-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RDS - storage_encrypted = true does not work #2635
Comments
By the way, it seems that setting up automatic backup is also broken. |
docs says
|
@atsushi-ishibashi: setting the storage_encrypted at aurora cluster level doesn't seem to work for me as well. I'll create a separate issue for that ... |
It basically boils down to the fact that if an option is not "consistent" (as in it would not be possible to create an instance with these parameters from the interface), Amazon will create something without the right parameters (my guess is the parameters are ignored). It feels like an incorrect design choice for something that sensitive as it gives you a false feeling of success. Anyway, the way to "fix" that is to go through the interface and see what options will work together and tweak your terraform configuration |
I'm having the same issue, but in my case the RDS instance is being created from an existing non-encrypted snapshot. Also, I'm informing the The result is a working RDS Instance without encryption, and any new |
Up, problem is still here. |
Note: my case is solved. It takes an encrypted snapshot to restore a encrypted RDS instance. If you try to restore an unencrypted snapshot to a new instance, does not matter if you enable encryption or not, it will be unencrypted as well. But for brand new instances (@victorkabdebon 's case) it should enable encryption just fine, which is not happening. |
Wow, reported back in 2017 and still not resolved :( |
Agreed. I feel there could be a check of the snapshot is encrypted and error if not when |
Dropping here for ref; but I think a check could be added to
|
Would also be cool if |
+1 up |
The same issue seems to be present when restoring a DocumentDB cluster from an unencrypted snapshot. Even though |
It sounds like the cases where Although it would be possible to add checks into the provider to prevent some cases, we generally try to leave that to the API. One reason is that if the functionality changes on the API side, we do not want to provider to blocking supported features. More importantly, it is not really practical to maintain the logic that would be required validate all working configurations for a resource. I'd recommend testing your |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
This issue was originally opened by @victorkabdebon as hashicorp/terraform#16894. It was migrated here as a result of the provider split. The original body of the issue is below.
Hi Terraform team,
Please see below an issue that I found on the latest version of Terraform over the weekend.
Terraform Version
Expected Behavior
I would have expected the database to be encrypted & setup. Instead, encryption was false.
Actual Behavior
In the output generated the flag was clearly set to storage_encrypted = true, but after it was created both in the admin and the tfstate the encryption was set to false.
Even worse, terraform would get stuck in a loop where at each "apply" it would want to recreate my database every time (probably because the program saw the encryption set to false in the state).
Steps to Reproduce
Truncated terraform configuration
As far as I can tell, turning storage_encrypted to true is enough, then running terraform apply.
The text was updated successfully, but these errors were encountered: