Valid values are: `Dev(No SLA)_Standard_D11_v2`, `Standard_D11_v2`, `Standard_D12_v2`, `Standard_D13_v2`, `Standard_D14_v2`, `Standard_DS13_v2+1TB_PS`, `Standard_DS13_v2+2TB_PS`, `Standard_DS14_v2+3TB_PS`, `Standard_DS14_v2+4TB_PS`, `Standard_L16s`, `Standard_L4s` and `Standard_L8s` +* `name` - (Required) The name of the SKU. Valid values are: `Dev(No SLA)_Standard_D11_v2`, `Standard_D11_v2`, `Standard_D12_v2`, `Standard_D13_v2`, `Standard_D14_v2`, `Standard_DS13_v2+1TB_PS`, `Standard_DS13_v2+2TB_PS`, `Standard_DS14_v2+3TB_PS`, `Standard_DS14_v2+4TB_PS`, `Standard_L16s`, `Standard_L4s` and `Standard_L8s` -- `capacity` - (Required) Specifies the node count for the cluster. Boundaries depend on the sku name. +* `capacity` - (Required) Specifies the node count for the cluster. Boundaries depend on the sku name. ## Attributes Reference The following attributes are exported: -- `id` - The Kusto Cluster ID. +* `id` - The Kusto Cluster ID. -- `uri` - The FQDN of the Azure Kusto Cluster. +* `uri` - The FQDN of the Azure Kusto Cluster. -- `data_ingestion_uri` - The Kusto Cluster URI to be used for data ingestion. +* `data_ingestion_uri` - The Kusto Cluster URI to be used for data ingestion. ## Timeouts The `timeouts` block allows you to specify [timeouts](https://www.terraform.io/docs/configuration/resources.html#timeouts) for certain actions: -- `create` - (Defaults to 60 minutes) Used when creating the Kusto Cluster. -- `update` - (Defaults to 60 minutes) Used when updating the Kusto Cluster. -- `read` - (Defaults to 5 minutes) Used when retrieving the Kusto Cluster. -- `delete` - (Defaults to 60 minutes) Used when deleting the Kusto Cluster. +* `create` - (Defaults to 60 minutes) Used when creating the Kusto Cluster. +* `update` - (Defaults to 60 minutes) Used when updating the Kusto Cluster. +* `read` - (Defaults to 5 minutes) Used when retrieving the Kusto Cluster. +* `delete` - (Defaults to 60 minutes) Used when deleting the Kusto Cluster. ## Import From eacb58b8b6f64a7d4967e00ab5a78c291f47a51b Mon Sep 17 00:00:00 2001 From: aqche <39076898+aqche@users.noreply.github.com> Date: Wed, 26 Feb 2020 16:09:09 -0800 Subject: [PATCH 4/6] Apply suggestions from code review Co-Authored-By: kt --- azurerm/internal/services/kusto/resource_arm_kusto_cluster.go | 2 +- .../services/kusto/tests/resource_arm_kusto_cluster_test.go | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go index 0361a8fe1a31..98ba7616bbe7 100644 --- a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go +++ b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go @@ -141,7 +141,7 @@ func resourceArmKustoClusterCreateUpdate(d *schema.ResourceData, meta interface{ } clusterProperties := kusto.ClusterProperties{ - EnableDiskEncryption: utils.Bool(enableDiskEncryption), + EnableDiskEncryption: utils.Bool(d.Get("enable_disk_encryption").(bool)), EnableStreamingIngest: utils.Bool(enableStreamingIngest), } diff --git a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go index 9700e71825fa..7808be8d704c 100644 --- a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go +++ b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go @@ -30,7 +30,7 @@ func TestAccAzureRMKustoCluster_basic(t *testing.T) { }) } -func TestAccAzureRMKustoCluster_propsUpdate(t *testing.T) { +func TestAccAzureRMKustoCluster_update(t *testing.T) { data := acceptance.BuildTestData(t, "azurerm_kusto_cluster", "test") resource.ParallelTest(t, resource.TestCase{ @@ -205,7 +205,7 @@ resource "azurerm_kusto_cluster" "test" { `, data.RandomInteger, data.Locations.Primary, data.RandomString) } -func testAccAzureRMKustoCluster_propsUpdate(data acceptance.TestData) string { +func testAccAzureRMKustoCluster_update(data acceptance.TestData) string { return fmt.Sprintf(` resource "azurerm_resource_group" "test" { name = "acctestRG-%d" From b248a832588dc2f400ea91540ceab379217e537a Mon Sep 17 00:00:00 2001 From: Austin Cheung Date: Wed, 26 Feb 2020 16:10:46 -0800 Subject: [PATCH 5/6] apply changes from code review --- .../services/kusto/resource_arm_kusto_cluster.go | 6 ++---- .../tests/resource_arm_kusto_cluster_test.go | 16 +++++++++++++--- website/docs/r/kusto_cluster.html.markdown | 3 +++ 3 files changed, 18 insertions(+), 7 deletions(-) diff --git a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go index 0361a8fe1a31..956f7f28bfd2 100644 --- a/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go +++ b/azurerm/internal/services/kusto/resource_arm_kusto_cluster.go @@ -132,8 +132,6 @@ func resourceArmKustoClusterCreateUpdate(d *schema.ResourceData, meta interface{ } location := azure.NormalizeLocation(d.Get("location").(string)) - enableDiskEncryption := d.Get("enable_disk_encryption").(bool) - enableStreamingIngest := d.Get("enable_streaming_ingest").(bool) sku, err := expandKustoClusterSku(d) if err != nil { @@ -141,8 +139,8 @@ func resourceArmKustoClusterCreateUpdate(d *schema.ResourceData, meta interface{ } clusterProperties := kusto.ClusterProperties{ - EnableDiskEncryption: utils.Bool(enableDiskEncryption), - EnableStreamingIngest: utils.Bool(enableStreamingIngest), + EnableDiskEncryption: utils.Bool(d.Get("enable_disk_encryption").(bool)), + EnableStreamingIngest: utils.Bool(d.Get("enable_streaming_ingest").(bool)), } t := d.Get("tags").(map[string]interface{}) diff --git a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go index 9700e71825fa..86213ba77fed 100644 --- a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go +++ b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go @@ -30,7 +30,7 @@ func TestAccAzureRMKustoCluster_basic(t *testing.T) { }) } -func TestAccAzureRMKustoCluster_propsUpdate(t *testing.T) { +func TestAccAzureRMKustoCluster_update(t *testing.T) { data := acceptance.BuildTestData(t, "azurerm_kusto_cluster", "test") resource.ParallelTest(t, resource.TestCase{ @@ -46,8 +46,9 @@ func TestAccAzureRMKustoCluster_propsUpdate(t *testing.T) { resource.TestCheckResourceAttr(data.ResourceName, "enable_streaming_ingest", "false"), ), }, + data.ImportStep(), { - Config: testAccAzureRMKustoCluster_propsUpdate(data), + Config: testAccAzureRMKustoCluster_update(data), Check: resource.ComposeTestCheckFunc( testCheckAzureRMKustoClusterExists(data.ResourceName), resource.TestCheckResourceAttr(data.ResourceName, "enable_disk_encryption", "true"), @@ -55,6 +56,15 @@ func TestAccAzureRMKustoCluster_propsUpdate(t *testing.T) { ), }, data.ImportStep(), + { + Config: testAccAzureRMKustoCluster_basic(data), + Check: resource.ComposeTestCheckFunc( + testCheckAzureRMKustoClusterExists(data.ResourceName), + resource.TestCheckResourceAttr(data.ResourceName, "enable_disk_encryption", "false"), + resource.TestCheckResourceAttr(data.ResourceName, "enable_streaming_ingest", "false"), + ), + }, + data.ImportStep(), }, }) } @@ -205,7 +215,7 @@ resource "azurerm_kusto_cluster" "test" { `, data.RandomInteger, data.Locations.Primary, data.RandomString) } -func testAccAzureRMKustoCluster_propsUpdate(data acceptance.TestData) string { +func testAccAzureRMKustoCluster_update(data acceptance.TestData) string { return fmt.Sprintf(` resource "azurerm_resource_group" "test" { name = "acctestRG-%d" diff --git a/website/docs/r/kusto_cluster.html.markdown b/website/docs/r/kusto_cluster.html.markdown index e3589ab74f0e..330a8d0febc5 100644 --- a/website/docs/r/kusto_cluster.html.markdown +++ b/website/docs/r/kusto_cluster.html.markdown @@ -60,6 +60,7 @@ A `sku` block supports the following: * `capacity` - (Required) Specifies the node count for the cluster. Boundaries depend on the sku name. + ## Attributes Reference The following attributes are exported: @@ -72,6 +73,8 @@ The following attributes are exported: ## Timeouts + + The `timeouts` block allows you to specify [timeouts](https://www.terraform.io/docs/configuration/resources.html#timeouts) for certain actions: * `create` - (Defaults to 60 minutes) Used when creating the Kusto Cluster. From 9e987d57f384e332c772ec6681c9b97a383e833e Mon Sep 17 00:00:00 2001 From: Austin Cheung Date: Sat, 29 Feb 2020 13:12:03 -0800 Subject: [PATCH 6/6] v0.12 changes --- .../kusto/tests/resource_arm_kusto_cluster_test.go | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go index cd91d0b0f9a7..0de371fb4793 100644 --- a/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go +++ b/azurerm/internal/services/kusto/tests/resource_arm_kusto_cluster_test.go @@ -233,6 +233,10 @@ resource "azurerm_kusto_cluster" "test" { func testAccAzureRMKustoCluster_update(data acceptance.TestData) string { return fmt.Sprintf(` +provider "azurerm" { + features {} +} + resource "azurerm_resource_group" "test" { name = "acctestRG-%d" location = "%s" @@ -240,8 +244,8 @@ resource "azurerm_resource_group" "test" { resource "azurerm_kusto_cluster" "test" { name = "acctestkc%s" - location = "${azurerm_resource_group.test.location}" - resource_group_name = "${azurerm_resource_group.test.name}" + location = azurerm_resource_group.test.location + resource_group_name = azurerm_resource_group.test.name enable_disk_encryption = true enable_streaming_ingest = true