diff --git a/examples/irsa/README.md b/examples/irsa/README.md index 53dc500dab..ab81f649d7 100644 --- a/examples/irsa/README.md +++ b/examples/irsa/README.md @@ -1,6 +1,6 @@ # IAM Roles for Service Accounts -This example shows how to create an IAM role to be used for a Kubernetes `ServiceAccount`. It will create a policy and role to be used by the [cluster-autoscaler](https://github.com/kubernetes/autoscaler/tree/master/cluster-autoscaler) using the [public Helm chart](https://github.com/kubernetes/autoscaler/tree/master/charts/cluster-autoscaler-chart). +This example shows how to create an IAM role to be used for a Kubernetes `ServiceAccount`. It will create a policy and role to be used by the [cluster-autoscaler](https://github.com/kubernetes/autoscaler/tree/master/cluster-autoscaler) using the [public Helm chart](https://github.com/kubernetes/autoscaler/tree/master/charts/cluster-autoscaler). The AWS documentation for IRSA is here: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html diff --git a/examples/irsa/irsa.tf b/examples/irsa/irsa.tf index 1775e33ecb..c841d4f266 100644 --- a/examples/irsa/irsa.tf +++ b/examples/irsa/irsa.tf @@ -44,7 +44,7 @@ data "aws_iam_policy_document" "cluster_autoscaler" { condition { test = "StringEquals" - variable = "autoscaling:ResourceTag/kubernetes.io/cluster/${module.eks.cluster_id}" + variable = "autoscaling:ResourceTag/k8s.io/cluster-autoscaler/${module.eks.cluster_id}" values = ["owned"] }