efs
devops-workflow/efs/aws
Terraform Module to define an EFS Filesystem (aka NFS)
terraform-aws-efs   Terraform module to provision an AWS EFS Network File System. README needs to be updated. Does not currently match module Usage Include this repository as a module in your existing terraform code: ``hcl module "efs" { source = "devops-workflow/efs/aws" version = "0.4.0" name = "app" attributes = "efs" region = "${var.aws_region}" vpc_id = "${var.vpc_id}" subnets = "${var.private_subnets}" security_groups = ["${var.security_group_id}"] zone_id = "${var.aws_route53_dns_zone_id}" } ` Input | Name | Default | Description | |:-------------------|:--------------:|:-----------------------------------------------------------------
| Name | Type | Description | Default |
|---|---|---|---|
| name | any | Base name for resource | required |
| subnets | any | AWS subnet IDs | required |
| vpc_id | any | AWS VPC ID | required |
| environment | any | Environment (ex: `dev`, `qa`, `stage`, `prod`). (Second or top level namespace. | required |
| tags | any | A map of additional tags | {} |
| encrypted | any | If true, the disk will be encrypted | "false" |
| kms_key_id | any | ARN for the KMS encryption key. When specifying kms_key_id, encrypted needs to b | "" |
| attributes | any | Suffix name with additional attributes (policy, role, etc.) | [] |
| component | any | TAG: Underlying, dedicated piece of service (Cache, DB, ...) | "UNDEF-EFS" |
| enabled | any | Set to false to prevent the module from creating anything | true |
| performance_mode | any | The file system performance mode. Can be either generalPurpose or maxIO | "generalPurpose" |
| delimiter | any | Delimiter to be used between `name`, `namespaces`, `attributes`, etc. | "-" |
| product | any | TAG: Company/business product | "UNDEF-EFS" |
| owner | any | TAG: Owner of the service | "UNDEF-EFS" |
| service | any | TAG: Application (microservice) name | "UNDEF-EFS" |
| dns_ttl | any | TTL of the DNS record | "60" |
| zone_id | any | Route53 DNS zone ID | "" |
| ingress_cidr | any | List of CIDR to allow access to EFS | [] |
| monitor | any | TAG: Should resource be monitored | "UNDEF-EFS" |
| namespace-env | any | Prefix name with the environment. If true, format is: <env>-<name> | true |
| organization | any | Organization name (Top level namespace) | "" |
| team | any | TAG: Department/team of people responsible for service | "UNDEF-EFS" |
| region | any | AWS region | "" |
| security_groups | any | AWS security group IDs to allow to connect to the EFS | [] |
host — Assigned DNS-record for the EFSid — ID of EFSkms_key_idname — Service name that was passed in. This is to make creating mount points easiermount_target_ids — List of IDs of the EFS mount targetsmount_target_ips — List of IPs of the EFS mount targetsmount_target_net_intf_ids — List of network interface IDs of the EFS mount targetsdns_name — FQDN of the EFS volumesecurity_groupAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,