AWS EBS
Versions Supported
- 1.30.x
- 1.28.x
- 1.26.x
- 1.24.x
KMS Encryption Policy
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
      "Resource": "*"
    }
  ]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
      "Resource": "*"
    }
  ]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
      "Resource": "*"
    }
  ]
}
If you want to use KMS encryption, you must attach the following IAM policy to the Palette IAM role that is used to create the cluster.
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": ["kms:GenerateDataKeyWithoutPlaintext", "kms:CreateGrant"],
      "Resource": "*"
    }
  ]
}
Terraform
Use the following Terraform snippet to reference the AWS EBS CSI pack in your Terraform template. Update the version number as needed.
data "spectrocloud_registry" "public_registry" {
  name = "Public Repo"
}
data "spectrocloud_pack_simple" "aws-ebs-csi" {
  name    = "csi-aws-ebs"
  version = "1.30.0"
  type = "helm"
  registry_uid = data.spectrocloud_registry.public_registry.id
}