NetBackup™ Terraform AWS Guide
NetBackup™ Terraform AWS Guide
Technology Deployment
Guide Using Terraform for
AWS
Release 10.5
Veritas Cloud Scale Technology deployment guide
using Terraform for AWS
Last updated: 2024-10-22
Legal Notice
Copyright © 2024 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, Veritas Alta, and NetBackup are trademarks or registered trademarks
of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may
be trademarks of their respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
https://www.veritas.com/about/legal/license-agreements
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:
https://www.veritas.com/support
You can manage your Veritas account information at the following URL:
https://my.veritas.com
If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:
Japan [email protected]
Documentation
Make sure that you have the current version of the documentation. Each document displays
the date of the last update on page 2. The latest documentation is available on the Veritas
website:
https://sort.veritas.com/documents
Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:
You can also see documentation information or ask a question on the Veritas community site:
http://www.veritas.com/community/
https://sort.veritas.com/data/support/SORT_Data_Sheet.pdf
Contents
■ About Terraform
Required terminology
The table describes the important terms used in this guide for deploying Veritas
Cloud Scale Technology on AWS.
Term Description
EFS CSI Amazon EFS Container Storage Interface (CSI) driver provides a CSI interface
that allows Kubernetes clusters running on AWS to manage the lifecycle of
Amazon EFS file systems.
VPC Amazon Virtual Private Cloud (VPC) lets you create and manage virtual
networks for AWS resources.
About Terraform
Terraform is an open source "Infrastructure as Code" tool created by HashiCorp.
It manages resources (such as cloud infrastructure, network appliances, Software
as a Service, and Platform as a Service) with the providers.
Using Terraform, you can create and manage resources on cloud platforms and
other services through their application programming interfaces (APIs). Service
providers enable Terraform to work virtually with any platform or service with an
accessible API. Some key points explaining the advantages of Terraform:
■ Manage any infrastructure: Terraform uses immutable approach to
infrastructure which reduces the complexity of upgrading or modifying your
services and infrastructure.
■ Tracks infrastructure status: A state file keeps track of your environment and
suggests changes to your infrastructure to match the configuration.
■ Standardize configurations: Terraform supports reusable configuration
components that are called modules that define configurable collections of
infrastructure.
Terraform supports several cloud infrastructure providers such as Amazon Web
Services (AWS), Cloudflare, Microsoft Azure, IBM Cloud, Google Cloud Platform,
and Oracle Cloud Infrastructure.
The table describes you about the high-level steps involved in the deployment.
10 Introduction
About Terraform
Table 1-2 Getting started using Terraform scripts for deploying Veritas
Cloud Scale Technology on AWS
Steps
1. Ensure that the prerequisites for creating the Terraform Management Server are met.
5b. Installation instruction for deploying the Veritas Cloud Scale Technology.
Table 2-1 Getting started using Terraform scripts for deploying Veritas
Cloud Scale Technology on AWS
Steps Description
1. Ensure the prerequisites for Ensure that the Terraform Management Server
creating Terraform Management prerequisites and networking requirements are met.
Server are met.
Refer to the section See “Terraform Management Server
requirements ” on page 21.
3. Authentication with AWS. User / role which you will be using for deployment should
have minimum permissions. Refer to the section
Table 2-1 Getting started using Terraform scripts for deploying Veritas
Cloud Scale Technology on AWS (continued)
Steps Description
4. Execute the PreFlight checker This checklist is executed to verify the environment
script. readiness before deploying the Veritas Cloud Scale
Technology. Refer to the section See “About PreFlight
checker(checklist) script” on page 27.
5a. Learn about the stages See “Stages of deploying Terraform scripts on AWS”
involved in the Terraform on page 28.
deployment.
See “Installation instructions for deploying the Veritas
5b. Installation instructions for Cloud Scale Technology on AWS” on page 40.
deploying the Veritas Cloud Scale
Technology.
6. Access Veritas Cloud Scale See “Accessing the Veritas Cloud Scale Technology
Technology UI after deployment. environment after deployment” on page 45.
Chapter 3
Prerequisities for setting
up AWS environment
This chapter includes the following topics:
■ Networking requirement
Networking requirement
Figure 3-1 Network configuration for managing Terraform Management
Server in AWS
■ Create DNS entries in the Route53 Hosted Zone: (Primary (1), MSDP (1),
Snapshot Manager (1) before executing the Terraform scripts.
Prerequisities for setting up AWS environment 15
AWS authentication and permission requirements
■ Define a forward lookup, private DNS zone to be used by EKS as part of the
load balancing subnet.
■ Populate the forward DNS zone with the appropriate records.
■ Define a 2nd reverse lookup, private DNS zone to be used by EKS as part
of the load balancing subnet.
■ Populate the reverse DNS zone with the appropriate records.
■ Sufficient quota for inbound and outbound rules for a security group are required.
By default, the quota for inbound and outbound rules for a security group is 60,
increase it to 100. For more details refer Amazon VPC quotas.
■ Outbound internet access is required from Terraform Management Server to
communicate with resources, services, and the servers.
■ While configuring the components or resources, avoid using prefixes like -
netbackup, primary or media. The installation may fail if these keywords are
used in the configuration.
Note: If the EKS VPC endpoint is enabled for the VPC and the Terraform
Management Server are in the same VPC, the deployment may fail, as the EKS
OIDC service endpoint can't be accessed from inside that VPC. Consequently,
operations such as creating an OIDC provider in the VPC will not work and results
in a timeout when attempting to request https://oidc.eks.region.amazonaws.com.
This is the limitation from AWS cloud provider. For more details, refer to the EKS
VPC endpoint. link
AmazonEKSClusterPolicy
AmazonEKSWorkerNodePolicy
AmazonEC2ContainerRegistryFullAccess
16 Prerequisities for setting up AWS environment
AWS authentication and permission requirements
AmazonEKSServicePolicy
AmazonEKS_CNI_Policy
AmazonEKSVPCResourceController
elasticfilesystem:DescribeAccountPreferences
elasticfilesystem:DescribeBackupPolicy
elasticfilesystem:DeleteAccessPoint
elasticfilesystem:DescribeReplicationConfigurations
elasticfilesystem:UntagResource
elasticfilesystem:CreateFileSystem
elasticfilesystem:ListTagsForResource
elasticfilesystem:DeleteTags
elasticfilesystem:DescribeLifecycleConfiguration
elasticfilesystem:ClientMount
elasticfilesystem:DescribeFileSystemPolicy
elasticfilesystem:DescribeFileSystems
elasticfilesystem:DeleteMountTarget
elasticfilesystem:CreateAccessPoint
elasticfilesystem:ModifyMountTargetSecurityGroups
elasticfilesystem:DescribeMountTargets
elasticfilesystem:DescribeAccessPoints
elasticfilesystem:CreateAccessPoints
elasticfilesystem:TagResource
elasticfilesystem:CreateTags
elasticfilesystem:DescribeTags
elasticfilesystem:CreateMountTarget
elasticfilesystem:Backup
elasticfilesystem:DeleteFileSystem
elasticfilesystem:DescribeMountTargetSecurityGroups
elasticfilesystem:UpdateFileSystem
eks:UpdateClusterVersion
eks:ListTagsForResource
eks:UpdateAddon
eks:ListAddons
eks:UpdateClusterConfig
eks:DescribeAddon
eks:UpdateNodegroupVersion
eks:UpdateNodegroup
eks:AssociateEncryptionConfig
eks:ListUpdates
Prerequisities for setting up AWS environment 17
AWS authentication and permission requirements
eks:UpdateClusterConfig
eks:DescribeAddon
eks:UpdateNodegroupVersion
eks:DescribeNodegroup
eks:AssociateEncryptionConfig
eks:DescribeAddonConfiguration
eks:UntagResource
eks:CreateNodegroup
eks:RegisterCluster
eks:DeregisterCluster
eks:DeleteCluster
eks:DescribeIdentityProviderConfig
eks:DeleteAddon
eks:DeleteNodegroup
eks:DescribeUpdate
eks:TagResource
eks:AccessKubernetesApi
eks:CreateAddon
eks:UpdateNodegroupConfig
eks:DescribeCluster
eks:ListClusters
eks:AssociateIdentityProviderConfig
iam:CreateInstanceProfile
iam:CreateServiceLinkedRole
iam:GetPolicyVersion
iam:UntagRole
iam:PutRolePermissionsBoundary
iam:TagRole
iam:UpdateOpenIDConnectProviderThumbprint
iam:RemoveRoleFromInstanceProfile
iam:DeletePolicy
iam:CreateRole
iam:AttachRolePolicy
iam:ListInstanceProfileTags
iam:PutRolePolicy
iam:DeleteRolePermissionsBoundary
iam:AddRoleToInstanceProfile
iam:ListInstanceProfilesForRole
iam:PassRole
iam:DetachRolePolicy
iam:DeleteRolePolicy
iam:ListOpenIDConnectProviderTags
iam:PutRolePolicy
18 Prerequisities for setting up AWS environment
AWS authentication and permission requirements
iam:DeleteRolePermissionsBoundary
iam:AddRoleToInstanceProfile
iam:ListInstanceProfilesForRole
iam:PassRole
iam:DetachRolePolicy
iam:DeleteRolePolicy
iam:ListOpenIDConnectProviderTags
iam:ListPolicyTags
iam:ListRolePolicies
iam:CreatePolicyVersion
iam:DeleteOpenIDConnectProvider
iam:ListPolicies
iam:DeleteRole
iam:UpdateRoleDescription
iam:ListInstanceProfiles
iam:TagPolicy
iam:CreateOpenIDConnectProvider
iam:CreatePolicy
iam:ListPolicyVersions
iam:ListOpenIDConnectProviders
iam:GetAccountName
iam:UntagPolicy
iam:UpdateRole
iam:UntagOpenIDConnectProvider
iam:GetOpenIDConnectProvider
iam:UntagInstanceProfile
iam:TagOpenIDConnectProvider
iam:GetRolePolicy
iam:DeletePolicyVersion
iam:TagInstanceProfile
iam:ListEntitiesForPolicy
ec2:DescribeVpcs
ec2:DescribeSubnets
ec2:DescribeVpcAttribute
ec2:CreateVpcEndpoint
ec2:DescribePrefixLists
ec2:DeleteVpcEndpoints
ec2:CreateVpcEndpoint
ec2:DescribePrefixLists
ec2:DeleteLaunchTemplate
ec2:CreateLaunchTemplate
ec2:GetLaunchTemplateData
ec2:DescribeLaunchTemplates
Prerequisities for setting up AWS environment 19
AWS authentication and permission requirements
ec2:DescribeLaunchTemplateVersions
ec2:ModifyLaunchTemplate
ec2:DeleteLaunchTemplateVersions
ec2:CreateLaunchTemplateVersion
20 Prerequisities for setting up AWS environment
AWS authentication and permission requirements
Chapter 4
Prerequisites for Terraform
This chapter includes the following topics:
2. Once the virtual machine is created, log in into the system using SSH client.
ssh -i example.pem [email protected]
3. Ensure you have min 30 GB free space in /var folder. Use the below command
to verify:
~$ df -h
d. Install the Docker files using the next two commands one by one.
apt update
c. Download the latest version of the Terraform. Substitute the new version
number if needed:
wget
https://releases.hashicorp.com/terraform/<latest_version>/terraform_<latest_version>_linux_amd64.zip
7 Copy over the Veritas binary file bundle and Terraform script bundle. This is a
large file which may take sometime.
8 Unzip the file downloaded on the location:
■ Ubuntu: /home/ubuntu
■ RHEL: /home/ec2-user
■ 2. To install the Terraform on RHEL, use the command: sudo dnf install -y
dnf-plugins-core
2. Addons stage
■ Creates IAM roles with required permissions needed for the addons.
■ Installs EBS driver, EFS driver and load balancer controller.
■ Installs Cert Manager
■ Installs Cluster Autoscaler
■ Creates EFS file systems.
■ Installs trust-manager
3. Deployment stage
■ Loads the Cloud Scale container images to local repository.
■ Tags and push the container images and Helm chart to ECR.
■ Deploys Veritas Cloud Scale Technology using Helm chart.
The actual installation of Veritas Cloud Scale Technology are provided in the section
See “Installation instructions for deploying the Veritas Cloud Scale Technology on
AWS” on page 40..
Note: Refer to the sample.tfvars file present in the base directory which has a
format for passing the input parameters.
Parameters Description
eks_security_group_ids List of security group ids to associate with the cloud scale
cluster. This security group enables EKS cluster to access
other resources.
Parameters Description
use_existing_iam Option to use existing IAM role or provision new IAM role.
This value is the IAM role Name of an existing IAM role that
allows the Kubernetes control plane to manage AWS
resources. The property cannot be changed after the cluster
is created.
node_group_scaling_primary_pool Scaling configuration block for the primary pool nodes. See
the default value for example.
desired_size: Desired number of worker nodes.
{"desired_size": 1,
"max_size": 2,
"min_size": 1}
Deploying Veritas Cloud Scale Technology using Terraform script 31
Stages of deploying Terraform scripts on AWS
Parameters Description
node_group_scaling_media_pool Scaling configuration block for the media pool nodes. See
the default value for example.
{"desired_size": 1,
"max_size": 1,
"min_size": 1}
node_group_scaling_storage_pool Scaling configuration block for the storage pool nodes. See
the default value for example.
{"desired_size": 1,
"max_size": 1,
"min_size": 1}
node_group_scaling_data_plane_pool Scaling configuration block for the data plane pool nodes.
See the default value for example.
{"desired_size": 1,
"max_size": 1,
"min_size": 1}
node_disk_size_primary_pool Disk size in GiB for worker nodes in the primary pool. The
default disk size is 200.
32 Deploying Veritas Cloud Scale Technology using Terraform script
Stages of deploying Terraform scripts on AWS
Parameters Description
node_disk_size_media_pool Disk size in GiB for worker nodes in the media pool. The
default disk size is 100.
node_instance_types_media_pool List of instance types associated with the nodes in the media
pool. Set the default value as t3.xlarge.
node_disk_size_storage_pool Disk size in GiB for worker nodes in the storage pool. The
default disk size is 100.
node_disk_size_data_plane_pool Disk size in GiB for worker nodes in the data plane pool. The
default disk size is 100.
node_instance_types_data_plane_pool List of instance types associated with the nodes in the data
plane pool. Set the default value as t3.xlarge.
efs_throughput_mode A throughput mode for the file system. The values that are
allowed are - 'bursting' and 'provisioned'.
arn_of_cmk_for_efs ARN of CMK for encrypting the EFS. This is an optional field.
If not provided EFS will be encrypted with AWS managed
key.
Optional Postgres db parameters. These parameters are required to be set only if the
'db_create' is set to 'true'.
Parameters Description
db_instance_class db.t3.medium
db_maintenance_window Mon:00:00-Mon:03:00
Parameters Description
KMS
Protection of RDS resources
Recovery of RDS resources
Backup of EC2 resources
Recovery of EC2 resources
Backup from snapshot
Restore from backup copy
Identity management and authorization
Provider managed consistent snapshots
Permissions on workload VM
EKS
High availability
Deployment
Note: Refer the sample.tfvars file present in the deployment directory which has
a format for passing the input parameters.
Parameters Description
EKS_NODES_ZONE_01_SUBNET_ID and
LOAD_BALANCER_SUBNET must be in the same
availability zone.
Parameters Description
Parameters Description
The storage_server_kms_key_secret_name
must be of 1-32 characters long, must contain only
lowercase alphanumeric characters, hyphens or
underscores.
Parameters Description
primary_server_log_size_in_gi Provide the size for primary server log volume. It must
be at least 30 Gi.
primary_server_data_size_in_gi Provide the size for primary server data volume. It must
be at least 30 Gi.
media_server_log_size_in_gi Provide the size for media server log volume. It must
be at least 30 Gi.
media_server_data_size_in_gi Provide the size for media server data volume. It must
be at least 50 Gi.
storage_server_log_size_in_gi Provide the size for storage server log volume. It must
be at least 5 Gi.
storage_server_data_size_in_gi Provide the size for storage server data volume. It must
be at least 5 Gi.
Parameters Description
Optional fields
email_server_configmap_name Name of the config map that contains all the required
information to configured email server..
For example:
email_server_configmap_details="smtp=smtpserverName:port\\,ssl-verify=ignore\\,smtp-use-starttls"
40 Deploying Veritas Cloud Scale Technology using Terraform script
Installation instructions for deploying the Veritas Cloud Scale Technology on AWS
Note: Terraform stores the state about your managed infrastructure and
configuration. This state is used by Terraform to map real world resources to your
configuration, keep track of metadata, and improve performance for large
infrastructures. This state is stored by default in a local file named
terraform.tfstate in 3 respective directories. Terraform uses state to determine
what changes to make to your infrastructure. Hence, the terraform.tfstate is
very crucial and we recommend taking backup of whole terraform source code
along with terraform.tfstate files by creating zip file and uploading it into S3
bucket after completing the deployment successfully.
Before proceeding to execute the deployment scripts, you need to execute the
PreFlight checker script twice. To know about the PreFlight checker, refer to the
section See “About PreFlight checker(checklist) script” on page 27.
Deploying Veritas Cloud Scale Technology using Terraform script 41
Installation instructions for deploying the Veritas Cloud Scale Technology on AWS
■ Create new .tfvars based on sample .tfvars with the appropriate values
and execute the commands below.
terraform init
terraform plan -var-file <vars-file>.tfvars
terraform apply -var-file <vars-file>.tfvars
4 Before executing this step, modfiy the values from the deployment.tfvars file
and then execute the below command.
Execute the PreFlight script using the command:
./cloudscale-preflight-check.sh -p aws -t postInfra
You will have to provide the Base input .tfvars file and Deployment
input .tfvars file path for validation.
5 Execute the steps mentioned in the section See “Changing database server
password in PostgreSQL (AWS)” on page 42. to reset the database password.
6 Execute the Deployment step.
■ Change the directory from addons to deployment using the below command:
42 Deploying Veritas Cloud Scale Technology using Terraform script
Installation instructions for deploying the Veritas Cloud Scale Technology on AWS
cd aws/deployment
■ Create new .tfvars file based on sample .tfvars with the appropriate values.
■ terraform init
Note: When setting the PostgreSQL password in DBaaS, ensure that the password
does not contain the following special characters: equal (=), double quote ("), single
quote ('), percentage (%), at sign (@), ampersand (&), question mark (?), underscore
(_), and hash (#)
For resetting the password for containerized PostgreSQL database, refer to the
section Changing database server password in DBaaS from the guide
NetBackup™ Deployment Guide for Kubernetes Clusters
44 Deploying Veritas Cloud Scale Technology using Terraform script
Installation instructions for deploying the Veritas Cloud Scale Technology on AWS
Chapter 6
Accessing the Veritas
Cloud Scale Technology
environment
This chapter includes the following topics:
After executing the above command, you will get list of namespaces created.
You can also view by navigating through UI under Kubernetes resources.
2. To view the Veritas Cloud Scale Technology deployment environment, execute
the below command and refer the table for output:
kubectl get --namespace netbackup
all,environments,primaryservers,mediaservers,msdpscaleouts,cpservers
3. Output:
pod/10-244-117-22.aks-nbux-medium-cfg-te-15902.internal 2/2
Running 0 11m
pod/dedupe1-uss-agent-54j9t 1/1
Running 0 11m
pod/dedupe1-uss-agent-6jnff 1/1
Running 0 11m
pod/dedupe1-uss-agent-bbsmn 1/1
Running 0 11m
pod/dedupe1-uss-agent-lrktl 1/1
Running 0 11m
pod/dedupe1-uss-controller-0 1/1
Running 0 11m
pod/dedupe1-uss-mds-1 1/1
Running 0 12m
pod/flexsnap-agent-59fb7f957b-5t5vj 1/1
Running 0 2m20s
pod/flexsnap-api-gateway-7b89c8957d-vlj5j 1/1
Running 0 2m21s
pod/flexsnap-certauth-65944c6797-vvspm 1/1
Running 0 3m45s
pod/flexsnap-coordinator-84ccfd95c5-59ztr 1/1
Running 0 2m20s
pod/flexsnap-fluentd-9b22l 1/1
Running 0 3m8s
pod/flexsnap-fluentd-collector-85fbc6677b-k2b56 1/1
Running 0 3m7s
pod/flexsnap-fluentd-rqqkd 1/1
Running 0 3m8s
pod/flexsnap-listener-8654fb56d9-4ltrs 1/1
Running 0 2m18s
pod/flexsnap-nginx-787878dfb6-j6m6r 1/1
Running 2 2m21s
pod/flexsnap-notification-548bf5fdb6-tdwm6 1/1
Running 0 2m19s
pod/flexsnap-rabbitmq-0 1/1
Running 0 2m57s
pod/flexsnap-scheduler-578d4646fd-z8fcv 1/1
Running 0 2m19s
pod/flexsnap-workflow-general-1709012159-12c95675-tpnqw 1/1
Running 0 78s
pod/media1-media-0 1/1
Running 0 6m58s
pod/nb-postgresql-0 1/1
Accessing the Veritas Cloud Scale Technology environment 47
Accessing the Veritas Cloud Scale Technology environment after deployment
Running 0 39m
pod/nucleus-env-primary-0 1/1
Running 0 34m
NAME READY AGE
statefulset.apps/dedupe1-uss-controller 1/1 11m
statefulset.apps/flexsnap-rabbitmq 1/1 2m58s
statefulset.apps/media1-media 1/1 6m59s
statefulset.apps/nb-postgresql 1/1 39m
statefulset.apps/nucleus-env-primary 1/1 34m
NAME
COMPLETIONS DURATION AGE
job.batch/flexsnap-workflow-general-1709012159-12c95675 0/1
79s 79s
■ Troubleshooting issues
■ Cleanup steps
Troubleshooting issues
The following table lists some of the issues that you may come across while
deploying Terraform on AWS.
1 The Terraform supports the Resolution: The Podman does not support
Podman-based Veritas Cloud Scale engineering binary installation as the
Technology deployments which will nbbuilder script supports only docker
not support the docker implemented installation.
nbbuilder script for engineering
binary installations.
50 Troubleshooting and cleanup environment steps
Cleanup steps
2 Even after executing the destroy Resolution: On the AWS console, do the
command, if there are any folders following:
that are not removed from the
■ Delete EKS cluster
environment.
■ Delete IAM roles and Policies
■ Delete EFS
■ Delete Load balancers
■ Delete Volumes/Snapshots
■ Delete RDS Target Groups
■ Delete OIDC Provider
.tfstate
.tfstate.backup
Cleanup steps
These steps are to be followed if you wish to cleanup the resources which are
created during the deployment including infrastructure and product deployment.
Terraform destroy command can be used to destroy the resources created during
the deployment. The destroy operation is performed in reverse order from that of
creation. It is used instead of deleting the assets individually.
Sequence to cleanup the deployment infrastructure
Pass the input variable files (.tfvars) which were used during creation. Navigate
to the respective directories and execute the following commands:
1. Deployment:
cd aws/deployment
You may need to run the destroy command twice to cleanup the environment.
Note: It may happen that even after executing the destroy command, the
environment is not cleaned. Execute the manual steps to cleanup the remains.
Refer to the pt.2 from the See “Troubleshooting issues” on page 49.
2. Addons
cd aws/addons
terraform destroy
3. Base
cd aws/base
6. Destroy addons
52 Troubleshooting and cleanup environment steps
Cleanup steps