AWS Amazon S3 Stored Iscsi Volume
This page shows how to write Terraform for Amazon S3 Stored Iscsi Volume and write them securely.
aws_storagegateway_stored_iscsi_volume (Terraform)
The Stored Iscsi Volume in Amazon S3 can be configured in Terraform with the resource name aws_storagegateway_stored_iscsi_volume. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
Parameters
-
arnoptional computed - string -
chap_enabledoptional computed - bool -
disk_idrequired - string -
gateway_arnrequired - string -
idoptional computed - string -
kms_encryptedoptional - bool -
kms_keyoptional - string -
lun_numberoptional computed - number -
network_interface_idrequired - string -
network_interface_portoptional computed - number -
preserve_existing_datarequired - bool -
snapshot_idoptional - string -
tagsoptional - map from string to string -
target_arnoptional computed - string -
target_namerequired - string -
volume_attachment_statusoptional computed - string -
volume_idoptional computed - string -
volume_size_in_bytesoptional computed - number -
volume_statusoptional computed - string -
volume_typeoptional computed - string
Explanation in Terraform Registry
Manages an AWS Storage Gateway stored iSCSI volume.
NOTE: The gateway must have a working storage added (e.g., via the
aws_storagegateway_working_storageresource) before the volume is operational to clients, however the Storage Gateway API will allow volume creation without error in that case and return volume status asWORKING STORAGE NOT CONFIGURED.
Tips: Best Practices for The Other AWS Amazon S3 Resources
In addition to the aws_s3_bucket_public_access_block, AWS Amazon S3 has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
aws_s3_bucket_public_access_block
Ensure S3 bucket-level Public Access Block restricts public bucket policies
It is better to enable S3 bucket-level Public Access Block if you don't need public buckets.
aws_s3_bucket
Ensure S3 bucket access policy is well configured
It is better to configure the S3 bucket access policy properly to limit it unless explicitly required.
CloudFormation Example
CloudFormation code does not have the related resource.