efs
devops-workflow/efs/aws
Terraform Module to define an EFS Filesystem (aka NFS)
Install
README
terraform-aws-efs   Terraform module to provision an AWS EFS Network File System. README needs to be updated. Does not currently match module Usage Include this repository as a module in your existing terraform code: ``hcl module "efs" { source = "devops-workflow/efs/aws" version = "0.4.0" name = "app" attributes = "efs" region = "${var.aws_region}" vpc_id = "${var.vpc_id}" subnets = "${var.private_subnets}" security_groups = ["${var.security_group_id}"] zone_id = "${var.aws_route53_dns_zone_id}" } ` Input | Name | Default | Description | |:-------------------|:--------------:|:-----------------------------------------------------------------
Inputs (25)
| Name | Type | Description | Default |
|---|---|---|---|
| name | any | Base name for resource | required |
| subnets | any | AWS subnet IDs | required |
| vpc_id | any | AWS VPC ID | required |
| environment | any | Environment (ex: `dev`, `qa`, `stage`, `prod`). (Second or top level namespace. | required |
| tags | any | A map of additional tags | {} |
| encrypted | any | If true, the disk will be encrypted | "false" |
| kms_key_id | any | ARN for the KMS encryption key. When specifying kms_key_id, encrypted needs to b | "" |
| attributes | any | Suffix name with additional attributes (policy, role, etc.) | [] |
| component | any | TAG: Underlying, dedicated piece of service (Cache, DB, ...) | "UNDEF-EFS" |
| enabled | any | Set to false to prevent the module from creating anything | true |
| performance_mode | any | The file system performance mode. Can be either generalPurpose or maxIO | "generalPurpose" |
| delimiter | any | Delimiter to be used between `name`, `namespaces`, `attributes`, etc. | "-" |
| product | any | TAG: Company/business product | "UNDEF-EFS" |
| owner | any | TAG: Owner of the service | "UNDEF-EFS" |
| service | any | TAG: Application (microservice) name | "UNDEF-EFS" |
| dns_ttl | any | TTL of the DNS record | "60" |
| zone_id | any | Route53 DNS zone ID | "" |
| ingress_cidr | any | List of CIDR to allow access to EFS | [] |
| monitor | any | TAG: Should resource be monitored | "UNDEF-EFS" |
| namespace-env | any | Prefix name with the environment. If true, format is: <env>-<name> | true |
| organization | any | Organization name (Top level namespace) | "" |
| team | any | TAG: Department/team of people responsible for service | "UNDEF-EFS" |
| region | any | AWS region | "" |
| security_groups | any | AWS security group IDs to allow to connect to the EFS | [] |
Outputs (9)
host — Assigned DNS-record for the EFSid — ID of EFSkms_key_idname — Service name that was passed in. This is to make creating mount points easiermount_target_ids — List of IDs of the EFS mount targetsmount_target_ips — List of IPs of the EFS mount targetsmount_target_net_intf_ids — List of network interface IDs of the EFS mount targetsdns_name — FQDN of the EFS volumesecurity_groupResources (4)
Details
Similar packages
Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,