Deploy Bucket Object Uploaded with Encrypted Text

Application Scenario

Object Storage Service (OBS) is a highly available, highly reliable, high-performance, secure, and low-cost object storage service provided by Huawei Cloud. OBS provides massive, secure, highly reliable, and low-cost data storage capabilities, supporting multiple storage types, including standard storage, infrequent access storage, archive storage, etc., meeting storage requirements for different business scenarios.

OBS bucket objects are core resources of the OBS service, used to store various types of data files. Through encrypted text upload of bucket objects, enterprises can encrypt sensitive text content and store it in OBS buckets, ensuring data security and privacy. This approach is particularly suitable for storing and managing text data that requires encryption protection, such as configuration files, script files, sensitive documents, etc. Encrypted text upload supports KMS key encryption, providing enterprise-level data security protection, providing enterprises with secure and reliable data storage solutions. This best practice will introduce how to use Terraform to automatically deploy bucket objects uploaded with encrypted text, including KMS key creation, OBS bucket configuration, file compression, and encrypted upload.

This best practice involves the following main resources and data sources:

Resources

Resource/Data Source Dependencies

huaweicloud_kms_key.test
    └── huaweicloud_obs_bucket.test
        └── huaweicloud_obs_bucket_object.test

Operation Steps

1. Script Preparation

Prepare the TF file (e.g., main.tf) in the specified workspace for writing the current best practice script, ensuring that it (or other TF files in the same directory) contains the provider version declaration and Huawei Cloud authentication information required for deploying resources. Refer to the "Preparation Before Deploying Huawei Cloud Resources" document for configuration introduction.

2. Create KMS Key

Add the following script to the TF file (e.g., main.tf) to instruct Terraform to create a KMS key resource:

Parameter Description:

  • key_alias: Key alias, assigned by referencing the input variable key_alias

  • key_usage: Key usage, assigned by referencing the input variable key_usage

  • count: Conditional creation, creates when encryption is enabled and key ID is not specified

3. Define Local Variables

Add the following script to the TF file (e.g., main.tf) to define local variables for handling file naming:

Parameter Description:

  • upload_object_name: Upload object name, generated by combining extension name and object name

  • upload_zip_file_name: Compressed file name, adds .zip extension to object name

4. Create OBS Bucket

Add the following script to the TF file (e.g., main.tf) to instruct Terraform to create an OBS bucket resource:

Parameter Description:

  • bucket: Bucket name, assigned by referencing the input variable bucket_name

  • storage_class: Storage class, assigned by referencing the input variable bucket_storage_class

  • acl: Access control list, assigned by referencing the input variable bucket_acl

  • encryption: Whether encryption is enabled, assigned by referencing the input variable bucket_encryption

  • sse_algorithm: Server-side encryption algorithm, uses kms algorithm when encryption is enabled

  • kms_key_id: KMS key ID, prioritizes using input variable, uses created KMS key if empty

  • force_destroy: Force destroy, assigned by referencing the input variable bucket_force_destroy

  • tags: Tags, merge bucket tags and file name tags

  • provisioner: Local executor, used to create text files, compress files, and clean up files

5. Create OBS Bucket Object

Add the following script to the TF file (e.g., main.tf) to instruct Terraform to create an OBS bucket object resource:

Parameter Description:

  • bucket: Bucket ID, assigned by referencing the OBS bucket resource (huaweicloud_obs_bucket.test) ID

  • key: Object key name, using compressed file name

  • source: Source file path, using locally created compressed file

  • encryption: Whether object encryption is enabled, assigned by referencing the input variable object_encryption

  • kms_key_id: KMS key ID, used when object encryption is enabled

6. Preset Input Parameters Required for Resource Deployment (Optional)

In this practice, some resources and data sources use input variables to assign values to configuration content. These input parameters need to be manually entered during subsequent deployments. At the same time, Terraform provides a method to preset these configurations through tfvars files, which can avoid repeated input during each execution.

Create a terraform.tfvars file in the working directory with the following example content:

Usage:

  1. Save the above content as terraform.tfvars file in the working directory (this file name allows users to automatically import the content of this tfvars file when executing terraform commands; for other names, .auto needs to be added before tfvars, such as variables.auto.tfvars)

  2. Modify parameter values as needed

  3. When executing terraform plan or terraform apply, Terraform will automatically read the variable values from this file

In addition to using terraform.tfvars file, variable values can also be set in the following ways:

  1. Command line parameters: terraform apply -var="bucket_name=my-bucket" -var="object_name=my-object"

  2. Environment variables: export TF_VAR_bucket_name=my-bucket

  3. Custom named variable files: terraform apply -var-file="custom.tfvars"

Note: If the same variable is set in multiple ways, Terraform will use the variable value according to the following priority: command line parameters > variable files > environment variables > default values.

7. Initialize and Apply Terraform Configuration

After completing the above script configuration, execute the following steps to create resources:

  1. Run terraform init to initialize the environment

  2. Run terraform plan to view the resource creation plan

  3. After confirming the resource plan is correct, run terraform apply to start creating encrypted bucket objects

  4. Run terraform show to view the created encrypted bucket objects

Reference Information

Last updated