Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for AWS Storage Gateway #943

Closed
wonderphil opened this issue Jun 22, 2017 · 17 comments
Closed

Support for AWS Storage Gateway #943

wonderphil opened this issue Jun 22, 2017 · 17 comments
Labels
new-resource Introduces a new resource. service/storagegateway Issues and PRs that pertain to the storagegateway service.

Comments

@wonderphil
Copy link

Hi guys,

Just wondering if there is a eta for support of AWS Storage Gateways and related services?

Thanks

@stack72 stack72 added the new-resource Introduces a new resource. label Jul 7, 2017
@alex1x
Copy link
Contributor

alex1x commented Nov 21, 2017

Would be great, currently needing to do acrobatics with other scripts to get this all automated and integrating with existing Terraform code.

@bflad
Copy link
Member

bflad commented Nov 22, 2017

Can you provide which functionality is highest priority for your use cases? It appears that bootstrapping the acceptance test for activating a gateway might take some effort with properly configuring an EC2 instance, etc.

@mickeybr
Copy link

mickeybr commented Dec 5, 2017

I could really use it for setting up the file shares more than anything.

@lthomas987
Copy link

I too would like to configure nfs shares from storage gateway.

@scraly
Copy link

scraly commented Jan 22, 2018

Any news about it?

@bflad bflad added the service/storagegateway Issues and PRs that pertain to the storagegateway service. label Jan 22, 2018
@bflad
Copy link
Member

bflad commented Jan 22, 2018

If someone could share a working aws_instance resource configuration that uses the Storage Gateway AMI, I think that would be helpful for moving forward since that would likely be the basis for all Storage Gateway acceptance testing.

Please note due to other priorities, the Terraform team at HashiCorp won't be able to work on this in the near future, but we'd be happy to review a pull request if you or someone else has the time and motivation to implement it. Alternatively, if others would also like to see this implemented I'd encourage adding a 👍 upvote reaction to the original issue comment (not to this comment), which we use as one of the inputs to prioritize work for the Terraform team.

@mickeybr
Copy link

I will check with our team for the configuration. I think we ended up delegating to a bash script in terraform for now that passes in the parameters. At this point we connect to the On-Premise VMware appliance instead of using an EC2 instance and it is pretty much a manual process to activate it.

But when an application team requests file shares, that's where we use the automated scripts.
Here's the CLI commands we would like to be supported by Terraform:

@smastrorocco
Copy link

Now that AWS supports SMB as well, am looking for this to be supported.

@bflad
Copy link
Member

bflad commented Jul 16, 2018

In order to properly test this within the provider, we need to create an EC2 gateway instance to fetch the activation key since most other API operations require an activated gateway ID.

I have submitted a data source to handle this, that automates making the HTTP call to the gateway server IP: aws_storagegateway_gateway_activation_key

With that groundwork for testing in place, we should be able to implement the other Storage Gateway API calls as resources within Terraform afterwards.

@bflad
Copy link
Member

bflad commented Jul 18, 2018

It turns out the above data source was invalid after the gateway is activated. This functionality has instead been rolled into first resource, aws_storagegateway_gateway, which has been released with version 1.28.0 of the AWS provider. The other resources can start to trickle in now that we can manage the actual gateways. I am personally planning on implementing NFS/SMB file shares next.

@dstauffacher
Copy link

You might be able to use this to automate deployment in the meantime: https://github.com/dstauffacher/nfs_file_gateway

@bflad
Copy link
Member

bflad commented Jul 20, 2018

Submitted pull requests:

@starz-Harinder
Copy link

Sorry if this is a silly ask, but has anyone successfully deployed a combination of Storage Gateway and File Shares using Terraform? An example of would be awesome!

@dstauffacher
Copy link

Sorry if this is a silly ask, but has anyone successfully deployed a combination of Storage Gateway and File Shares using Terraform? An example of would be awesome!

I have, yes. My example project is here: https://github.com/dstauffacher/terraform_file_gateway
If you scroll up in this thread a bit, you'll see an older link I posted to a project that uses a combo of terraform and AWS CLI commands organized in a bash script. This link is to a terraform-only version of the same project.

@starz-Harinder
Copy link

starz-Harinder commented Jan 12, 2019

Thank you!

@bflad
Copy link
Member

bflad commented Sep 5, 2019

Whoops, it looks like I forgot to close out this general Storage Gateway support feature request awhile ago! If you have any further bug reports or feature requests with Storage Gateway, please file new GitHub issues following the issue templates. 👍

@bflad bflad closed this as completed Sep 5, 2019
@ghost
Copy link

ghost commented Nov 1, 2019

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks!

@ghost ghost locked and limited conversation to collaborators Nov 1, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
new-resource Introduces a new resource. service/storagegateway Issues and PRs that pertain to the storagegateway service.
Projects
None yet
Development

No branches or pull requests

10 participants