Azure NetApp Account

This page shows how to write Terraform and Azure Resource Manager for NetApp Account and write them securely.

azurerm_netapp_account (Terraform)

The Account in NetApp can be configured in Terraform with the resource name azurerm_netapp_account. The following sections describe 10 examples of how to use the resource and its parameters.

Example Usage from GitHub

account.tf#L1
resource "azurerm_netapp_account" "account" {
  # Must be unique for the subscription.
  name                = var.settings.name
  resource_group_name = var.resource_group_name
  location            = var.location
}
account.tf#L1
resource "azurerm_netapp_account" "account" {
  # Must be unique for the subscription.
  name                = var.settings.name
  resource_group_name = var.resource_group_name
  location            = var.location
}
account.tf#L12
resource "azurerm_netapp_account" "account" {
  # Must be unique for the subscription.
  name                = var.settings.name
  resource_group_name = var.resource_group_name
  location            = var.location
}
account.tf#L12
resource "azurerm_netapp_account" "account" {
  # Must be unique for the subscription.
  name                = var.settings.name
  resource_group_name = var.resource_group_name
  location            = var.location
  lifecycle {
anf.tf#L19
resource "azurerm_netapp_account" "example" {
  name                = "example-netappaccount"
  location            = azurerm_resource_group.example.location
  resource_group_name = azurerm_resource_group.example.name
}

storage.tf#L11
resource "azurerm_netapp_account" "NetApp_acct" {
  name                = var.NetApp_acct_name
  resource_group_name = var.rgname
  location            = var.deploylocation

  active_directory {
netapp.tf#L16
resource "azurerm_netapp_account" "example" {
  name                = var.netapp-account-name
  resource_group_name = azurerm_resource_group.example.name
  location            = azurerm_resource_group.example.location
  tags = {
      learning = "AzureStudy"
main.tf#L7
resource "azurerm_netapp_account" "this" {
  location            = var.location
  name                = var.name
  resource_group_name = var.resource_group_name

  dynamic "active_directory" {
netappstorage.tf#L16
resource "azurerm_netapp_account" "netapp_acct" {
  name                = var.netapp_acct_name
  resource_group_name = var.rg_name
  location            = var.deploy_location

  active_directory {
anf.tf#L1
resource "azurerm_netapp_account" "workload_netapp_account" {
  provider = azurerm.main
  count    = var.ANF_settings.use && length(var.ANF_settings.arm_id) == 0 ? 1 : 0
  name     = format("%s%s%s", local.prefix, var.naming.separator, local.resource_suffixes.netapp_account)

  resource_group_name = local.rg_exists ? data.azurerm_resource_group.resource_group[0].name : azurerm_resource_group.resource_group[0].name

Review your Terraform file for Azure best practices

Shisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).

Parameters

Explanation in Terraform Registry

Manages a NetApp Account.

NOTE: Azure allows only one active directory can be joined to a single subscription at a time for NetApp Account.

Microsoft.NetApp/netAppAccounts (Azure Resource Manager)

The netAppAccounts in Microsoft.NetApp can be configured in Azure Resource Manager with the resource name Microsoft.NetApp/netAppAccounts. The following sections describe how to use the resource and its parameters.

Example Usage from GitHub

template.json
{
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workbookDisplayName": {
      "type": "string",
template.json
{
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workbookDisplayName": {
      "type": "string",
template.json
{
  "contentVersion": "1.0.0.0",
  "parameters": {
    "workbookDisplayName": {
      "type": "string",

Parameters

  • apiVersion required - string
  • location required - string

    Resource location

  • name required - string

    The name of the NetApp account

  • properties required
      • activeDirectories optional array
          • activeDirectoryId optional - string

            Id of the Active Directory

          • administrators optional - array

            Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier

          • adName optional - string

            Name of the active directory machine. This optional parameter is used only while creating kerberos volume

          • aesEncryption optional - boolean

            If enabled, AES encryption will be enabled for SMB communication.

          • allowLocalNfsUsersWithLdap optional - boolean

            If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.

          • backupOperators optional - array

            Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier

          • dns optional - string

            Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain

          • domain optional - string

            Name of the Active Directory domain

          • encryptDCConnections optional - boolean

            If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.

          • kdcIP optional - string

            kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.

          • ldapOverTLS optional - boolean

            Specifies whether or not the LDAP traffic needs to be secured via TLS.

          • ldapSigning optional - boolean

            Specifies whether or not the LDAP traffic needs to be signed.

          • organizationalUnit optional - string

            The Organizational Unit (OU) within the Windows Active Directory

          • password optional - string

            Plain text password of Active Directory domain administrator, value is masked in the response

          • securityOperators optional - array

            Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier

          • serverRootCACertificate optional - string

            When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.

          • site optional - string

            The Active Directory site the service will limit Domain Controller discovery to

          • smbServerName optional - string

            NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes

          • username optional - string

            Username of Active Directory domain administrator

      • encryption optional
          • keySource optional - string

            Encryption Key Source. Possible values are: 'Microsoft.NetApp'.

  • tags optional - string

    Tags are a list of key-value pairs that describe the resource

  • type required - string

Frequently asked questions

What is Azure NetApp Account?

Azure NetApp Account is a resource for NetApp of Microsoft Azure. Settings can be wrote in Terraform.

Where can I find the example code for the Azure NetApp Account?

For Terraform, the anmoltoppo/Terraform, davesee/terraform-caf-rover-breakout and pkhuntia/aztfmod source code examples are useful. See the Terraform Example section for further details.

For Azure Resource Manager, the HasanIftakher/Azure-Monitor, tulpy/Azure and microsoft/AzureMonitorCommunity source code examples are useful. See the Azure Resource Manager Example section for further details.