AWS EBS
Versions Supported
- 1.30.x
- 1.28.x
- 1.26.x
- 1.24.x
KMS Encryption Policy
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
Terraform
Use the following Terraform snippet to reference the AWS EBS CSI pack in your Terraform template. Update the version number as needed.
data "spectrocloud_registry" "public_registry" {
name = "Public Repo"
}
data "spectrocloud_pack_simple" "aws-ebs-csi" {
name = "csi-aws-ebs"
version = "1.30.0"
type = "helm"
registry_uid = data.spectrocloud_registry.public_registry.id
}