A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://docs.databricks.com/aws/en/compute/group-access below:

Assign compute resources to a group

Assign compute resources to a group

This article explains how to create a compute resource assigned to a group using the Dedicated access mode.

Dedicated group access mode allows users to get the operational efficiency of a standard access mode cluster while also securely supporting languages and workloads that are not supported by standard access mode, such as Databricks Runtime for ML, RDD APIs, and R.

Requirements​

To use the dedicated group access mode:

What is dedicated access mode?​

Dedicated access mode is the latest version of single-user access mode. With dedicated access, a compute resource can be assigned to a single user or group, only allowing the assigned user(s) access to use the compute resource.

When a user is connected to a compute resource dedicated to a group (a group cluster), the user's permissions automatically down-scopes to the group's permissions, allowing the user to securely share the resource with the other members of the group.

Create a compute resource dedicated to a group​
  1. In your Databricks workspace, go to Compute and click Create compute.
  2. Expand the Advanced section.
  3. Under Access mode, click Manual and then select Dedicated (formerly: Single-user) from the dropdown menu.
  4. In the Single user or group field, select the group you want assigned to this resource.
  5. Configure the other desired compute settings, then click Create.
Best practices for managing group clusters​

Because user permissions are scoped down to the group when using group clusters, Databricks recommends creating a /Workspace/Groups/<groupName> folder for each group you plan to use with a group cluster. Then, assign CAN MANAGE permissions on the folder to the group. This allows groups to avoid permission errors. All of the group's notebooks and workspace assets should be managed in the group folder.

You must also modify the following workloads to run on group clusters:

Permissioning behavior on group clusters​

All commands, queries, and other actions performed on a group cluster use the permissions assigned to the group, not the individual user.

Individual user permissions cannot be enforced because all group members have full access to the Spark APIs and shared compute environment. If user-based permissions were applied, one member could query restricted data, and another member without access could still retrieve the results through the shared environment. Therefore, the group itself, not the user who is a member of the group, must have the necessary permissions to successfully perform the action.

For example, the group needs explicit permission to query a table, access a secret scope or secret, use a Unity Catalog connection credential, access a Git folder, or create a workspace object.

Example group permissions​

When you create a data object using the group cluster, the group is assigned as the object's owner.

For example, if you have a notebook attached to a group cluster and run the following command:

SQL

use catalog main;
create schema group_cluster_group_schema;

Then run this query to check the owner of the schema:

SQL

describe schema group_cluster_group_schema;

Auditing group dedicated compute activity​

There are two key identities involved when a group cluster runs a workload:

  1. The user who is running the workload on the group cluster
  2. The group whose permissions are used to perform the actual workload actions

The audit log system table records these identities under the following parameters:

The following example query pulls up the identity metadata for an action taken with the group cluster:

SQL

select action_name, event_time, user_identity.email, identity_metadata
from system.access.audit
where user_identity.email = "uc-group-cluster-group" AND service_name = "unityCatalog"
order by event_time desc limit 100;

View the audit log system table reference for more example queries. See Audit log system table reference.

Known issues​

Workspace files and folders created from group clusters result in the assigned object owner being Unknown. Subsequent operations on those objects, such as read, write, and delete, fail with permission-denied errors.

Known limitations​

Dedicated group access has the following limitations:


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4