@@ -47,34 +47,34 @@ module "irsa_role" {
47
47
tags = local. tags
48
48
}
49
49
50
- module "cluster_autoscaler_irsa_role " {
50
+ module "cert_manager_irsa_role " {
51
51
source = " ../../modules/iam-role-for-service-accounts-eks"
52
52
53
- role_name = " cluster-autoscaler "
54
- attach_cluster_autoscaler_policy = true
55
- cluster_autoscaler_cluster_ids = [module . eks . cluster_id ]
53
+ role_name = " cert-manager "
54
+ attach_external_dns_policy = true
55
+ cert_manager_hosted_zone_arns = [" arn:aws:route53:::hostedzone/IClearlyMadeThisUp " ]
56
56
57
57
oidc_providers = {
58
58
ex = {
59
59
provider_arn = module.eks.oidc_provider_arn
60
- namespace_service_accounts = [" kube-system:cluster-autoscaler " ]
60
+ namespace_service_accounts = [" kube-system:cert-manager " ]
61
61
}
62
62
}
63
63
64
64
tags = local. tags
65
65
}
66
66
67
- module "external_dns_irsa_role " {
67
+ module "cluster_autoscaler_irsa_role " {
68
68
source = " ../../modules/iam-role-for-service-accounts-eks"
69
69
70
- role_name = " external-dns "
71
- attach_external_dns_policy = true
72
- external_dns_hosted_zone_arns = [" arn:aws:route53:::hostedzone/IClearlyMadeThisUp " ]
70
+ role_name = " cluster-autoscaler "
71
+ attach_cluster_autoscaler_policy = true
72
+ cluster_autoscaler_cluster_ids = [module . eks . cluster_id ]
73
73
74
74
oidc_providers = {
75
75
ex = {
76
76
provider_arn = module.eks.oidc_provider_arn
77
- namespace_service_accounts = [" default:my-app " , " canary:my-app " ]
77
+ namespace_service_accounts = [" kube-system:cluster-autoscaler " ]
78
78
}
79
79
}
80
80
@@ -113,54 +113,53 @@ module "efs_csi_irsa_role" {
113
113
tags = local. tags
114
114
}
115
115
116
- module "vpc_cni_ipv4_irsa_role " {
116
+ module "external_dns_irsa_role " {
117
117
source = " ../../modules/iam-role-for-service-accounts-eks"
118
118
119
- role_name = " vpc-cni-ipv4 "
120
- attach_vpc_cni_policy = true
121
- vpc_cni_enable_ipv4 = true
119
+ role_name = " external-dns "
120
+ attach_external_dns_policy = true
121
+ external_dns_hosted_zone_arns = [ " arn:aws:route53:::hostedzone/IClearlyMadeThisUp " ]
122
122
123
123
oidc_providers = {
124
124
ex = {
125
125
provider_arn = module.eks.oidc_provider_arn
126
- namespace_service_accounts = [" kube-system:aws-vpc-cni " ]
126
+ namespace_service_accounts = [" kube-system:external-dns " ]
127
127
}
128
128
}
129
129
130
130
tags = local. tags
131
131
}
132
132
133
- module "vpc_cni_ipv6_irsa_role " {
133
+ module "external_secrets_irsa_role " {
134
134
source = " ../../modules/iam-role-for-service-accounts-eks"
135
135
136
- role_name = " vpc-cni-ipv6"
137
- attach_vpc_cni_policy = true
138
- vpc_cni_enable_ipv6 = true
136
+ role_name = " external-secrets"
137
+ attach_external_secrets_policy = true
138
+ external_secrets_ssm_parameter_arns = [" arn:aws:ssm:*:*:parameter/foo" ]
139
+ external_secrets_secrets_manager_arns = [" arn:aws:secretsmanager:*:*:secret:bar" ]
139
140
140
141
oidc_providers = {
141
142
ex = {
142
143
provider_arn = module.eks.oidc_provider_arn
143
- namespace_service_accounts = [" kube-system:aws-vpc-cni " ]
144
+ namespace_service_accounts = [" default:kubernetes-external-secrets " ]
144
145
}
145
146
}
146
147
147
148
tags = local. tags
148
149
}
149
150
150
- module "node_termination_handler_irsa_role " {
151
+ module "fsx_lustre_csi_irsa_role " {
151
152
source = " ../../modules/iam-role-for-service-accounts-eks"
152
153
153
- role_name = " node-termination-handler "
154
- attach_node_termination_handler_policy = true
154
+ role_name = " fsx-lustre-csi "
155
+ attach_fsx_lustre_csi_policy = true
155
156
156
157
oidc_providers = {
157
158
ex = {
158
159
provider_arn = module.eks.oidc_provider_arn
159
- namespace_service_accounts = [" kube-system:aws-node " ]
160
+ namespace_service_accounts = [" kube-system:fsx-csi-controller-sa " ]
160
161
}
161
162
}
162
-
163
- tags = local. tags
164
163
}
165
164
166
165
module "karpenter_controller_irsa_role" {
@@ -214,6 +213,72 @@ module "load_balancer_controller_targetgroup_binding_only_irsa_role" {
214
213
tags = local. tags
215
214
}
216
215
216
+ module "amazon_managed_service_prometheus_irsa_role" {
217
+ source = " ../../modules/iam-role-for-service-accounts-eks"
218
+
219
+ role_name = " amazon-managed-service-prometheus"
220
+ attach_amazon_managed_service_prometheus_policy = true
221
+
222
+ oidc_providers = {
223
+ ex = {
224
+ provider_arn = module.eks.oidc_provider_arn
225
+ namespace_service_accounts = [" prometheus:amp-ingest" ]
226
+ }
227
+ }
228
+
229
+ tags = local. tags
230
+ }
231
+
232
+ module "node_termination_handler_irsa_role" {
233
+ source = " ../../modules/iam-role-for-service-accounts-eks"
234
+
235
+ role_name = " node-termination-handler"
236
+ attach_node_termination_handler_policy = true
237
+
238
+ oidc_providers = {
239
+ ex = {
240
+ provider_arn = module.eks.oidc_provider_arn
241
+ namespace_service_accounts = [" kube-system:aws-node" ]
242
+ }
243
+ }
244
+
245
+ tags = local. tags
246
+ }
247
+
248
+ module "vpc_cni_ipv4_irsa_role" {
249
+ source = " ../../modules/iam-role-for-service-accounts-eks"
250
+
251
+ role_name = " vpc-cni-ipv4"
252
+ attach_vpc_cni_policy = true
253
+ vpc_cni_enable_ipv4 = true
254
+
255
+ oidc_providers = {
256
+ ex = {
257
+ provider_arn = module.eks.oidc_provider_arn
258
+ namespace_service_accounts = [" kube-system:aws-vpc-cni" ]
259
+ }
260
+ }
261
+
262
+ tags = local. tags
263
+ }
264
+
265
+ module "vpc_cni_ipv6_irsa_role" {
266
+ source = " ../../modules/iam-role-for-service-accounts-eks"
267
+
268
+ role_name = " vpc-cni-ipv6"
269
+ attach_vpc_cni_policy = true
270
+ vpc_cni_enable_ipv6 = true
271
+
272
+ oidc_providers = {
273
+ ex = {
274
+ provider_arn = module.eks.oidc_provider_arn
275
+ namespace_service_accounts = [" kube-system:aws-vpc-cni" ]
276
+ }
277
+ }
278
+
279
+ tags = local. tags
280
+ }
281
+
217
282
# ###############################################################################
218
283
# Supporting Resources
219
284
# ###############################################################################
0 commit comments