instance_profile.tf 1.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. resource "aws_iam_instance_profile" "instance_profile" {
  2. name = "${ var.prefix }-instance-profile"
  3. path = "/instance/"
  4. role = aws_iam_role.instance_role.name
  5. }
  6. resource "aws_iam_role" "instance_role" {
  7. name = "${ var.prefix }-instance-role"
  8. path = "/instance/"
  9. assume_role_policy = <<EOF
  10. {
  11. "Version": "2012-10-17",
  12. "Statement": [
  13. {
  14. "Sid": "",
  15. "Effect": "Allow",
  16. "Principal": {
  17. "Service": [
  18. "ec2.amazonaws.com",
  19. "ssm.amazonaws.com"
  20. ]
  21. },
  22. "Action": "sts:AssumeRole"
  23. }
  24. ]
  25. }
  26. EOF
  27. }
  28. # These 3 are the default profile attachments:
  29. resource "aws_iam_role_policy_attachment" "instance_AmazonEC2RoleforSSM" {
  30. role = aws_iam_role.instance_role.name
  31. policy_arn = "arn:${var.aws_partition}:iam::aws:policy/service-role/AmazonEC2RoleforSSM"
  32. }
  33. resource "aws_iam_role_policy_attachment" "instance_default_policy_attach" {
  34. role = aws_iam_role.instance_role.name
  35. policy_arn = "arn:${ var.aws_partition }:iam::${ var.aws_account_id }:policy/launchroles/default_instance_tag_read"
  36. }
  37. resource "aws_iam_role_policy_attachment" "instance_cloudwatch_policy_attach" {
  38. role = aws_iam_role.instance_role.name
  39. policy_arn = "arn:${ var.aws_partition }:iam::${ var.aws_account_id }:policy/cloudwatch_events"
  40. }