Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support KmsKeyId in aws_db_instance resource for rds encryption #6353

Closed
krushi90 opened this issue Apr 26, 2016 · 3 comments
Closed

Support KmsKeyId in aws_db_instance resource for rds encryption #6353

krushi90 opened this issue Apr 26, 2016 · 3 comments

Comments

@krushi90
Copy link

krushi90 commented Apr 26, 2016

As part of #1041, support for storage encryption was added but with default key. Can we add support for specifying KmsKeyId in aws_db_instance resource?

In my current use case, I need to use a different key(not default key) for RDS encryption. Since encryption can only be set at the time of creating RDS instance, I don't know if there is any other way to specify a different key other than creating a cloud formation resource for RDS. Are there any alternate solutions for this as of now?

@krushi90
Copy link
Author

@hc-asana I see closed flag on this. Does this mean this will be implemented or will not be implemented? Thanks.

@stack72
Copy link
Contributor

stack72 commented May 13, 2016

Hi @krushi90

I just added this cf37c3a

This will make Terraform 0.7 so this can now be closed :)

Paul

@stack72 stack72 closed this as completed May 13, 2016
@ghost
Copy link

ghost commented Apr 25, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators Apr 25, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants