From e3216e3cf80cb59089ba0e0365c6650520000aaf Mon Sep 17 00:00:00 2001 From: Br0mZ <38252710+Br0mZ@users.noreply.github.com> Date: Thu, 26 Aug 2021 13:04:35 +0200 Subject: [PATCH] docs: Fix cluster-autoscaler tags in irsa example (#1436) --- examples/irsa/README.md | 2 +- examples/irsa/irsa.tf | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/examples/irsa/README.md b/examples/irsa/README.md index 53dc500dab..ab81f649d7 100644 --- a/examples/irsa/README.md +++ b/examples/irsa/README.md @@ -1,6 +1,6 @@ # IAM Roles for Service Accounts -This example shows how to create an IAM role to be used for a Kubernetes `ServiceAccount`. It will create a policy and role to be used by the [cluster-autoscaler](https://github.com/kubernetes/autoscaler/tree/master/cluster-autoscaler) using the [public Helm chart](https://github.com/kubernetes/autoscaler/tree/master/charts/cluster-autoscaler-chart). +This example shows how to create an IAM role to be used for a Kubernetes `ServiceAccount`. It will create a policy and role to be used by the [cluster-autoscaler](https://github.com/kubernetes/autoscaler/tree/master/cluster-autoscaler) using the [public Helm chart](https://github.com/kubernetes/autoscaler/tree/master/charts/cluster-autoscaler). The AWS documentation for IRSA is here: https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html diff --git a/examples/irsa/irsa.tf b/examples/irsa/irsa.tf index 1775e33ecb..c841d4f266 100644 --- a/examples/irsa/irsa.tf +++ b/examples/irsa/irsa.tf @@ -44,7 +44,7 @@ data "aws_iam_policy_document" "cluster_autoscaler" { condition { test = "StringEquals" - variable = "autoscaling:ResourceTag/kubernetes.io/cluster/${module.eks.cluster_id}" + variable = "autoscaling:ResourceTag/k8s.io/cluster-autoscaler/${module.eks.cluster_id}" values = ["owned"] }