Module: efs-backup
Terraform module designed to easily backup EFS filesystems to S3 using DataPipeline.
The workflow is simple:
- Periodically launch resource (EC2 instance) based on schedule
- Execute the shell command defined in the activity on the instance
- Sync data from Production EFS to S3 Bucket by using
aws-cli
- The execution log of the activity is stored in
S3
- Publish the success or failure of the activity to an
SNS
topic - Automatically rotate the backups using
S3 lifecycle rule
Usage
Include this module in your existing terraform code:
module "efs_backup" {
source = "git::https://github.com/cloudposse/terraform-aws-efs-backup.git?ref=master"
name = "${var.name}"
stage = "${var.stage}"
namespace = "${var.namespace}"
vpc_id = "${var.vpc_id}"
efs_mount_target_id = "${var.efs_mount_target_id}"
use_ip_address = "false"
noncurrent_version_expiration_days = "${var.noncurrent_version_expiration_days}"
ssh_key_pair = "${var.ssh_key_pair}"
datapipeline_config = "${var.datapipeline_config}"
modify_security_group = "true"
}
output "efs_backup_security_group" {
value = "${module.efs_backup.security_group_id}"
}
Integration with EFS
To enable connectivity between the DataPipeline
instances and the EFS
, use one of the following methods to configure Security Groups:
- Explicitly add the
DataPipeline
SG (the output of this modulesecurity_group_id
) to the list of theingress
rules of theEFS
SG. For example:
module "elastic_beanstalk_environment" {
source = "git::https://github.com/cloudposse/terraform-aws-elastic-beanstalk-environment.git?ref=master"
namespace = "${var.namespace}"
name = "${var.name}"
stage = "${var.stage}"
delimiter = "${var.delimiter}"
attributes = ["${compact(concat(var.attributes, list("eb-env")))}"]
tags = "${var.tags}"
# ..............................
}
module "efs" {
source = "git::https://github.com/cloudposse/terraform-aws-efs.git?ref=tmaster"
namespace = "${var.namespace}"
name = "${var.name}"
stage = "${var.stage}"
delimiter = "${var.delimiter}"
attributes = ["${compact(concat(var.attributes, list("efs")))}"]
tags = "${var.tags}"
# Allow EB/EC2 instances and DataPipeline instances to connect to the EFS
security_groups = ["${module.elastic_beanstalk_environment.security_group_id}", "${module.efs_backup.security_group_id}"]
}
module "efs_backup" {
source = "git::https://github.com/cloudposse/terraform-aws-efs-backup.git?ref=master"
name = "${var.name}"
stage = "${var.stage}"
namespace = "${var.namespace}"
delimiter = "${var.delimiter}"
attributes = ["${compact(concat(var.attributes, list("efs-backup")))}"]
tags = "${var.tags}"
# Important to set it to `false` since we added the `DataPipeline` SG (output of the `efs_backup` module) to the `security_groups` of the `efs` module
# See NOTE below for more information
modify_security_group = "false"
# ..............................
}
- Set
modify_security_group
attribute totrue
so the module will modify theEFS
SG to allow theDataPipeline
to connect to theEFS
NOTE: Do not mix these two methods together.
Terraform
does not support using a Security Group with in-line rules in conjunction with any Security Group Rule resources.
https://www.terraform.io/docs/providers/aws/r/security_group_rule.html
NOTE on Security Groups and Security Group Rules: Terraform currently provides both a standalone Security Group Rule resource (a single ingress or egress rule), and a Security Group resource with ingress and egress rules defined in-line. At this time you cannot use a Security Group with in-line rules in conjunction with any Security Group Rule resources. Doing so will cause a conflict of rule settings and will overwrite rules.
Variables
Required Variables
efs_mount_target_id
(string
) requiredEFS Mount Target ID (e.g.
fsmt-279bfc62
)ssh_key_pair
(string
) requiredSSH
key that will be deployed on DataPipeline's instance
Optional Variables
datapipeline_config
(map(string)
) optionalDataPipeline configuration options
Default value:
{
"email": "",
"instance_type": "t2.micro",
"period": "24 hours",
"timeout": "60 Minutes"
}datapipeline_security_group
(string
) optionalOptionally specify a security group to use for the datapipeline instances
Default value:
""
modify_security_group
(string
) optionalShould the module modify the
EFS
security groupDefault value:
"false"
noncurrent_version_expiration_days
(string
) optionalS3 object versions expiration period (days)
Default value:
"35"
region
(string
) optional(Optional) AWS Region. If not specified, will be derived from 'aws_region' data source
Default value:
""
subnet_id
(string
) optionalOptionally specify the subnet to use
Default value:
""
use_ip_address
(string
) optionalIf set to
true
, will use IP address instead of DNS name to connect to theEFS
Default value:
"false"
vpc_id
(string
) optionalVPC ID
Default value:
""
Context Variables
The following variables are defined in the context.tf
file of this module and part of the terraform-null-label pattern.
context.tf
file of this module and part of the terraform-null-label pattern.name
(any
) requiredThe Name of the application or solution (e.g.
bastion
orportal
)
Required: YesDefault value: ``
namespace
(any
) requiredNamespace (e.g.
cp
orcloudposse
)
Required: YesDefault value: ``
stage
(any
) requiredStage (e.g.
prod
,dev
,staging
)
Required: YesDefault value: ``
attributes
(list(string)
) optionalAdditional attributes (e.g.
efs-backup
)
Required: NoDefault value:
[ ]
delimiter
(string
) optionalDelimiter to be used between
name
,namespace
,stage
, etc.
Required: NoDefault value:
"-"
tags
(map(string)
) optionalAdditional tags (e.g.
map('BusinessUnit
,XYZ
)
Required: NoDefault value:
{ }
Outputs
backups_bucket_name
Backups bucket name
datapipeline_ids
Datapipeline ids
logs_bucket_name
Logs bucket name
security_group_id
Security group id
sns_topic_arn
Backup notification SNS topic ARN
Dependencies
Providers
aws
Modules
Name | Version | Source | Description |
---|---|---|---|
backups_label | tags/0.3.1 | git::https://github.com/cloudposse/terraform-null-label.git | n/a |
datapipeline_label | tags/0.3.1 | git::https://github.com/cloudposse/terraform-null-label.git | n/a |
label | tags/0.3.1 | git::https://github.com/cloudposse/terraform-null-label.git | n/a |
logs_label | tags/0.3.1 | git::https://github.com/cloudposse/terraform-null-label.git | n/a |
resource_role_label | tags/0.3.1 | git::https://github.com/cloudposse/terraform-null-label.git | n/a |
role_label | tags/0.3.1 | git::https://github.com/cloudposse/terraform-null-label.git | n/a |
sns_label | tags/0.3.1 | git::https://github.com/cloudposse/terraform-null-label.git | n/a |
Resources
The following resources are used by this module:
aws_cloudformation_stack.datapipeline
(resource)aws_cloudformation_stack.sns
(resource)aws_iam_instance_profile.resource_role
(resource)aws_iam_role.resource_role
(resource)aws_iam_role.role
(resource)aws_iam_role_policy_attachment.resource_role
(resource)aws_iam_role_policy_attachment.role
(resource)aws_s3_bucket.backups
(resource)aws_s3_bucket.logs
(resource)aws_security_group.datapipeline
(resource)aws_security_group_rule.datapipeline_efs_ingress
(resource)
Data Sources
The following data sources are used by this module:
aws_ami.amazon_linux
(data source)aws_efs_mount_target.default
(data source)aws_iam_policy_document.resource_role
(data source)aws_iam_policy_document.role
(data source)aws_region.default
(data source)aws_subnet_ids.default
(data source)aws_vpc.default
(data source)