-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
(aws-logs): (Support for KMS encryption on Log Retention Construct) #22961
Comments
Hey @AlastairMiller, We should be able to support this if the LogGroup is being created as part of this construct. As part of the
Unfortunately this might not cover all use cases, as there is no |
Thanks for your response @peterwoodworth , That is the behaviour I would expect. As far as I know you cannot encrypt a Log group post creation anyway. In this case I would expect another encrypted log group to be created rather than replacement of the existing. I have completed a quick POC and it appears to work as I would expect. |
There are API calls to associate and disassociate a KMS key with an existing log group. |
Describe the feature
The
LogRetentionProps
do not allow passing a KMS key unlikeLogGroupProps
Use Case
To be compliant with business security requirements, all log groups require encryption. This can be satisfied by using the
LogGroup
construct but currently, the more convenientLogRetention
construct cannot replicate this behaviour.Proposed Solution
Adding an optional parameter to the props which allows passing of a KMS Key if desired.
This can be then passed (if present) through to the lambda and the SDK accepts
kmsKeyId
as a parameterThe text was updated successfully, but these errors were encountered: