How to Update Multi-AZ DB clusters (New) CA Certificate

2

I have a Multi-AZ DB cluster with the Postgres engine; it is not an Aurora cluster but a new Multi-AZ DB cluster that has one writer instance and two reader instances. Currently, it uses rds-ca-2019; how do I update to use rds-ca-rsa2048-g1? In the certificate update menu, I can find the warning of expiration but am unable to modify it. It says modifying the DB cluster is not possible.

Thanks

Sumar
gefragt vor 7 Monaten443 Aufrufe
2 Antworten
0

I'm having the same issue and am unable to modify individual db instances of my multi-AZ cluster

Tyler
beantwortet vor 7 Monaten
0

For everyone coming here. This is my workarround. Before deploy the CFN template, we override the CA Certificate

aws rds modify-certificates --certificate-identifier rds-ca-rsa2048-g1

So the new instance will use rds-ca-rsa2048-g1

And then, we deploy the CFN template

  CMSDBCluster:
    Type: AWS::RDS::DBCluster
    Condition: IsProduction
    Properties: 
      AllocatedStorage: 100
      BackupRetentionPeriod: 30
      DatabaseName: !Ref CMSDBName
      DBClusterIdentifier: !Sub "${App}-${Env}-cms"
      DBClusterInstanceClass: db.m5d.large
      DBClusterParameterGroupName: !Ref "CMSDBClusterParameterGroup"
      DBInstanceParameterGroupName: !Ref "CMSDBParameterGroup"
      DBSubnetGroupName: !Ref "CMSDBSubnetGroup"
      DeletionProtection: true
      EnableCloudwatchLogsExports: 
        - postgresql
      Engine: postgres
      EngineMode: provisioned
      EngineVersion: "15.3"
      Iops: 1000
      MasterUsername: !Sub "db_${Env}_admin"
      MasterUserPassword: !Ref CMSDBPassword
      NetworkType: IPV4
      PerformanceInsightsEnabled: true
      PerformanceInsightsRetentionPeriod: 7
      Port: 5432
      PreferredBackupWindow: "15:00-16:00"
      PreferredMaintenanceWindow: "Sun:16:05-Sun:17:00"
      PubliclyAccessible: false
      StorageEncrypted: true
      StorageType: io1
      VpcSecurityGroupIds: 
        - Fn::GetAtt: CMSDBSecurityGroup.GroupId
      Tags:
        - Key: application
          Value: !Sub ${App}
        - Key: environment
          Value: !Sub ${Env}

The result it will use rds-ca-rsa2048-g1 instead of the old one. I hope in the near future, aws will add CACertificate to AWS::RDS::DBCluster resource if the engine is postgres or mysql. Thanks

Sumar
beantwortet vor 7 Monaten

Du bist nicht angemeldet. Anmelden um eine Antwort zu veröffentlichen.

Eine gute Antwort beantwortet die Frage klar, gibt konstruktives Feedback und fördert die berufliche Weiterentwicklung des Fragenstellers.

Richtlinien für die Beantwortung von Fragen