-
Notifications
You must be signed in to change notification settings - Fork 9.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Block Device Mapping support for AWS Launch Configurations #865
Comments
See #756. It is accepted as an enhancement. |
Oh OK, thanks @xueshanf. I'll close this as a duplicate. |
As Per AmazonRDS/API/CreateDBInstanceReadReplica docs If you create an encrypted Read Replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the AWS Region that they are created in, and you can't use encryption keys from one AWS Region in another AWS Region. This commit sets the Read Replica Source Region based on the replicate_source_db arn. kms_key_id is managed as usual. Fixes: hashicorp#518 Related: hashicorp#3337, hashicorp#865
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
It would be nice to be able to specify
block_device_mappings
foraws_launch_configuration
resources.I'm working on a PR to add support.
The text was updated successfully, but these errors were encountered: