Skip to content

Commit 73a591a

Browse files
committed
fix: shorten IAM name_prefix to stay within 38-char limit
1 parent fedeb74 commit 73a591a

2 files changed

Lines changed: 6 additions & 6 deletions

File tree

manifests/modules/fastpaths/developers/.workshop/terraform/preprovision/fluent-bit.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ resource "aws_cloudwatch_log_group" "fluentbit" {
1616

1717
# IAM role for FluentBit with CloudWatch write permissions using Pod Identity
1818
resource "aws_iam_role" "auto_fluentbit" {
19-
name_prefix = "${var.eks_cluster_auto_id}-fluent-bit-"
19+
name_prefix = "${var.eks_cluster_auto_id}-fb-"
2020

2121
assume_role_policy = jsonencode({
2222
Version = "2012-10-17"
@@ -37,7 +37,7 @@ resource "aws_iam_role" "auto_fluentbit" {
3737

3838
# IAM policy for FluentBit CloudWatch log write access
3939
resource "aws_iam_policy" "auto_fluentbit_cloudwatch" {
40-
name_prefix = "${var.eks_cluster_auto_id}-fluent-bit-"
40+
name_prefix = "${var.eks_cluster_auto_id}-fb-pol-"
4141
description = "CloudWatch Logs policy for FluentBit"
4242

4343
policy = jsonencode({

manifests/modules/fastpaths/developers/.workshop/terraform/preprovision/secrets-manager.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ resource "helm_release" "external_secrets" {
5555

5656
# IAM role for Secrets Manager access using Pod Identity
5757
resource "aws_iam_role" "secrets_manager_role" {
58-
name_prefix = "${var.eks_cluster_auto_id}-secrets-"
58+
name_prefix = "${var.eks_cluster_auto_id}-sm-"
5959

6060
assume_role_policy = jsonencode({
6161
Version = "2012-10-17"
@@ -76,7 +76,7 @@ resource "aws_iam_role" "secrets_manager_role" {
7676

7777
# IAM policy for Secrets Manager access (keeping same permissions)
7878
resource "aws_iam_policy" "secrets_manager" {
79-
name_prefix = "${var.eks_cluster_auto_id}-secrets-manager-"
79+
name_prefix = "${var.eks_cluster_auto_id}-sm-pol-"
8080
policy = <<POLICY
8181
{
8282
"Version": "2012-10-17",
@@ -126,7 +126,7 @@ locals {
126126

127127
# IAM role for Secrets Manager access using Pod Identity
128128
resource "aws_iam_role" "external_secrets" {
129-
name_prefix = "${var.eks_cluster_auto_id}-external-secrets"
129+
name_prefix = "${var.eks_cluster_auto_id}-eso-"
130130

131131
assume_role_policy = jsonencode({
132132
Version = "2012-10-17"
@@ -147,7 +147,7 @@ resource "aws_iam_role" "external_secrets" {
147147

148148
# IAM policy for Secrets Manager access (keeping same permissions)
149149
resource "aws_iam_policy" "external_secrets" {
150-
name_prefix = "${var.eks_cluster_auto_id}-secrets-manager-"
150+
name_prefix = "${var.eks_cluster_auto_id}-eso-pol-"
151151
policy = <<POLICY
152152
{
153153
"Version": "2012-10-17",

0 commit comments

Comments
 (0)