We recommend using Azure Native.
azure.netapp.Account
Explore with Pulumi AI
Manages a NetApp Account.
NOTE: Azure allows only one active directory can be joined to a single subscription at a time for NetApp Account.
NetApp Account Usage
import * as pulumi from "@pulumi/pulumi";
import * as azure from "@pulumi/azure";
const example = new azure.core.ResourceGroup("example", {
name: "example-resources",
location: "West Europe",
});
const current = azure.core.getClientConfig({});
const exampleUserAssignedIdentity = new azure.authorization.UserAssignedIdentity("example", {
name: "anf-user-assigned-identity",
location: example.location,
resourceGroupName: example.name,
});
const exampleAccount = new azure.netapp.Account("example", {
name: "netappaccount",
location: example.location,
resourceGroupName: example.name,
activeDirectory: {
username: "aduser",
password: "aduserpwd",
smbServerName: "SMBSERVER",
dnsServers: ["1.2.3.4"],
domain: "westcentralus.com",
organizationalUnit: "OU=FirstLevel",
},
identity: {
type: "UserAssigned",
identityIds: [exampleUserAssignedIdentity.id],
},
});
import pulumi
import pulumi_azure as azure
example = azure.core.ResourceGroup("example",
name="example-resources",
location="West Europe")
current = azure.core.get_client_config()
example_user_assigned_identity = azure.authorization.UserAssignedIdentity("example",
name="anf-user-assigned-identity",
location=example.location,
resource_group_name=example.name)
example_account = azure.netapp.Account("example",
name="netappaccount",
location=example.location,
resource_group_name=example.name,
active_directory={
"username": "aduser",
"password": "aduserpwd",
"smb_server_name": "SMBSERVER",
"dns_servers": ["1.2.3.4"],
"domain": "westcentralus.com",
"organizational_unit": "OU=FirstLevel",
},
identity={
"type": "UserAssigned",
"identity_ids": [example_user_assigned_identity.id],
})
package main
import (
"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/authorization"
"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/core"
"github.com/pulumi/pulumi-azure/sdk/v6/go/azure/netapp"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
example, err := core.NewResourceGroup(ctx, "example", &core.ResourceGroupArgs{
Name: pulumi.String("example-resources"),
Location: pulumi.String("West Europe"),
})
if err != nil {
return err
}
_, err = core.GetClientConfig(ctx, map[string]interface{}{}, nil)
if err != nil {
return err
}
exampleUserAssignedIdentity, err := authorization.NewUserAssignedIdentity(ctx, "example", &authorization.UserAssignedIdentityArgs{
Name: pulumi.String("anf-user-assigned-identity"),
Location: example.Location,
ResourceGroupName: example.Name,
})
if err != nil {
return err
}
_, err = netapp.NewAccount(ctx, "example", &netapp.AccountArgs{
Name: pulumi.String("netappaccount"),
Location: example.Location,
ResourceGroupName: example.Name,
ActiveDirectory: &netapp.AccountActiveDirectoryArgs{
Username: pulumi.String("aduser"),
Password: pulumi.String("aduserpwd"),
SmbServerName: pulumi.String("SMBSERVER"),
DnsServers: pulumi.StringArray{
pulumi.String("1.2.3.4"),
},
Domain: pulumi.String("westcentralus.com"),
OrganizationalUnit: pulumi.String("OU=FirstLevel"),
},
Identity: &netapp.AccountIdentityArgs{
Type: pulumi.String("UserAssigned"),
IdentityIds: pulumi.StringArray{
exampleUserAssignedIdentity.ID(),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Azure = Pulumi.Azure;
return await Deployment.RunAsync(() =>
{
var example = new Azure.Core.ResourceGroup("example", new()
{
Name = "example-resources",
Location = "West Europe",
});
var current = Azure.Core.GetClientConfig.Invoke();
var exampleUserAssignedIdentity = new Azure.Authorization.UserAssignedIdentity("example", new()
{
Name = "anf-user-assigned-identity",
Location = example.Location,
ResourceGroupName = example.Name,
});
var exampleAccount = new Azure.NetApp.Account("example", new()
{
Name = "netappaccount",
Location = example.Location,
ResourceGroupName = example.Name,
ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs
{
Username = "aduser",
Password = "aduserpwd",
SmbServerName = "SMBSERVER",
DnsServers = new[]
{
"1.2.3.4",
},
Domain = "westcentralus.com",
OrganizationalUnit = "OU=FirstLevel",
},
Identity = new Azure.NetApp.Inputs.AccountIdentityArgs
{
Type = "UserAssigned",
IdentityIds = new[]
{
exampleUserAssignedIdentity.Id,
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.core.ResourceGroup;
import com.pulumi.azure.core.ResourceGroupArgs;
import com.pulumi.azure.core.CoreFunctions;
import com.pulumi.azure.authorization.UserAssignedIdentity;
import com.pulumi.azure.authorization.UserAssignedIdentityArgs;
import com.pulumi.azure.netapp.Account;
import com.pulumi.azure.netapp.AccountArgs;
import com.pulumi.azure.netapp.inputs.AccountActiveDirectoryArgs;
import com.pulumi.azure.netapp.inputs.AccountIdentityArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new ResourceGroup("example", ResourceGroupArgs.builder()
.name("example-resources")
.location("West Europe")
.build());
final var current = CoreFunctions.getClientConfig();
var exampleUserAssignedIdentity = new UserAssignedIdentity("exampleUserAssignedIdentity", UserAssignedIdentityArgs.builder()
.name("anf-user-assigned-identity")
.location(example.location())
.resourceGroupName(example.name())
.build());
var exampleAccount = new Account("exampleAccount", AccountArgs.builder()
.name("netappaccount")
.location(example.location())
.resourceGroupName(example.name())
.activeDirectory(AccountActiveDirectoryArgs.builder()
.username("aduser")
.password("aduserpwd")
.smbServerName("SMBSERVER")
.dnsServers("1.2.3.4")
.domain("westcentralus.com")
.organizationalUnit("OU=FirstLevel")
.build())
.identity(AccountIdentityArgs.builder()
.type("UserAssigned")
.identityIds(exampleUserAssignedIdentity.id())
.build())
.build());
}
}
resources:
example:
type: azure:core:ResourceGroup
properties:
name: example-resources
location: West Europe
exampleUserAssignedIdentity:
type: azure:authorization:UserAssignedIdentity
name: example
properties:
name: anf-user-assigned-identity
location: ${example.location}
resourceGroupName: ${example.name}
exampleAccount:
type: azure:netapp:Account
name: example
properties:
name: netappaccount
location: ${example.location}
resourceGroupName: ${example.name}
activeDirectory:
username: aduser
password: aduserpwd
smbServerName: SMBSERVER
dnsServers:
- 1.2.3.4
domain: westcentralus.com
organizationalUnit: OU=FirstLevel
identity:
type: UserAssigned
identityIds:
- ${exampleUserAssignedIdentity.id}
variables:
current:
fn::invoke:
Function: azure:core:getClientConfig
Arguments: {}
Create Account Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Account(name: string, args: AccountArgs, opts?: CustomResourceOptions);
@overload
def Account(resource_name: str,
args: AccountArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Account(resource_name: str,
opts: Optional[ResourceOptions] = None,
resource_group_name: Optional[str] = None,
active_directory: Optional[AccountActiveDirectoryArgs] = None,
identity: Optional[AccountIdentityArgs] = None,
location: Optional[str] = None,
name: Optional[str] = None,
tags: Optional[Mapping[str, str]] = None)
func NewAccount(ctx *Context, name string, args AccountArgs, opts ...ResourceOption) (*Account, error)
public Account(string name, AccountArgs args, CustomResourceOptions? opts = null)
public Account(String name, AccountArgs args)
public Account(String name, AccountArgs args, CustomResourceOptions options)
type: azure:netapp:Account
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var exampleaccountResourceResourceFromNetappaccount = new Azure.NetApp.Account("exampleaccountResourceResourceFromNetappaccount", new()
{
ResourceGroupName = "string",
ActiveDirectory = new Azure.NetApp.Inputs.AccountActiveDirectoryArgs
{
Password = "string",
DnsServers = new[]
{
"string",
},
Domain = "string",
Username = "string",
SmbServerName = "string",
KerberosAdName = "string",
LdapSigningEnabled = false,
LocalNfsUsersWithLdapAllowed = false,
OrganizationalUnit = "string",
LdapOverTlsEnabled = false,
ServerRootCaCertificate = "string",
SiteName = "string",
KerberosKdcIp = "string",
AesEncryptionEnabled = false,
},
Identity = new Azure.NetApp.Inputs.AccountIdentityArgs
{
Type = "string",
IdentityIds = new[]
{
"string",
},
PrincipalId = "string",
TenantId = "string",
},
Location = "string",
Name = "string",
Tags =
{
{ "string", "string" },
},
});
example, err := netapp.NewAccount(ctx, "exampleaccountResourceResourceFromNetappaccount", &netapp.AccountArgs{
ResourceGroupName: pulumi.String("string"),
ActiveDirectory: &netapp.AccountActiveDirectoryArgs{
Password: pulumi.String("string"),
DnsServers: pulumi.StringArray{
pulumi.String("string"),
},
Domain: pulumi.String("string"),
Username: pulumi.String("string"),
SmbServerName: pulumi.String("string"),
KerberosAdName: pulumi.String("string"),
LdapSigningEnabled: pulumi.Bool(false),
LocalNfsUsersWithLdapAllowed: pulumi.Bool(false),
OrganizationalUnit: pulumi.String("string"),
LdapOverTlsEnabled: pulumi.Bool(false),
ServerRootCaCertificate: pulumi.String("string"),
SiteName: pulumi.String("string"),
KerberosKdcIp: pulumi.String("string"),
AesEncryptionEnabled: pulumi.Bool(false),
},
Identity: &netapp.AccountIdentityArgs{
Type: pulumi.String("string"),
IdentityIds: pulumi.StringArray{
pulumi.String("string"),
},
PrincipalId: pulumi.String("string"),
TenantId: pulumi.String("string"),
},
Location: pulumi.String("string"),
Name: pulumi.String("string"),
Tags: pulumi.StringMap{
"string": pulumi.String("string"),
},
})
var exampleaccountResourceResourceFromNetappaccount = new Account("exampleaccountResourceResourceFromNetappaccount", AccountArgs.builder()
.resourceGroupName("string")
.activeDirectory(AccountActiveDirectoryArgs.builder()
.password("string")
.dnsServers("string")
.domain("string")
.username("string")
.smbServerName("string")
.kerberosAdName("string")
.ldapSigningEnabled(false)
.localNfsUsersWithLdapAllowed(false)
.organizationalUnit("string")
.ldapOverTlsEnabled(false)
.serverRootCaCertificate("string")
.siteName("string")
.kerberosKdcIp("string")
.aesEncryptionEnabled(false)
.build())
.identity(AccountIdentityArgs.builder()
.type("string")
.identityIds("string")
.principalId("string")
.tenantId("string")
.build())
.location("string")
.name("string")
.tags(Map.of("string", "string"))
.build());
exampleaccount_resource_resource_from_netappaccount = azure.netapp.Account("exampleaccountResourceResourceFromNetappaccount",
resource_group_name="string",
active_directory={
"password": "string",
"dns_servers": ["string"],
"domain": "string",
"username": "string",
"smb_server_name": "string",
"kerberos_ad_name": "string",
"ldap_signing_enabled": False,
"local_nfs_users_with_ldap_allowed": False,
"organizational_unit": "string",
"ldap_over_tls_enabled": False,
"server_root_ca_certificate": "string",
"site_name": "string",
"kerberos_kdc_ip": "string",
"aes_encryption_enabled": False,
},
identity={
"type": "string",
"identity_ids": ["string"],
"principal_id": "string",
"tenant_id": "string",
},
location="string",
name="string",
tags={
"string": "string",
})
const exampleaccountResourceResourceFromNetappaccount = new azure.netapp.Account("exampleaccountResourceResourceFromNetappaccount", {
resourceGroupName: "string",
activeDirectory: {
password: "string",
dnsServers: ["string"],
domain: "string",
username: "string",
smbServerName: "string",
kerberosAdName: "string",
ldapSigningEnabled: false,
localNfsUsersWithLdapAllowed: false,
organizationalUnit: "string",
ldapOverTlsEnabled: false,
serverRootCaCertificate: "string",
siteName: "string",
kerberosKdcIp: "string",
aesEncryptionEnabled: false,
},
identity: {
type: "string",
identityIds: ["string"],
principalId: "string",
tenantId: "string",
},
location: "string",
name: "string",
tags: {
string: "string",
},
});
type: azure:netapp:Account
properties:
activeDirectory:
aesEncryptionEnabled: false
dnsServers:
- string
domain: string
kerberosAdName: string
kerberosKdcIp: string
ldapOverTlsEnabled: false
ldapSigningEnabled: false
localNfsUsersWithLdapAllowed: false
organizationalUnit: string
password: string
serverRootCaCertificate: string
siteName: string
smbServerName: string
username: string
identity:
identityIds:
- string
principalId: string
tenantId: string
type: string
location: string
name: string
resourceGroupName: string
tags:
string: string
Account Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Account resource accepts the following input properties:
- Resource
Group stringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Active
Directory AccountActive Directory - A
active_directory
block as defined below. - Identity
Account
Identity - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Dictionary<string, string>
- A mapping of tags to assign to the resource.
- Resource
Group stringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Active
Directory AccountActive Directory Args - A
active_directory
block as defined below. - Identity
Account
Identity Args - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- map[string]string
- A mapping of tags to assign to the resource.
- resource
Group StringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- active
Directory AccountActive Directory - A
active_directory
block as defined below. - identity
Account
Identity - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Map<String,String>
- A mapping of tags to assign to the resource.
- resource
Group stringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- active
Directory AccountActive Directory - A
active_directory
block as defined below. - identity
Account
Identity - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- {[key: string]: string}
- A mapping of tags to assign to the resource.
- resource_
group_ strname - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- active_
directory AccountActive Directory Args - A
active_directory
block as defined below. - identity
Account
Identity Args - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location str
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name str
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Mapping[str, str]
- A mapping of tags to assign to the resource.
- resource
Group StringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- active
Directory Property Map - A
active_directory
block as defined below. - identity Property Map
- The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Map<String>
- A mapping of tags to assign to the resource.
Outputs
All input properties are implicitly available as output properties. Additionally, the Account resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Account Resource
Get an existing Account resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AccountState, opts?: CustomResourceOptions): Account
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
active_directory: Optional[AccountActiveDirectoryArgs] = None,
identity: Optional[AccountIdentityArgs] = None,
location: Optional[str] = None,
name: Optional[str] = None,
resource_group_name: Optional[str] = None,
tags: Optional[Mapping[str, str]] = None) -> Account
func GetAccount(ctx *Context, name string, id IDInput, state *AccountState, opts ...ResourceOption) (*Account, error)
public static Account Get(string name, Input<string> id, AccountState? state, CustomResourceOptions? opts = null)
public static Account get(String name, Output<String> id, AccountState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Active
Directory AccountActive Directory - A
active_directory
block as defined below. - Identity
Account
Identity - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Resource
Group stringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Dictionary<string, string>
- A mapping of tags to assign to the resource.
- Active
Directory AccountActive Directory Args - A
active_directory
block as defined below. - Identity
Account
Identity Args - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - Location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- Name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- Resource
Group stringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- map[string]string
- A mapping of tags to assign to the resource.
- active
Directory AccountActive Directory - A
active_directory
block as defined below. - identity
Account
Identity - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resource
Group StringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Map<String,String>
- A mapping of tags to assign to the resource.
- active
Directory AccountActive Directory - A
active_directory
block as defined below. - identity
Account
Identity - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location string
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name string
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resource
Group stringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- {[key: string]: string}
- A mapping of tags to assign to the resource.
- active_
directory AccountActive Directory Args - A
active_directory
block as defined below. - identity
Account
Identity Args - The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location str
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name str
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resource_
group_ strname - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Mapping[str, str]
- A mapping of tags to assign to the resource.
- active
Directory Property Map - A
active_directory
block as defined below. - identity Property Map
- The
identity
block where it is used when customer managed keys based encryption will be enabled as defined below. - location String
- Specifies the supported Azure location where the resource exists. Changing this forces a new resource to be created.
- name String
- The name of the NetApp Account. Changing this forces a new resource to be created.
- resource
Group StringName - The name of the resource group where the NetApp Account should be created. Changing this forces a new resource to be created.
- Map<String>
- A mapping of tags to assign to the resource.
Supporting Types
AccountActiveDirectory, AccountActiveDirectoryArgs
- Dns
Servers List<string> - A list of DNS server IP addresses for the Active Directory domain. Only allows
IPv4
address. - Domain string
- The name of the Active Directory domain.
- Password string
- The password associated with the
username
. - Smb
Server stringName - The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- Username string
- The Username of Active Directory Domain Administrator.
- Aes
Encryption boolEnabled - If enabled, AES encryption will be enabled for SMB communication. Defaults to
false
. - Kerberos
Ad stringName - Name of the active directory machine.
- Kerberos
Kdc stringIp kdc server IP addresses for the active directory machine.
IMPORTANT: If you plan on using Kerberos volumes, both
ad_name
andkdc_ip
are required in order to create the volume.- Ldap
Over boolTls Enabled - Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to
false
. - Ldap
Signing boolEnabled - Specifies whether or not the LDAP traffic needs to be signed. Defaults to
false
. - Local
Nfs boolUsers With Ldap Allowed - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to
false
. - Organizational
Unit string - The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to
CN=Computers
. - Server
Root stringCa Certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if
ldap_over_tls_enabled
is set totrue
. - Site
Name string - The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to
Default-First-Site-Name
.
- Dns
Servers []string - A list of DNS server IP addresses for the Active Directory domain. Only allows
IPv4
address. - Domain string
- The name of the Active Directory domain.
- Password string
- The password associated with the
username
. - Smb
Server stringName - The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- Username string
- The Username of Active Directory Domain Administrator.
- Aes
Encryption boolEnabled - If enabled, AES encryption will be enabled for SMB communication. Defaults to
false
. - Kerberos
Ad stringName - Name of the active directory machine.
- Kerberos
Kdc stringIp kdc server IP addresses for the active directory machine.
IMPORTANT: If you plan on using Kerberos volumes, both
ad_name
andkdc_ip
are required in order to create the volume.- Ldap
Over boolTls Enabled - Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to
false
. - Ldap
Signing boolEnabled - Specifies whether or not the LDAP traffic needs to be signed. Defaults to
false
. - Local
Nfs boolUsers With Ldap Allowed - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to
false
. - Organizational
Unit string - The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to
CN=Computers
. - Server
Root stringCa Certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if
ldap_over_tls_enabled
is set totrue
. - Site
Name string - The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to
Default-First-Site-Name
.
- dns
Servers List<String> - A list of DNS server IP addresses for the Active Directory domain. Only allows
IPv4
address. - domain String
- The name of the Active Directory domain.
- password String
- The password associated with the
username
. - smb
Server StringName - The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username String
- The Username of Active Directory Domain Administrator.
- aes
Encryption BooleanEnabled - If enabled, AES encryption will be enabled for SMB communication. Defaults to
false
. - kerberos
Ad StringName - Name of the active directory machine.
- kerberos
Kdc StringIp kdc server IP addresses for the active directory machine.
IMPORTANT: If you plan on using Kerberos volumes, both
ad_name
andkdc_ip
are required in order to create the volume.- ldap
Over BooleanTls Enabled - Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to
false
. - ldap
Signing BooleanEnabled - Specifies whether or not the LDAP traffic needs to be signed. Defaults to
false
. - local
Nfs BooleanUsers With Ldap Allowed - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to
false
. - organizational
Unit String - The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to
CN=Computers
. - server
Root StringCa Certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if
ldap_over_tls_enabled
is set totrue
. - site
Name String - The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to
Default-First-Site-Name
.
- dns
Servers string[] - A list of DNS server IP addresses for the Active Directory domain. Only allows
IPv4
address. - domain string
- The name of the Active Directory domain.
- password string
- The password associated with the
username
. - smb
Server stringName - The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username string
- The Username of Active Directory Domain Administrator.
- aes
Encryption booleanEnabled - If enabled, AES encryption will be enabled for SMB communication. Defaults to
false
. - kerberos
Ad stringName - Name of the active directory machine.
- kerberos
Kdc stringIp kdc server IP addresses for the active directory machine.
IMPORTANT: If you plan on using Kerberos volumes, both
ad_name
andkdc_ip
are required in order to create the volume.- ldap
Over booleanTls Enabled - Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to
false
. - ldap
Signing booleanEnabled - Specifies whether or not the LDAP traffic needs to be signed. Defaults to
false
. - local
Nfs booleanUsers With Ldap Allowed - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to
false
. - organizational
Unit string - The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to
CN=Computers
. - server
Root stringCa Certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if
ldap_over_tls_enabled
is set totrue
. - site
Name string - The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to
Default-First-Site-Name
.
- dns_
servers Sequence[str] - A list of DNS server IP addresses for the Active Directory domain. Only allows
IPv4
address. - domain str
- The name of the Active Directory domain.
- password str
- The password associated with the
username
. - smb_
server_ strname - The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username str
- The Username of Active Directory Domain Administrator.
- aes_
encryption_ boolenabled - If enabled, AES encryption will be enabled for SMB communication. Defaults to
false
. - kerberos_
ad_ strname - Name of the active directory machine.
- kerberos_
kdc_ strip kdc server IP addresses for the active directory machine.
IMPORTANT: If you plan on using Kerberos volumes, both
ad_name
andkdc_ip
are required in order to create the volume.- ldap_
over_ booltls_ enabled - Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to
false
. - ldap_
signing_ boolenabled - Specifies whether or not the LDAP traffic needs to be signed. Defaults to
false
. - local_
nfs_ boolusers_ with_ ldap_ allowed - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to
false
. - organizational_
unit str - The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to
CN=Computers
. - server_
root_ strca_ certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if
ldap_over_tls_enabled
is set totrue
. - site_
name str - The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to
Default-First-Site-Name
.
- dns
Servers List<String> - A list of DNS server IP addresses for the Active Directory domain. Only allows
IPv4
address. - domain String
- The name of the Active Directory domain.
- password String
- The password associated with the
username
. - smb
Server StringName - The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes.
- username String
- The Username of Active Directory Domain Administrator.
- aes
Encryption BooleanEnabled - If enabled, AES encryption will be enabled for SMB communication. Defaults to
false
. - kerberos
Ad StringName - Name of the active directory machine.
- kerberos
Kdc StringIp kdc server IP addresses for the active directory machine.
IMPORTANT: If you plan on using Kerberos volumes, both
ad_name
andkdc_ip
are required in order to create the volume.- ldap
Over BooleanTls Enabled - Specifies whether or not the LDAP traffic needs to be secured via TLS. Defaults to
false
. - ldap
Signing BooleanEnabled - Specifies whether or not the LDAP traffic needs to be signed. Defaults to
false
. - local
Nfs BooleanUsers With Ldap Allowed - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes. Defaults to
false
. - organizational
Unit String - The Organizational Unit (OU) within Active Directory where machines will be created. If blank, defaults to
CN=Computers
. - server
Root StringCa Certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have a base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes. Required if
ldap_over_tls_enabled
is set totrue
. - site
Name String - The Active Directory site the service will limit Domain Controller discovery to. If blank, defaults to
Default-First-Site-Name
.
AccountIdentity, AccountIdentityArgs
- Type string
- The identity type, which can be
SystemAssigned
orUserAssigned
. Only one type at a time is supported by Azure NetApp Files. - Identity
Ids List<string> - The identity id of the user assigned identity to use when type is
UserAssigned
- Principal
Id string - Tenant
Id string
- Type string
- The identity type, which can be
SystemAssigned
orUserAssigned
. Only one type at a time is supported by Azure NetApp Files. - Identity
Ids []string - The identity id of the user assigned identity to use when type is
UserAssigned
- Principal
Id string - Tenant
Id string
- type String
- The identity type, which can be
SystemAssigned
orUserAssigned
. Only one type at a time is supported by Azure NetApp Files. - identity
Ids List<String> - The identity id of the user assigned identity to use when type is
UserAssigned
- principal
Id String - tenant
Id String
- type string
- The identity type, which can be
SystemAssigned
orUserAssigned
. Only one type at a time is supported by Azure NetApp Files. - identity
Ids string[] - The identity id of the user assigned identity to use when type is
UserAssigned
- principal
Id string - tenant
Id string
- type str
- The identity type, which can be
SystemAssigned
orUserAssigned
. Only one type at a time is supported by Azure NetApp Files. - identity_
ids Sequence[str] - The identity id of the user assigned identity to use when type is
UserAssigned
- principal_
id str - tenant_
id str
- type String
- The identity type, which can be
SystemAssigned
orUserAssigned
. Only one type at a time is supported by Azure NetApp Files. - identity
Ids List<String> - The identity id of the user assigned identity to use when type is
UserAssigned
- principal
Id String - tenant
Id String
Import
NetApp Accounts can be imported using the resource id
, e.g.
$ pulumi import azure:netapp/account:Account example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.NetApp/netAppAccounts/account1
~> IMPORTANT: When importing a NetApp account, the active_directory.password
and active_directory.server_root_ca_certificate
values cannot be retrieved from the Azure API and will need to be redeclared within the resource.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Classic pulumi/pulumi-azure
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
azurerm
Terraform Provider.