@@ -55,7 +55,7 @@ resource "helm_release" "external_secrets" {
5555
5656# IAM role for Secrets Manager access using Pod Identity
5757resource "aws_iam_role" "secrets_manager_role" {
58- name_prefix = " ${ var . eks_cluster_auto_id } -secrets -"
58+ name_prefix = " ${ var . eks_cluster_auto_id } -sm -"
5959
6060 assume_role_policy = jsonencode ({
6161 Version = " 2012-10-17"
@@ -76,7 +76,7 @@ resource "aws_iam_role" "secrets_manager_role" {
7676
7777# IAM policy for Secrets Manager access (keeping same permissions)
7878resource "aws_iam_policy" "secrets_manager" {
79- name_prefix = " ${ var . eks_cluster_auto_id } -secrets-manager -"
79+ name_prefix = " ${ var . eks_cluster_auto_id } -sm-pol -"
8080 policy = << POLICY
8181{
8282 "Version": "2012-10-17",
@@ -126,7 +126,7 @@ locals {
126126
127127# IAM role for Secrets Manager access using Pod Identity
128128resource "aws_iam_role" "external_secrets" {
129- name_prefix = " ${ var . eks_cluster_auto_id } -external-secrets "
129+ name_prefix = " ${ var . eks_cluster_auto_id } -eso- "
130130
131131 assume_role_policy = jsonencode ({
132132 Version = " 2012-10-17"
@@ -147,7 +147,7 @@ resource "aws_iam_role" "external_secrets" {
147147
148148# IAM policy for Secrets Manager access (keeping same permissions)
149149resource "aws_iam_policy" "external_secrets" {
150- name_prefix = " ${ var . eks_cluster_auto_id } -secrets-manager -"
150+ name_prefix = " ${ var . eks_cluster_auto_id } -eso-pol -"
151151 policy = << POLICY
152152{
153153 "Version": "2012-10-17",
0 commit comments