Class: Aws::RDS::Types::ModifyTenantDatabaseMessage

Inherits:
Struct
  • Object
show all
Includes:
Structure
Defined in:
lib/aws-sdk-rds/types.rb

Overview

Constant Summary collapse

SENSITIVE =
[:master_user_password]

Instance Attribute Summary collapse

Instance Attribute Details

#db_instance_identifierString

The identifier of the DB instance that contains the tenant database that you are modifying. This parameter isn’t case-sensitive.

Constraints:

  • Must match the identifier of an existing DB instance.

^

Returns:

  • (String)


20549
20550
20551
20552
20553
20554
20555
20556
20557
20558
20559
# File 'lib/aws-sdk-rds/types.rb', line 20549

class ModifyTenantDatabaseMessage < Struct.new(
  :db_instance_identifier,
  :tenant_db_name,
  :master_user_password,
  :new_tenant_db_name,
  :manage_master_user_password,
  :rotate_master_user_password,
  :master_user_secret_kms_key_id)
  SENSITIVE = [:master_user_password]
  include Aws::Structure
end

#manage_master_user_passwordBoolean

Specifies whether to manage the master user password with Amazon Web Services Secrets Manager.

If the tenant database doesn’t manage the master user password with Amazon Web Services Secrets Manager, you can turn on this management. In this case, you can’t specify ‘MasterUserPassword`.

If the tenant database already manages the master user password with Amazon Web Services Secrets Manager, and you specify that the master user password is not managed with Amazon Web Services Secrets Manager, then you must specify ‘MasterUserPassword`. In this case, Amazon RDS deletes the secret and uses the new password for the master user specified by `MasterUserPassword`.

For more information, see [Password management with Amazon Web Services Secrets Manager] in the *Amazon RDS User Guide.*

Constraints:

  • Can’t manage the master user password with Amazon Web Services Secrets Manager if ‘MasterUserPassword` is specified.

^

[1]: docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html

Returns:

  • (Boolean)


20549
20550
20551
20552
20553
20554
20555
20556
20557
20558
20559
# File 'lib/aws-sdk-rds/types.rb', line 20549

class ModifyTenantDatabaseMessage < Struct.new(
  :db_instance_identifier,
  :tenant_db_name,
  :master_user_password,
  :new_tenant_db_name,
  :manage_master_user_password,
  :rotate_master_user_password,
  :master_user_secret_kms_key_id)
  SENSITIVE = [:master_user_password]
  include Aws::Structure
end

#master_user_passwordString

The new password for the master user of the specified tenant database in your DB instance.

<note markdown=“1”> Amazon RDS operations never return the password, so this action provides a way to regain access to a tenant database user if the password is lost. This includes restoring privileges that might have been accidentally revoked.

</note>

Constraints:

  • Can include any printable ASCII character except ‘/`, `“` (double quote), `@`, `&` (ampersand), and `’‘ (single quote).

^

Length constraints:

  • Must contain between 8 and 30 characters.

^

Returns:

  • (String)


20549
20550
20551
20552
20553
20554
20555
20556
20557
20558
20559
# File 'lib/aws-sdk-rds/types.rb', line 20549

class ModifyTenantDatabaseMessage < Struct.new(
  :db_instance_identifier,
  :tenant_db_name,
  :master_user_password,
  :new_tenant_db_name,
  :manage_master_user_password,
  :rotate_master_user_password,
  :master_user_secret_kms_key_id)
  SENSITIVE = [:master_user_password]
  include Aws::Structure
end

#master_user_secret_kms_key_idString

The Amazon Web Services KMS key identifier to encrypt a secret that is automatically generated and managed in Amazon Web Services Secrets Manager.

This setting is valid only if both of the following conditions are met:

  • The tenant database doesn’t manage the master user password in Amazon Web Services Secrets Manager.

    If the tenant database already manages the master user password in Amazon Web Services Secrets Manager, you can’t change the KMS key used to encrypt the secret.

  • You’re turning on ‘ManageMasterUserPassword` to manage the master user password in Amazon Web Services Secrets Manager.

    If you’re turning on ‘ManageMasterUserPassword` and don’t specify ‘MasterUserSecretKmsKeyId`, then the `aws/secretsmanager` KMS key is used to encrypt the secret. If the secret is in a different Amazon Web Services account, then you can’t use the ‘aws/secretsmanager` KMS key to encrypt the secret, and you must use a self-managed KMS key.

The Amazon Web Services KMS key identifier is any of the following:

  • Key ARN

  • Key ID

  • Alias ARN

  • Alias name for the KMS key

To use a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN.

A default KMS key exists for your Amazon Web Services account. Your Amazon Web Services account has a different default KMS key for each Amazon Web Services Region.

Returns:

  • (String)


20549
20550
20551
20552
20553
20554
20555
20556
20557
20558
20559
# File 'lib/aws-sdk-rds/types.rb', line 20549

class ModifyTenantDatabaseMessage < Struct.new(
  :db_instance_identifier,
  :tenant_db_name,
  :master_user_password,
  :new_tenant_db_name,
  :manage_master_user_password,
  :rotate_master_user_password,
  :master_user_secret_kms_key_id)
  SENSITIVE = [:master_user_password]
  include Aws::Structure
end

#new_tenant_db_nameString

The new name of the tenant database when renaming a tenant database. This parameter isn’t case-sensitive.

Constraints:

  • Can’t be the string null or any other reserved word.

  • Can’t be longer than 8 characters.

Returns:

  • (String)


20549
20550
20551
20552
20553
20554
20555
20556
20557
20558
20559
# File 'lib/aws-sdk-rds/types.rb', line 20549

class ModifyTenantDatabaseMessage < Struct.new(
  :db_instance_identifier,
  :tenant_db_name,
  :master_user_password,
  :new_tenant_db_name,
  :manage_master_user_password,
  :rotate_master_user_password,
  :master_user_secret_kms_key_id)
  SENSITIVE = [:master_user_password]
  include Aws::Structure
end

#rotate_master_user_passwordBoolean

Specifies whether to rotate the secret managed by Amazon Web Services Secrets Manager for the master user password.

This setting is valid only if the master user password is managed by RDS in Amazon Web Services Secrets Manager for the DB instance. The secret value contains the updated password.

For more information, see [Password management with Amazon Web Services Secrets Manager] in the *Amazon RDS User Guide.*

Constraints:

  • You must apply the change immediately when rotating the master user password.

^

[1]: docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html

Returns:

  • (Boolean)


20549
20550
20551
20552
20553
20554
20555
20556
20557
20558
20559
# File 'lib/aws-sdk-rds/types.rb', line 20549

class ModifyTenantDatabaseMessage < Struct.new(
  :db_instance_identifier,
  :tenant_db_name,
  :master_user_password,
  :new_tenant_db_name,
  :manage_master_user_password,
  :rotate_master_user_password,
  :master_user_secret_kms_key_id)
  SENSITIVE = [:master_user_password]
  include Aws::Structure
end

#tenant_db_nameString

The user-supplied name of the tenant database that you want to modify. This parameter isn’t case-sensitive.

Constraints:

  • Must match the identifier of an existing tenant database.

^

Returns:

  • (String)


20549
20550
20551
20552
20553
20554
20555
20556
20557
20558
20559
# File 'lib/aws-sdk-rds/types.rb', line 20549

class ModifyTenantDatabaseMessage < Struct.new(
  :db_instance_identifier,
  :tenant_db_name,
  :master_user_password,
  :new_tenant_db_name,
  :manage_master_user_password,
  :rotate_master_user_password,
  :master_user_secret_kms_key_id)
  SENSITIVE = [:master_user_password]
  include Aws::Structure
end