- Newest
- Most votes
- Most comments
Key things to address:
-
VPC Endpoint Not Used The KMS VPC endpoint you created isn't used for Custom Key Store connections. KMS uses its own managed ENI, so the endpoint is irrelevant here.
-
Security Group Blocking KMS ENI KMS creates a hidden ENI during connection. Your CloudHSM’s security group must allow inbound TCP ports 2223–2225 from any source, since KMS’s managed ENI uses a security group you can't control. Temporarily set this rule on the CloudHSM SG:
TCP 2223–2225 from 0.0.0.0/0If this works, you can later restrict the range.
-
Subnet and AZ Mismatch Ensure the subnets you selected when creating the custom key store:
- Are in the same VPC as CloudHSM
- Match the same availability zones (e.g., eu-north-1a, eu-north-1b)
- Have free IPs and aren’t blocking ENI creation
-
Manual ENIs Won’t Help Manually creating ENIs doesn’t work—KMS won’t use them. It must create and manage its own.
If no ENI appears when you run ConnectCustomKeyStore, it likely means subnet or SG configuration is stopping the process before any connection attempt is made.
Relevant content
- asked 3 years ago
- asked 10 months ago
