Skip to content

Commit 8aeb80f

Browse files
committed
Fixed the reference to the cidr block variable.
1 parent 425dd26 commit 8aeb80f

File tree

2 files changed

+30
-24
lines changed

2 files changed

+30
-24
lines changed

Terraform/deploy-fsx-ontap/module/main.tf

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,17 @@ resource "aws_fsx_ontap_file_system" "terraform-fsxn" {
2929
fsx_admin_password = data.aws_secretsmanager_secret_version.fsx_password.secret_string
3030
route_table_ids = var.route_table_ids
3131
tags = var.tags
32-
disk_iops_configuration = var.disk_iops_configuration
32+
dynamic "disk_iops_configuration" {
33+
for_each = var.disk_iops_configuration != null ? [var.disk_iops_configuration] : []
34+
content {
35+
iops = disk_iops_configuration.value["iops"]
36+
mode = disk_iops_configuration.value["mode"]
37+
}
38+
}
3339

3440
lifecycle {
3541
precondition {
36-
condition = !var.create_sg || (var.cidr_block != "" && var.source_security_group_id == "" || var.cidr_block == "" && var.source_security_group_id != "")
42+
condition = !var.create_sg || (var.cidr_for_sg != "" && var.source_security_group_id == "" || var.cidr_for_sg == "" && var.source_security_group_id != "")
3743
error_message = "You must specify EITHER cidr_block OR source_security_group_id when creating a security group, not both."
3844
}
3945
precondition {

Terraform/deploy-fsx-ontap/module/security_groups.tf

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
* the "security_group_id" to the security group you want to use. Both of these variables
1111
* can be found in the variables.tf file.
1212
*
13-
* - If you wish to use the created Security Group, just be sure to set the cidr_block OR
13+
* - If you wish to use the created Security Group, just be sure to set the cidr_for_sg OR
1414
* source_security_group_id varaibles in the variables.tf file. Do not set both or the
1515
* creation of the security group will fail.
1616
*/
@@ -33,7 +33,7 @@ resource "aws_vpc_security_group_ingress_rule" "all_icmp" {
3333
resource "aws_vpc_security_group_ingress_rule" "nfs_tcp" {
3434
security_group_id = aws_security_group.fsx_sg.id
3535
description = "Remote procedure call for NFS"
36-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
36+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
3737
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
3838
from_port = 111
3939
to_port = 111
@@ -43,7 +43,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_tcp" {
4343
resource "aws_vpc_security_group_ingress_rule" "nfs_udp" {
4444
security_group_id = aws_security_group.fsx_sg.id
4545
description = "Remote procedure call for NFS"
46-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
46+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
4747
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
4848
from_port = 111
4949
to_port = 111
@@ -53,7 +53,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_udp" {
5353
resource "aws_vpc_security_group_ingress_rule" "cifs" {
5454
security_group_id = aws_security_group.fsx_sg.id
5555
description = "NetBIOS service session for CIFS"
56-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
56+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
5757
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
5858
from_port = 139
5959
to_port = 139
@@ -63,7 +63,7 @@ resource "aws_vpc_security_group_ingress_rule" "cifs" {
6363
resource "aws_vpc_security_group_ingress_rule" "snmp_tcp" {
6464
security_group_id = aws_security_group.fsx_sg.id
6565
description = "Simple network management protocol for log collection"
66-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
66+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
6767
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
6868
from_port = 161
6969
to_port = 162
@@ -73,7 +73,7 @@ resource "aws_vpc_security_group_ingress_rule" "snmp_tcp" {
7373
resource "aws_vpc_security_group_ingress_rule" "snmp_udp" {
7474
security_group_id = aws_security_group.fsx_sg.id
7575
description = "Simple network management protocol for log collection"
76-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
76+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
7777
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
7878
from_port = 161
7979
to_port = 162
@@ -83,7 +83,7 @@ resource "aws_vpc_security_group_ingress_rule" "snmp_udp" {
8383
resource "aws_vpc_security_group_ingress_rule" "smb_cifs" {
8484
security_group_id = aws_security_group.fsx_sg.id
8585
description = "Microsoft SMB/CIFS over TCP with NetBIOS framing"
86-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
86+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
8787
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
8888
from_port = 445
8989
to_port = 445
@@ -93,7 +93,7 @@ resource "aws_vpc_security_group_ingress_rule" "smb_cifs" {
9393
resource "aws_vpc_security_group_ingress_rule" "nfs_mount_tcp" {
9494
security_group_id = aws_security_group.fsx_sg.id
9595
description = "NFS mount"
96-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
96+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
9797
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
9898
from_port = 635
9999
to_port = 635
@@ -103,7 +103,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_mount_tcp" {
103103
resource "aws_vpc_security_group_ingress_rule" "kerberos" {
104104
security_group_id = aws_security_group.fsx_sg.id
105105
description = "Kerberos authentication"
106-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
106+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
107107
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
108108
from_port = 749
109109
to_port = 749
@@ -113,7 +113,7 @@ resource "aws_vpc_security_group_ingress_rule" "kerberos" {
113113
resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon" {
114114
security_group_id = aws_security_group.fsx_sg.id
115115
description = "NFS server daemon"
116-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
116+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
117117
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
118118
from_port = 2049
119119
to_port = 2049
@@ -123,7 +123,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon" {
123123
resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon_udp" {
124124
security_group_id = aws_security_group.fsx_sg.id
125125
description = "NFS server daemon"
126-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
126+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
127127
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
128128
from_port = 2049
129129
to_port = 2049
@@ -133,7 +133,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon_udp" {
133133
resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon" {
134134
security_group_id = aws_security_group.fsx_sg.id
135135
description = "NFS lock daemon"
136-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
136+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
137137
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
138138
from_port = 4045
139139
to_port = 4045
@@ -143,7 +143,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon" {
143143
resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon_udp" {
144144
security_group_id = aws_security_group.fsx_sg.id
145145
description = "NFS lock daemon"
146-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
146+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
147147
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
148148
from_port = 4045
149149
to_port = 4045
@@ -153,7 +153,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon_udp" {
153153
resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor" {
154154
security_group_id = aws_security_group.fsx_sg.id
155155
description = "Status monitor for NFS"
156-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
156+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
157157
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
158158
from_port = 4046
159159
to_port = 4046
@@ -163,7 +163,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor" {
163163
resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor_udp" {
164164
security_group_id = aws_security_group.fsx_sg.id
165165
description = "Status monitor for NFS"
166-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
166+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
167167
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
168168
from_port = 4046
169169
to_port = 4046
@@ -173,7 +173,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor_udp" {
173173
resource "aws_vpc_security_group_ingress_rule" "nfs_rquotad" {
174174
security_group_id = aws_security_group.fsx_sg.id
175175
description = "Remote quota server for NFS"
176-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
176+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
177177
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
178178
from_port = 4049
179179
to_port = 4049
@@ -183,7 +183,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_rquotad" {
183183
resource "aws_vpc_security_group_ingress_rule" "iscsi_tcp" {
184184
security_group_id = aws_security_group.fsx_sg.id
185185
description = "iSCSI"
186-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
186+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
187187
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
188188
from_port = 3260
189189
to_port = 3260
@@ -193,7 +193,7 @@ resource "aws_vpc_security_group_ingress_rule" "iscsi_tcp" {
193193
resource "aws_vpc_security_group_ingress_rule" "Snapmirror_Intercluster_communication" {
194194
security_group_id = aws_security_group.fsx_sg.id
195195
description = "Snapmirror Intercluster communication"
196-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
196+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
197197
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
198198
from_port = 11104
199199
to_port = 11104
@@ -203,7 +203,7 @@ resource "aws_vpc_security_group_ingress_rule" "Snapmirror_Intercluster_communic
203203
resource "aws_vpc_security_group_ingress_rule" "Snapmirror_data_transfer" {
204204
security_group_id = aws_security_group.fsx_sg.id
205205
description = "Snapmirror data transfer"
206-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
206+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
207207
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
208208
from_port = 11105
209209
to_port = 11105
@@ -213,7 +213,7 @@ resource "aws_vpc_security_group_ingress_rule" "Snapmirror_data_transfer" {
213213
resource "aws_vpc_security_group_ingress_rule" "nfs_mount_udp" {
214214
security_group_id = aws_security_group.fsx_sg.id
215215
description = "NFS mount"
216-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
216+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
217217
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
218218
from_port = 635
219219
to_port = 635
@@ -223,7 +223,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_mount_udp" {
223223
resource "aws_vpc_security_group_ingress_rule" "ssh" {
224224
security_group_id = aws_security_group.fsx_sg.id
225225
description = "ssh"
226-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
226+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
227227
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
228228
from_port = 22
229229
to_port = 22
@@ -233,7 +233,7 @@ resource "aws_vpc_security_group_ingress_rule" "ssh" {
233233
resource "aws_vpc_security_group_ingress_rule" "s3_and_api" {
234234
security_group_id = aws_security_group.fsx_sg.id
235235
description = "Provice acccess to S3 and the ONTAP REST API"
236-
cidr_ipv4 = (var.cidr_block != "" ? var.cidr_block : null)
236+
cidr_ipv4 = (var.cidr_for_sg != "" ? var.cidr_for_sg : null)
237237
referenced_security_group_id = (var.source_security_group_id != "" ? var.source_security_group_id : null)
238238
from_port = 443
239239
to_port = 443

0 commit comments

Comments
 (0)