# Scenario1: Shared EFS and Shared EFS Access Point This example assumes following resources are already provisioned: - EFS file system exists and optionally encrypted using KMS. - EFS access point exists. - EFS mount points exist in the target VPC Subnets. - EFS Security Group exists and attached to the EFS mount points.
list(object({| n/a | yes | | [subnet\_tags](#input\_subnet\_tags) | Tags to discover target subnets in the VPC, these tags should identify one or more subnets | `map(string)` | n/a | yes | | [tags](#input\_tags) | Common and mandatory tags for the resources | `map(string)` | n/a | yes | | [vpc\_tags](#input\_vpc\_tags) | Tags to discover target VPC, these tags should uniquely identify a VPC | `map(string)` | n/a | yes | | [create\_common\_logs](#input\_create\_common\_logs) | Create the common CW log groups | `bool` | `false` | no | | [efs\_ap\_id](#input\_efs\_ap\_id) | EFS File System Access Point Id, if not provided a new EFA Access Point will be created | `string` | `null` | no | | [efs\_id](#input\_efs\_id) | EFS File System Id, if not provided a new EFS will be created | `string` | `null` | no | | [efs\_kms\_alias](#input\_efs\_kms\_alias) | KMS Alias to discover KMS for EFS encryption, if not provided a new CMK will be created. If efs\_id is provided for the encrypted EFS, this must also be provided. | `string` | `""` | no | | [efs\_sg\_tags](#input\_efs\_sg\_tags) | Tags used to discover EFS Security Group, if not provided new EFS security group will be created. If efs\_id is provided, this must also be provided. | `map(string)` | `null` | no | | [lambda\_role](#input\_lambda\_role) | Lambda Execution Role, if not provided a new IAM role will be created | `string` | `null` | no | | [logging\_role](#input\_logging\_role) | SFTP Logging Role, if not provided a new IAM role will be created | `string` | `null` | no | | [r53\_zone\_name](#input\_r53\_zone\_name) | Route 53 Zone Name. Optional, if provided, a DNS record will be created for the SFTP server | `string` | `""` | no | | [sftp\_daily\_report\_subscribers](#input\_sftp\_daily\_report\_subscribers) | List of email address to which daily activity reports will be sent | `list(string)` | `[]` | no | | [sftp\_encryptions](#input\_sftp\_encryptions) | Encryption specs for the SFTP server |
name = string # unique name
uid = string # e.g. 3001
gid = string # e.g. 4000
ssh_key_file = string # e.g. ./users/test.pub
}))
object({| `null` | no | | [sftp\_user\_automation\_subscribers](#input\_sftp\_user\_automation\_subscribers) | List of email address to user automation information will be sent | `list(string)` | `[]` | no | | [user\_role](#input\_user\_role) | SFTP User Role, if not provided a new IAM role will be created | `string` | `null` | no | ## Outputs | Name | Description | |------|-------------| | [daily\_report\_subscribers](#output\_daily\_report\_subscribers) | Daily Report Subscribers | | [sftp\_efs\_ap](#output\_sftp\_efs\_ap) | Elastic File System ids | | [sftp\_iam\_role](#output\_sftp\_iam\_role) | IAM Roles used by SFTP | | [sftp\_kms](#output\_sftp\_kms) | KMS Keys created by SFTP | | [sftp\_security\_group](#output\_sftp\_security\_group) | Security Group used by SFTP Server | | [sftp\_server](#output\_sftp\_server) | Route 53 FQDN for SFTP Server | | [sftp\_users](#output\_sftp\_users) | SFTP Users | | [user\_automation\_subscribers](#output\_user\_automation\_subscribers) | User Automation Event Subscribers |
encrypt_logs = bool # default false
logs_kms_alias = string # new CMK will be created, if needed
encrypt_lambda = bool # default false
lambda_kms_alias = string # new CMK will be created, if needed
encrypt_sns = bool # default false
sns_kms_alias = string # new CMK will be created, if needed
})