Support LogEncryptionKmsKeyId for EMR Clusters #17062
Labels
enhancement
Requests to existing resources that expand the functionality or scope.
service/emr
Issues and PRs that pertain to the emr service.
Milestone
Community Note
Description
We need to store the EMR logs in a cross account s3 bucket and encrypt them. The bucket policy will deny any request to put an object unless the KMS key is provided in the request.
I made the change seen here and tested in our accounts. EMR was able to write logs to a cross account bucket that needs encryption key in the request. I don't know go & terraform code enough to be able to write validations and test cases though.
Validation
log_uri
should be set iflog_encryption_kms_key_id
is providedAny help here would be much appreciated.
New or Affected Resource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: