-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement]: Support TransitEncryptionMode
argument for ElastiCache clusters
#29403
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
PR #26987 is addressing this, isn't it? We are just waiting for it to be prioritised and merged. Maybe in milestone 5.0, we will finally see this. |
…ating instance. This requires that `transit_encryption_mode` is specified. Fixes hashicorp#29403.
This functionality has been released in v5.16.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
Not so long ago, AWS announced ability to enable in-transit encryption for existing ElastiCache clusters. This feature is already available in AWS Console & AWS CLI.
It would be nice to have in terraform also. It will help to make process of migration to TLS enabled cluster more smooth.
Affected Resource(s) and/or Data Source(s)
Potential Terraform Configuration
References
Would you like to implement a fix?
No
The text was updated successfully, but these errors were encountered: