Module: efs-cloudwatch-sns-alarms
Create a set of sane EFS CloudWatch alerts for monitoring the health of an EFS resource.
area | metric | comparison operator | threshold | rationale |
---|---|---|---|---|
Storage | BurstCreditBalance | < | 192000000000 | 192 GB in Bytes (last hour where you can burst at 100 MB/sec) |
Storage | PercentIOLimit | > | 95 | When the IO limit has been exceeded, the system performance drops. |
Examples
resource "aws_efs_file_system" "default" {
creation_token = "app"
}
module "efs_alarms" {
source = "git::https://github.com/cloudposse/terraform-aws-efs-cloudwatch-sns-alarms.git?ref=master"
filesystem_id = "${aws_efs_file_system.default.id}"
}
Requirements
No requirements.
Providers
Name | Version |
---|---|
aws | n/a |
Modules
No modules.
Resources
Name | Type |
---|---|
aws_cloudwatch_metric_alarm.burst_credit_balance_too_low | resource |
aws_cloudwatch_metric_alarm.percent_io_limit_too_high | resource |
aws_sns_topic.default | resource |
aws_sns_topic_policy.default | resource |
aws_caller_identity.default | data source |
aws_iam_policy_document.sns_topic_policy | data source |
Inputs
Name | Description | Type | Default | Required |
---|---|---|---|---|
add_sns_policy | Attach a policy that allows the notifications through to the SNS topic endpoint | string | "false" | no |
additional_endpoint_arns | Any alert endpoints, such as autoscaling, or app escaling endpoint arns that will respond to an alert | list(string) | [] | no |
burst_credit_balance_threshold | The minimum number of burst credits that a file system should have. | string | "192000000000" | no |
filesystem_id | The EFS file system ID that you want to monitor | string | n/a | yes |
percent_io_limit_threshold | IO Limit threshold | string | "95" | no |
sns_topic_arn | An SNS topic ARN that has already been created. Its policy must already allow access from CloudWatch Alarms, or set add_sns_policy to true | string | "" | no |
Outputs
Name | Description |
---|---|
sns_topic_arn | An SNS topic ARN that has already been created. Its policy must already allow access from CloudWatch Alarms, or set add_sns_policy to true |