Code development platform for open source projects from the European Union institutions

Skip to content
Snippets Groups Projects
Unverified Commit 3cc91606 authored by Kevin Coleman's avatar Kevin Coleman Committed by GitHub
Browse files

Merge pull request #63 from aws-samples/bug-fix-emr-on-eks

emr on eks fix for service account
parents ba666b8c 77acd2b0
No related branches found
No related tags found
No related merge requests found
......@@ -15,19 +15,20 @@ This module deploys the necessary resources to run EMR Spark Jobs on EKS Cluster
```hcl
#---------------------------------------
# ENABLE EMR ON EKS
#---------------------------------------
enable_emr_on_eks = true
emr_on_eks_teams = {
data_team_a = {
emr_on_eks_username = "emr-containers"
emr_on_eks_namespace = "spark"
emr_on_eks_iam_role_name = "EMRonEKSExecution"
emr_on_eks_namespace = "emr-data-team-a"
emr_on_eks_iam_role_name = "emr-eks-data-team-a"
}
data_team_b = {
emr_on_eks_username = "data-team-b-user"
emr_on_eks_namespace = "data-team-b"
emr_on_eks_iam_role_name = "data_team_b"
emr_on_eks_namespace = "emr-data-team-b"
emr_on_eks_iam_role_name = "emr-eks-data-team-b"
}
}
```
......
......@@ -74,9 +74,9 @@ locals {
# EMR on EKS IAM Roles for aws-auth
emr_on_eks_config_map = var.enable_emr_on_eks == true ? [
for key, node in var.emr_on_eks_teams : {
{
rolearn : "arn:${data.aws_partition.current.partition}:iam::${data.aws_caller_identity.current.account_id}:role/AWSServiceRoleForAmazonEMRContainers"
username : "${node.emr_on_eks_username}"
username : "emr-containers"
groups : []
}
] : []
......
locals {
default_emr_on_eks_teams = {
emr_on_eks_username = "emr-containers"
emr_on_eks_namespace = "spark"
emr_on_eks_iam_role_name = "EMRonEKSExecution"
emr_on_eks_namespace = "emr-on-eks-spark"
emr_on_eks_iam_role_name = "emr-on-eks-spark-iam-role"
}
emr_on_eks_team = merge(
local.default_emr_on_eks_teams,
var.emr_on_eks_teams
)
emr_service_name = "emr-containers"
}
......@@ -16,7 +16,7 @@ resource "kubernetes_namespace" "spark" {
resource "kubernetes_role" "emr_containers" {
metadata {
name = local.emr_on_eks_team["emr_on_eks_username"]
name = local.emr_service_name
namespace = kubernetes_namespace.spark.id
}
......@@ -65,19 +65,19 @@ resource "kubernetes_role" "emr_containers" {
resource "kubernetes_role_binding" "emr_containers" {
metadata {
name = local.emr_on_eks_team["emr_on_eks_username"]
name = local.emr_service_name
namespace = kubernetes_namespace.spark.id
}
subject {
kind = "User"
name = local.emr_on_eks_team["emr_on_eks_username"]
name = local.emr_service_name
}
role_ref {
api_group = "rbac.authorization.k8s.io"
kind = "Role"
name = local.emr_on_eks_team["emr_on_eks_username"]
name = local.emr_service_name
}
}
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment