efs
clouddrove/efs/aws
Terraform module to create or deploy EFS on AWS.
Terraform AWS EFS Terraform module to create or deploy EFS on AWS. We eat, drink, sleep and most importantly love DevOps. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy Bigger problems are always solved by breaking them into smaller manageable problems . Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller connected yet manageable pieces within the infrastructure. This module is basically combination of Terraform open source and includes automatation tests and examples. It also helps to create and improve your infrastructure with minimalistic code instead of maintaining the whole infrastructure code yourself. We have [
| Name | Type | Description | Default |
|---|---|---|---|
| security_groups | list(string) | Security group IDs to allow access to the EFS | required |
| vpc_id | string | VPC ID | required |
| creation_token | string | A unique name (a maximum of 64 characters are allowed) used as reference when cr | required |
| availability_zones | list(string) | Availability Zone IDs | required |
| subnets | list(string) | Subnet IDs | required |
| egress_cidr_blocks | list(string) | Security group IDs to allow access to the EFS | [
"0.0.0.0/0"
] |
| replication_configuration_destination | any | A destination configuration block | {} |
| to_port | number | Security group IDs to allow access to the EFS | 2049 |
| egress_to_port | number | Security group IDs to allow access to the EFS | 0 |
| encrypted | bool | If true, the file system will be encrypted | true |
| allow_cidr | list(any) | Provide allowed cidr to efs | [] |
| mount_target_description | string | "this is mount target security group " | |
| source_policy_documents | list(string) | List of IAM policy documents that are merged together into the exported document | [] |
| label_order | list(any) | label order, e.g. `name`,`application` | [
"name",
"environment"
] |
| managedby | string | ManagedBy, eg 'CloudDrove'. | "[email protected]" |
| override_policy_documents | list(string) | List of IAM policy documents that are merged together into the exported document | [] |
| policy_statements | any | A list of IAM policy [statements](https://registry.terraform.io/providers/hashic | [] |
| from_port | number | Security group IDs to allow access to the EFS | 2049 |
| enable_aws_efs_file_system_policy | bool | A flag to enable or disable aws efs file system policy . Defaults to `false` | false |
| egress_from_port | number | Security group IDs to allow access to the EFS | 0 |
| protocol | string | Security group IDs to allow access to the EFS | "tcp" |
| mount_target_ip_address | string | The address (within the address range of the specified subnet) at which the file | null |
| name | string | Solution name, e.g. `app` | "" |
| environment | string | Environment (e.g. `prod`, `dev`, `staging`). | "test" |
| throughput_mode | string | Throughput mode for the file system. Defaults to bursting. Valid values: `bursti | "bursting" |
network_interface_ids — List of mount target network interface IDstags — The tags of the ecs clusterarn — EFS ARNid — EFS IDmount_target_ids — List of EFS mount target IDs (one per Availability Zone)mount_target_ips — List of EFS mount target IPs (one per Availability Zone)Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,