Closed cduhn17 closed 10 months ago
Hi Team, one question: For route53_static.tf line 95: Are the Amazon Simple Queue Service (SQS) queues protecting the contents of their messages using Server-Side Encryption (SSE)? The SQS service uses an AWS KMS Customer Master Key (CMK) to generate data keys required for encryption/decryption process of SQS messages. Apparently, there is no additional charge for using SQS Server-Side Encryption, but there is a charge for using AWS KMS.
Hi Team, one question: For route53_static.tf line 95: Are the Amazon Simple Queue Service (SQS) queues protecting the contents of their messages using Server-Side Encryption (SSE)? The SQS service uses an AWS KMS Customer Master Key (CMK) to generate data keys required for encryption/decryption process of SQS messages. Apparently, there is no additional charge for using SQS Server-Side Encryption, but there is a charge for using AWS KMS.
Server-side encryption is currently disabled for that SQS queue. Since this issue is unrelated to this PR, please create a new issue for this. I'm not sure if there are any concerns with encrypting this queue, but if so, they can be discussed in the new issue you create. Thanks!
Hi Team, one question: For route53_static.tf line 95: Are the Amazon Simple Queue Service (SQS) queues protecting the contents of their messages using Server-Side Encryption (SSE)? The SQS service uses an AWS KMS Customer Master Key (CMK) to generate data keys required for encryption/decryption process of SQS messages. Apparently, there is no additional charge for using SQS Server-Side Encryption, but there is a charge for using AWS KMS.
Server-side encryption is currently disabled for that SQS queue. Since this issue is unrelated to this PR, please create a new issue for this. I'm not sure if there are any concerns with encrypting this queue, but if so, they can be discussed in the new issue you create. Thanks!
Hi Dave, the issue is mostly specific to the route53_static.tf code. Since SSE is disabled for the SQS queue that's sufficient. Thanks
@cduhn17 I went ahead and applied these TXT record changes, so you should now (or very soon) see them updated in DNS.
Update route53_crossfeed_app.tf TXT values
๐ฃ Description
Letsencrypt certbot SSL certs renewed, as part of the renewal process the DNS TXT files are system updated.
๐ญ Motivation and context
The DNS TXT records must be updated for the renewal process to complete. This process determines ownership and control of the domains, that the SSL certs are dependant.
๐งช Testing
โ Pre-approval checklist