All Products
Search
Document Center

ApsaraDB RDS:Use Terraform to enhance the data security of an ApsaraDB RDS for PostgreSQL instance

Last Updated:Jul 04, 2025

This topic describes how to use Terraform to change security groups, IP address whitelists, and secure sockets layer (SSL) encryption settings of an ApsaraDB RDS for PostgreSQL instance. This topic also describes how to enable the enhanced whitelist mode for the RDS instance.

Note

You can run the sample code in this topic with a few clicks. For more information, visit Terraform Explorer.

Prerequisites

  • An RDS instance is created. For more information, see Create an RDS instance.

  • The RDS instance is in the Running state. You can use one of the following methods to check whether the RDS instance is in the Running state:

    • Check the value of the status parameter by following the instructions provided in Query instance details. If the value is Running, the RDS instance is in the Running state.

    • Log on to the ApsaraDB RDS console, switch to the required region, find the RDS instance, and then check the instance status.

  • An Alibaba Cloud account has all permissions on resources within the account. If an Alibaba Cloud account is leaked, the resources are exposed to major risks. We recommend that you use a Resource Access Management (RAM) user and create an AccessKey pair for the RAM user. For more information, see Create a RAM user and Create an AccessKey pair.

  • You must use RAM to manage access permissions on cloud resources in an efficient manner. This helps meet the requirements for multi-user collaboration and allows you to grant permissions to users based on the principle of least privilege (PoLP) to prevent security vulnerabilities caused by excessive permissions. For more information, see Grant permissions to RAM users.

    {
        "Version": "1",
        "Statement": [
            {
                "Effect": "Allow",
                "Action": [
                    "vpc:DescribeVpcAttribute",
                    "vpc:DescribeRouteTableList",
                    "vpc:DescribeVSwitchAttributes",
                    "vpc:DeleteVpc",
                    "vpc:DeleteVSwitch",
                    "vpc:CreateVpc",
                    "vpc:CreateVSwitch",
                    "vpc:DescribeVSwitches",
                    "ecs:CreateSecurityGroup",
                    "ecs:ModifySecurityGroupPolicy",
                    "ecs:DescribeSecurityGroups",
                    "ecs:ListTagResources",
                    "ecs:DeleteSecurityGroup",
                    "ecs:DescribeSecurityGroupAttribute",
                    "ecs:AuthorizeSecurityGroup",
                    "ecs:RevokeSecurityGroup"
                ],
                "Resource": "*"
            },
            {
                "Action": "rds:*",
                "Resource": "*",
                "Effect": "Allow"
            },
            {
                "Action": "dbs:*",
                "Resource": "acs:rds:*:*:*",
                "Effect": "Allow"
            },
            {
                "Action": "hdm:*",
                "Resource": "acs:rds:*:*:*",
                "Effect": "Allow"
            },
            {
                "Action": "dms:LoginDatabase",
                "Resource": "acs:rds:*:*:*",
                "Effect": "Allow"
            },
            {
                "Effect": "Allow",
                "Action": "ram:CreateServiceLinkedRole",
                "Resource": "*",
                "Condition": {
                    "StringEquals": {
                        "ram:ServiceName": [
                            "backupencryption.rds.aliyuncs.com"
                        ]
                    }
                }
            },
            {
                "Effect": "Allow",
                "Action": "bss:ModifyAgreementRecord",
                "Resource": "*"
            },
            {
                "Effect": "Allow",
                "Action": [
                    "bss:DescribeOrderList",
                    "bss:DescribeOrderDetail",
                    "bss:PayOrder",
                    "bss:CancelOrder"
                ],
                "Resource": "*"
            }
        ]
    }
  • Prepare the Terraform environment. You can use one of the following methods to use Terraform:

    • Use Terraform in Terraform Explorer: Alibaba Cloud provides Terraform Explorer, an online runtime environment for Terraform. You can use Terraform after you log on to Terraform Explorer without the need to install Terraform. For more information, see Use Terraform in Terraform Explorer. This method is suitable for scenarios in which you want to use and debug Terraform in a fast and convenient manner at no additional cost.

    • Use Terraform in Cloud Shell: Terraform is preinstalled in Cloud Shell and identity credentials are configured. You can directly run Terraform commands in Cloud Shell. For more information, see Use Terraform in Cloud Shell. This method is suitable for scenarios in which you want to use and debug Terraform in a fast and convenient manner at low cost.

    • Install and configure Terraform on your on-premises machine: This method is suitable for scenarios in which network conditions are poor or a custom development environment is used. For more information, see Install and configure Terraform in the local PC.

Resources

Note

You are charged for specific resources. If you no longer require the resources, you must release or unsubscribe from the resources at the earliest opportunity.

Modify the security group

This section describes how to change the security group of an RDS instance to sg-****.

  1. Create a working directory and a configuration file named main.tf in the directory. Copy the following code to the main.tf configuration file:

    • Create the required resources.

      variable "region" {
        default = "cn-shenzhen"
      }
      
      variable "zone_id" {
        default = "cn-shenzhen-c"
      }
      
      variable "instance_type" {
        default = "pg.n2.2c.2m"
      }
      
      provider "alicloud" {
        region = var.region
      }
      
      # Create a VPC.
      resource "alicloud_vpc" "main" {
        vpc_name   = "alicloud"
        cidr_block = "172.16.0.0/16"
      }
      
      # Create a vSwitch.
      resource "alicloud_vswitch" "main" {
        vpc_id     = alicloud_vpc.main.id
        cidr_block = "172.16.192.0/20"
        zone_id    = var.zone_id
      }
      
      # Create a security group.
      resource "alicloud_security_group" "example" {
        name   = "terraform-example"
        vpc_id = alicloud_vpc.main.id
      }
      
      # Create an RDS instance.
      resource "alicloud_db_instance" "instance" {
        engine               = "PostgreSQL"
        engine_version       = "13.0"
        instance_type        = var.instance_type
        instance_storage     = "30"
        instance_charge_type = "Postpaid"
        vswitch_id           = alicloud_vswitch.main.id
      }                    
    • In the main.tf file, add the security_group_ids field to the resource "alicloud_db_instance" "instance" {} configuration item and configure the field based on the following code snippet:

      ...
      resource "alicloud_db_instance" "instance" {
      ...
        security_group_ids =  [alicloud_security_group.example.id]
      }  
    Note

    After the change, the new configuration overwrites the original configuration. If you want to configure multiple security groups, you can append the IDs of the security groups to the value of the security_group_ids field and separate the IDs with commas (,). The value of the security_group_ids field is enclosed by brackets [].

  2. Run the following command to initialize the runtime environment for Terraform:

    terraform init

    If the following information is returned, Terraform is initialized.

    Initializing the backend...
    
    Initializing provider plugins...
    - Checking for available provider plugins...
    - Downloading plugin for provider "alicloud" (hashicorp/alicloud) 1.90.1...
    ...
    
    You may now begin working with Terraform. Try running "terraform plan" to see
    any changes that are required for your infrastructure. All Terraform commands
    should now work.
    
    If you ever set or change modules or backend configuration for Terraform,
    rerun this command to reinitialize your working directory. If you forget, other
    commands will detect it and remind you to do so if necessary.
  3. Create an execution plan and preview the changes.

    terraform plan
  4. Run the following command to create the resources:

    terraform apply

    During the execution, enter yes as prompted and press the Enter key. Wait until the command is successfully executed. If the following information appears, the operation is successful:

    alicloud_db_instance.instance: Modifying... [id=pgm-****]
    alicloud_db_instance.instance: Modifications complete after 4s [id=pgm-****]
    
    Apply complete!  Resources: 0 added, 1 changed, 0 destroyed.
  5. Verify the result.

    Run the terraform show command

    Run the following command to view the security group:

    terraform show
    # alicloud_db_instance.instance:
    resource "alicloud_db_instance" "instance" {
        client_ca_enabled          = 0
        client_crl_enabled         = 0
        connection_string          = "pgm-****.pg.rds.aliyuncs.com"
        connection_string_prefix   = "pgm-****"
        db_instance_storage_type   = "cloud_essd"
        db_time_zone               = "Asia/shenzhen"
        deletion_protection        = false
        engine                     = "PostgreSQL"
        engine_version             = "13.0"
        force_restart              = false
        ha_config                  = "Manual"
        id                         = "pgm-****"
        instance_charge_type       = "Postpaid"
        instance_name              = "terraformtest"
        instance_storage           = 50
        instance_type              = "pg.n2.2c.2m"
        maintain_time              = "05:00Z-06:00Z"
        manual_ha_time             = "2022-09-30T09:00:00Z"
        monitoring_period          = 300
        period                     = 0
        port                       = "5432"
        private_ip_address         = "192.168.XX.XX"
        resource_group_id          = "rg-****"
        security_group_id          = "sg-****"
        security_group_ids         = [
            "sg-****",
        ]
        security_ip_mode           = "normal"
        security_ips               = [
            "127.0.0.1",
        ]
        sql_collector_config_value = 30
        sql_collector_status       = "Disabled"
        storage_auto_scale         = "Enable"
        storage_threshold          = 30
        storage_upper_bound        = 100
        target_minor_version       = "rds_postgres_1300_20220830"
        tcp_connection_type        = "SHORT"
        vpc_id                     = "vpc-****"
        vswitch_id                 = "vsw-****"
        zone_id                    = "cn-hangzhou-j"
    
        pg_hba_conf {
            address     = "127.0.0.1"
            database    = "all"
            method      = "md5"
            priority_id = 1
            type        = "host"
            user        = "all"
        }
    }

    Log on to the ApsaraDB RDS console

    Log on to the ApsaraDB RDS console to view the security group.安全组

Modify an IP address whitelist

This section describes how to change the IP address whitelist to 0.0.0.0/0.

  1. In the main.tf file, add the security_ips field to the resource "alicloud_db_instance" "instance" {} configuration item and configure the field based on the following code snippet:

    ...
    resource "alicloud_db_instance" "instance" {
    ...
      security_ips =  ["0.0.0.0/0"]
    }  
    Note

    After the change, the new configuration overwrites the original configuration. If you want to add multiple IP addresses to the whitelist, you can append the IP addresses to the value of the security_ips field and separate the IP addresses with commas (,). The value of the security_ips field is enclosed by brackets [].

  2. Run the following command:

    terraform apply

    During the execution, enter yes as prompted and press the Enter key. Wait until the command is successfully executed. If the following information appears, the operation is successful:

    alicloud_db_instance.instance: Modifying... [id=pgm-****]
    alicloud_db_instance.instance: Modifications complete after 6s [id=pgm-****]
    
    Apply complete!  Resources: 0 added, 1 changed, 0 destroyed.
  3. Verify the result.

    Run the terraform show command

    Run the following command to view the IP address whitelist:

    terraform show
    # alicloud_db_account.account:
    resource "alicloud_db_account" "account" {
        account_name     = "tf_account_test"
        account_password = (sensitive value)
        account_type     = "Normal"
        db_instance_id   = "pgm-****"
        id               = "pgm-****:tf_account_test"
        instance_id      = "pgm-****"
        name             = "tf_account_test"
        status           = "Available"
        type             = "Normal"
    }
    
    # alicloud_db_instance.instance:
    resource "alicloud_db_instance" "instance" {
        client_ca_enabled          = 0
        client_crl_enabled         = 0
        connection_string          = "pgm-****.pg.rds.aliyuncs.com"
        connection_string_prefix   = "pgm-****"
        db_instance_storage_type   = "cloud_essd"
        db_time_zone               = "Asia/shenzhen"
        deletion_protection        = false
        engine                     = "PostgreSQL"
        engine_version             = "13.0"
        force_restart              = false
        ha_config                  = "Auto"
        id                         = "pgm-****"
        instance_charge_type       = "Postpaid"
        instance_name              = "terraformtest"
        instance_storage           = 50
        instance_type              = "pg.n2.2c.2m"
        maintain_time              = "05:00Z-06:00Z"
        monitoring_period          = 300
        period                     = 0
        port                       = "5432"
        private_ip_address         = "172.16.XX.XX"
        resource_group_id          = "rg-****"
        security_group_ids         = []
        security_ip_mode           = "normal"
        security_ips               = [
            "127.0.0.1",
        ]
        sql_collector_config_value = 30
        sql_collector_status       = "Disabled"
        storage_auto_scale         = "Enable"
        storage_threshold          = 30
        storage_upper_bound        = 100
        target_minor_version       = "rds_postgres_1300_20220730"
        tcp_connection_type        = "SHORT"
        vpc_id                     = "vpc-****"
        vswitch_id                 = "vsw-****"
        zone_id                    = "cn-heyuan-j"
    
        pg_hba_conf {
            address     = "127.0.0.1"
            database    = "all"
            method      = "md5"
            priority_id = 1
            type        = "host"
            user        = "all"
        }
    }
                                    

    Log on to the ApsaraDB RDS console

    Log on to the ApsaraDB RDS console to view the IP address whitelist.白名单

Modify SSL encryption settings

This section describes how to enable SSL encryption for an RDS instance.

  1. In the main.tf file, add the ssl_action field to the resource "alicloud_db_instance" "instance" {} configuration item and configure the field based on the following code snippet:

    ...
    resource "alicloud_db_instance" "instance" {
    ...
      ssl_action  =  "Open"
    }  
  2. Run the following command:

    terraform apply

    During the execution, enter yes as prompted and press the Enter key. Wait until the command is successfully executed. If the following information appears, the operation is successful:

    alicloud_db_instance.instance: Modifying... [id=pgm-****]
    alicloud_db_instance.instance: Still modifying... [id=pgm-****, 10s elapsed]
    ...
    alicloud_db_instance.instance: Still modifying... [id=pgm-****, 6m31s elapsed]
    alicloud_db_instance.instance: Modifications complete after 6m35s [id=pgm-****]
    
    Apply complete!  Resources: 0 added, 1 changed, 0 destroyed.
  3. Verify the result.

    Run the terraform show command

    Run the following command to view the SSL settings:

    terraform show
    # alicloud_db_instance.instance:
    resource "alicloud_db_instance" "instance" {
        acl                        = "prefer"
        ca_type                    = "aliyun"
        client_ca_enabled          = 0
        client_crl_enabled         = 0
        connection_string          = "pgm-****.pg.rds.aliyuncs.com"
        connection_string_prefix   = "pgm-****"
        db_instance_storage_type   = "cloud_essd"
        db_time_zone               = "Asia/shenzhen"
        deletion_protection        = false
        engine                     = "PostgreSQL"
        engine_version             = "13.0"
        force_restart              = false
        ha_config                  = "Auto"
        id                         = "pgm-****"
        instance_charge_type       = "Postpaid"
        instance_name              = "terraformtest"
        instance_storage           = 50
        instance_type              = "pg.n2.2c.2m"
        maintain_time              = "05:00Z-06:00Z"
        monitoring_period          = 300
        period                     = 0
        port                       = "5432"
        private_ip_address         = "192.168.XX.XX"
        replication_acl            = "prefer"
        resource_group_id          = "rg-****"
        security_group_id          = "sg-****"
        security_group_ids         = [
            "sg-****",
        ]
        security_ip_mode           = "normal"
        security_ips               = [
            "0.0.0.0/0",
        ]
        server_cert                = <<-EOT
            -----BEGIN CERTIFICATE-----
            MIIE7jCCA9agAwIBAgICO3****2
            N9xwKlPQ65q/kux0yErtwhAD
            -----END CERTIFICATE-----
        EOT
        server_key                 = <<-EOT
            -----BEGIN RSA PRIVATE KEY-----
            MIIJKQIBAAKCAgEAux0yE****e+VAdGp
            -----END RSA PRIVATE KEY-----
        EOT
        sql_collector_config_value = 30
        sql_collector_status       = "Disabled"
        ssl_action                 = "Open"
        ssl_status                 = "0"
        storage_auto_scale         = "Enable"
        storage_threshold          = 30
        storage_upper_bound        = 100
        target_minor_version       = "rds_postgres_1300_20220830"
        tcp_connection_type        = "SHORT"
        vpc_id                     = "vpc-****"
        vswitch_id                 = "vsw-****"
        zone_id                    = "cn-hangzhou-j"
    
        pg_hba_conf {
            address     = "127.0.0.1"
            database    = "all"
            method      = "md5"
            priority_id = 1
            type        = "host"
            user        = "all"
        }
    }

    Log on to the ApsaraDB RDS console

    Log on to the ApsaraDB RDS console to view the SSL settings.SSL

Enable the enhanced whitelist mode for an RDS instance that uses Premium Local SSDs

  1. In the main.tf file, add the security_ip_mode field to the resource "alicloud_db_instance" "instance" {} configuration item and configure the field based on the following code snippet:

    ...
    resource "alicloud_db_instance" "instance" {
    ...
      security_ip_mode = "safety"
    }                      
    Note

    The enhanced whitelist mode cannot be switched back to the standard whitelist mode.

  2. Run the following command:

    terraform apply

    During the execution, enter yes as prompted and press the Enter key. Wait until the command is successfully executed. If the following information appears, the operation is successful:

    alicloud_db_instance.instance: Modifying... [id=pgm-****]
    alicloud_db_instance.instance: Modifications complete after 3s [id=pgm-****]
    
    Apply complete!  Resources: 0 added, 1 changed, 0 destroyed.
  3. Verify the result.

    Run the terraform show command

    Run the following command to view the whitelist mode.

    terraform show
    # alicloud_db_instance.instance:
    resource "alicloud_db_instance" "instance" {
        acl                        = "prefer"
        ca_type                    = "aliyun"
        client_ca_enabled          = 0
        client_crl_enabled         = 0
        connection_string          = "pgm-****.pg.rds.aliyuncs.com"
        connection_string_prefix   = "pgm-****"
        db_instance_storage_type   = "cloud_essd"
        db_time_zone               = "Asia/shenzhen"
        deletion_protection        = false
        engine                     = "PostgreSQL"
        engine_version             = "13.0"
        force_restart              = false
        ha_config                  = "Auto"
        id                         = "pgm-****"
        instance_charge_type       = "Postpaid"
        instance_name              = "terraformtest"
        instance_storage           = 50
        instance_type              = "pg.n2.2c.2m"
        maintain_time              = "05:00Z-06:00Z"
        monitoring_period          = 300
        period                     = 0
        port                       = "5432"
        private_ip_address         = "192.168.XX.XX"
        replication_acl            = "prefer"
        resource_group_id          = "rg-****"
        security_group_id          = "sg-****"
        security_group_ids         = [
            "sg-****",
        ]
        security_ip_mode           = "safety"
        security_ip_mode           = "normal"
        security_ips               = [
            "0.0.0.0/0",
        ]
        server_cert                = <<-EOT
            -----BEGIN CERTIFICATE-----
            MIIE7jCCA9agAwIBAgICO3****2
            N9xwKlPQ65q/kux0yErtwhAD
            -----END CERTIFICATE-----
        EOT
        server_key                 = <<-EOT
            -----BEGIN RSA PRIVATE KEY-----
            MIIJKQIBAAKCAgEAux0yE****e+VAdGp
            -----END RSA PRIVATE KEY-----
        EOT
        sql_collector_config_value = 30
        sql_collector_status       = "Disabled"
        ssl_action                 = "Open"
        ssl_status                 = "0"
        storage_auto_scale         = "Enable"
        storage_threshold          = 30
        storage_upper_bound        = 100
        target_minor_version       = "rds_postgres_1300_20220830"
        tcp_connection_type        = "SHORT"
        vpc_id                     = "vpc-****"
        vswitch_id                 = "vsw-****"
        zone_id                    = "cn-hangzhou-j"
    
        pg_hba_conf {
            address     = "127.0.0.1"
            database    = "all"
            method      = "md5"
            priority_id = 1
            type        = "host"
            user        = "all"
        }
    }

    Log on to the ApsaraDB RDS console

    Log on to the ApsaraDB RDS console to view the whitelist mode.高安全白名单

Clear resources

If you no longer require the preceding resources that are created or managed by using Terraform, run the following command to release the resources. For more information about the terraform destroy command, see Common commands.

terraform destroy

Complete sample code

Note

You can run the sample code in this topic with a few clicks. For more information, visit Terraform Explorer.

Sample code

variable "region" {
  default = "cn-shenzhen"
}

variable "zone_id" {
  default = "cn-shenzhen-c"
}

variable "instance_type" {
  default = "pg.n2.2c.2m"
}

variable "target_minor_version" {
  default = "rds_postgres_1300_20240830"
}

variable "security_ips" {
  default = "0.0.0.0/0"
}

provider "alicloud" {
  region = var.region
}

# Create a VPC.
resource "alicloud_vpc" "main" {
  vpc_name   = "alicloud"
  cidr_block = "172.16.0.0/16"
}

# Create a vSwitch.
resource "alicloud_vswitch" "main" {
  vpc_id     = alicloud_vpc.main.id
  cidr_block = "172.16.192.0/20"
  zone_id    = var.zone_id
}

resource "alicloud_security_group" "example" {
  name   = "terraform-example"
  vpc_id = alicloud_vpc.main.id
}

# Create an RDS instance.
resource "alicloud_db_instance" "instance" {
  engine                 = "PostgreSQL"
  engine_version         = "13.0"
  instance_type          = var.instance_type
  instance_storage       = "30"
  instance_charge_type   = "Postpaid"
  vswitch_id             = alicloud_vswitch.main.id
  # Change the security group.
  # security_group_ids   = [alicloud_security_group.example.id]
  # Modify an IP address allowlist.
  # security_ips         =  [var.security_ips]
  # Modify SSL encryption settings.
  # ssl_action           =  "Open"
  # Enable the enhanced whitelist mode for an RDS instance that uses Premium Local SSDs.
  # security_ip_mode     = "safety"
}                    

If you want to experience more examples, go to the quickstarts page and view the examples in the folder of the corresponding service.