-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Root EBS volume encryption #2051
Comments
The functionality is available but as you have identified, its available through the |
Aha, alright. It's a little disappointing that using a low level block like |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Is your request related to a problem? Please describe.
Up until the release of v18.0.0 (i.e., this feature was present up until v17.24.0 and removed in #1680), it was possible to specify EBS root volume encryption by passing in
root_kms_key_id
.I can't find it documented anywhere that this feature was intentionally dropped. As far as I can tell, the only way to achieve encrypted root EBS volumes is to explicitly configure
block_device_mappings
, e.g.:Describe the solution you'd like.
A high level variable like
root_kms_key_id
to be passed into the node group modules (at least EKS-managed and self-managed) would be very nice, especially compared to the relatively low levelblock_device_mappings
.The text was updated successfully, but these errors were encountered: