@@ -159,19 +159,19 @@ EOF
159159}
160160
161161resource "aws_iam_role_policy_attachment" "node_AmazonEKSWorkerNodeMinimalPolicy" {
162- policy_arn = " arn:aws :iam::aws:policy/AmazonEKSWorkerNodeMinimalPolicy"
162+ policy_arn = " arn:${ var . partition } :iam::aws:policy/AmazonEKSWorkerNodeMinimalPolicy"
163163 role = aws_iam_role. node . name
164164}
165165
166166# to download images from this account ECR
167167resource "aws_iam_role_policy_attachment" "node_AmazonEC2ContainerRegistryPullOnly" {
168- policy_arn = " arn:aws :iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
168+ policy_arn = " arn:${ var . partition } :iam::aws:policy/AmazonEC2ContainerRegistryPullOnly"
169169 role = aws_iam_role. node . name
170170}
171171
172172# To be able to install Cloud Watch EKS Addons with access to all metrics
173173resource "aws_iam_role_policy_attachment" "node_CloudWatchAgentServerPolicy" {
174- policy_arn = " arn:aws :iam::aws:policy/CloudWatchAgentServerPolicy"
174+ policy_arn = " arn:${ var . partition } :iam::aws:policy/CloudWatchAgentServerPolicy"
175175 role = aws_iam_role. node . name
176176}
177177
@@ -196,27 +196,27 @@ resource "aws_iam_role" "cluster" {
196196}
197197
198198resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSClusterPolicy" {
199- policy_arn = " arn:aws :iam::aws:policy/AmazonEKSClusterPolicy"
199+ policy_arn = " arn:${ var . partition } :iam::aws:policy/AmazonEKSClusterPolicy"
200200 role = aws_iam_role. cluster . name
201201}
202202
203203resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSComputePolicy" {
204- policy_arn = " arn:aws :iam::aws:policy/AmazonEKSComputePolicy"
204+ policy_arn = " arn:${ var . partition } :iam::aws:policy/AmazonEKSComputePolicy"
205205 role = aws_iam_role. cluster . name
206206}
207207
208208resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSBlockStoragePolicy" {
209- policy_arn = " arn:aws :iam::aws:policy/AmazonEKSBlockStoragePolicy"
209+ policy_arn = " arn:${ var . partition } :iam::aws:policy/AmazonEKSBlockStoragePolicy"
210210 role = aws_iam_role. cluster . name
211211}
212212
213213resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSLoadBalancingPolicy" {
214- policy_arn = " arn:aws :iam::aws:policy/AmazonEKSLoadBalancingPolicy"
214+ policy_arn = " arn:${ var . partition } :iam::aws:policy/AmazonEKSLoadBalancingPolicy"
215215 role = aws_iam_role. cluster . name
216216}
217217
218218resource "aws_iam_role_policy_attachment" "cluster_AmazonEKSNetworkingPolicy" {
219- policy_arn = " arn:aws :iam::aws:policy/AmazonEKSNetworkingPolicy"
219+ policy_arn = " arn:${ var . partition } :iam::aws:policy/AmazonEKSNetworkingPolicy"
220220 role = aws_iam_role. cluster . name
221221}
222222
@@ -226,7 +226,7 @@ resource "null_resource" "cluster-config" {
226226 always_run = timestamp ()
227227 }
228228 provisioner "local-exec" {
229- command = " ${ path . module } /configure-cluster.sh '${ local . account_id } ' '${ aws_eks_cluster . cluster . name } ' '${ var . region } ' '${ jsonencode (var. namespaces )} ' '${ var . install_nginx } ' '${ nonsensitive (var. dd_api_key )} ' '${ nonsensitive (var. dd_app_key )} '"
229+ command = " ${ path . module } /configure-cluster.sh '${ var . partition } ' ' ${ local . account_id } ' '${ aws_eks_cluster . cluster . name } ' '${ var . region } ' '${ jsonencode (var. namespaces )} ' '${ var . install_nginx } ' '${ nonsensitive (var. dd_api_key )} ' '${ nonsensitive (var. dd_app_key )} '"
230230 }
231231
232232 depends_on = [
0 commit comments