Difference between revisions of "Terraform resource: aws iam role policy attachment"
Jump to navigation
Jump to search
Line 24: | Line 24: | ||
* [[aws_eks_node_group]] | * [[aws_eks_node_group]] | ||
* [[aws_iam_instance_profile]] | * [[aws_iam_instance_profile]] | ||
+ | * <code>[[aws_iam_role_policy]]</code> | ||
== See also == | == See also == |
Revision as of 09:36, 12 June 2024
Examples
Module:
# module.eks.aws_iam_role_policy_attachment.cluster_AmazonEKSClusterPolicy[0] will be created + resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSClusterPolicy" { + id = (known after apply) + policy_arn = "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy" + role = (known after apply) }
resource "aws_iam_role_policy_attachment" "your_node_policy" { role = aws_iam_role.your_node_role.name policy_arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" }
resource "aws_eks_node_group" "example" { cluster_name = aws_eks_cluster.example.name node_group_name = "example" node_role_arn = aws_iam_role.example.arn subnet_ids = aws_subnet.example[*].id scaling_config { desired_size = 1 max_size = 2 min_size = 1 } update_config { max_unavailable = 1 } # Ensure that IAM Role permissions are created before and deleted after EKS Node Group handling. # Otherwise, EKS will not be able to properly delete EC2 Instances and Elastic Network Interfaces. depends_on = [ aws_iam_role_policy_attachment.example-AmazonEKSWorkerNodePolicy, aws_iam_role_policy_attachment.example-AmazonEKS_CNI_Policy, aws_iam_role_policy_attachment.example-AmazonEC2ContainerRegistryReadOnly, ] }
Related
- Terraform resource:
aws_iam_role
- aws_eks_node_group
- aws_iam_instance_profile
aws_iam_role_policy
See also
aws_iam_role_policy_attachment
- Terraform IAM resources:
aws_iam_user, aws_iam_group, aws_iam_role, aws_iam_role_policy_attachment
,aws_iam_policy
,aws_iam_role_policy, aws_iam_user_policy, aws_iam_user_policy_attachment
,aws_iam_access_key, aws_iam_group_policy, aws_iam_group_policy_attachment, aws_iam_openid_connect_provider
Advertising: