sidebar_label | title | description | type | category | sidebar_class_name | tags | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
AWS-EBS |
AWS EBS |
AWS EBS CSI pack for AWS Clusters |
integration |
|
hide-from-sidebar |
|
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
"Resource": "*"
}
]
}
Use the following Terraform snippet to reference the AWS EBS CSI pack in your Terraform template. Update the version number as needed.
data "spectrocloud_registry" "public_registry" {
name = "Public Repo"
}
data "spectrocloud_pack_simple" "aws-ebs-csi" {
name = "csi-aws-ebs"
version = "1.30.0"
type = "helm"
registry_uid = data.spectrocloud_registry.public_registry.id
}