Enable fleet instance types

This article explains how to update your workspace permissions to allow the use of fleet instance types. For more information on fleet instance types, see AWS Fleet instance types.

Note

If your workspace was created after May 2023, your workspace should have these permissions by default.

Requirements

To enable fleet permissions, you must have permission to add a policy to the IAM role that was used to deploy your workspace.

Locate your workspace’s IAM role

If you are unsure which IAM role was used to deploy your workspace, account admins can locate that information in the account console. Use the following steps to find the IAM role:

  1. In the account console, click Workspaces.

  2. Locate your workspace and click its name.

  3. The Credentials tile includes the ARN and a link to the IAM role’s credential configuration.

Add a fleet policy to the IAM role

For Databricks to enable fleet instance types in your workspace, you must create an access policy that grants your workspace fleet-related permissions. After you add the following policy to the IAM role, users in your workspace can access fleet instance types.

  1. In the Roles section of the IAM console, click the IAM role associated with your workspace deployment.

  2. Click the Add permissions drop-down menu and select Create inline policy.

  3. In the policy editor, click the JSON tab.

  4. Copy and paste the following access policy:

    {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "VisualEditor0",
                "Effect": "Allow",
                "Action": [
                    "ec2:DescribeFleetHistory",
                    "ec2:ModifyFleet",
                    "ec2:DeleteFleets",
                    "ec2:DescribeFleetInstances",
                    "ec2:DescribeFleets",
                    "ec2:CreateFleet",
                    "ec2:DeleteLaunchTemplate",
                    "ec2:GetLaunchTemplateData",
                    "ec2:CreateLaunchTemplate",
                    "ec2:DescribeLaunchTemplates",
                    "ec2:DescribeLaunchTemplateVersions",
                    "ec2:ModifyLaunchTemplate",
                    "ec2:DeleteLaunchTemplateVersions",
                    "ec2:CreateLaunchTemplateVersion",
                    "ec2:AssignPrivateIpAddresses",
                    "ec2:GetSpotPlacementScores"
                ],
                "Resource": "*"
            }
        ]
    }
    
  5. Click Review policy.

  6. In the Name field, enter a policy name.

  7. Click Create policy.