You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Terraform/deploy-fsx-ontap/module/README.md
+28-20Lines changed: 28 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,15 +21,23 @@ Calling this terraform module will result the following:
21
21
* Create a new AWS Security Group in your VPC with the following rules:
22
22
-**Ingress** allow all ICMP traffic
23
23
-**Ingress** allow nfs port 111 (both TCP and UDP)
24
-
-**Ingress** allow cifc TCP port 139
24
+
-**Ingress** allow cifs TCP port 139
25
25
-**Ingress** allow snmp ports 161-162 (both TCP and UDP)
26
26
-**Ingress** allow smb cifs TCP port 445
27
-
-**Ingress** alloe bfs mount port 635 (both TCP and UDP)
27
+
-**Ingress** allow nfs mount port 635 (both TCP and UDP)
28
+
-**Ingress** allow kerberos TCP port 749
29
+
-**Ingress** allow nfs port 2049 (both TCP and UDP)
30
+
-**Ingress** allow nfs lock and monitoring 4045-4046 (both TCP and UDP)
31
+
-**Ingress** allow nfs quota TCP 4049
32
+
-**Ingress** allow Snapmirror Intercluster communication TCP port 11104
33
+
-**Ingress** allow Snapmirror data transfer TCP port 11105
34
+
-**Ingress** allow ssh port 22
35
+
-**Ingress** allow https port 443
28
36
-**Egress** allow all traffic
29
37
* Create a new FSx for Netapp ONTAP file-system in your AWS account named "_terraform-fsxn_". The file-system will be created with the following configuration parameters:
30
38
* 1024Gb of storage capacity
31
39
* Multi AZ deployment type
32
-
*256Mbps of throughput capacity
40
+
*128Mbps of throughput capacity
33
41
34
42
* Create a Storage Virtual Maching (SVM) in this new file-system named "_first_svm_"
35
43
* Create a new FlexVol volume in this SVM named "_vol1_" with the following configuration parameters:
@@ -49,8 +57,8 @@ Calling this terraform module will result the following:
@@ -68,24 +76,23 @@ Calling this terraform module will result the following:
68
76
> [!NOTE]
69
77
> In this sample, the AWS Credentials were configured through [AWS CLI](https://aws.amazon.com/cli/), which adds them to a shared configuration file (option 4 above). Therefore, this documentation only provides guidance on setting-up the AWS credentials with shared configuration file using AWS CLI.
70
78
71
-
#### Configure AWS Credentials using AWS CLI
79
+
#### Configure AWS Credentials using AWS CLI
72
80
73
-
The AWS Provider can source credentials and other settings from the shared configuration and credentials files. By default, these files are located at `$HOME/.aws/config` and `$HOME/.aws/credentials` on Linux and macOS, and `"%USERPROFILE%\.aws\credentials"` on Windows.
81
+
The AWS Provider can source credentials and other settings from the shared configuration and credentials files. By default, these files are located at `$HOME/.aws/config` and `$HOME/.aws/credentials` on Linux and macOS, and `"%USERPROFILE%\.aws\credentials"` on Windows.
74
82
75
-
There are several ways to set your credentials and configuration setting using AWS CLI. We will use [`aws configure`](https://docs.aws.amazon.com/cli/latest/reference/configure/index.html) command:
83
+
There are several ways to set your credentials and configuration setting using AWS CLI. We will use [`aws configure`](https://docs.aws.amazon.com/cli/latest/reference/configure/index.html) command:
76
84
77
-
Run the following command to quickly set and view your credentails, region, and output format. The following example shows sample values:
85
+
Run the following command to quickly set and view your credentails, region, and output format. The following example shows sample values:
Default region name [None]: < YOUR-PREFERRED-REGION >
84
-
Default output format [None]: json
85
-
```
86
-
87
-
To list configuration data, use the [`aws configire list`](https://docs.aws.amazon.com/cli/latest/reference/configure/list.html) command. This command lists the profile, access key, secret key, and region configuration information used for the specified profile. For each configuration item, it shows the value, where the configuration value was retrieved, and the configuration variable name.
Default region name [None]: < YOUR-PREFERRED-REGION >
92
+
Default output format [None]: json
93
+
```
88
94
95
+
To list configuration data, use the [`aws configire list`](https://docs.aws.amazon.com/cli/latest/reference/configure/list.html) command. This command lists the profile, access key, secret key, and region configuration information used for the specified profile. For each configuration item, it shows the value, where the configuration value was retrieved, and the configuration variable name.
89
96
90
97
## Usage
91
98
@@ -250,7 +257,7 @@ terraform apply -y
250
257
251
258
| Name | Description | Type | Default | Required |
|fsx_admin_password| The ONTAP administrative password forthe fsxadmin user that you can use to administer your file system using the ONTAP CLI and REST API |`string`|n/a|yes|
260
+
|aws_secretsmanager_region| The AWS region where the secret is stored. |`string`|`"us-east-2"`|No|
254
261
| backup_retention_days | The number of days to retain automatic backups. Setting this to 0 disables automatic backups. You can retain automatic backups for a maximum of 90 days. |`number`|`0`| no |
255
262
| cidr_for_sg | cide block to be used for the ingress rules |`string`|`"0.0.0.0/0"`| no |
256
263
| create_sg | Determines whether the SG should be deployed as part of this execution or not |`bool`|`false`| no |
@@ -260,6 +267,7 @@ terraform apply -y
260
267
| fsx_deploy_type | The filesystem deployment type. Supports MULTI_AZ_1 and SINGLE_AZ_1 |`string`|`"MULTI_AZ_1"`| no |
261
268
| fsx_maintenance_start_time | The preferred start time (in d:HH:MM format) to perform weekly maintenance, in the UTC time zone. |`string`|`"1:00:00"`| no |
262
269
| fsx_name | The deployed filesystem name |`string`|`"terraform-fsxn"`| no |
270
+
| fsx_secret_name | The name of the AWS SecretManager secret that holds the ONTAP administrative password for the fsxadmin user that you can use to administer your file system using the ONTAP CLI and REST API. |`string`|`"fsx_secret"`| Yes |
263
271
| fsx_subnets | A list of IDs for the subnets that the file system will be accessible from. Up to 2 subnets can be provided. |`map(any)`|<pre>{<br>"primarysub": "",<br>"secondarysub": ""<br>}</pre>| no |
264
272
| fsx_tput_in_MBps | The throughput capacity (in MBps) for the file system. Valid values are 128, 256, 512, 1024, 2048, and 4096. |`number`|`256`| no |
265
273
| kms_key_id | ARN for the KMS Key to encrypt the file system at rest, Defaults to an AWS managed KMS Key. |`string`|`null`| no |
@@ -297,4 +305,4 @@ See the License for the specific language governing permissions and limitations
The following resources are a Security Group followed by ingress and egress rules for FSx ONTAP.
8
-
The Security Group is not required for deploying FSx ONTAP, but is included here for completeness.
9
-
10
-
- If you wish to skip this resource, pass the variable "create_sg" as false to the module block. Otherwise, pass true.
11
-
12
-
- If you wish to use the Security Group, choose the relevant source for the ingress rules as cidr block and pass the variable "cidr_for_sg" to the module block.
13
-
14
-
Note that a source reference for a Security Group is optional, but is considered to be a best practice.
15
-
The rules below are just a suggestion for basic functionality.
0 commit comments