Closed lason-ovh closed 7 months ago
Having this feature will be useful :-).
FYI When a user configure a Terraform backend to store a TF state into a OVHcloud High Storage S3 and add encrypt=true". For the user the terraform state is encrypted. But it seems that it's not the case.
Is it possible, in a first step, to display to the user a warning message?
And do you know the ETA for this feature?
Example of a backend.tf
file to test:
terraform {
backend "s3" {
bucket = "terraform-state-hp"
key = "terraform.tfstate"
region = "gra"
#or sbg or any activated high performance storage region
endpoint = "s3.gra.perf.cloud.ovh.net"
skip_credentials_validation = true
skip_region_validation = true
encrypt = true
}
}
Thanks
@scraly When we execute terraform apply
there is a message about the missing feature.
Error saving state: failed to upload state: NotImplemented: Server-side encryption is not supported.
status code: 501, request id: txa29c0fa8121f41f8af53a-00649c5109, host id: txa29c0fa8121f41f8af53a-00649c5109
I didn't test with performance endpoint, just the regular one `s3.gra.cloud.ovh.net
.
This feature will be great to have a Terraform's state encrypted an save in a French block storage service and avoid to manage yourself an encryption key with the backend option sse_customer_key.
The "regular endpoint" you mention (s3.gra.cloud.ovh.net) is an endpoint from our legacy offer (swift/openstack).
To get new features such as Encryption at rest, S3 lock etc you have to use Object Storage Standard -S3 API
new offer, the endpoint is : https://s3.
@scraly the optimistic ETA for a v1 would be end of october, the pessimistic ETA would be end of current civil year
Hi @lason-ovh, any ETA update here? Thanks
Hi @lason-ovh, any ETA update here? Thanks
Hi, first of all, thank you for enquiring, as we value your feedbacks and engagement. Unfortunately, we had to put this feature in stand by. However, we have confidence of releasing SSE-S3 in Q1 2024. Please stay tuned for any announcements.
Why?
Hi @lason-ovh 👋 Are you still confident about releasing in Q1-2024? We have deals waiting on that, so 🤞
Me too.
Hi @lason-ovh 👋 Are you still confident about releasing in Q1-2024? We have deals waiting on that, so 🤞
Hi, we are still confident about the ETA so stay tuned ;)
Hi, we are waiting for this feature as well. Q1 is over, any update on the deadline ? Thanks
Same here 👀
I'm not waiting for the holidays or any good news apart from the resolution of this ticket!
Any news?
Hi @lcgiry, @loliee, @biapar, yes we're in the final stretch now, just a few days away from releasing it. Thank you for your patience all!
Hi all, great news! :partying_face: :partying_face: SSE-S3 is now in General Availability. Check the user guide to learn how to activate the feature.
Does anyone else get api error NotImplemented: Multiple configuration rules are not supported
when trying to enable bucket SSE-S3 over terraform?
It seems that the aws s3 terraform provider is using the API differently than the aws s3api put-bucket-encryption
command in the documentation.
Does anyone else get
api error NotImplemented: Multiple configuration rules are not supported
when trying to enable bucket SSE-S3 over terraform?It seems that the aws s3 terraform provider is using the API differently than the
aws s3api put-bucket-encryption
command in the documentation.
Hi @Preisschild, this has been identified and we are going to fix it quickly!
Hi @agoude do you have any updates on the resolution of the problem ?
Hi @agoude do you have any updates on the resolution of the problem ?
We are still working on it and we will deploy it as soon as possible. I'll come back to you with a proper ETA, thank you again!
Hi @agoude do you have any updates on the resolution of the problem ?
Hi, the fix should be deployed in W24
In order to protect you sensitive data, objects should be encrypted at rest. Up until now, we provided SSE-C i.e data is encrypted by the server using an encryption key that the customer provides. However, to be trully secure, this also requires the customer to store the keys securely and rotates them regularly. This leads to extra work that has to be managed by the customer.
By leveraging our expertise in security, the customer can shift the burden of managing encryption keys to OVH by using what this feature is all about: SSE-S3.
During your API calls, when you upload an object or perform a multi part upload, just set the value of the "x-amz-server-side-encryption" header to "AES256".
OVH will take care of :
For a user perspective everything is done in the background and in a transparent way.