Open troyel opened 2 years ago
@nkvuong : I see you marked this as a platform bug, should we, or would it help for us to register a support case against this with Azure as well since this is Azure Databricks?
@troyel currently the account-level SCIM does not support persist external_id leading to behaviour as you noticed, hence it is a platform bug. If you raise a support case for this, it will reinforce the message
Following up - is this issue still relevant?
Following up - is this issue still relevant?
Yes, @nfx
When authenticating against the Databricks account level the databricks_user resource object does not support the external_id argument. The resource does not fail, but the response recieved back is empty without accepting/using the external_id reference.
This causes some potential issues when trying to match users back with Azure AD references. It works as expected when authenticating the provider against the workspace.
Configuration
Expected Behavior
Expected behaviour is that the external_id is persisted and exists in the created databricks_user resource on Databricks account.
Actual Behavior
external_id is not persisted on Databricks account and terraform creates a diff by trying to add "external_id" to update the resource for each user.
Steps to Reproduce
terraform apply
twice to see that external_id is not set and persisted but always tried to set through terraform applyTerraform and provider versions
Terraform v1.2.3 on linux_amd64
Debug Output
{ "@level": "warn", "@message": "Provider \"provider[\\"registry.terraform.io/databricks/databricks\\"]\" produced an unexpected new value for databricks_user.bi[\"userid\"], but we are tolerating it because it is using the legacy plugin SDK. The following problems may be the cause of any confusing errors from downstream operations: