AWS Amazon S3 Stored Iscsi Volume
This page shows how to write Terraform for Amazon S3 Stored Iscsi Volume and write them securely.
aws_storagegateway_stored_iscsi_volume (Terraform)
The Stored Iscsi Volume in Amazon S3 can be configured in Terraform with the resource name aws_storagegateway_stored_iscsi_volume
. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
Parameters
-
arn
optional computed - string -
chap_enabled
optional computed - bool -
disk_id
required - string -
gateway_arn
required - string -
id
optional computed - string -
kms_encrypted
optional - bool -
kms_key
optional - string -
lun_number
optional computed - number -
network_interface_id
required - string -
network_interface_port
optional computed - number -
preserve_existing_data
required - bool -
snapshot_id
optional - string -
tags
optional - map from string to string -
target_arn
optional computed - string -
target_name
required - string -
volume_attachment_status
optional computed - string -
volume_id
optional computed - string -
volume_size_in_bytes
optional computed - number -
volume_status
optional computed - string -
volume_type
optional computed - string
Explanation in Terraform Registry
Manages an AWS Storage Gateway stored iSCSI volume.
NOTE: The gateway must have a working storage added (e.g., via the
aws_storagegateway_working_storage
resource) before the volume is operational to clients, however the Storage Gateway API will allow volume creation without error in that case and return volume status asWORKING STORAGE NOT CONFIGURED
.
Tips: Best Practices for The Other AWS Amazon S3 Resources
In addition to the aws_s3_bucket_public_access_block, AWS Amazon S3 has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
aws_s3_bucket_public_access_block
Ensure S3 bucket-level Public Access Block restricts public bucket policies
It is better to enable S3 bucket-level Public Access Block if you don't need public buckets.
aws_s3_bucket
Ensure S3 bucket access policy is well configured
It is better to configure the S3 bucket access policy properly to limit it unless explicitly required.
CloudFormation Example
CloudFormation code does not have the related resource.