efs

devops-workflow/efs/aws

Terraform Module HCL AWS

Terraform Module to define an EFS Filesystem (aka NFS)

Install
module "efs" {
source = "devops-workflow/efs/aws"
version = "0.6.2"
}
plain text: /constructs/tfmod-devops-workflow-efs-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

terraform-aws-efs ![CircleCI](https://circleci.com/gh/devops-workflow/terraform-aws-efs) ![Github release](https://github.com/devops-workflow/terraform-aws-efs/releases) Terraform module to provision an AWS EFS Network File System. README needs to be updated. Does not currently match module Usage Include this repository as a module in your existing terraform code: ``hcl module "efs" { source = "devops-workflow/efs/aws" version = "0.4.0" name = "app" attributes = "efs" region = "${var.aws_region}" vpc_id = "${var.vpc_id}" subnets = "${var.private_subnets}" security_groups = ["${var.security_group_id}"] zone_id = "${var.aws_route53_dns_zone_id}" } ` Input | Name | Default | Description | |:-------------------|:--------------:|:-----------------------------------------------------------------

Inputs (25)
NameTypeDescriptionDefault
nameanyBase name for resource required
subnetsanyAWS subnet IDs required
vpc_idanyAWS VPC ID required
environmentanyEnvironment (ex: `dev`, `qa`, `stage`, `prod`). (Second or top level namespace. required
tagsanyA map of additional tags{}
encryptedanyIf true, the disk will be encrypted"false"
kms_key_idanyARN for the KMS encryption key. When specifying kms_key_id, encrypted needs to b""
attributesanySuffix name with additional attributes (policy, role, etc.)[]
componentanyTAG: Underlying, dedicated piece of service (Cache, DB, ...)"UNDEF-EFS"
enabledanySet to false to prevent the module from creating anythingtrue
performance_modeanyThe file system performance mode. Can be either generalPurpose or maxIO"generalPurpose"
delimiteranyDelimiter to be used between `name`, `namespaces`, `attributes`, etc."-"
productanyTAG: Company/business product"UNDEF-EFS"
owneranyTAG: Owner of the service"UNDEF-EFS"
serviceanyTAG: Application (microservice) name"UNDEF-EFS"
dns_ttlanyTTL of the DNS record"60"
zone_idanyRoute53 DNS zone ID""
ingress_cidranyList of CIDR to allow access to EFS[]
monitoranyTAG: Should resource be monitored"UNDEF-EFS"
namespace-envanyPrefix name with the environment. If true, format is: <env>-<name>true
organizationanyOrganization name (Top level namespace)""
teamanyTAG: Department/team of people responsible for service"UNDEF-EFS"
regionanyAWS region""
security_groupsanyAWS security group IDs to allow to connect to the EFS[]
Outputs (9)
host — Assigned DNS-record for the EFS
id — ID of EFS
kms_key_id
name — Service name that was passed in. This is to make creating mount points easier
mount_target_ids — List of IDs of the EFS mount targets
mount_target_ips — List of IPs of the EFS mount targets
mount_target_net_intf_ids — List of network interface IDs of the EFS mount targets
dns_name — FQDN of the EFS volume
security_group
Resources (4)
aws_efs_file_systemaws_efs_mount_targetaws_security_groupaws_security_group_rule
Details
FrameworkTerraform Module
LanguageHCL
Version0.6.2
Cloud AWS
★ Stars2
Forks5
Total downloads9.6k
Inputs25
Outputs9
Resources4
Examples3
LicenseApache-2.0
Namespacedevops-workflow
Updated