-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
mongodbatlas_encryption_at_rest key rotation impossible to perform with Azure KeyVault #80
Comments
@gvilarino thank you for the excellent detail. We'll have the team take a look at this and the other issue you reported. |
Unfortunately #128 does not seem to fix this issue. It's happening for the GCP provider as well. This is running with the 0.4.0 provider plugin:
|
@gvilarino PR #128 should have fixed this for Azure. Wanted to confirm it did. @rvdh we are working to solve this for GCP as well w/ #212, just fyi. |
Thanks @themantissa for the heads-up. I'll give it a try as soon as I can. |
When using customer keys for encryption at rest it is possible to rotate encryption keys with no downtime through the MongoDB atlas portal by just specifying a different (and accessible) key ID (it even works by changing any credentials, even using a different KeyVault).
The problem is when using this module's
mongodbatlas_encryption_at_rest
resource: having a complete project + cluster + encryption set of resources, like so:Now, rotating the encryption key should just be changing the
key_identifier
value and applying the change. I.e.:However, the plan for this is not an unpdate-in-place, rather a recreation of the whole encryption configuration.
If these encryption settings are used by a cluster, and if attempting to
apply
, you get the following error:This makes it pragmatically impossible to perform an encryption key rotation from this module without first disabling encryption at rest entirely.
The text was updated successfully, but these errors were encountered: