-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue creating KMS key #134
Comments
Hi @applike-ss If you are managing a new account only via Terraform I think you should create the serviceRole in another module, with the help of https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_service_linked_role |
@applike-ss You should also be able to disable the use of KMS and encryption all together for EBS CSI https://github.com/particuleio/terraform-kubernetes-addons/blob/main/modules/aws/aws-ebs-csi-driver.tf#L26, if not could you raise a bug in the addons module please ? |
with serviceRole you mean the role i let terragrunt assume? I don't see how that gives any more permissions than my current role - Or what is the point in doing that?
I did disable encryption completely for my testing. However i assume that due to
|
Ok so it seems I misunderstood the issue. If you don't want to use kms with ebs-csi-driver you can put |
thx, i will try that. |
i removed the encryption config for now and it seems to work nicely this way, thanks |
For testing out tEKS i don't want to use KMS for ebs volume encryption, however the module insists on creating resources and fails.
This is the failing resource:
And this is the error message i get:
The role
AWSServiceRoleForAutoScaling
does not exist yet.The text was updated successfully, but these errors were encountered: