@@ -411,6 +411,7 @@ Resources:
411411 - !Sub arn:aws:iam::${AWS::AccountId}:role/ai-jvm-analyzer*
412412 - !Sub arn:aws:iam::${AWS::AccountId}:role/service-role/unicorn*
413413 - !Sub arn:aws:iam::${AWS::AccountId}:role/unicorn*
414+ - !Sub arn:aws:iam::${AWS::AccountId}:role/workshop-*
414415 Sid : PassRole
415416 - Action : ec2:RunInstances
416417 Condition :
@@ -780,6 +781,27 @@ Resources:
780781 Fn::GetAtt :
781782 - IdeInstanceLauncherFunction803C5A2A
782783 - Arn
784+ SecurityGroupIds :
785+ Fn::Join :
786+ - " "
787+ - - Fn::GetAtt :
788+ - IdeSecurityGroup73B02454
789+ - GroupId
790+ - " ,"
791+ - Fn::GetAtt :
792+ - IdeInternalSecurityGroupB0A5D76B
793+ - GroupId
794+ SubnetIds :
795+ Fn::Join :
796+ - " "
797+ - - Ref : VpcPublicSubnet1Subnet8E8DEDC0
798+ - " ,"
799+ - Ref : VpcPublicSubnet2SubnetA811849C
800+ VolumeSize : " 50"
801+ IamInstanceProfileArn :
802+ Fn::GetAtt :
803+ - IdeInstanceProfile61B92038
804+ - Arn
783805 InstanceName : ide
784806 InstanceTypes : m6a.xlarge,m7a.xlarge
785807 UserData :
@@ -920,27 +942,6 @@ Resources:
920942 fi
921943 ImageId :
922944 Ref : SsmParameterValueawsserviceamiamazonlinuxlatestal2023amikernel61x8664C96584B6F00A464EAD1953AFF4B05118Parameter
923- SecurityGroupIds :
924- Fn::Join :
925- - " "
926- - - Fn::GetAtt :
927- - IdeSecurityGroup73B02454
928- - GroupId
929- - " ,"
930- - Fn::GetAtt :
931- - IdeInternalSecurityGroupB0A5D76B
932- - GroupId
933- SubnetIds :
934- Fn::Join :
935- - " "
936- - - Ref : VpcPublicSubnet1Subnet8E8DEDC0
937- - " ,"
938- - Ref : VpcPublicSubnet2SubnetA811849C
939- VolumeSize : " 50"
940- IamInstanceProfileArn :
941- Fn::GetAtt :
942- - IdeInstanceProfile61B92038
943- - Arn
944945 UpdateReplacePolicy : Delete
945946 DeletionPolicy : Delete
946947 IdeEipAssociationDFF81215 :
@@ -1319,12 +1320,12 @@ Resources:
13191320 Environment :
13201321 ComputeType : BUILD_GENERAL1_MEDIUM
13211322 EnvironmentVariables :
1322- - Name : GIT_BRANCH
1323- Type : PLAINTEXT
1324- Value : new-ws-infra
13251323 - Name : TEMPLATE_TYPE
13261324 Type : PLAINTEXT
13271325 Value : java-on-amazon-eks
1326+ - Name : GIT_BRANCH
1327+ Type : PLAINTEXT
1328+ Value : new-ws-infra
13281329 Image : aws/codebuild/amazonlinux2-x86_64-standard:5.0
13291330 ImagePullCredentialsType : CODEBUILD
13301331 PrivilegedMode : false
@@ -1529,12 +1530,12 @@ Resources:
15291530 Description : workshop-setup build complete
15301531 EventPattern :
15311532 detail :
1533+ project-name :
1534+ - Ref : CodeBuildProjectA0FF5539
15321535 build-status :
15331536 - SUCCEEDED
15341537 - FAILED
15351538 - STOPPED
1536- project-name :
1537- - Ref : CodeBuildProjectA0FF5539
15381539 detail-type :
15391540 - CodeBuild Build State Change
15401541 source :
@@ -1566,13 +1567,13 @@ Resources:
15661567 Fn::GetAtt :
15671568 - CodeBuildStartLambdaFunction8349284F
15681569 - Arn
1569- ContentHash : " 1766939994295"
15701570 CodeBuildIamRoleArn :
15711571 Fn::GetAtt :
15721572 - CodeBuildRoleE9A44575
15731573 - Arn
15741574 ProjectName :
15751575 Ref : CodeBuildProjectA0FF5539
1576+ ContentHash : " 1767018258469"
15761577 DependsOn :
15771578 - CodeBuildCompleteRuleAllowEventRuleWorkshopStackCodeBuildReportLambdaFunctionD77C60919E0B0C89
15781579 - CodeBuildCompleteRuleEE9277E8
@@ -1837,6 +1838,31 @@ Resources:
18371838 - ThreadAnalysisSecurityGroup28B00BCE
18381839 - GroupId
18391840 ToPort : 443
1841+ EksCloudWatchAgentRole1979BC79 :
1842+ Type : AWS::IAM::Role
1843+ Properties :
1844+ AssumeRolePolicyDocument :
1845+ Statement :
1846+ - Action :
1847+ - sts:AssumeRole
1848+ - sts:TagSession
1849+ Effect : Allow
1850+ Principal :
1851+ Service : pods.eks.amazonaws.com
1852+ Version : " 2012-10-17"
1853+ Description : EKS Pod Identity role for CloudWatch Observability add-on
1854+ ManagedPolicyArns :
1855+ - Fn::Join :
1856+ - " "
1857+ - - "arn:"
1858+ - Ref : AWS::Partition
1859+ - :iam::aws:policy/CloudWatchAgentServerPolicy
1860+ - Fn::Join :
1861+ - " "
1862+ - - "arn:"
1863+ - Ref : AWS::Partition
1864+ - :iam::aws:policy/AWSXrayWriteOnlyAccess
1865+ RoleName : workshop-eks-cloudwatch-agent-role
18401866 EksSecretsStoreDriverA84665C0 :
18411867 Type : AWS::EKS::Addon
18421868 Properties :
@@ -1884,7 +1910,7 @@ Resources:
18841910 - Ref : AWS::AccountId
18851911 - " -"
18861912 - Ref : AWS::Region
1887- - " -20251228173954 "
1913+ - " -20251229152418 "
18881914 PublicAccessBlockConfiguration :
18891915 BlockPublicAcls : true
18901916 BlockPublicPolicy : true
@@ -3021,6 +3047,14 @@ Outputs:
30213047 - password
30223048 Export :
30233049 Name : ide-password
3050+ EksCloudWatchAgentRoleArn304F2D87 :
3051+ Description : CloudWatch Agent Pod Identity Role ARN
3052+ Value :
3053+ Fn::GetAtt :
3054+ - EksCloudWatchAgentRole1979BC79
3055+ - Arn
3056+ Export :
3057+ Name : workshop-eks-cloudwatch-agent-role-arn
30243058Parameters :
30253059 SsmParameterValueawsserviceamiamazonlinuxlatestal2023amikernel61x8664C96584B6F00A464EAD1953AFF4B05118Parameter :
30263060 Type : AWS::SSM::Parameter::Value<AWS::EC2::Image::Id>
0 commit comments