How to Update Multi-AZ DB clusters (New) CA Certificate

2

I have a Multi-AZ DB cluster with the Postgres engine; it is not an Aurora cluster but a new Multi-AZ DB cluster that has one writer instance and two reader instances. Currently, it uses rds-ca-2019; how do I update to use rds-ca-rsa2048-g1? In the certificate update menu, I can find the warning of expiration but am unable to modify it. It says modifying the DB cluster is not possible.

Thanks

Sumar
已提問 7 個月前檢視次數 442 次
2 個答案
0

I'm having the same issue and am unable to modify individual db instances of my multi-AZ cluster

Tyler
已回答 7 個月前
0

For everyone coming here. This is my workarround. Before deploy the CFN template, we override the CA Certificate

aws rds modify-certificates --certificate-identifier rds-ca-rsa2048-g1

So the new instance will use rds-ca-rsa2048-g1

And then, we deploy the CFN template

  CMSDBCluster:
    Type: AWS::RDS::DBCluster
    Condition: IsProduction
    Properties: 
      AllocatedStorage: 100
      BackupRetentionPeriod: 30
      DatabaseName: !Ref CMSDBName
      DBClusterIdentifier: !Sub "${App}-${Env}-cms"
      DBClusterInstanceClass: db.m5d.large
      DBClusterParameterGroupName: !Ref "CMSDBClusterParameterGroup"
      DBInstanceParameterGroupName: !Ref "CMSDBParameterGroup"
      DBSubnetGroupName: !Ref "CMSDBSubnetGroup"
      DeletionProtection: true
      EnableCloudwatchLogsExports: 
        - postgresql
      Engine: postgres
      EngineMode: provisioned
      EngineVersion: "15.3"
      Iops: 1000
      MasterUsername: !Sub "db_${Env}_admin"
      MasterUserPassword: !Ref CMSDBPassword
      NetworkType: IPV4
      PerformanceInsightsEnabled: true
      PerformanceInsightsRetentionPeriod: 7
      Port: 5432
      PreferredBackupWindow: "15:00-16:00"
      PreferredMaintenanceWindow: "Sun:16:05-Sun:17:00"
      PubliclyAccessible: false
      StorageEncrypted: true
      StorageType: io1
      VpcSecurityGroupIds: 
        - Fn::GetAtt: CMSDBSecurityGroup.GroupId
      Tags:
        - Key: application
          Value: !Sub ${App}
        - Key: environment
          Value: !Sub ${Env}

The result it will use rds-ca-rsa2048-g1 instead of the old one. I hope in the near future, aws will add CACertificate to AWS::RDS::DBCluster resource if the engine is postgres or mysql. Thanks

Sumar
已回答 7 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南