Nutanix Examples: Protection Policy with VM Migration & Active Directory Authentication
Those looking to explore Nutanix on Equinix Metal are likely to have two concerns in mind: ease of migration and security. Thankfully, two examples have recently been added to the Equinix Terraform directory that demonstrate exactly how a user can accomplish these two things. Nutanix Clusters Setup and Protection Policy - walks a user through creating two Nutanix Clusters on Equinix Metal rapidly, create a protection policy between them, and then practice creating a VM in one cluster and migrating it to the other cluster. Nutanix on Equinix Metal with Active Directory Authentication - helps a user create a cluster on Equinix, add an AD server VM, configure AD authentication, and map a few sample roles to the AD. Both examples use a combination of Terraform and manual Prism console steps, promoting understanding while deploying with speed and convenience. Consider walking through these examples if you're interested in exploring Nutanix on Equinix Metal or learning more about making your infrastructure more reliable and secure.34Views2likes0CommentsTerraform Provider Demo | Inside Equinix Developer Tech
In this video, we explore Terraform as the industry standard for provisioning on Equinix Metal. We’ll discuss the advantages of a declarative approach using HashiCorp Configuration Language (HCL), which enables reproducible and repeatable server environments. Join us for a demonstration of setting up Equinix Metal, including authentication and creating projects and devices with user data for automated configurations. Thank you for watching, and don’t miss the other videos in this series!29Views0likes0CommentsWhat is Infrastructure as Code?
Discover how Infrastructure as Code (IaC) can transform your workflow by enabling automation for provisioning and managing infrastructure. Explore popular IaC tools like Terraform and Pulumi, and learn how Equinix's IaC providers can enhance your services. Understand the benefits of IaC in reducing human error, speeding up deployments, and maintaining consistency across different environments. Subscribe for more insights and visit deploy.equinix.com/labs for detailed information.46Views0likes0CommentsTerraform CDK | Inside Equinix Developer Tech
In this video, David Flanagan a.k.a. Rawkode, does a deepdive on the Equinix Terraform CDK. David will discuss the advantages of using Terraform CDK for your Equinix provisioning, emphasizing the benefits of a declarative approach to code. This method allows for reusable snippets across teams, reducing redundant work. We'll demonstrate how to create a function to find the cheapest server configuration and show how this refactored code can be published and shared via various platforms like NPM and PyPy. Thank you for joining this walkthrough on provisioning Equinix Metal devices with Terraform CDK. Be sure to check out the other demo videos in this series. See you next time!99Views0likes0CommentsNutanix Terraform Cluster Provisioning
Come join Equinix's Chris Privitere! Nutanix Terraform Cluster Provisioning simplifies the process of setting up cloud environments. By using a few lines of code, you can efficiently configure and deploy clusters. This method ensures a streamlined and consistent setup, reducing manual errors. It's a reliable solution for managing complex IT infrastructures. LINKS Nutanix Workshop Create an Account Deploy Labs149Views0likes0CommentsTerraform-Provider-Equinix v1.16.0 Release
Equinix Terraform Provider v1.16.0not only has the ability to createFabric Cloud Routerresources directly, but also layer 2 connections to AWS, GCP, and specific fabric ports in Equinix. Connections to Azure and Oracle via Terraform are coming soon! FCR is a great option for those who want to quickly route between clouds using BGP or static networks without worrying about specific OS, vendor requirements, or advanced configuration. For those who use Network Edge, this Terraform release allows you to disable the default internet connectivity before provisioning specific firewalls (Palo Alto Networks NGFW, CiscoFTDv, and AviatrixFireNet)just like you can in the console.1.2KViews1like0CommentsAnsible-Collection-Equinix v0.1.0 Release
This is the firstrelease of the Equinix Ansible Collection. This collection will mature to succeed the Ansible Equinix Metal collection. The big difference with this collection is that the goal of the project is to cover all Equinix APIs over time, starting with Metal, Fabric, and Network Edge. If you are just getting started with Ansible on Equinix, this is the project to use. Let us know which features you’ll need for your playbooks.We’ve stubbed out issues for all of the resources that will be needed to put this provider on parity with the Equinix Terraform provider which has thethe most complete IaC coverage today. Broader API coverage is being facilitated by the move away from legacy, hand-crafted, Python SDKs (packet-python). We will favor (and produce) SDKs generated from the OpenAPI spec for each Equinix API that will be supported. Metal Python is the first of these, an SDK built for wide adoption. Its readiness to simplify the API developer experience in Pythonis demonstrated throughout the Equinix Ansible collection. Additionally, this collection is applying some of the best practices seen in other Cloud Provider Ansible modules. This is most visible in the name of the module and how it is imported. See the project's E2E tests for working examples of how this collection can be used.1.9KViews0likes0CommentsEquinix Provider for Terraform v1.14.3 Release
The 1.14.3 release of the Equinix Terraform provider includes bug fixes and documentation improvements to provide a more consistent experience. The spot market request resource and data source have been updated to avoid unnecessary changes when the order of `facilities` changes for a spot market request, the virtual circuit resource has been updated to reduce the occurrence of API errors due to invalid requests, and the documentation for the `equinix_metal_device` resource has been updated to more accurately describe the `user_ssh_key_ids` and `project_ssh_key_ids` fields.1.6KViews0likes0Comments