- Newest
- Most votes
- Most comments
Hello.
Does it mean that the RDS instance is still there but all the data inside is gone?
RDS data is not deleted unless you manipulate it with SQL or other means.
If the query log is enabled, you will be able to see Delete and Drop operations from there.
https://repost.aws/knowledge-center/rds-postgresql-query-logging
RDS can also be restored from snapshots if RDS snapshots are still available.
https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_RestoreFromSnapshot.html
you can check it by using logs , like general logs, error logs, audit logs. make sure to click on parameter group then your can see your rds parameter group and then search general,error, audit logs and change value to 1 and restart the DB. now go to RDS logs not cloudwatch logs and you can see it the logs. Now monitor and make sure to take backup according to your requirement.
Have you check the CloudWatch metrics to see what happend to your RDS?
It happened to me as well, on RDS Postgres Database instance.
You can set the following to prevent the problem: i) Inbound rules for security group shouldn't open to anywhere, but to VPC or specific security group access, ii) Use strong password for default user, don't use the default password
Relevant content
- asked 8 months ago
- asked 2 years ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 2 years ago
Thank you for your answer.
I turned on query logging for PostgreSQL and I can see the DROP statements log. It drops all tables and databases in the RDS Database instances It occurs about once a month.
Does it relate to Free Tier Plan, the Instance Class or the RDS automatic tasks or something? (I'm using Burstable performance Instance Class)
AWS does not automatically delete your data even in the free tier. This means that it will not be removed unless your application or yourself queries it. By the way, is public access enabled for RDS? If public access is enabled, unauthorized access from outside may be the cause. https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html#USER_VPC.Hiding
First, identify who is executing the drop query.