Amazon Elastic File System Construct Library
Amazon Elastic File System (Amazon EFS) provides a simple, scalable, fully managed elastic NFS file system for use with AWS Cloud services and on-premises resources. Amazon EFS provides file storage in the AWS Cloud. With Amazon EFS, you can create a file system, mount the file system on an Amazon EC2 instance, and then read and write data to and from your file system.
This module is part of the AWS Cloud Development Kit project.
File Systems
Amazon EFS provides elastic, shared file storage that is POSIX-compliant. The file system you create supports concurrent read and write access from multiple Amazon EC2 instances and is accessible from all of the Availability Zones in the AWS Region where it is created. Learn more about EFS file systems
Create an Amazon EFS file system
A Virtual Private Cloud (VPC) is required to create an Amazon EFS file system.
The following example creates a file system that is encrypted at rest, running in General Purpose
performance mode, and Bursting
throughput mode and does not transition files to the Infrequent
Access (IA) storage class.
file_system = efs.FileSystem(self, "MyEfsFileSystem",
vpc=ec2.Vpc(self, "VPC"),
lifecycle_policy=efs.LifecyclePolicy.AFTER_14_DAYS, # files are not transitioned to infrequent access (IA) storage by default
performance_mode=efs.PerformanceMode.GENERAL_PURPOSE, # default
out_of_infrequent_access_policy=efs.OutOfInfrequentAccessPolicy.AFTER_1_ACCESS, # files are not transitioned back from (infrequent access) IA to primary storage by default
transition_to_archive_policy=efs.LifecyclePolicy.AFTER_14_DAYS, # files are not transitioned to Archive by default
replication_overwrite_protection=efs.ReplicationOverwriteProtection.ENABLED
)
⚠️ An Amazon EFS file system’s performance mode can’t be MAX_IO when its throughputMode is ELASTIC.
⚠️ An Amazon EFS file system’s performance mode can’t be changed after the file system has been created. Updating this property will replace the file system.
Any file system that has been created outside the stack can be imported into your CDK app.
Use the fromFileSystemAttributes()
API to import an existing file system.
Here is an example of giving a role write permissions on a file system.
import aws_cdk.aws_iam as iam
imported_file_system = efs.FileSystem.from_file_system_attributes(self, "existingFS",
file_system_id="fs-12345678", # You can also use fileSystemArn instead of fileSystemId.
security_group=ec2.SecurityGroup.from_security_group_id(self, "SG", "sg-123456789",
allow_all_outbound=False
)
)
One Zone file system
To initialize a One Zone file system use the oneZone
property:
# vpc: ec2.Vpc
efs.FileSystem(self, "OneZoneFileSystem",
vpc=vpc,
one_zone=True
)
⚠️ One Zone file systems are not compatible with the MAX_IO performance mode.
⚠️ When oneZone
is enabled, the file system is automatically placed in the first availability zone of the VPC.
To specify a different availability zone:
# vpc: ec2.Vpc
efs.FileSystem(self, "OneZoneFileSystem",
vpc=vpc,
one_zone=True,
vpc_subnets=ec2.SubnetSelection(
availability_zones=["us-east-1b"]
)
)
⚠️ When oneZone
is enabled, mount targets will be created only in the specified availability zone.
This is to prevent deployment failures due to cross-AZ configurations.
⚠️ When oneZone
is enabled, vpcSubnets
can be specified with
availabilityZones
that contains exactly one single zone.
Replicating file systems
You can create a replica of your EFS file system in the AWS Region of your preference.
# vpc: ec2.Vpc
# auto generate a regional replication destination file system
efs.FileSystem(self, "RegionalReplicationFileSystem",
vpc=vpc,
replication_configuration=efs.ReplicationConfiguration.regional_file_system("us-west-2")
)
# auto generate a one zone replication destination file system
efs.FileSystem(self, "OneZoneReplicationFileSystem",
vpc=vpc,
replication_configuration=efs.ReplicationConfiguration.one_zone_file_system("us-east-1", "us-east-1a")
)
destination_file_system = efs.FileSystem(self, "DestinationFileSystem",
vpc=vpc,
# set as the read-only file system for use as a replication destination
replication_overwrite_protection=efs.ReplicationOverwriteProtection.DISABLED
)
# specify the replication destination file system
efs.FileSystem(self, "ReplicationFileSystem",
vpc=vpc,
replication_configuration=efs.ReplicationConfiguration.existing_file_system(destination_file_system)
)
Note: EFS now supports only one replication destination and thus allows specifying just one replicationConfiguration
for each file system.
Visit Replicating file systems for more details.
IAM to control file system data access
You can use both IAM identity policies and resource policies to control client access to Amazon EFS resources in a way that is scalable and optimized for cloud environments. Using IAM, you can permit clients to perform specific actions on a file system, including read-only, write, and root access.
import aws_cdk.aws_iam as iam
my_file_system_policy = iam.PolicyDocument(
statements=[iam.PolicyStatement(
actions=["elasticfilesystem:ClientWrite", "elasticfilesystem:ClientMount"
],
principals=[iam.AccountRootPrincipal()],
resources=["*"],
conditions={
"Bool": {
"elasticfilesystem:AccessedViaMountTarget": "true"
}
}
)]
)
file_system = efs.FileSystem(self, "MyEfsFileSystem",
vpc=ec2.Vpc(self, "VPC"),
file_system_policy=my_file_system_policy
)
Alternatively, a resource policy can be added later using addToResourcePolicy(statement)
. Note that this will not work with imported FileSystem.
import aws_cdk.aws_iam as iam
# statement: iam.PolicyStatement
file_system = efs.FileSystem(self, "MyEfsFileSystem",
vpc=ec2.Vpc(self, "VPC")
)
file_system.add_to_resource_policy(statement)
Permissions
If you need to grant file system permissions to another resource, you can use the .grant()
API.
As an example, the following code gives elasticfilesystem:Backup
permissions to an IAM role.
role = iam.Role(self, "Role",
assumed_by=iam.AnyPrincipal()
)
file_system.grant(role, "elasticfilesystem:Backup")
APIs for clients also include .grantRead()
, .grantReadWrite()
, and .grantRootAccess()
. Using these APIs grants access to clients.
Also, by default, the file system policy is updated to only allow access to clients using IAM authentication and deny access to anonymous clients.
role = iam.Role(self, "ClientRole",
assumed_by=iam.AnyPrincipal()
)
file_system.grant_read(role)
You can control this behavior with allowAnonymousAccess
. The following example continues to allow anonymous client access.
import aws_cdk.aws_iam as iam
role = iam.Role(self, "ClientRole",
assumed_by=iam.AnyPrincipal()
)
file_system = efs.FileSystem(self, "MyEfsFileSystem",
vpc=ec2.Vpc(self, "VPC"),
allow_anonymous_access=True
)
file_system.grant_read(role)
Access Point
An access point is an application-specific view into an EFS file system that applies an operating system user and group, and a file system path, to any file system request made through the access point. The operating system user and group override any identity information provided by the NFS client. The file system path is exposed as the access point’s root directory. Applications using the access point can only access data in its own directory and below. To learn more, see Mounting a File System Using EFS Access Points.
Use the addAccessPoint
API to create an access point from a fileSystem.
file_system.add_access_point("MyAccessPoint",
# create a unique access point via an optional client token
client_token="client-token"
)
By default, when you create an access point, the root(/
) directory is exposed to the client
connecting to the access point. You can specify a custom path with the path
property.
If path
does not exist, it will be created with the settings defined in the creationInfo
.
See Creating Access Points for more details.
Any access point that has been created outside the stack can be imported into your CDK app.
Use the fromAccessPointAttributes()
API to import an existing access point.
efs.AccessPoint.from_access_point_attributes(self, "ap",
access_point_id="fsap-1293c4d9832fo0912",
file_system=efs.FileSystem.from_file_system_attributes(self, "efs",
file_system_id="fs-099d3e2f",
security_group=ec2.SecurityGroup.from_security_group_id(self, "sg", "sg-51530134")
)
)
⚠️ Notice: When importing an Access Point using fromAccessPointAttributes()
, you must make sure
the mount targets are deployed and their lifecycle state is available
. Otherwise, you may encounter
the following error when deploying:
EFS file system
referenced by access point has mount targets created in all availability zones the function will execute in, but not all are in the available life cycle state yet. Please wait for them to become available and try the request again.
Connecting
To control who can access the EFS, use the .connections
attribute. EFS has
a fixed default port, so you don’t need to specify the port:
file_system.connections.allow_default_port_from(instance)
Learn more about managing file system network accessibility
Mounting the file system using User Data
After you create a file system, you can create mount targets. Then you can mount the file system on EC2 instances, containers, and Lambda functions in your virtual private cloud (VPC).
The following example automatically mounts a file system during instance launch.
file_system.connections.allow_default_port_from(instance)
instance.user_data.add_commands("yum check-update -y", "yum upgrade -y", "yum install -y amazon-efs-utils", "yum install -y nfs-utils", "file_system_id_1=" + file_system.file_system_id, "efs_mount_point_1=/mnt/efs/fs1", "mkdir -p \"${efs_mount_point_1}\"", "test -f \"/sbin/mount.efs\" && echo \"${file_system_id_1}:/ ${efs_mount_point_1} efs defaults,_netdev\" >> /etc/fstab || " + "echo \"${file_system_id_1}.efs." + Stack.of(self).region + ".amazonaws.com:/ ${efs_mount_point_1} nfs4 nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2,noresvport,_netdev 0 0\" >> /etc/fstab", "mount -a -t efs,nfs4 defaults")
Learn more about mounting EFS file systems
Deleting
Since file systems are stateful resources, by default the file system will not be deleted when your stack is deleted.
You can configure the file system to be destroyed on stack deletion by setting a removalPolicy
file_system = efs.FileSystem(self, "EfsFileSystem",
vpc=ec2.Vpc(self, "VPC"),
removal_policy=RemovalPolicy.DESTROY
)