This is a Terraform module which creates an FSx for NetApp ONTAP file system in a multi-AZ fashion, including an SVM, a Security-Group and a FlexVolume in that file system, using AWS Terraform provider. This repo should be sourced as a terraform module, and does not need to be cloned locally! Follow the instructions below to use this sample in your environment.
Calling this terraform module will result the following:
-
Create a new AWS Security Group in your VPC with the following rules:
- Ingress allow all ICMP traffic
- Ingress allow nfs port 111 (both TCP and UDP)
- Ingress allow cifs TCP port 139
- Ingress allow snmp ports 161-162 (both TCP and UDP)
- Ingress allow smb cifs TCP port 445
- Ingress allow nfs mount port 635 (both TCP and UDP)
- Ingress allow kerberos TCP port 749
- Ingress allow nfs port 2049 (both TCP and UDP)
- Ingress allow nfs lock and monitoring 4045-4046 (both TCP and UDP)
- Ingress allow nfs quota TCP 4049
- Ingress allow Snapmirror Intercluster communication TCP port 11104
- Ingress allow Snapmirror data transfer TCP port 11105
- Ingress allow ssh port 22
- Ingress allow https port 443
- Egress allow all traffic
-
Create two new AWS secrets. One that contains the fsxadmin password and another that contains the SVM admin password.
-
Create a new FSx for Netapp ONTAP file-system. Much of the configuration has default values, but can be modified to your preference by providing your own values in the module block. The default configuration includes:
- 1024Gb of storage capacity
- Generation 1 Multi AZ deployment type
- 128Mbps of throughput capacity
- 1 HA pair
- 1 Storage Virtual Machine (SVM)
- 1 FlexVol volume with the following configuration parameters:
- Size of 2TB - Thin provisioned
- Junction path of /vol1
- Security style of UNIX
- Storage efficiencies enabled
- Auto tiering policy with 31 cooling days
- post-delete backup disabled
Note
All of the above configuration parameters can be modified for your preference by assigning your own values in the module block! See below for more information.
Name | Version |
---|---|
terraform | >= 1.6.6 |
aws provider | >= 5.25 |
-
You must have an AWS Account with necessary permissions to create and manage resources
-
Configure your AWS Credentials on the server running this Terraform module. This can be derived from several sources, which are applied in the following order:
- Parameters in the provider configuration
- Environment variables
- Shared credentials files
- Shared configuration files
- Container credentials
- Instance profile credentials and Region
This order matches the precedence used by the AWS CLI and the AWS SDKs.
Note
In this sample, the AWS Credentials were configured through AWS CLI, which adds them to a shared configuration file (option 4 above). Therefore, this documentation only provides guidance on setting-up the AWS credentials with shared configuration file using AWS CLI.
The AWS Provider can source credentials and other settings from the shared configuration and credentials files. By default, these files are located at $HOME/.aws/config
and $HOME/.aws/credentials
on Linux and macOS, and "%USERPROFILE%\.aws\credentials"
on Windows.
There are several ways to set your credentials and configuration setting using AWS CLI. We will use aws configure
command:
Run the following command to quickly set and view your credentails, region, and output format. The following example shows sample values:
$ aws configure
AWS Access Key ID [None]: < YOUR-ACCESS-KEY-ID >
AWS Secret Access Key [None]: < YOUR-SECRET-ACCESS-KE >
Default region name [None]: < YOUR-PREFERRED-REGION >
Default output format [None]: json
To list configuration data, use the aws configire list
command. This command lists the profile, access key, secret key, and region configuration information used for the specified profile. For each configuration item, it shows the value, where the configuration value was retrieved, and the configuration variable name.
This directory contains a shared Terraform module that can be referenced remotely. No need to clone the repository in order to use it! To reference this module, create a new terraform folder in your local environment, add a main.tf file and modify it according to the instructions below.
Add the AWS provider block to your local root main.tf
file with the required configuration. For more information check the docs
Example:
terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version >= "5.25"
}
}
}
provider "aws" {
# Configuration options
}
Add the following module block to your local main.tf
file.
Of course changing the subnets, route_table_ids, and other variables to match your environment.
You will find below a complete list of all the parameters that can be passed to the module block.
module "fsxontap" {
source = "github.com/NetApp/FSx-ONTAP-samples-scripts/Terraform/deploy-fsx-ontap/module"
name = "Development"
deployment_type = "MULTI_AZ_2"
ha_pairs = 1
throughput_in_MBps = 384
subnets = {
"primarysub" = "subnet-11111111"
"secondarysub" = "subnet-22222222"
}
route_table_ids = ["rtb-abcd1234"]
create_sg = true
security_group_name_prefix = "fsxn-sg"
vpc_id = "vpc-88888888"
cidr_for_sg = "10.0.0.0/8"
}
Whenever you add a new module to a configuration, Terraform must install the module before
it can be used. Both the terraform get
and terraform init
commands will install and
update modules. The terraform init
command will also initialize backends and install plugins.
Command:
terraform init
Output:
Initializing the backend...
Initializing modules...
Downloading git::https://github.com/Netapp/FSx-ONTAP-samples-scripts.git for fsxontap...
- fsxontap in .terraform/modules/fsxontap/Terraform/deploy-fsx-ontap/module
Initializing provider plugins...
- Finding hashicorp/aws versions matching "5.25.0"...
- Installing hashicorp/aws v5.25.0...
- Installed hashicorp/aws v5.25.0 (signed by HashiCorp)
Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
Now that your new module is installed and configured, run the terraform plan
command to create an execution plan, which lets you preview the changes that Terraform plans to make to your infrastructure:
terraform plan
Ensure that the proposed changes match what you expected before you apply the changes!
Once confirmed, run the terraform apply
command followed by yes
to execute the Terrafom code and apply the changes proposed in the plan
step:
terraform apply
Name | Version |
---|---|
aws | n/a |
Name | Description | Type | Default | Required |
---|---|---|---|---|
subnets | A map specifying the subnets where the management and data endpoints will be deployed. There are two suppoted keys: 'primarysub' which specfies where the 'active' node's endpoint will be located. 'secondarysub' where the standby node's endpoint will be located. Both must be specified if you are deploying a MULTI_AZ file system. Only the primary subnet is used for a SINGLE_AZ file system. | map(string) |
n/a | yes |
aws_account_id | The AWS account ID. Used to create account specific permissions on the secrets that are created. Use the default for less specific permissions. | string |
"*" |
no |
backup_retention_days | The number of days to retain automatic backups. Setting this to 0 disables automatic backups. You can retain automatic backups for a maximum of 90 days. | number |
0 |
no |
capacity_size_gb | The storage capacity in GiBs of the FSxN file system. Valid values between 1024 (1 TiB) and 1048576 (1 PiB). Gen 1 deployment types are limited to 192 TiB. Gen 2 Multi AZ is limited to 512 TiB. Gen 2 Single AZ is limited to 1 PiB. | number |
1024 |
no |
cidr_for_sg | The cidr block to be used for the created security ingress rules. Set to an empty string if you want to use the source_sg_id as the source. | string |
"" |
no |
create_sg | Determines whether the Security Group should be created as part of this deployment or not. | bool |
true |
no |
daily_backup_start_time | A recurring daily time, in the format HH:MM. HH is the zero-padded hour of the day (0-23), and MM is the zero-padded minute of the hour. Requires automatic_backup_retention_days to be set. | string |
null |
no |
deployment_type | The file system deployment type. Supported values are 'MULTI_AZ_1', 'SINGLE_AZ_1', 'MULTI_AZ_2', and 'SINGLE_AZ_2'. MULTI_AZ_1 and SINGLE_AZ_1 are Gen 1. MULTI_AZ_2 and SINGLE_AZ_2 are Gen 2. | string |
"MULTI_AZ_1" |
no |
disk_iops_configuration | The SSD IOPS configuration for the file system. Valid modes are 'AUTOMATIC' (3 iops per GB provisioned) or 'USER_PROVISIONED'. NOTE: Due to a bug in the AWS FSx Terraform provider, if you want AUTOMATIC, then leave this variable empty. If you want USER_PROVISIONED, then add a 'mode=USER_PROVISIONED' (with USER_PROVISIONED enclosed in double quotes) and 'iops=number' where number is between 1 and 160000. | map(any) |
{} |
no |
endpoint_ip_address_range | The IP address range that the FSxN file system will be accessible from. This is only used for Mutli AZ deployment types and must be left a null for Single AZ deployment types. | string |
null |
no |
ha_pairs | The number of HA pairs in the file system. Valid values are from 1 through 12. Only the Single AZ Gen 2 deployment type supports more than 1 HA pair. | number |
1 |
no |
kms_key_id | ARN for the KMS Key to encrypt the file system at rest. Defaults to an AWS managed KMS Key. | string |
null |
no |
maintenance_start_time | The preferred start time to perform weekly maintenance, in UTC time zone. The format is 'D:HH:MM' format. D is the day of the week, where 1=Monday and 7=Sunday. | string |
null |
no |
name | The name to assign to the FSx for ONTAP file system. | string |
"fsxn" |
no |
root_vol_sec_style | Specifies the root volume security style, Valid values are UNIX, NTFS, and MIXED (although MIXED is not recommended). All volumes created under this SVM will inherit the root security style unless the security style is specified on the volume. | string |
"UNIX" |
no |
route_table_ids | An array of routing table IDs that will be modified to allow access to the FSxN file system. This is only used for Multi AZ deployment types and must be left as null for Single AZ deployment types. | list(string) |
null |
no |
secret_name_prefix | The prefix to the secret name that will be created that will contain the FSxN passwords (system, and SVM). | string |
"fsxn-secret" |
no |
secrets_region | The AWS region where the secrets for the FSxN file system and SVM will be deployed. | string |
"" |
no |
security_group_ids | If you are not creating the security group, provide a list of IDs of the security groups to be used. | list(string) |
[] |
no |
security_group_name_prefix | The prefix to the security group name that will be created. | string |
"fsxn-sg" |
no |
source_sg_id | The ID of the security group to allow access to the FSxN file system. Set to an empty string if you want to use the cidr_for_sg as the source. | string |
"" |
no |
svm_name | name of the Storage Virtual Machine, (a.k.a. vserver). | string |
"fsx" |
no |
tags | A map defining tags to be applied to the FSxN file system. The format is '{Name1 = value, Name2 = value}'. | map(any) |
null |
no |
throughput_in_MBps | The throughput capacity (in MBps) for the file system. Valid values are 128, 256, 512, 1024, 2048, and 4096 for Gen 1, and 384, 768, 1536, 3072 and 6144 for Gen 2. | string |
"128" |
no |
vol_info | Details for the initial volume creation. | object({ |
{} |
no |
vpc_id | The VPC ID where the security group will be created. | string |
"" |
no |
Name | Description |
---|---|
filesystem_id | The ID of the FSxN Filesystem |
filesystem_management_ip | The management IP of the FSxN Filesystem. |
fsxn_secret_arn | The ARN of the secret |
fsxn_secret_name | The Name of the secret |
security_group_id | The ID of the FSxN Security Group |
svm_id | The ID of the FSxN Storage Virtual Machine |
svm_management_ip | The management IP of the Storage Virtual Machine. |
svm_secret_arn | The Name of the secret |
svm_secret_name | The Name of the secret |
vol_id | The ID of the ONTAP volume in the File System |
This repository is maintained by the contributors listed on GitHub.
Licensed under the Apache License, Version 2.0 (the "License").
You may obtain a copy of the License at apache.org/licenses/LICENSE-2.0.
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" basis, without WARRANTIES or conditions of any kind, either express or implied.
See the License for the specific language governing permissions and limitations under the License.
© 2024 NetApp, Inc. All Rights Reserved.