Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(redshift): clusters created with encryption key arn break after v1.130.0 #20001

Closed
peterwoodworth opened this issue Apr 20, 2022 · 2 comments
Closed
Assignees
Labels
@aws-cdk/aws-redshift Related to Amazon Redshift bug This issue is a bug. closed-for-staleness This issue was automatically closed because it hadn't received any attention in a while. effort/small Small work item – less than a day of effort p1

Comments

@peterwoodworth
Copy link
Contributor

peterwoodworth commented Apr 20, 2022

Describe the bug

This commit sets the key to always be the key ID (as requested by cfn docs). Since these docs say update requires "no interruption", this change was pushed through as it was assumed it wouldn't break users who created clusters with the key arn rather than the key id.

Despite all this, users are running into errors. One user posted a comment on the PR indicating failure, and another customer reported internally that deployment is failing (P62432664)

Expected Behavior

Successful deployment when upgrading versions

Current Behavior

Deployment fails due to Cfn not being able to handle being given the key id if it first received the key arn from a previous deployment.

Specific error is This encryption info combination is invalid

Reproduction Steps

I was able to reproduce this error.

First, Create a redshift cluster with an encryption key pre v1.130.0
Then, upgrade to v1.130.0 or above and deploy

Possible Solution

No response

Additional Information/Context

You can work around this using escape hatches.

Override the KmsKeyId property on the underlying CfnCluster to what it was before.

(cluster.node.defaultChild as redshift.CfnCluster).addPropertyOverride("KmsKeyId", encryptionKey.keyArn);

Note that if this still results in a different template, then you should probably not pass the key into the L2 Cluster construct at all

CDK CLI Version

1.130.0

Framework Version

No response

Node.js Version

16

OS

mac

Language

Typescript

Language Version

No response

Other information

No response

@peterwoodworth peterwoodworth added bug This issue is a bug. needs-triage This issue or PR still needs to be triaged. labels Apr 20, 2022
@github-actions github-actions bot added the @aws-cdk/aws-redshift Related to Amazon Redshift label Apr 20, 2022
@peterwoodworth peterwoodworth added p1 effort/small Small work item – less than a day of effort and removed needs-triage This issue or PR still needs to be triaged. labels Apr 20, 2022
@skinny85
Copy link
Contributor

skinny85 commented May 4, 2022

@peterwoodworth should we revert the commit that made that change? Or open an issue to the Redshift team?

Just curious what's happening with this issue.

@skinny85 skinny85 assigned peterwoodworth and unassigned skinny85 May 4, 2022
@github-actions
Copy link

github-actions bot commented May 4, 2023

This issue has not received any attention in 1 year. If you want to keep this issue open, please leave a comment below and auto-close will be canceled.

@github-actions github-actions bot added closing-soon This issue will automatically close in 4 days unless further comments are made. closed-for-staleness This issue was automatically closed because it hadn't received any attention in a while. and removed closing-soon This issue will automatically close in 4 days unless further comments are made. labels May 4, 2023
@github-actions github-actions bot closed this as completed May 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
@aws-cdk/aws-redshift Related to Amazon Redshift bug This issue is a bug. closed-for-staleness This issue was automatically closed because it hadn't received any attention in a while. effort/small Small work item – less than a day of effort p1
Projects
None yet
Development

No branches or pull requests

2 participants