Skip to main content
Create file storage
Last update:

Create file storage

We recommend that you create resources in order. If you create all resources at once, Terraform will take into account the dependencies between resources that you specify in the configuration file. If dependencies are not specified, resources will be created in parallel, which can cause errors. For example, a resource that is required to create another resource may not have been created yet.


  1. Optional: configure the providers.
  2. Create a private network and subnet.
  3. Configure the storage network configuration.
  4. Create file storage.
  5. Configure the file storage access rules.

Configuration files

Example file for configuring providers
terraform {
required_providers {
selectel = {
source = "selectel/selectel"
version = "~> 6.0"
}
openstack = {
source = "terraform-provider-openstack/openstack"
version = "2.1.0"
}
}
}

provider "selectel" {
domain_name = "123456"
username = "user"
password = "password"
auth_region = "ru-9"
auth_url = "https://cloud.api.selcloud.ru/identity/v3/"
}

resource "selectel_vpc_project_v2" "project_1" {
name = "project"
}

resource "selectel_iam_serviceuser_v1" "serviceuser_1" {
name = "username"
password = "password"
role {
role_name = "member"
scope = "project"
project_id = selectel_vpc_project_v2.project_1.id
}
}

provider "openstack" {
auth_url = "https://cloud.api.selcloud.ru/identity/v3"
domain_name = "123456"
tenant_id = selectel_vpc_project_v2.project_1.id
user_name = selectel_iam_serviceuser_v1.serviceuser_1.name
password = selectel_iam_serviceuser_v1.serviceuser_1.password
region = "ru-9"
}
Example of a file for creating a file storage
resource "openstack_networking_network_v2" "network_1" {
name = "private-network"
admin_state_up = "true"
}

resource "openstack_networking_subnet_v2" "subnet_1" {
name = "private-subnet"
network_id = openstack_networking_network_v2.network_1.id
cidr = "192.168.199.0/24"
}

resource "openstack_sharedfilesystem_sharenetwork_v2" "sharenetwork_1" {
name = "share-network"
neutron_net_id = openstack_networking_network_v2.network_1.id
neutron_subnet_id = openstack_networking_subnet_v2.subnet_1.id
}

resource "openstack_sharedfilesystem_share_v2" "share_1" {
name = "nfs-storage"
share_type = "basic.ru-9a"
share_proto = "NFS"
size = 50
share_network_id = openstack_sharedfilesystem_sharenetwork_v2.sharenetwork_1.id
metadata = {"ip": "192.168.199.3"}
}

resource "openstack_sharedfilesystem_share_access_v2" "shareaccess_1" {
access_level = "rw"
access_to = "0.0.0.0/0"
access_type = "ip"
share_id = openstack_sharedfilesystem_share_v2.share_1.id
}

1. Optional: configure providers

If you have configured Selectel and OpenStack providers, skip this step.

  1. Ensure that in the Control Panel you have created a service user with the Account Administrator and User Administrator roles.

  2. Create a directory to store the configuration files and a separate file with a .tf extension to configure the providers.

  3. Add Selectel and OpenStack providers to the file to configure the providers:

    terraform {
    required_providers {
    selectel = {
    source = "selectel/selectel"
    version = "~> 6.0"
    }
    openstack = {
    source = "terraform-provider-openstack/openstack"
    version = "2.1.0"
    }
    }
    }

    Here version — versions of providers. The current version can be found in Selectel (in Terraform Registry and GitHub) and OpenStack (in Terraform Registry and GitHub) documentation.

    Learn more about the products, services, and services that can be managed with providers in the Selectel and OpenStack Providers instruction.

  4. Initialize the Selectel provider:

    provider "selectel" {
    domain_name = "123456"
    username = "user"
    password = "password"
    auth_region = "ru-9"
    auth_url = "https://cloud.api.selcloud.ru/identity/v3/"
    }

    Here:

    • domain_name — Selectel account number. You can look it up in control panel in the upper right corner;
    • username — username service user with the roles Account Administrator and User Administrator. Can be viewed in the control panel section Access ControlUser Management → tab Service Users (the section is available only to the Account Owner and User Administrator);
    • password — password of the service user. You can view it when creating a user or change it to a new one;
    • auth_region — pool for example ru-9. All resources will be created in this pool. The list of available pools can be found in the instructions Availability matrices.
  5. Create a project:

    resource "selectel_vpc_project_v2" "project_1" {
    name = "project"
    }

    View a detailed description of the selectel_vpc_project_v2 resource.

  6. Create a service user to access the project and assign the Project Administrator role to it:

    resource "selectel_iam_serviceuser_v1" "serviceuser_1" {
    name = "username"
    password = "password"
    role {
    role_name = "member"
    scope = "project"
    project_id = selectel_vpc_project_v2.project_1.id
    }
    }

    Here:

    • username — username;
    • password — user password. The password must be no shorter than eight characters and contain Latin letters of different cases and digits;
    • project_id — Project ID. You can view it in control panel: section Cloud Platform → open the projects menu (the name of the current project) → in the line of the required project press .

    View a detailed description of the selectel_iam_serviceuser_v1 resource.

  7. Initialize the OpenStack provider:

    provider "openstack" {
    auth_url = "https://cloud.api.selcloud.ru/identity/v3"
    domain_name = "123456"
    tenant_id = selectel_vpc_project_v2.project_1.id
    user_name = selectel_iam_serviceuser_v1.serviceuser_1.name
    password = selectel_iam_serviceuser_v1.serviceuser_1.password
    region = "ru-9"
    }

    Here:

    • domain_name — Selectel account number. You can look it up in control panel in the upper right corner;
    • region — pool for example ru-9. All resources will be created in this pool. The list of available pools can be found in the instructions Availability matrices.
  8. If you create resources at the same time as configuring providers, add the depends_on argument for OpenStack resources . For example, for the resource openstack_networking_network_v2:

    resource "openstack_networking_network_v2" "network_1" {
    name = "private-network"
    admin_state_up = "true"

    depends_on = [
    selectel_vpc_project_v2.project_1,
    selectel_iam_serviceuser_v1.serviceuser_1
    ]
    }
  9. Optional: if you want to use a mirror, create a separate Terraform CLI configuration file and add a block to it:

    provider_installation {
    network_mirror {
    url = "https://tf-proxy.selectel.ru/mirror/v1/"
    include = ["registry.terraform.io/*/*"]
    }
    direct {
    exclude = ["registry.terraform.io/*/*"]
    }
    }

    See the CLI Configuration File instructions in HashiCorp's CLI Configuration File documentation for more information on configuring mirrors.

  10. Open the CLI.

  11. Initialize the Terraform configuration in the directory:

    terraform init
  12. Check that the configuration files have been compiled without errors:

    terraform validate
  13. Format the configuration files:

    terraform fmt
  14. Check the resources that will be created:

    terraform plan
  15. Apply the changes and create the resources:

    terraform apply
  16. Confirm the creation — type yes and press Enter. The created resources are displayed in the control panel.

  17. If there were not enough quotas to create resources, increase the quotas.

2. Create a private network and subnet

resource "openstack_networking_network_v2" "network_1" {
name = "private-network"
admin_state_up = "true"
}

resource "openstack_networking_subnet_v2" "subnet_1" {
name = "private-subnet"
network_id = openstack_networking_network_v2.network_1.id
cidr = "192.168.199.0/24"
}

Here cidr is the CIDR of the private subnet, for example 192.168.199.0/24.

See a detailed description of the resources:

3. Configure the storage network configuration

resource "openstack_sharedfilesystem_sharenetwork_v2" "sharenetwork_1" {
name = "share-network"
neutron_net_id = openstack_networking_network_v2.network_1.id
neutron_subnet_id = openstack_networking_subnet_v2.subnet_1.id
}

View a detailed description of the openstack_sharedfilesystem_sharenetwork_v2 resource.

4. Create file storage

resource "openstack_sharedfilesystem_share_v2" "share_1" {
name = "nfs-storage"
share_type = "basic.ru-9a"
share_proto = "NFS"
size = 50
share_network_id = openstack_sharedfilesystem_sharenetwork_v2.sharenetwork_1.id
metadata = {"ip": "192.168.199.3"}
}

Here:

  • share_type — file storage type и pool segment in the format <type>.<pool_segment> for example basic.ru-9a:
    • <type>:
      • basic — HDD type Basic;
      • universal — SSD type Universal;
      • fast — SSD type Fast;
    • <pool_segment> — the pool segment where the file storage will be created, e.g. ru-9a. You can see the list of available pool segments in the instructions Availability matrices;
  • share_proto — file storage protocol: NFS or CIFS;
  • size — file storage size in GB, e.g. 50. Limitations are from 50 GB to 50 TB;
  • optional: metadata = {"ip": "<ip_address>"} — private IP address of the file storage, for example 192.168.0.3. Once the storage is created, the IP address cannot be changed.

View the detailed resource description of openstack_sharedfilesystem_share_v2.

5. Configure file storage access rules

resource "openstack_sharedfilesystem_share_access_v2" "shareaccess_1" {
access_level = "rw"
access_to = "0.0.0.0/0"
access_type = "ip"
share_id = openstack_sharedfilesystem_share_v2.share_1.id
}

Here:

  • access_level — access level to the storage, depends on the protocol:
    • for CIFS SMBv3 — rw (read and write);
    • for NFSv4 — ro (read only) or rw (read and write);
  • access_to — The IP address or CIDR of the private subnet for which access will be granted. For example:
    • 192.168.199.10 — access for IP address;
    • 192.168.199.0/24 — access for the private subnet range;
    • 0.0.0.0/0 — access for all addresses on the private subnet. To configure this access, you can add to the resource openstack_sharedfilesystem_share_v2 line metadata = { "access_list_allow_all": "true"}.

View a detailed description of the openstack_sharedfilesystem_share_access_v2 resource.