Azure NetApp Account
This page shows how to write Terraform and Azure Resource Manager for NetApp Account and write them securely.
azurerm_netapp_account (Terraform)
The Account in NetApp can be configured in Terraform with the resource name azurerm_netapp_account. The following sections describe 10 examples of how to use the resource and its parameters.
Example Usage from GitHub
resource "azurerm_netapp_account" "account" {
# Must be unique for the subscription.
name = var.settings.name
resource_group_name = var.resource_group_name
location = var.location
}
resource "azurerm_netapp_account" "account" {
# Must be unique for the subscription.
name = var.settings.name
resource_group_name = var.resource_group_name
location = var.location
}
resource "azurerm_netapp_account" "account" {
# Must be unique for the subscription.
name = var.settings.name
resource_group_name = var.resource_group_name
location = var.location
}
resource "azurerm_netapp_account" "account" {
# Must be unique for the subscription.
name = var.settings.name
resource_group_name = var.resource_group_name
location = var.location
lifecycle {
resource "azurerm_netapp_account" "example" {
name = "example-netappaccount"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
}
resource "azurerm_netapp_account" "NetApp_acct" {
name = var.NetApp_acct_name
resource_group_name = var.rgname
location = var.deploylocation
active_directory {
resource "azurerm_netapp_account" "example" {
name = var.netapp-account-name
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
tags = {
learning = "AzureStudy"
resource "azurerm_netapp_account" "this" {
location = var.location
name = var.name
resource_group_name = var.resource_group_name
dynamic "active_directory" {
resource "azurerm_netapp_account" "netapp_acct" {
name = var.netapp_acct_name
resource_group_name = var.rg_name
location = var.deploy_location
active_directory {
resource "azurerm_netapp_account" "workload_netapp_account" {
provider = azurerm.main
count = var.ANF_settings.use && length(var.ANF_settings.arm_id) == 0 ? 1 : 0
name = format("%s%s%s", local.prefix, var.naming.separator, local.resource_suffixes.netapp_account)
resource_group_name = local.rg_exists ? data.azurerm_resource_group.resource_group[0].name : azurerm_resource_group.resource_group[0].name
Parameters
-
idoptional computed - string -
locationrequired - string -
namerequired - string -
resource_group_namerequired - string -
tagsoptional - map from string to string -
active_directorylist block-
dns_serversrequired - list of string -
domainrequired - string -
organizational_unitoptional - string -
passwordrequired - string -
smb_server_namerequired - string -
usernamerequired - string
-
-
timeoutssingle block
Explanation in Terraform Registry
Manages a NetApp Account.
NOTE: Azure allows only one active directory can be joined to a single subscription at a time for NetApp Account.
Microsoft.NetApp/netAppAccounts (Azure Resource Manager)
The netAppAccounts in Microsoft.NetApp can be configured in Azure Resource Manager with the resource name Microsoft.NetApp/netAppAccounts. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
{
"contentVersion": "1.0.0.0",
"parameters": {
"workbookDisplayName": {
"type": "string",
{
"contentVersion": "1.0.0.0",
"parameters": {
"workbookDisplayName": {
"type": "string",
{
"contentVersion": "1.0.0.0",
"parameters": {
"workbookDisplayName": {
"type": "string",
Parameters
apiVersionrequired - stringlocationrequired - stringResource location
namerequired - stringThe name of the NetApp account
propertiesrequiredactiveDirectoriesoptional arrayactiveDirectoryIdoptional - stringId of the Active Directory
administratorsoptional - arrayUsers to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
adNameoptional - stringName of the active directory machine. This optional parameter is used only while creating kerberos volume
aesEncryptionoptional - booleanIf enabled, AES encryption will be enabled for SMB communication.
allowLocalNfsUsersWithLdapoptional - booleanIf enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
backupOperatorsoptional - arrayUsers to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
dnsoptional - stringComma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
domainoptional - stringName of the Active Directory domain
encryptDCConnectionsoptional - booleanIf enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
kdcIPoptional - stringkdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
ldapOverTLSoptional - booleanSpecifies whether or not the LDAP traffic needs to be secured via TLS.
ldapSigningoptional - booleanSpecifies whether or not the LDAP traffic needs to be signed.
organizationalUnitoptional - stringThe Organizational Unit (OU) within the Windows Active Directory
passwordoptional - stringPlain text password of Active Directory domain administrator, value is masked in the response
securityOperatorsoptional - arrayDomain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
serverRootCACertificateoptional - stringWhen LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
siteoptional - stringThe Active Directory site the service will limit Domain Controller discovery to
smbServerNameoptional - stringNetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
usernameoptional - stringUsername of Active Directory domain administrator
encryptionoptionalkeySourceoptional - stringEncryption Key Source. Possible values are: 'Microsoft.NetApp'.
tagsoptional - stringTags are a list of key-value pairs that describe the resource
typerequired - string
Frequently asked questions
What is Azure NetApp Account?
Azure NetApp Account is a resource for NetApp of Microsoft Azure. Settings can be wrote in Terraform.
Where can I find the example code for the Azure NetApp Account?
For Terraform, the anmoltoppo/Terraform, davesee/terraform-caf-rover-breakout and pkhuntia/aztfmod source code examples are useful. See the Terraform Example section for further details.
For Azure Resource Manager, the HasanIftakher/Azure-Monitor, tulpy/Azure and microsoft/AzureMonitorCommunity source code examples are useful. See the Azure Resource Manager Example section for further details.