diff --git a/modules/kubernetes-addons/aws-load-balancer-controller/data.tf b/modules/kubernetes-addons/aws-load-balancer-controller/data.tf index 1cbb0182a5..8686476ccd 100644 --- a/modules/kubernetes-addons/aws-load-balancer-controller/data.tf +++ b/modules/kubernetes-addons/aws-load-balancer-controller/data.tf @@ -1,4 +1,17 @@ data "aws_iam_policy_document" "aws_lb" { + statement { + sid = "" + effect = "Allow" + resources = ["*"] + actions = ["iam:CreateServiceLinkedRole"] + + condition { + test = "StringEquals" + variable = "iam:AWSServiceName" + values = ["elasticloadbalancing.amazonaws.com"] + } + } + statement { sid = "" effect = "Allow" @@ -28,7 +41,6 @@ data "aws_iam_policy_document" "aws_lb" { "elasticloadbalancing:DescribeTargetGroupAttributes", "elasticloadbalancing:DescribeTargetGroups", "elasticloadbalancing:DescribeTargetHealth", - "iam:CreateServiceLinkedRole", ] } @@ -234,6 +246,23 @@ data "aws_iam_policy_document" "aws_lb" { } } + statement { + sid = "" + effect = "Allow" + + resources = [ + "arn:${var.addon_context.aws_partition_id}:elasticloadbalancing:*:*:listener/net/*/*/*", + "arn:${var.addon_context.aws_partition_id}:elasticloadbalancing:*:*:listener/app/*/*/*", + "arn:${var.addon_context.aws_partition_id}:elasticloadbalancing:*:*:listener-rule/net/*/*/*", + "arn:${var.addon_context.aws_partition_id}:elasticloadbalancing:*:*:listener-rule/app/*/*/*", + ] + + actions = [ + "elasticloadbalancing:AddTags", + "elasticloadbalancing:RemoveTags", + ] + } + statement { sid = "" effect = "Allow"