-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Terraform RDS - Does not support updating - ca_cert_identifier #10417
Comments
same problem! |
The same here, using version v0.11.11 |
Same problem here, using Terraform aws provider v.2.26 |
There's a PR for this feature here: #10100 |
Our AWS account will start provisioning the new CA on Nov 1, 2019. Need to get ahead of that :) |
Another PR: #10490 |
I believe a similar change is also needed to the |
I have the same issue using the resource "aws_rds_cluster_instance". I'm using Terraform 0.11.14. |
Any update regarding this, as I have same requirement? |
Same problem with Terraform
|
It can't be as easy as dropping an 'Optional: true,' into resource_aws_db_instance.go near line 426 , can it? |
For non-aurora RDS ( For Aurora ( |
@mchhatani @luisrussi1 You can use the below snippet it may help you. declare -a arr=( "loyalty" "marketing" "customer" ) |
In practice, you wouldn't want to apply this change to all environments at the same time as you seem to be doing above. Apply and test each environment in turn to ensure you don't have an expected outage. Also for clusters you care about with multiple instances you'll want to upgrade & manage them accordingly to ensure no production site outages. This change shouldn't matter, but it's always worth performing a DB snapshot before making any changes as well. |
yes. i was just trying to hide my rds name that's why i put name with environenment. this onw wont work with cluster. since i used it my non prod env. I thought it would help some one |
Who is maintaining this provider? It's time for AMZN to finally embrace the fact that they have competition now. I'm not even mad at hashicorp - 2020 won't be the year of CloudFormation either. So my message to the AMZN RDS team: Thanks for making us update our infrastructure to enhance security. Please also secure some of those sweet corporate profit$ in order to put more people on contributing and maintaining your AWS (RDS) terraform providers. Every systems person I know is talking about alternative cloud providers already. Disregarding the significance of terraform actually exacerbates this dynamic. 💩🙈 |
Support for the new |
This has been released in version 2.37.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
Pretty sure AWS does NOT maintain the Terraform AWS provider. |
PSA: Acceptable values for
Also I had to set I had trouble finding this in the Terraform provider documentation but found my answer in the RDS certificate rotation guide. |
Your hard work can save so many people time, but you need to store it somewhere they'll look for it in 1, 3, 9 months from now. Can you update the documentation and clean up the parts where you got stuck? |
Which was exactly my point - one of the richest companies in the world - the largest cloud provider really, is also an open-source leech. Thanks to the Hashicorp/Terraform community for fixing this though 👍 |
You could argue that Hashicorp/Terraform is a direct competitor to tech like Cloudformation; so why would they put time & resource into helping the project? |
Because it's a super popular tool that helps people use AWS? |
I'm using Here's my terraform script:
|
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Hello Team,
We recently received communication from AWS to change the RDS SSL/TLS certificate from "rds-ca-2015" to "rds-ca-2019" and this value is exported in parameter "ca_cert_identifier" in TF.
While setting/overriding this parameter in TF , we get below error
"module.ci.aws_db_instance.postgres-rds: "ca_cert_identifier": this field cannot be set"
We are using TF - 2.31.0 version for aws provider.
We can change this value using awscli, aws console and via boto3.
Please confirm if this is supported by TF or not.
Any help/answer would be greatly appreciated.
Regards,
Mukesh
The text was updated successfully, but these errors were encountered: