From 2968b00b4bdd314dd6bc4ce5b54acbe10db6ce6f Mon Sep 17 00:00:00 2001 From: DooHyoJeong Date: Thu, 25 Sep 2025 01:07:38 +0900 Subject: [PATCH] =?UTF-8?q?chore[deploy]:=20=EA=B6=8C=ED=95=9C=20=EB=B3=80?= =?UTF-8?q?=EA=B2=BD?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .github/workflows/CI-CD_Pipeline.yml | 2 +- infra/main.tf | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/CI-CD_Pipeline.yml b/.github/workflows/CI-CD_Pipeline.yml index 5bd0fc96..e16cd5df 100644 --- a/.github/workflows/CI-CD_Pipeline.yml +++ b/.github/workflows/CI-CD_Pipeline.yml @@ -218,7 +218,7 @@ jobs: aws-region: ${{ secrets.AWS_REGION }} aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} - instance-ids: "i-094fd5f8988b7330b" + instance-ids: "i-084a4704f4e017cc4" working-directory: / comment: Deploy command: | diff --git a/infra/main.tf b/infra/main.tf index 89d83377..ec6216b2 100644 --- a/infra/main.tf +++ b/infra/main.tf @@ -171,7 +171,7 @@ resource "aws_iam_role_policy_attachment" "s3_full_access" { # EC2 역할에 AmazonEC2RoleforSSM 정책을 부착 resource "aws_iam_role_policy_attachment" "ec2_ssm" { role = aws_iam_role.ec2_role_1.name - policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM" + policy_arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" } # IAM 인스턴스 프로파일 생성