- Newest
- Most votes
- Most comments
Key things to address:
-
VPC Endpoint Not Used The KMS VPC endpoint you created isn't used for Custom Key Store connections. KMS uses its own managed ENI, so the endpoint is irrelevant here.
-
Security Group Blocking KMS ENI KMS creates a hidden ENI during connection. Your CloudHSM’s security group must allow inbound TCP ports 2223–2225 from any source, since KMS’s managed ENI uses a security group you can't control. Temporarily set this rule on the CloudHSM SG:
TCP 2223–2225 from 0.0.0.0/0
If this works, you can later restrict the range.
-
Subnet and AZ Mismatch Ensure the subnets you selected when creating the custom key store:
- Are in the same VPC as CloudHSM
- Match the same availability zones (e.g., eu-north-1a, eu-north-1b)
- Have free IPs and aren’t blocking ENI creation
-
Manual ENIs Won’t Help Manually creating ENIs doesn’t work—KMS won’t use them. It must create and manage its own.
If no ENI appears when you run ConnectCustomKeyStore
, it likely means subnet or SG configuration is stopping the process before any connection attempt is made.
Relevant content
- asked 2 years ago
- AWS OFFICIALUpdated 9 months ago