Skip to content

Commit 0ca335b

Browse files
committed
Updated based on Gen 2 update.
1 parent 35442e7 commit 0ca335b

File tree

1 file changed

+21
-35
lines changed
  • Terraform/deploy-fsx-ontap/standalone-module

1 file changed

+21
-35
lines changed

Terraform/deploy-fsx-ontap/standalone-module/README.md

Lines changed: 21 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,15 @@ This sample demonstrates how to deploy an FSx for NetApp ONTAP file system, incl
1414
Follow the instructions below to use this sample in your own environment.
1515
### Repository Overview
1616
This is a standalone Terraform configuration repository that contains the following files:
17-
* **main.tf** - The main set of configuration for this terraform sample
18-
* **output.tf** - Contains output declarations of the resources created by this Terraform module. Terraform stores output values in the configuration's state file
19-
* **security_groups.tf** - Contains security group configurations for the FSxN file system. This file is optional and can be removed if you don't want to use the provided security group.
20-
* **variables.tf** - Contains the variable definitions and assignments for this sample. Exported values will override any of the variables in this file.
17+
* **main.tf** - Contains the configuration of the AWS FSx for ONTAP based on the variables set in the `variables.tf` file.
18+
* **output.tf** - Contains output declarations of the resources created by this Terraform configuration.
19+
* **security_groups.tf** - Contains security group configurations for the FSxN file system.
20+
* **variables.tf** - Contains the variable definitions that allows you to customize the deployment.
2121

2222
### What to expect
2323
Running this terraform sample will result the following:
24-
* Create a new AWS Security Group in your VPC with the following rules:
25-
- **Ingress** allow all ICMP traffic
24+
* Optionally a new AWS Security Group in your VPC with the following rules:
25+
- **Ingress** allow ICMP traffic
2626
- **Ingress** allow nfs port 111 (both TCP and UDP)
2727
- **Ingress** allow cifs TCP port 139
2828
- **Ingress** allow snmp ports 161-162 (both TCP and UDP)
@@ -36,22 +36,23 @@ Running this terraform sample will result the following:
3636
- **Ingress** allow Snapmirror data transfer TCP port 11105
3737
- **Ingress** allow ssh port 22
3838
- **Ingress** allow https port 443
39-
- **Egress** allow all traffic
39+
- **Egress** allow all out bound traffic
4040

4141
* Two new AWS secrets. One that contains the fsxadmin password and another that contains the SVM admin password.
4242

43-
* Create a new FSx for Netapp ONTAP file-system in your AWS account named "_terraform-fsxn_". The file-system will be created with the following configuration parameters:
43+
* A new FSx for Netapp ONTAP file-system. Much of the configuration is defined in the `variables.tf` file, but the following are the default values:
4444
* 1024Gb of storage capacity
45-
* Multi AZ deployment type
45+
* Generation 1 Multi AZ deployment type
4646
* 128Mbps of throughput capacity
47-
48-
* Create a Storage Virtual Maching (SVM) in this new file-system named "_first_svm_"
49-
50-
* Create a new FlexVol volume in this SVM named "_vol1_" with the following configuration parameters:
51-
* Size of 1024Mb
52-
* Storage efficiencies mechanism enabled
53-
* Auto tiering policy with 31 cooling days
54-
* post-delete backup disabled
47+
* 1 HA pair
48+
* 1 Storage Virtual Machine (SVM)
49+
* 1 FlexVol volume with the following configuration parameters:
50+
* Size of 2TB - Thin provisioned
51+
* Junction path of /vol1
52+
* Security style of UNIX
53+
* Storage efficiencies enabled
54+
* Auto tiering policy with 31 cooling days
55+
* post-delete backup disabled
5556

5657
## Prerequisites
5758

@@ -121,7 +122,7 @@ This directory represents a standalone Terraform module. Run the following comma
121122
terraform init
122123
```
123124

124-
A succesfull initialization should display the following output:
125+
A successful initialization should display the following output:
125126
```shell
126127
Initializing the backend...
127128
Initializing modules...
@@ -160,25 +161,10 @@ You can see that Terraform recognizes the modules required by our configuration:
160161
161162
### 4. Update Variables
162163
163-
- Open the **`variables.tf`** file in your preferred text editor. Update the values of the variables to match your
164+
Open the **`variables.tf`** file in your preferred text editor. Update the values of the variables to match your
164165
preferences and save the file. This will ensure that the Terraform code deploys resources according to your specifications.
165166
166-
**Make sure to replace the values with ones that match your AWS environment and needs.**
167-
Modify the remaining optional variables (e.g. defining AD) in the **`main.tf`** file and remove commenting
168-
where needed according to the explanations in-line.
169-
170-
### 5. Update Security Group
171-
A default security group is defined in the "security_groups.tf" file. At the top of
172-
that file you can see where you can specify either a CIDR block or a security group ID
173-
to allow access to the FSxN file system. Do not specify both, as it will cause
174-
the terraform deployment to fail.
175-
176-
If you decide you don't want to use the security group, you can either delete the security_groups.tf file,
177-
or just rename it such that it doesn't end with ".tf" (e.g. security_groups.tf.kep). You will also need
178-
to update the `security_group_ids = [aws_security_group.fsx_sg.id]` line in the main.tf file
179-
to reference the security group(s) you want to use.
180-
181-
### 6. Create a Terraform plan
167+
### 5. Create a Terraform plan
182168
Run the following command to create an execution plan, which lets you preview the changes that Terraform plans to make to your infrastructure:
183169
```shell
184170
terraform plan

0 commit comments

Comments
 (0)