Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

KMS CMKs and AWS Accounts on scheduler 1.5.6 version #602

Open
rootops opened this issue Mar 6, 2025 · 1 comment
Open

KMS CMKs and AWS Accounts on scheduler 1.5.6 version #602

rootops opened this issue Mar 6, 2025 · 1 comment
Labels

Comments

@rootops
Copy link

rootops commented Mar 6, 2025

Hello,

We are using AWS Instance Scheduler to manage the start and stop operations of EC2 and RDS instances across a large-scale deployment . Each account has different KMS Customer Managed Keys (CMKs) for encryption ( actually start instances not working), and we need to ensure that the Instance Scheduler can handle this complexity efficiently.
i need clarification on How does it manage the start and stop operations when different KMS CMKs are used across accounts?

NB: my actual version is 1.5.6

Regards,
M.B

@CrypticCabub
Copy link
Member

CrypticCabub commented Mar 6, 2025

starting with version 3.0.0, Instance Scheduler provides a place in the cloud formation templates for you to specify your KMS keys to provide the scheduler limited access for the purpose of starting encrypted EC2 instances. You can find documentation of this feature here: https://docs.aws.amazon.com/solutions/latest/instance-scheduler-on-aws/security-1.html#encrypted-ec2-ebs-volumes

for 1.5.x, this can still be achieved, but you would need to manually apply the permissions to your solution's scheduling role in each spoke account.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants