Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Switch from rds-ca-2019 to rds-ca-rsa2048-g1. #1798

Merged
merged 1 commit into from
Nov 17, 2023
Merged

Switch from rds-ca-2019 to rds-ca-rsa2048-g1. #1798

merged 1 commit into from
Nov 17, 2023

Conversation

sengi
Copy link
Contributor

@sengi sengi commented Nov 17, 2023

Context: https://aws.amazon.com/blogs/aws/rotate-your-ssl-tls-certificates-now-amazon-rds-and-amazon-aurora-expire-in-2024/

Tested: applied in staging, no sign of any apps failing to talk to databases, app probes all passing etc.

@sengi sengi merged commit 0c6eee6 into main Nov 17, 2023
1 check passed
@sengi sengi deleted the sengi/rds-ca branch November 17, 2023 10:36
@sengi
Copy link
Contributor Author

sengi commented Nov 17, 2023

Rolled out everywhere now. Also updated the defaults so that snapshot restores use the up-to-date CA in all three accounts (aws rds modify-certificates --certificate-identifier rds-ca-rsa2048-g1 --region eu-west-1).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants