From 5595de1d3dabff47f33ca6172f9c91c2e6391f74 Mon Sep 17 00:00:00 2001 From: Jason Yoo Date: Sun, 17 Mar 2024 23:45:51 +0900 Subject: [PATCH] =?UTF-8?q?[=EB=AA=A8=EB=8B=88=ED=84=B0=EB=A7=81]=20scc-mo?= =?UTF-8?q?nitoring=20service=20account=20=EA=B0=80=20deploy-secret=20role?= =?UTF-8?q?=20=EC=9D=84=20=EC=82=AC=EC=9A=A9=ED=95=A0=20=EC=88=98=20?= =?UTF-8?q?=EC=9E=88=EB=8F=84=EB=A1=9D=20(#240)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit feat: add scc-monitoring service account to deploy secret role --- infra/terraform/scc/iam.tf | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/infra/terraform/scc/iam.tf b/infra/terraform/scc/iam.tf index e21b4db86..c0b0d4386 100644 --- a/infra/terraform/scc/iam.tf +++ b/infra/terraform/scc/iam.tf @@ -57,7 +57,8 @@ data "aws_iam_policy_document" "scc_deploy_secret" { variable = "k3s.staircrusher.club:sub" values = [ "system:serviceaccount:scc:scc-server-deploy-secret", - "system:serviceaccount:scc-redash:scc-redash-deploy-secret" + "system:serviceaccount:scc-redash:scc-redash-deploy-secret", + "system:serviceaccount:scc-monitoring:scc-monitoring-deploy-secret", ] } }