Open
Description
Feature description
Make it possible to use azure service principal when using 'io.kestra.plugin.databricks.sql.Query'.
I've managed to use a service principal by properties. to get the secret I needed to create it from databricks, I couldn't use the entra service principal secret.
Another issue with using this "temporary solution" is that I couldn't get secrets to work, so I needed to add the oauth2secret and clientid as plaintext.
create secret for service principal
databricks manage account
user management -> service principals
create an OAuth secret, can't use from entra
- id: databricks_sql
type: io.kestra.plugin.databricks.sql.Query
properties:
AuthMech: "11"
Auth_Flow: "1"
OAuth2ClientId: "guid for entra service principal"
OAuth2Secret: "secret created from databricks"
host: myname.azuredatabricks.net
httpPath: /sql/1.0/warehouses/my-id
sql: select 1
More info can be found at slack https://kestra-io.slack.com/archives/C03FQKXRK3K/p1736944826740719
Metadata
Metadata
Assignees
Type
Projects
Status
Backlog