---
title: Terraform (AWS)
description: Configure R2 buckets and objects with Terraform using the AWS provider.
image: https://developers.cloudflare.com/dev-products-preview.png
---

> Documentation Index  
> Fetch the complete documentation index at: https://developers.cloudflare.com/r2/llms.txt  
> Use this file to discover all available pages before exploring further.

[Skip to content](#%5Ftop) 

# Terraform (AWS)

**Last reviewed:**  almost 3 years ago 

You must [generate an Access Key](https://developers.cloudflare.com/r2/api/tokens/) before getting started. All examples will utilize `access_key_id` and `access_key_secret` variables which represent the **Access Key ID** and **Secret Access Key** values you generated.

  
This example shows how to configure R2 with Terraform using the [AWS provider ↗](https://github.com/hashicorp/terraform-provider-aws).

Note for using AWS provider

For using only the Cloudflare provider, see [Terraform](https://developers.cloudflare.com/r2/examples/terraform/).

With [terraform ↗](https://developer.hashicorp.com/terraform/downloads) installed:

1. Create `main.tf` file, or edit your existing Terraform configuration
2. Populate the endpoint URL at `endpoints.s3` with your [Cloudflare account ID](https://developers.cloudflare.com/fundamentals/account/find-account-and-zone-ids/)
3. Populate `access_key` and `secret_key` with the corresponding [R2 API credentials](https://developers.cloudflare.com/r2/api/tokens/).
4. Ensure that `skip_region_validation = true`, `skip_requesting_account_id = true`, and `skip_credentials_validation = true` are set in the provider configuration.

```

terraform {

  required_providers {

    aws = {

      source = "hashicorp/aws"

      version = "~> 5"

    }

  }

}


provider "aws" {

  region = "us-east-1"


  access_key = <R2 Access Key>

  secret_key = <R2 Secret Key>


  # Required for R2.

  # These options disable S3-specific validation on the client (Terraform) side.

  skip_credentials_validation = true

  skip_region_validation      = true

  skip_requesting_account_id  = true


  endpoints {

    s3 = "https://<account id>.r2.cloudflarestorage.com"

  }

}


resource "aws_s3_bucket" "default" {

  bucket = "<org>-test"

}


resource "aws_s3_bucket_cors_configuration" "default" {

  bucket   = aws_s3_bucket.default.id


  cors_rule {

    allowed_methods = ["GET"]

    allowed_origins = ["*"]

  }

}


resource "aws_s3_bucket_lifecycle_configuration" "default" {

  bucket = aws_s3_bucket.default.id


  rule {

    id     = "expire-bucket"

    status = "Enabled"

    expiration {

      days = 1

    }

  }


  rule {

    id     = "abort-multipart-upload"

    status = "Enabled"

    abort_incomplete_multipart_upload {

      days_after_initiation = 1

    }

  }

}


```

You can then use `terraform plan` to view the changes and `terraform apply` to apply changes.

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":{"@id":"/directory/","name":"Directory"}},{"@type":"ListItem","position":2,"item":{"@id":"/r2/","name":"R2"}},{"@type":"ListItem","position":3,"item":{"@id":"/r2/examples/","name":"Examples"}},{"@type":"ListItem","position":4,"item":{"@id":"/r2/examples/terraform-aws/","name":"Terraform (AWS)"}}]}
```
