Skip to content

Commit fea9a95

Browse files
committed
Fixed some spelling errors
1 parent 702cc67 commit fea9a95

File tree

3 files changed

+30
-30
lines changed

3 files changed

+30
-30
lines changed

Terraform/deploy-fsx-ontap/standalone-module/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ resource "aws_fsx_ontap_storage_virtual_machine" "mysvm" {
6464
name = var.svm_name
6565

6666
// OPTIONAL PARAMETERS
67-
# root_volume_security_style = "
67+
# root_volume_security_style = ""
6868
# tags = {}
6969
# active_directory_configuration {}
7070
}
@@ -88,7 +88,7 @@ resource "aws_fsx_ontap_volume" "myvol" {
8888
skip_final_backup = true
8989
# bypass_snaplock_enterprise_retention = true
9090
# copy_tags_to_backups = false
91-
# security_style = "MIXED"
91+
# security_style = "UNIX"
9292
# snaplock_configuration {}
9393
# snapshot_policy {}
9494
# tags = {}

Terraform/deploy-fsx-ontap/standalone-module/security_groups.tf

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222

2323
/* Set either the CIDR block OR the Security Group ID for the source of the ingress rules */
2424
locals {
25-
ciddr_block = "10.0.0.0/8" // Set this to the CIDR block you want to allow traffic from.
25+
cidr_block = "10.0.0.0/8" // Set this to the CIDR block you want to allow traffic from.
2626
security_group_id = "" // Set this to the Security Group ID that is assigned to clients that you want to allow traffic from.
2727
}
2828

@@ -44,7 +44,7 @@ resource "aws_vpc_security_group_ingress_rule" "all_icmp" {
4444
resource "aws_vpc_security_group_ingress_rule" "nfs_tcp" {
4545
security_group_id = aws_security_group.fsx_sg.id
4646
description = "Remote procedure call for NFS"
47-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
47+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
4848
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
4949
from_port = 111
5050
to_port = 111
@@ -54,7 +54,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_tcp" {
5454
resource "aws_vpc_security_group_ingress_rule" "nfs_udp" {
5555
security_group_id = aws_security_group.fsx_sg.id
5656
description = "Remote procedure call for NFS"
57-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
57+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
5858
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
5959
from_port = 111
6060
to_port = 111
@@ -64,7 +64,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_udp" {
6464
resource "aws_vpc_security_group_ingress_rule" "cifs" {
6565
security_group_id = aws_security_group.fsx_sg.id
6666
description = "NetBIOS service session for CIFS"
67-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
67+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
6868
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
6969
from_port = 139
7070
to_port = 139
@@ -74,7 +74,7 @@ resource "aws_vpc_security_group_ingress_rule" "cifs" {
7474
resource "aws_vpc_security_group_ingress_rule" "snmp_tcp" {
7575
security_group_id = aws_security_group.fsx_sg.id
7676
description = "Simple network management protocol for log collection"
77-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
77+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
7878
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
7979
from_port = 161
8080
to_port = 162
@@ -84,7 +84,7 @@ resource "aws_vpc_security_group_ingress_rule" "snmp_tcp" {
8484
resource "aws_vpc_security_group_ingress_rule" "snmp_udp" {
8585
security_group_id = aws_security_group.fsx_sg.id
8686
description = "Simple network management protocol for log collection"
87-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
87+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
8888
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
8989
from_port = 161
9090
to_port = 162
@@ -94,7 +94,7 @@ resource "aws_vpc_security_group_ingress_rule" "snmp_udp" {
9494
resource "aws_vpc_security_group_ingress_rule" "smb_cifs" {
9595
security_group_id = aws_security_group.fsx_sg.id
9696
description = "Microsoft SMB/CIFS over TCP with NetBIOS framing"
97-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
97+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
9898
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
9999
from_port = 445
100100
to_port = 445
@@ -104,7 +104,7 @@ resource "aws_vpc_security_group_ingress_rule" "smb_cifs" {
104104
resource "aws_vpc_security_group_ingress_rule" "nfs_mount_tcp" {
105105
security_group_id = aws_security_group.fsx_sg.id
106106
description = "NFS mount"
107-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
107+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
108108
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
109109
from_port = 635
110110
to_port = 635
@@ -114,7 +114,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_mount_tcp" {
114114
resource "aws_vpc_security_group_ingress_rule" "kerberos" {
115115
security_group_id = aws_security_group.fsx_sg.id
116116
description = "Kerberos authentication"
117-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
117+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
118118
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
119119
from_port = 749
120120
to_port = 749
@@ -124,7 +124,7 @@ resource "aws_vpc_security_group_ingress_rule" "kerberos" {
124124
resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon" {
125125
security_group_id = aws_security_group.fsx_sg.id
126126
description = "NFS server daemon"
127-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
127+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
128128
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
129129
from_port = 2049
130130
to_port = 2049
@@ -134,7 +134,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon" {
134134
resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon_udp" {
135135
security_group_id = aws_security_group.fsx_sg.id
136136
description = "NFS server daemon"
137-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
137+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
138138
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
139139
from_port = 2049
140140
to_port = 2049
@@ -144,7 +144,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_server_daemon_udp" {
144144
resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon" {
145145
security_group_id = aws_security_group.fsx_sg.id
146146
description = "NFS lock daemon"
147-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
147+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
148148
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
149149
from_port = 4045
150150
to_port = 4045
@@ -154,7 +154,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon" {
154154
resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon_udp" {
155155
security_group_id = aws_security_group.fsx_sg.id
156156
description = "NFS lock daemon"
157-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
157+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
158158
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
159159
from_port = 4045
160160
to_port = 4045
@@ -164,7 +164,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_lock_daemon_udp" {
164164
resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor" {
165165
security_group_id = aws_security_group.fsx_sg.id
166166
description = "Status monitor for NFS"
167-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
167+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
168168
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
169169
from_port = 4046
170170
to_port = 4046
@@ -174,7 +174,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor" {
174174
resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor_udp" {
175175
security_group_id = aws_security_group.fsx_sg.id
176176
description = "Status monitor for NFS"
177-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
177+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
178178
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
179179
from_port = 4046
180180
to_port = 4046
@@ -184,7 +184,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_status_monitor_udp" {
184184
resource "aws_vpc_security_group_ingress_rule" "nfs_rquotad" {
185185
security_group_id = aws_security_group.fsx_sg.id
186186
description = "Remote quota server for NFS"
187-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
187+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
188188
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
189189
from_port = 4049
190190
to_port = 4049
@@ -194,7 +194,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_rquotad" {
194194
resource "aws_vpc_security_group_ingress_rule" "iscsi_tcp" {
195195
security_group_id = aws_security_group.fsx_sg.id
196196
description = "iSCSI"
197-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
197+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
198198
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
199199
from_port = 3260
200200
to_port = 3260
@@ -204,7 +204,7 @@ resource "aws_vpc_security_group_ingress_rule" "iscsi_tcp" {
204204
resource "aws_vpc_security_group_ingress_rule" "Snapmirror_Intercluster_communication" {
205205
security_group_id = aws_security_group.fsx_sg.id
206206
description = "Snapmirror Intercluster communication"
207-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
207+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
208208
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
209209
from_port = 11104
210210
to_port = 11104
@@ -214,7 +214,7 @@ resource "aws_vpc_security_group_ingress_rule" "Snapmirror_Intercluster_communic
214214
resource "aws_vpc_security_group_ingress_rule" "Snapmirror_data_transfer" {
215215
security_group_id = aws_security_group.fsx_sg.id
216216
description = "Snapmirror data transfer"
217-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
217+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
218218
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
219219
from_port = 11105
220220
to_port = 11105
@@ -224,7 +224,7 @@ resource "aws_vpc_security_group_ingress_rule" "Snapmirror_data_transfer" {
224224
resource "aws_vpc_security_group_ingress_rule" "nfs_mount_udp" {
225225
security_group_id = aws_security_group.fsx_sg.id
226226
description = "NFS mount"
227-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
227+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
228228
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
229229
from_port = 635
230230
to_port = 635
@@ -234,7 +234,7 @@ resource "aws_vpc_security_group_ingress_rule" "nfs_mount_udp" {
234234
resource "aws_vpc_security_group_ingress_rule" "ssh" {
235235
security_group_id = aws_security_group.fsx_sg.id
236236
description = "ssh"
237-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
237+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
238238
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
239239
from_port = 22
240240
to_port = 22
@@ -244,7 +244,7 @@ resource "aws_vpc_security_group_ingress_rule" "ssh" {
244244
resource "aws_vpc_security_group_ingress_rule" "s3_and_api" {
245245
security_group_id = aws_security_group.fsx_sg.id
246246
description = "Provice acccess to S3 and the ONTAP REST API"
247-
cidr_ipv4 = (local.ciddr_block != "" ? local.ciddr_block : null)
247+
cidr_ipv4 = (local.cidr_block != "" ? local.cidr_block : null)
248248
referenced_security_group_id = (local.security_group_id != "" ? local.security_group_id : null)
249249
from_port = 443
250250
to_port = 443

Terraform/deploy-fsx-ontap/standalone-module/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,6 @@ variable "aws_secretsmanager_region" {
44
default = "us-east-2"
55
}
66

7-
variable "fsx_secret_name" {
8-
description = "The name of the AWS SecretManager secret that holds the ONTAP administrative password for the fsxadmin user that you can use to administer your file system using the ONTAP CLI and REST API."
9-
type = string
10-
default = "fsx_secret"
11-
}
12-
137
variable "fsx_capacity_size_gb" {
148
description = "The storage capacity (GiB) of the FSxN file system. Valid values between 1024 and 196608."
159
type = number
@@ -42,6 +36,12 @@ variable "fsx_region" {
4236
default = "us-west-2"
4337
}
4438

39+
variable "fsx_secret_name" {
40+
description = "The name of the AWS SecretManager secret that holds the ONTAP administrative password for the fsxadmin user that you can use to administer your file system using the ONTAP CLI and REST API."
41+
type = string
42+
default = "fsx_secret"
43+
}
44+
4545
variable "fsx_subnets" {
4646
description = "A list of subnets IDs that the file system will be accessible from. For MULTI_AZ_1 deployment type, provide both subnets. For SINGLE_AZ_1 deployment type, only the primary subnet is used."
4747
type = map(any)

0 commit comments

Comments
 (0)