Amazon Elastic File System (EFS) is a serverless, elastic network file storage solution that can be shared across AWS cloud services and on-premise resources.
For detailed information, check out our Operator Guide for this bundle.
Our bundles aren't intended to be used locally, outside of testing. Instead, our bundles are designed to be configured, connected, deployed and monitored in the Massdriver platform.
Bundles are the basic building blocks of infrastructure, applications, and architectures in Massdriver. Read more here.
Form input parameters for configuring a bundle for deployment.
View
retention
(object)backup
(boolean): Automatically backup your file system data with AWS Backup using recommended settings. Additional pricing applies. Default:False
.transition_to_ia
(string): Duration from the last time a file was accessed until it is transitioned to Infrequently Accessed (IA) storage class. Default:AFTER_30_DAYS
.- One of
- Disabled
- 7 days
- 14 days
- 30 days
- 60 days
- 90 days
- One of
storage
(object)performance_mode
(string): General Purpose has lower latency, but limits your file operations per second. Max IO substantially increases IOPs, but increase latency. Default:generalPurpose
.- One of
- General Purpose
- Max IO
- One of
provisioned_throughput_in_mibps
(integer): The throughput, measured in MiB/s, that you want to provision for the file system. Required if Throughput mode is set to "Provisioned". Minimum:1
. Maximum:1024
.throughput_mode
(string): Burst mode uses a credit system which accrues over time based on the size of the EFS file system and is ideal for most applications with bursty throughput patterns. Provisioned is best when your throughput requirements are relatively constant. Default:bursting
.- One of
- Burst
- Provisioned
- One of
Connections from other bundles that this bundle depends on.
View
-
aws_authentication
(object): . Cannot contain additional properties.data
(object)-
arn
(string): Amazon Resource Name.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
-
external_id
(string): An external ID is a piece of data that can be passed to the AssumeRole API of the Security Token Service (STS). You can then use the external ID in the condition element in a role's trust policy, allowing the role to be assumed only when a certain value is present in the external ID.
-
specs
(object)aws
(object): .-
region
(string): AWS Region to provision in.Examples:
"us-west-2"
-
-
vpc
(object): . Cannot contain additional properties.data
(object)infrastructure
(object)-
arn
(string): Amazon Resource Name.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
-
cidr
(string)Examples:
"10.100.0.0/16"
"192.24.12.0/22"
-
internal_subnets
(array)-
Items (object): AWS VCP Subnet.
-
arn
(string): Amazon Resource Name.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
Examples:
-
-
-
private_subnets
(array)-
Items (object): AWS VCP Subnet.
-
arn
(string): Amazon Resource Name.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
Examples:
-
-
-
public_subnets
(array)-
Items (object): AWS VCP Subnet.
-
arn
(string): Amazon Resource Name.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
Examples:
-
-
-
specs
(object)aws
(object): .-
region
(string): AWS Region to provision in.Examples:
"us-west-2"
-
Resources created by this bundle that can be connected to other bundles.
View
file_system
(object): Cannot contain additional properties.data
(object)infrastructure
(object)-
arn
(string): Amazon Resource Name.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
-
dns_name
(string)
-
security
(object): Informs downstream services of network and/or IAM policies. Cannot contain additional properties.-
iam
(object): IAM Policies. Cannot contain additional properties.^[a-z]+[a-z_]*[a-z]+$
(object)-
policy_arn
(string): AWS IAM policy ARN.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
-
-
identity
(object): For instances where IAM policies must be attached to a role attached to an AWS resource, for instance AWS Eventbridge to Firehose, this attribute should be used to allow the downstream to attach it's policies (Firehose) directly to the IAM role created by the upstream (Eventbridge). It is important to remember that connections in massdriver are one way, this scheme perserves the dependency relationship while allowing bundles to control the lifecycles of resources under it's management. Cannot contain additional properties.-
role_arn
(string): ARN for this resources IAM Role.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
-
-
network
(object): AWS security group rules to inform downstream services of ports to open for communication. Cannot contain additional properties.^[a-z-]+$
(object)-
arn
(string): Amazon Resource Name.Examples:
"arn:aws:rds::ACCOUNT_NUMBER:db/prod"
"arn:aws:ec2::ACCOUNT_NUMBER:vpc/vpc-foo"
-
port
(integer): Port number. Minimum:0
. Maximum:65535
. -
protocol
(string): Must be one of:['tcp', 'udp']
.
-
-
specs
(object)aws
(object): .-
region
(string): AWS Region to provision in.Examples:
"us-west-2"
-
Did we miss something? Please submit an issue to report any bugs or request additional features.
Note: Massdriver bundles are intended to be tightly use-case scoped, intention-based, reusable pieces of IaC for use in the Massdriver platform. For this reason, major feature additions that broaden the scope of an existing bundle are likely to be rejected by the community.
Still want to get involved? First check out our contribution guidelines.
If your use-case isn't covered by this bundle, you can still get involved! Massdriver is designed to be an extensible platform. Fork this bundle, or create your own bundle from scratch!
Questions? Concerns? Adulations? We'd love to hear from you!
Please connect with us!