You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Terraform/deploy-fsx-ontap/standalone-module/README.md
+21-35Lines changed: 21 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,15 +14,15 @@ This sample demonstrates how to deploy an FSx for NetApp ONTAP file system, incl
14
14
Follow the instructions below to use this sample in your own environment.
15
15
### Repository Overview
16
16
This is a standalone Terraform configuration repository that contains the following files:
17
-
***main.tf** - The main set of configuration for this terraform sample
18
-
***output.tf** - Contains output declarations of the resources created by this Terraform module. Terraform stores output values in the configuration's state file
19
-
***security_groups.tf** - Contains security group configurations for the FSxN file system. This file is optional and can be removed if you don't want to use the provided security group.
20
-
***variables.tf** - Contains the variable definitions and assignments for this sample. Exported values will override any of the variables in this file.
17
+
***main.tf** - Contains the configuration of the AWS FSx for ONTAP based on the variables set in the `variables.tf` file.
18
+
***output.tf** - Contains output declarations of the resources created by this Terraform configuration.
19
+
***security_groups.tf** - Contains security group configurations for the FSxN file system.
20
+
***variables.tf** - Contains the variable definitions that allows you to customize the deployment.
21
21
22
22
### What to expect
23
23
Running this terraform sample will result the following:
24
-
*Create a new AWS Security Group in your VPC with the following rules:
25
-
-**Ingress** allow all ICMP traffic
24
+
*Optionally a new AWS Security Group in your VPC with the following rules:
25
+
-**Ingress** allow ICMP traffic
26
26
-**Ingress** allow nfs port 111 (both TCP and UDP)
27
27
-**Ingress** allow cifs TCP port 139
28
28
-**Ingress** allow snmp ports 161-162 (both TCP and UDP)
@@ -36,22 +36,23 @@ Running this terraform sample will result the following:
36
36
-**Ingress** allow Snapmirror data transfer TCP port 11105
37
37
-**Ingress** allow ssh port 22
38
38
-**Ingress** allow https port 443
39
-
-**Egress** allow all traffic
39
+
-**Egress** allow all out bound traffic
40
40
41
41
* Two new AWS secrets. One that contains the fsxadmin password and another that contains the SVM admin password.
42
42
43
-
*Create a new FSx for Netapp ONTAP file-system in your AWS account named "_terraform-fsxn_". The file-system will be created with the following configuration parameters:
43
+
*A new FSx for Netapp ONTAP file-system. Much of the configuration is defined in the `variables.tf` file, but the following are the default values:
44
44
* 1024Gb of storage capacity
45
-
* Multi AZ deployment type
45
+
*Generation 1 Multi AZ deployment type
46
46
* 128Mbps of throughput capacity
47
-
48
-
* Create a Storage Virtual Maching (SVM) in this new file-system named "_first_svm_"
49
-
50
-
* Create a new FlexVol volume in this SVM named "_vol1_" with the following configuration parameters:
51
-
* Size of 1024Mb
52
-
* Storage efficiencies mechanism enabled
53
-
* Auto tiering policy with 31 cooling days
54
-
* post-delete backup disabled
47
+
* 1 HA pair
48
+
* 1 Storage Virtual Machine (SVM)
49
+
* 1 FlexVol volume with the following configuration parameters:
50
+
* Size of 2TB - Thin provisioned
51
+
* Junction path of /vol1
52
+
* Security style of UNIX
53
+
* Storage efficiencies enabled
54
+
* Auto tiering policy with 31 cooling days
55
+
* post-delete backup disabled
55
56
56
57
## Prerequisites
57
58
@@ -121,7 +122,7 @@ This directory represents a standalone Terraform module. Run the following comma
121
122
terraform init
122
123
```
123
124
124
-
A succesfull initialization should display the following output:
125
+
A successful initialization should display the following output:
125
126
```shell
126
127
Initializing the backend...
127
128
Initializing modules...
@@ -160,25 +161,10 @@ You can see that Terraform recognizes the modules required by our configuration:
160
161
161
162
### 4. Update Variables
162
163
163
-
- Open the **`variables.tf`** file in your preferred text editor. Update the values of the variables to match your
164
+
Open the **`variables.tf`** file in your preferred text editor. Update the values of the variables to match your
164
165
preferences and save the file. This will ensure that the Terraform code deploys resources according to your specifications.
165
166
166
-
**Make sure to replace the values with ones that match your AWS environment and needs.**
167
-
Modify the remaining optional variables (e.g. defining AD) in the **`main.tf`** file and remove commenting
168
-
where needed according to the explanations in-line.
169
-
170
-
### 5. Update Security Group
171
-
A default security group is defined in the "security_groups.tf" file. At the top of
172
-
that file you can see where you can specify either a CIDR block or a security group ID
173
-
to allow access to the FSxN file system. Do not specify both, as it will cause
174
-
the terraform deployment to fail.
175
-
176
-
If you decide you don't want to use the security group, you can either delete the security_groups.tf file,
177
-
or just rename it such that it doesn't end with ".tf" (e.g. security_groups.tf.kep). You will also need
178
-
to update the `security_group_ids = [aws_security_group.fsx_sg.id]` line in the main.tf file
179
-
to reference the security group(s) you want to use.
180
-
181
-
### 6. Create a Terraform plan
167
+
### 5. Create a Terraform plan
182
168
Run the following command to create an execution plan, which lets you preview the changes that Terraform plans to make to your infrastructure:
0 commit comments