|
| 1 | + |
| 2 | +# [terraform-aws-arc-efs](https://github.com/sourcefuse/terraform-aws-arc-efs) |
| 3 | + |
| 4 | +<a href="https://github.com/sourcefuse/terraform-aws-arc-efs/releases/latest"><img src="https://img.shields.io/github/release/sourcefuse/terraform-aws-arc-efs.svg?style=for-the-badge" alt="Latest Release"/></a> <a href="https://github.com/sourcefuse/terraform-aws-arc-efs/commits"><img src="https://img.shields.io/github/last-commit/sourcefuse/terraform-aws-arc-efs.svg?style=for-the-badge" alt="Last Updated"/></a>   |
| 5 | + |
| 6 | +[](https://sonarcloud.io/summary/new_code?id=sourcefuse_terraform-aws-arc-efs) |
| 7 | + |
| 8 | +--- |
| 9 | + |
| 10 | +## Overview |
| 11 | + |
| 12 | +SourceFuse AWS Reference Architecture (ARC) Terraform module for managing AWS Elastic File System. |
| 13 | + |
| 14 | +## Usage |
| 15 | +### Basic Example |
| 16 | + |
| 17 | +```hcl |
| 18 | +module "efs" { |
| 19 | + source = "sourcefuse/arc-efs/aws" |
| 20 | +
|
| 21 | + namespace = "arc" |
| 22 | + environment = "dev" |
| 23 | + name = "my-efs" |
| 24 | +
|
| 25 | + # Mount targets |
| 26 | + mount_targets = { |
| 27 | + "us-east-1a" = { |
| 28 | + subnet_id = "subnet-12345678" |
| 29 | + } |
| 30 | + "us-east-1b" = { |
| 31 | + subnet_id = "subnet-87654321" |
| 32 | + } |
| 33 | + } |
| 34 | +
|
| 35 | + # Security configuration |
| 36 | + mount_target_security_group_vpc_id = "vpc-12345678" |
| 37 | + allowed_cidr_blocks = ["10.0.0.0/16"] |
| 38 | +
|
| 39 | + tags = { |
| 40 | + Project = "MyProject" |
| 41 | + } |
| 42 | +} |
| 43 | +``` |
| 44 | + |
| 45 | +### Advanced Example with Access Points |
| 46 | + |
| 47 | +```hcl |
| 48 | +module "efs" { |
| 49 | + source = "sourcefuse/arc-efs/aws" |
| 50 | +
|
| 51 | + namespace = "arc" |
| 52 | + environment = "prod" |
| 53 | + name = "app-storage" |
| 54 | +
|
| 55 | + # High-performance configuration |
| 56 | + performance_mode = "maxIO" |
| 57 | + throughput_mode = "provisioned" |
| 58 | + provisioned_throughput_in_mibps = 500 |
| 59 | +
|
| 60 | + # Encryption |
| 61 | + encrypted = true |
| 62 | + kms_key_id = aws_kms_key.efs.arn |
| 63 | +
|
| 64 | + # Mount targets |
| 65 | + mount_targets = { |
| 66 | + "us-east-1a" = { subnet_id = "subnet-12345678" } |
| 67 | + "us-east-1b" = { subnet_id = "subnet-87654321" } |
| 68 | + } |
| 69 | +
|
| 70 | + # Security configuration |
| 71 | + mount_target_security_group_vpc_id = "vpc-12345678" |
| 72 | + allowed_cidr_blocks = ["10.0.0.0/8"] |
| 73 | +
|
| 74 | + # Access points |
| 75 | + access_points = { |
| 76 | + web_app = { |
| 77 | + path = "/web" |
| 78 | + creation_info = { |
| 79 | + owner_gid = 1001 |
| 80 | + owner_uid = 1001 |
| 81 | + permissions = "755" |
| 82 | + } |
| 83 | + posix_user = { |
| 84 | + gid = 1001 |
| 85 | + uid = 1001 |
| 86 | + } |
| 87 | + } |
| 88 | + database = { |
| 89 | + path = "/db" |
| 90 | + creation_info = { |
| 91 | + owner_gid = 999 |
| 92 | + owner_uid = 999 |
| 93 | + permissions = "750" |
| 94 | + } |
| 95 | + } |
| 96 | + } |
| 97 | +
|
| 98 | + # Lifecycle policy for cost optimization |
| 99 | + lifecycle_policy = { |
| 100 | + transition_to_ia = "AFTER_30_DAYS" |
| 101 | + transition_to_primary_storage_class = "AFTER_1_ACCESS" |
| 102 | + } |
| 103 | +
|
| 104 | + # Cross-region replication |
| 105 | + replication_configuration = { |
| 106 | + destination = { |
| 107 | + region = "us-west-2" |
| 108 | + } |
| 109 | + } |
| 110 | +
|
| 111 | + tags = { |
| 112 | + Environment = "Production" |
| 113 | + Compliance = "Required" |
| 114 | + } |
| 115 | +} |
| 116 | +``` |
| 117 | + |
| 118 | +## Examples |
| 119 | + |
| 120 | +This module includes several comprehensive examples: |
| 121 | + |
| 122 | +- **[Basic](./examples/basic/)** - Simple EFS setup with mount targets |
| 123 | +- **[With Access Points](./examples/with-access-points/)** - Multiple access points for different applications |
| 124 | +- **[With Replication](./examples/with-replication/)** - Cross-region replication for disaster recovery |
| 125 | +- **[Complete](./examples/complete/)** - All features including encryption, lifecycle policies, and access points |
| 126 | + |
| 127 | +## Important Notes |
| 128 | + |
| 129 | +### EFS Replication Cleanup Behavior |
| 130 | + |
| 131 | +**Important**: When using cross-region EFS replication (`replication_configuration`), AWS creates a destination EFS file system in the target region. **By AWS design**, when replication is deleted (e.g., during `terraform destroy`), the destination EFS is preserved as a standalone, writeable file system rather than being automatically deleted. |
| 132 | + |
| 133 | +This is an **AWS safety feature** to prevent accidental data loss, but it means the destination EFS will continue to incur charges unless manually cleaned up. |
| 134 | + |
| 135 | +**To avoid ongoing charges:** |
| 136 | +1. After running `terraform destroy`, manually check the destination region (e.g., us-east-2) |
| 137 | +2. Delete any remaining EFS file systems that were created by replication if you no longer need them |
| 138 | +3. You can identify these by their creation time matching when you deployed your Terraform configuration |
| 139 | + |
| 140 | +**Example cleanup commands:** |
| 141 | +```bash |
| 142 | +# List EFS file systems in the replication region |
| 143 | +aws efs describe-file-systems --region us-east-2 |
| 144 | + |
| 145 | +# Delete the destination EFS if no longer needed (replace with actual file system ID) |
| 146 | +aws efs delete-file-system --region us-east-2 --file-system-id fs-xxxxxxxxx |
| 147 | +``` |
| 148 | + |
| 149 | +**Why this happens:** |
| 150 | +According to AWS documentation: *"Deleting a replication configuration ends the replication process. After a replication configuration is deleted, the destination file system becomes Writeable and its replication overwrite protection is re-enabled."* |
| 151 | + |
| 152 | +This behavior ensures that valuable data in the destination EFS is not accidentally lost when replication is stopped. |
| 153 | + |
| 154 | +<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK --> |
| 155 | +## Requirements |
| 156 | + |
| 157 | +| Name | Version | |
| 158 | +|------|---------| |
| 159 | +| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3 | |
| 160 | +| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0, < 7.0 | |
| 161 | + |
| 162 | +## Providers |
| 163 | + |
| 164 | +| Name | Version | |
| 165 | +|------|---------| |
| 166 | +| <a name="provider_aws"></a> [aws](#provider\_aws) | 6.25.0 | |
| 167 | + |
| 168 | +## Modules |
| 169 | + |
| 170 | +No modules. |
| 171 | + |
| 172 | +## Resources |
| 173 | + |
| 174 | +| Name | Type | |
| 175 | +|------|------| |
| 176 | +| [aws_efs_access_point.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/efs_access_point) | resource | |
| 177 | +| [aws_efs_backup_policy.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/efs_backup_policy) | resource | |
| 178 | +| [aws_efs_file_system.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/efs_file_system) | resource | |
| 179 | +| [aws_efs_file_system_policy.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/efs_file_system_policy) | resource | |
| 180 | +| [aws_efs_mount_target.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/efs_mount_target) | resource | |
| 181 | +| [aws_efs_replication_configuration.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/efs_replication_configuration) | resource | |
| 182 | +| [aws_security_group.mount_target](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group) | resource | |
| 183 | +| [aws_security_group_rule.additional](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource | |
| 184 | +| [aws_security_group_rule.nfs_ingress_cidr](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource | |
| 185 | +| [aws_security_group_rule.nfs_ingress_sg](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule) | resource | |
| 186 | + |
| 187 | +## Inputs |
| 188 | + |
| 189 | +| Name | Description | Type | Default | Required | |
| 190 | +|------|-------------|------|---------|:--------:| |
| 191 | +| <a name="input_access_points"></a> [access\_points](#input\_access\_points) | A map of EFS access points to create | <pre>map(object({<br/> path = optional(string, "/")<br/> creation_info = optional(object({<br/> owner_gid = number<br/> owner_uid = number<br/> permissions = string<br/> }))<br/> posix_user = optional(object({<br/> gid = number<br/> uid = number<br/> secondary_gids = optional(list(number))<br/> }))<br/> tags = optional(map(string), {})<br/> }))</pre> | `{}` | no | |
| 192 | +| <a name="input_additional_security_group_rules"></a> [additional\_security\_group\_rules](#input\_additional\_security\_group\_rules) | A map of additional security group rules to add to the mount target security group | <pre>map(object({<br/> type = string<br/> from_port = number<br/> to_port = number<br/> protocol = string<br/> cidr_blocks = optional(list(string))<br/> ipv6_cidr_blocks = optional(list(string))<br/> prefix_list_ids = optional(list(string))<br/> security_groups = optional(list(string))<br/> self = optional(bool)<br/> description = optional(string)<br/> }))</pre> | `{}` | no | |
| 193 | +| <a name="input_allowed_cidr_blocks"></a> [allowed\_cidr\_blocks](#input\_allowed\_cidr\_blocks) | List of CIDR blocks allowed to access EFS | `list(string)` | `[]` | no | |
| 194 | +| <a name="input_allowed_security_group_ids"></a> [allowed\_security\_group\_ids](#input\_allowed\_security\_group\_ids) | List of security group IDs allowed to access EFS | `list(string)` | `[]` | no | |
| 195 | +| <a name="input_availability_zone_name"></a> [availability\_zone\_name](#input\_availability\_zone\_name) | AWS Availability Zone in which to create the file system. Used to create a file system that uses One Zone storage classes | `string` | `null` | no | |
| 196 | +| <a name="input_bypass_policy_lockout_safety_check"></a> [bypass\_policy\_lockout\_safety\_check](#input\_bypass\_policy\_lockout\_safety\_check) | A flag to indicate whether to bypass the aws\_efs\_file\_system\_policy lockout safety check | `bool` | `false` | no | |
| 197 | +| <a name="input_create_mount_target_security_group"></a> [create\_mount\_target\_security\_group](#input\_create\_mount\_target\_security\_group) | Create a security group for mount targets | `bool` | `true` | no | |
| 198 | +| <a name="input_creation_token"></a> [creation\_token](#input\_creation\_token) | A unique name (a maximum of 64 characters are allowed) used as reference when creating the EFS | `string` | `null` | no | |
| 199 | +| <a name="input_enable_backup_policy"></a> [enable\_backup\_policy](#input\_enable\_backup\_policy) | A boolean that indicates whether or not to apply Backup Policy to the file system | `bool` | `true` | no | |
| 200 | +| <a name="input_encrypted"></a> [encrypted](#input\_encrypted) | If true, the disk will be encrypted | `bool` | `true` | no | |
| 201 | +| <a name="input_kms_key_id"></a> [kms\_key\_id](#input\_kms\_key\_id) | The ARN for the KMS encryption key. When specifying kms\_key\_id, encrypted needs to be set to true | `string` | `null` | no | |
| 202 | +| <a name="input_lifecycle_policy"></a> [lifecycle\_policy](#input\_lifecycle\_policy) | A file system lifecycle policy object | <pre>object({<br/> transition_to_ia = optional(string)<br/> transition_to_primary_storage_class = optional(string)<br/> })</pre> | `{}` | no | |
| 203 | +| <a name="input_mount_target_security_group_description"></a> [mount\_target\_security\_group\_description](#input\_mount\_target\_security\_group\_description) | Description of the mount target security group | `string` | `"EFS mount target security group"` | no | |
| 204 | +| <a name="input_mount_target_security_group_name"></a> [mount\_target\_security\_group\_name](#input\_mount\_target\_security\_group\_name) | Name of the mount target security group | `string` | `null` | no | |
| 205 | +| <a name="input_mount_target_security_group_vpc_id"></a> [mount\_target\_security\_group\_vpc\_id](#input\_mount\_target\_security\_group\_vpc\_id) | ID of the VPC where mount target security group will be created | `string` | `null` | no | |
| 206 | +| <a name="input_mount_targets"></a> [mount\_targets](#input\_mount\_targets) | A map of mount target configurations where key is the AZ name | <pre>map(object({<br/> subnet_id = string<br/> security_groups = optional(list(string), [])<br/> }))</pre> | `{}` | no | |
| 207 | +| <a name="input_name"></a> [name](#input\_name) | Name of the EFS file system | `string` | n/a | yes | |
| 208 | +| <a name="input_performance_mode"></a> [performance\_mode](#input\_performance\_mode) | The file system performance mode. Can be either `generalPurpose` or `maxIO` | `string` | `"generalPurpose"` | no | |
| 209 | +| <a name="input_policy"></a> [policy](#input\_policy) | A valid JSON formatted policy for the EFS file system | `string` | `null` | no | |
| 210 | +| <a name="input_provisioned_throughput_in_mibps"></a> [provisioned\_throughput\_in\_mibps](#input\_provisioned\_throughput\_in\_mibps) | The throughput, measured in MiB/s, that you want to provision for the file system. Only applicable with throughput\_mode set to provisioned | `number` | `null` | no | |
| 211 | +| <a name="input_replication_configuration"></a> [replication\_configuration](#input\_replication\_configuration) | A map of replication configuration | <pre>object({<br/> destination = object({<br/> region = optional(string)<br/> availability_zone_name = optional(string)<br/> kms_key_id = optional(string)<br/> })<br/> })</pre> | `null` | no | |
| 212 | +| <a name="input_tags"></a> [tags](#input\_tags) | Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`) | `map(string)` | `{}` | no | |
| 213 | +| <a name="input_throughput_mode"></a> [throughput\_mode](#input\_throughput\_mode) | Throughput mode for the file system. Defaults to bursting. Valid values: `bursting`, `elastic`, `provisioned` | `string` | `"bursting"` | no | |
| 214 | + |
| 215 | +## Outputs |
| 216 | + |
| 217 | +| Name | Description | |
| 218 | +|------|-------------| |
| 219 | +| <a name="output_access_point_arns"></a> [access\_point\_arns](#output\_access\_point\_arns) | List of access point ARNs | |
| 220 | +| <a name="output_access_point_ids"></a> [access\_point\_ids](#output\_access\_point\_ids) | List of access point IDs | |
| 221 | +| <a name="output_access_points"></a> [access\_points](#output\_access\_points) | Map of access points created | |
| 222 | +| <a name="output_backup_policy_id"></a> [backup\_policy\_id](#output\_backup\_policy\_id) | ID of the backup policy | |
| 223 | +| <a name="output_complete_efs_config"></a> [complete\_efs\_config](#output\_complete\_efs\_config) | Complete EFS configuration for reference | |
| 224 | +| <a name="output_efs_arn"></a> [efs\_arn](#output\_efs\_arn) | ARN of the EFS file system | |
| 225 | +| <a name="output_efs_creation_token"></a> [efs\_creation\_token](#output\_efs\_creation\_token) | Creation token of the EFS file system | |
| 226 | +| <a name="output_efs_dns_name"></a> [efs\_dns\_name](#output\_efs\_dns\_name) | DNS name of the EFS file system | |
| 227 | +| <a name="output_efs_encrypted"></a> [efs\_encrypted](#output\_efs\_encrypted) | Whether the EFS file system is encrypted | |
| 228 | +| <a name="output_efs_id"></a> [efs\_id](#output\_efs\_id) | ID of the EFS file system | |
| 229 | +| <a name="output_efs_kms_key_id"></a> [efs\_kms\_key\_id](#output\_efs\_kms\_key\_id) | The ARN for the KMS encryption key used to encrypt the EFS file system | |
| 230 | +| <a name="output_efs_owner_id"></a> [efs\_owner\_id](#output\_efs\_owner\_id) | AWS account ID that created the file system | |
| 231 | +| <a name="output_efs_performance_mode"></a> [efs\_performance\_mode](#output\_efs\_performance\_mode) | Performance mode of the EFS file system | |
| 232 | +| <a name="output_efs_size_in_bytes"></a> [efs\_size\_in\_bytes](#output\_efs\_size\_in\_bytes) | Current byte count used by the file system | |
| 233 | +| <a name="output_efs_throughput_mode"></a> [efs\_throughput\_mode](#output\_efs\_throughput\_mode) | Throughput mode of the EFS file system | |
| 234 | +| <a name="output_mount_target_dns_names"></a> [mount\_target\_dns\_names](#output\_mount\_target\_dns\_names) | List of mount target DNS names | |
| 235 | +| <a name="output_mount_target_ids"></a> [mount\_target\_ids](#output\_mount\_target\_ids) | List of mount target IDs | |
| 236 | +| <a name="output_mount_target_network_interface_ids"></a> [mount\_target\_network\_interface\_ids](#output\_mount\_target\_network\_interface\_ids) | List of mount target network interface IDs | |
| 237 | +| <a name="output_mount_targets"></a> [mount\_targets](#output\_mount\_targets) | Map of mount targets created | |
| 238 | +| <a name="output_replication_configuration_destination_file_system_id"></a> [replication\_configuration\_destination\_file\_system\_id](#output\_replication\_configuration\_destination\_file\_system\_id) | The file system ID of the replica | |
| 239 | +| <a name="output_replication_configuration_id"></a> [replication\_configuration\_id](#output\_replication\_configuration\_id) | ID of the replication configuration | |
| 240 | +| <a name="output_security_group_arn"></a> [security\_group\_arn](#output\_security\_group\_arn) | ARN of the mount target security group | |
| 241 | +| <a name="output_security_group_id"></a> [security\_group\_id](#output\_security\_group\_id) | ID of the mount target security group | |
| 242 | +| <a name="output_security_group_name"></a> [security\_group\_name](#output\_security\_group\_name) | Name of the mount target security group | |
| 243 | +<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK --> |
| 244 | + |
| 245 | +## Versioning |
| 246 | +This project uses a `.version` file at the root of the repo which the pipeline reads from and does a git tag. |
| 247 | + |
| 248 | +When you intend to commit to `main`, you will need to increment this version. Once the project is merged, |
| 249 | +the pipeline will kick off and tag the latest git commit. |
| 250 | + |
| 251 | +## Development |
| 252 | + |
| 253 | +### Prerequisites |
| 254 | + |
| 255 | +- [terraform](https://learn.hashicorp.com/terraform/getting-started/install#installing-terraform) |
| 256 | +- [terraform-docs](https://github.com/segmentio/terraform-docs) |
| 257 | +- [pre-commit](https://pre-commit.com/#install) |
| 258 | +- [golang](https://golang.org/doc/install#install) |
| 259 | +- [golint](https://github.com/golang/lint#installation) |
| 260 | + |
| 261 | +### Configurations |
| 262 | + |
| 263 | +- Configure pre-commit hooks |
| 264 | + ```sh |
| 265 | + pre-commit install |
| 266 | + ``` |
| 267 | + |
| 268 | +### Versioning |
| 269 | + |
| 270 | +while Contributing or doing git commit please specify the breaking change in your commit message whether its major,minor or patch |
| 271 | + |
| 272 | +For Example |
| 273 | + |
| 274 | +```sh |
| 275 | +git commit -m "your commit message #major" |
| 276 | +``` |
| 277 | +By specifying this , it will bump the version and if you don't specify this in your commit message then by default it will consider patch and will bump that accordingly |
| 278 | + |
| 279 | +### Tests |
| 280 | +- Tests are available in `test` directory |
| 281 | +- Configure the dependencies |
| 282 | + ```sh |
| 283 | + cd test/ |
| 284 | + go mod init github.com/sourcefuse/terraform-aws-refarch-<module_name> |
| 285 | + go get github.com/gruntwork-io/terratest/modules/terraform |
| 286 | + ``` |
| 287 | +- Now execute the test |
| 288 | + ```sh |
| 289 | + go test -timeout 30m |
| 290 | + ``` |
| 291 | + |
| 292 | +## Authors |
| 293 | + |
| 294 | +This project is authored by: |
| 295 | +- SourceFuse ARC Team |
0 commit comments