Deploy KMS Encrypted Bucket
Application Scenario
Object Storage Service (OBS) is a highly available, highly reliable, high-performance, secure, and low-cost object storage service provided by Huawei Cloud. OBS provides massive, secure, highly reliable, and low-cost data storage capabilities, supporting multiple storage types, including standard storage, infrequent access storage, archive storage, etc., meeting storage requirements for different business scenarios.
OBS KMS encrypted buckets are an important security feature of the OBS service, used to provide server-side encryption protection for storage buckets. Through KMS (Key Management Service) encryption, enterprises can ensure that data stored in OBS is encrypted and protected, meeting data security and compliance requirements. KMS encryption supports multiple encryption algorithms, provides key management and rotation functions, providing enterprise-level data security protection for enterprises. This best practice will introduce how to use Terraform to automatically deploy OBS KMS encrypted buckets, including KMS key creation and OBS bucket configuration.
Related Resources/Data Sources
This best practice involves the following main resources and data sources:
Resources
Resource/Data Source Dependencies
huaweicloud_kms_key.test
└── huaweicloud_obs_bucket.testOperation Steps
1. Script Preparation
Prepare the TF file (e.g., main.tf) in the specified workspace for writing the current best practice script, ensuring that it (or other TF files in the same directory) contains the provider version declaration and Huawei Cloud authentication information required for deploying resources. Refer to the "Preparation Before Deploying Huawei Cloud Resources" document for configuration introduction.
2. Create KMS Key
Add the following script to the TF file (e.g., main.tf) to instruct Terraform to create a KMS key resource:
Parameter Description:
key_alias: Key alias, assigned by referencing the input variable key_alias
key_usage: Key usage, assigned by referencing the input variable key_usage
count: Conditional creation, creates when encryption is enabled and key ID is not specified
3. Create OBS Bucket
Add the following script to the TF file (e.g., main.tf) to instruct Terraform to create an OBS bucket resource:
Parameter Description:
bucket: Bucket name, assigned by referencing the input variable bucket_name
storage_class: Storage class, assigned by referencing the input variable bucket_storage_class
acl: Access control list, assigned by referencing the input variable bucket_acl
encryption: Whether encryption is enabled, assigned by referencing the input variable bucket_encryption
sse_algorithm: Server-side encryption algorithm, uses kms algorithm when encryption is enabled
kms_key_id: KMS key ID, prioritizes using input variable, uses created KMS key if empty
force_destroy: Force destroy, assigned by referencing the input variable bucket_force_destroy
tags: Tags, assigned by referencing the input variable bucket_tags
4. Preset Input Parameters Required for Resource Deployment (Optional)
In this practice, some resources and data sources use input variables to assign values to configuration content. These input parameters need to be manually entered during subsequent deployments. At the same time, Terraform provides a method to preset these configurations through tfvars files, which can avoid repeated input during each execution.
Create a terraform.tfvars file in the working directory with the following example content:
Usage:
Save the above content as
terraform.tfvarsfile in the working directory (this file name allows users to automatically import the content of thistfvarsfile when executing terraform commands; for other names,.autoneeds to be added before tfvars, such asvariables.auto.tfvars)Modify parameter values as needed
When executing
terraform planorterraform apply, Terraform will automatically read the variable values from this file
In addition to using terraform.tfvars file, variable values can also be set in the following ways:
Command line parameters:
terraform apply -var="bucket_name=my-bucket" -var="key_alias=my-key"Environment variables:
export TF_VAR_bucket_name=my-bucketCustom named variable files:
terraform apply -var-file="custom.tfvars"
Note: If the same variable is set in multiple ways, Terraform will use the variable value according to the following priority: command line parameters > variable files > environment variables > default values.
5. Initialize and Apply Terraform Configuration
After completing the above script configuration, execute the following steps to create resources:
Run
terraform initto initialize the environmentRun
terraform planto view the resource creation planAfter confirming the resource plan is correct, run
terraform applyto start creating KMS encrypted bucketsRun
terraform showto view the created KMS encrypted buckets
Reference Information
Last updated