Skip to content

Latest commit

 

History

History
68 lines (48 loc) · 2.54 KB

File metadata and controls

68 lines (48 loc) · 2.54 KB

Terraform examples for Azure NetApp Files application volume groups

Overview

This repository contains Terraform code examples designed to provision and manage Azure NetApp Files application volume groups. Azure NetApp Files is a high-performance file storage service that supports various workloads, and application volume groups simplify the deployment of related volumes for SAP HANA and Oracle.

Features

  • Automated AVG Management: Simplifies the creation, modification, and deletion of Azure NetApp Files application volume groups.
  • Version Control: Tracks changes to volume group configurations.
  • Scalability: Supports scaling storage capacity and performance based on application needs.
  • Integration: Seamlessly integrates with Azure services and workloads.

Prerequisites

  • Install Terraform.
  • Configure access credentials for your Azure account.
  • Ensure the Azure NetApp Files service is enabled in your subscription.

Examples included in this repo

  • oracle-destination-avg - This example creates destination volumes (cross-zone or cross-region replication) for an existing application volume group for Oracle.

Usage

  1. Clone this repository:

    git clone https://github.com/ANFTechTeam/terraform-avg.git
    cd terraform-avg
  2. Change directory to one of the examples

    cd oracle-destination-avg
  3. Initialize Terraform:

    terraform init
  4. Review and customize the variables in the variables.tf and terraform.tfvars files, including details for the NetApp account, capacity pool, and volume configurations.

  5. Plan the infrastructure changes:

    terraform plan
  6. Apply the changes to provision the application volume group:

    terraform apply
  7. To destroy the application volume group:

    terraform destroy

Notes

  • Follow best practices for managing sensitive data, such as using Azure Key Vault or environment variables for credentials.
  • Regularly review and update the Terraform code to align with evolving application and storage requirements.

Resources