Terraform Module to create an Azure storage account with a set of containers (and access level), set of file shares (and quota), tables, queues, Network policies and Blob lifecycle management.
To defines the kind of account, set the argument to account_kind = "StorageV2"
. Account kind defaults to StorageV2
. If you want to change this value to other storage accounts kind, then this module automatically computes the appropriate values for account_tier
, account_replication_type
. The valid options are BlobStorage
, BlockBlobStorage
, FileStorage
, Storage
and StorageV2
. static_website
can only be set when the account_kind is set to StorageV2
.
[!NOTE] This module now supports the meta arguments including
providers
,depends_on
,count
, andfor_each
.
- Storage Account
- Storage Advanced Threat Protection
- Containers
- SMB File Shares
- Storage Table
- Storage Queue
- Network Policies
- Azure Blob storage lifecycle
- Managed Service Identity
# Azure Provider configuration
provider "azurerm" {
features {}
}
resource "azurerm_user_assigned_identity" "example" {
for_each = toset(["user-identity1", "user-identity2"])
resource_group_name = "rg-shared-westeurope-01"
location = "westeurope"
name = each.key
}
module "storage" {
source = "kumarvna/storage/azurerm"
version = "2.5.0"
# By default, this module will not create a resource group
# proivde a name to use an existing resource group, specify the existing resource group name,
# and set the argument to `create_resource_group = false`. Location will be same as existing RG.
create_resource_group = true
resource_group_name = "rg-demo-internal-shared-westeurope-002"
location = "westeurope"
storage_account_name = "mystorage"
# To enable advanced threat protection set argument to `true`
enable_advanced_threat_protection = true
# Container lists with access_type to create
containers_list = [
{ name = "mystore250", access_type = "private" },
{ name = "blobstore251", access_type = "blob" },
{ name = "containter252", access_type = "container" }
]
# SMB file share with quota (GB) to create
file_shares = [
{ name = "smbfileshare1", quota = 50 },
{ name = "smbfileshare2", quota = 50 }
]
# Storage tables
tables = ["table1", "table2", "table3"]
# Storage queues
queues = ["queue1", "queue2"]
# Configure managed identities to access Azure Storage (Optional)
# Possible types are `SystemAssigned`, `UserAssigned` and `SystemAssigned, UserAssigned`.
managed_identity_type = "UserAssigned"
managed_identity_ids = [for k in azurerm_user_assigned_identity.example : k.id]
# Lifecycle management for storage account.
# Must specify the value to each argument and default is `0`
lifecycles = [
{
prefix_match = ["mystore250/folder_path"]
tier_to_cool_after_days = 0
tier_to_archive_after_days = 50
delete_after_days = 100
snapshot_delete_after_days = 30
},
{
prefix_match = ["blobstore251/another_path"]
tier_to_cool_after_days = 0
tier_to_archive_after_days = 30
delete_after_days = 75
snapshot_delete_after_days = 30
}
]
# Adding TAG's to your Azure resources (Required)
# ProjectName and Env are already declared above, to use them here, create a varible.
tags = {
ProjectName = "demo-internal"
Env = "dev"
Owner = "user@example.com"
BusinessUnit = "CORP"
ServiceClass = "Gold"
}
}
By default, this module will not create a resource group and the name of an existing resource group to be given in an argument resource_group_name
. If you want to create a new resource group, set the argument create_resource_group = true
.
Note
If you are using an existing resource group, then this module uses the same resource group location to create all resources in this module.
A BlockBlobStorage account is a specialized storage account in the premium performance tier for storing unstructured object data as block blobs or append blobs. Compared with general-purpose v2 and BlobStorage accounts, BlockBlobStorage accounts provide low, consistent latency and higher transaction rates.
BlockBlobStorage accounts don't currently support tiering to hot, cool, or archive access tiers. This type of storage account does not support page blobs, tables, or queues.
To create BlockBlobStorage accounts, set the argument to account_kind = "BlockBlobStorage"
.
A FileStorage account is a specialized storage account used to store and create premium file shares. This storage account kind supports files but not block blobs, append blobs, page blobs, tables, or queues.
FileStorage accounts offer unique performance dedicated characteristics such as IOPS bursting. For more information on these characteristics, see the File share storage tiers section of the Files planning guide.
To create BlockBlobStorage accounts, set the argument to account_kind = "FileStorage"
.
A container organizes a set of blobs, similar to a directory in a file system. A storage account can include an unlimited number of containers, and a container can store an unlimited number of blobs. The container name must be lowercase.
This module creates the containers based on your input within an Azure Storage Account. Configure the access_type
for this Container as per your preference. Possible values are blob
, container
or private
. Preferred Defaults to private
.
Azure Files offers fully managed file shares in the cloud that are accessible via the industry standard Server Message Block (SMB) protocol. Azure file shares can be mounted concurrently by cloud or on-premises deployments of Windows, Linux, and macOS.
This module creates the SMB file shares based on your input within an Azure Storage Account. Configure the quota
for this file share as per your preference. The maximum size of the share, in gigabytes. For Standard storage accounts, this must be greater than 0
and less than 5120
GB (5 TB). For Premium FileStorage storage accounts, this must be greater than 100
GB and less than 102400
GB (100 TB).
Soft delete protects blob data from being accidentally or erroneously modified or deleted. When soft delete is enabled for a storage account, containers, blobs, blob versions, and snapshots in that storage account may be recovered after they are deleted, within a retention period that you specify.
This module allows you to specify the number of days that the blob or container should be retained period using blob_soft_delete_retention_days
and container_soft_delete_retention_days
arguments between 1 and 365 days. Default is 7
days.
Warning
Container soft delete can restore only whole containers and their contents at the time of deletion. You cannot restore a deleted blob within a container by using container soft delete. Microsoft recommends also enabling blob soft delete and blob versioning to protect individual blobs in a container.
When you restore a container, you must restore it to its original name. If the original name has been used to create a new container, then you will not be able to restore the soft-deleted container.
The Azure storage firewall provides access control access for the public endpoints of the storage account. Use network policies to block all access through the public endpoint when using private endpoints. The storage firewall configuration also enables select trusted Azure platform services to access the storage account securely.
The default action set to Allow
when no network rules matched. A subnet_ids
or ip_rules
can be added to network_rules
block to allow a request that is not Azure Services.
module "storage" {
source = "kumarvna/storage/azurerm"
version = "2.5.0"
# .... omitted
# If specifying network_rules, one of either `ip_rules` or `subnet_ids` must be specified
network_rules = {
bypass = ["AzureServices"]
# One or more IP Addresses, or CIDR Blocks to access this Key Vault.
ip_rules = ["123.201.18.148"]
# One or more Subnet ID's to access this Key Vault.
subnet_ids = []
}
# .... omitted
}
Azure Blob storage lifecycle management offers a rich, rule-based policy for General Purpose v2 (GPv2) accounts, Blob storage accounts, and Premium Block Blob storage accounts. Use the policy to transition your data to the appropriate access tiers or expire at the end of the data's lifecycle.
The lifecycle management policy lets you:
- Transition blobs to a cooler storage tier (hot to cool, hot to archive, or cool to archive) to optimize for performance and cost
- Delete blobs at the end of their lifecycles
- Define rules to be run once per day at the storage account level
- Apply rules to containers or a subset of blobs*
This module supports the implementation of storage lifecycle management. If specifying network_rules, one of either ip_rules
or subnet_ids
must be specified and default_action must be set to Deny
.
module "storage" {
source = "kumarvna/storage/azurerm"
version = "2.5.0"
# .... omitted
# Lifecycle management for storage account.
# Must specify the value to each argument and default is `0`
lifecycles = [
{
prefix_match = ["mystore250/folder_path"]
tier_to_cool_after_days = 0
tier_to_archive_after_days = 50
delete_after_days = 100
snapshot_delete_after_days = 30
},
{
prefix_match = ["blobstore251/another_path"]
tier_to_cool_after_days = 0
tier_to_archive_after_days = 30
delete_after_days = 75
snapshot_delete_after_days = 30
}
]
# .... omitted
}
Managed identities for Azure resources provides Azure services with an automatically managed identity in Azure Active Directory. You can use this identity to authenticate to any service that supports Azure AD authentication, without having credentials in your code.
There are two types of managed identities:
- System-assigned: When enabled a system-assigned managed identity an identity is created in Azure AD that is tied to the lifecycle of that service instance. when the resource is deleted, Azure automatically deletes the identity. By design, only that Azure resource can use this identity to request tokens from Azure AD.
- User-assigned: A managed identity as a standalone Azure resource. For User-assigned managed identities, the identity is managed separately from the resources that use it.
Regardless of the type of identity chosen a managed identity is a service principal of a special type that may only be used with Azure resources. When the managed identity is deleted, the corresponding service principal is automatically removed.
resource "azurerm_user_assigned_identity" "example" {
for_each = toset(["user-identity1", "user-identity2"])
resource_group_name = "rg-shared-westeurope-01"
location = "westeurope"
name = each.key
}
module "storage" {
source = "kumarvna/storage/azurerm"
version = "2.5.0"
# .... omitted
# Configure managed identities to access Azure Storage (Optional)
# Possible types are `SystemAssigned`, `UserAssigned` and `SystemAssigned, UserAssigned`.
managed_identity_type = "UserAssigned"
managed_identity_ids = [for k in azurerm_user_assigned_identity.example : k.id]
# .... omitted for bravity
}
Applying tags to your Azure resources, resource groups, and subscriptions to logically organize them into a taxonomy. Each tag consists of a name and a value pair. For example, you can apply the name Environment
and the value Production
to all the resources in production.
For recommendations on how to implement a tagging strategy, see Resource naming and tagging decision guide.
Important
Tag names are case-insensitive for operations. A tag with a tag name, regardless of the casing, is updated or retrieved. However, the resource provider might keep the casing you provide for the tag name. You'll see that casing in cost reports. Tag values are case-sensitive.
An effective naming convention assembles resource names by using important resource information as parts of a resource's name. For example, using these recommended naming conventions, a public IP resource for a production SharePoint workload is named like this: pip-sharepoint-prod-westus-001
.
Name | Version |
---|---|
terraform | >= 1.1.0 |
azurerm | >= 3.1.0 |
Name | Version |
---|---|
azurerm | >= 3.1.0 |
random | >= 3.1.0 |
Name | Description | Type | Default |
---|---|---|---|
create_resource_group |
Whether to create resource group and use it for all networking resources | string | false |
resource_group_name |
The name of the resource group in which resources are created | string | "" |
location |
The location of the resource group in which resources are created | string | "" |
account_kind |
General-purpose v2 accounts: Basic storage account type for blobs, files, queues, and tables. | string | "StorageV2" |
skuname |
The SKUs supported by Microsoft Azure Storage. Valid options are Premium_LRS, Premium_ZRS, Standard_GRS, Standard_GZRS, Standard_LRS, Standard_RAGRS, Standard_RAGZRS, Standard_ZRS | string | Standard_RAGRS |
access_tier |
Defines the access tier for BlobStorage and StorageV2 accounts. Valid options are Hot and Cool. | string | "Hot" |
is_hns_enabled |
Is Hierarchical Namespace enabled? This can be used with Azure Data Lake Storage Gen 2 | bool | false |
min_tls_version |
The minimum supported TLS version for the storage account. Possible values are TLS1_0 , TLS1_1 , and TLS1_2 |
string | "TLS1_2" |
blob_soft_delete_retention_days |
Specifies the number of days that the blob should be retained, between 1 and 365 days. |
number | 7 |
container_soft_delete_retention_days |
Specifies the number of days that the blob should be retained, between 1 and 365 days. |
number | 7 |
enable_versioning |
Is versioning enabled? | string | false |
last_access_time_enabled |
Is the last access time based tracking enabled? | string | false |
change_feed_enabled |
Is the blob service properties for change feed events enabled? | string | false |
enable_advanced_threat_protection |
Controls Advance threat protection plan for Storage account!string | false |
|
managed_identity_type |
The type of Managed Identity which should be assigned to the Azure Storage. Possible values are SystemAssigned , UserAssigned and SystemAssigned, UserAssigned |
string | null |
managed_identity_ids |
A list of User Managed Identity ID's which should be assigned to the Azure Storage. | string | null |
network_rules |
Configure Azure storage firewalls and virtual networks | list | null |
containers_list |
List of container | list | [] |
file_shares |
List of SMB file shares | list | [] |
queues |
List of storages queues | list | [] |
tables |
List of storage tables | list | [] |
lifecycles |
Configure Azure Storage firewalls and virtual networks | list | {} |
Tags |
A map of tags to add to all resources | map | {} |
Name | Description | Type | Default |
---|---|---|---|
name |
Name of the container | string | "" |
access_type |
The Access Level configured for the Container. Possible values are blob , container or private . |
string | "private" |
Name | Description | Type | Default |
---|---|---|---|
name |
Name of the SMB file share | string | "" |
quota |
The required size in GB. Defaults to 5120 |
string | "" |
Name | Description | Type | Default |
---|---|---|---|
bypass |
Specifies whether traffic is bypassed for Logging/Metrics/AzureServices. Valid options are any combination of Logging , Metrics , AzureServices , or None . |
string | "AzureServices" |
ip_rules |
List of public IP or IP ranges in CIDR Format. Only IPV4 addresses are allowed. Private IP address ranges are not allowed. | list(string) | [] |
subnet_ids | A list of resource ids for subnets. | list(string) | [] |
Name | Description | Type | Default |
---|---|---|---|
prefix_match |
An array of strings for prefixes to be matched | set(string) | [] |
tier_to_cool_after_days |
The age in days after last modification to tier blobs to cool storage. Supports blob currently at Hot tier. Must be at least 0 . |
number | 0 |
tier_to_archive_after_days |
The age in days after last modification to tier blobs to archive storage. Supports blob currently at Hot or Cool tier. Must be at least 0 . |
number | 0 |
delete_after_days |
The age in days after last modification to delete the blob. Must be at least 0. | number | 0 |
snapshot_delete_after_days |
The age in days after create to delete the snapshot. Must be at least 0. | number | 0 |
Name | Description | Type | Default |
---|---|---|---|
cors_rule |
(Optional) A map of CORS rules to add to the storage account | object({ |
null |
Name | Description |
---|---|
resource_group_name |
The name of the resource group in which resources are created |
resource_group_id |
The id of the resource group in which resources are created |
resource_group_location |
The location of the resource group in which resources are created |
storage_account_id |
The ID of the storage account |
sorage_account_name |
The name of the storage account |
storage_account_primary_location |
The primary location of the storage account |
storage_account_primary_blob_endpoint |
The endpoint URL for blob storage in the primary location |
storage_account_primary_web_endpoint |
The endpoint URL for web storage in the primary location |
storage_account_primary_web_host |
The hostname with port if applicable for web storage in the primary location |
storage_primary_connection_string |
The primary connection string for the storage account |
storage_primary_access_key |
The primary access key for the storage account |
storage_secondary_access_key |
The secondary access key for the storage account |
containers |
The list of containers |
file_shares |
The list of SMB file shares |
tables |
The list of storage tables |
queues |
The list of storage queues |
Originally created by Kumaraswamy Vithanala