resource "helm_release" "job-executer-service" { name = "job-executer-service" chart = "https://github.com/keptn-contrib/job-executor-service/releases/download/0.3.0/job-executor-service-0.3.0.tgz" namespace = var.KEPTN_NAMESPACE timeout = 500 set { name = "tolerations[0].key" value = "dedicated" } set { name = "tolerations[0].value" value = "group2" } set { name = "tolerations[0].operator" value = "Equal" } set { name = "tolerations[0].effect" value = "NoSchedule" } set { name = "nodeSelector.role" value = "group2" } set { name = "remoteControlPlane.api.hostname" value = "api-gateway-nginx.keptn" } set { name = "remoteControlPlane.api.token" value = module.keptn-api-token.result } set { name = "remoteControlPlane.topicSubscription" value = "sh.keptn.event.deployment.triggered\\,sh.keptn.event.test.triggered\\,sh.keptn.event.action.triggered\\,sh.keptn.event.uninstall.triggered" } depends_on = [ helm_release.keptn, module.keptn-api-token ] } resource "kubernetes_service_account" "jes-deploy-using-helm" { metadata { name = "jes-deploy-using-helm" namespace = var.KEPTN_NAMESPACE # annotations = { # "eks.amazonaws.com/role-arn" = aws_iam_role.externaldns_route53.arn # } } automount_service_account_token = true depends_on = [ helm_release.keptn ] } resource "kubernetes_cluster_role_binding" "keptn-jes-deploy-using-helm" { metadata { name = "keptn-jes-deploy-using-helm" } role_ref { api_group = "rbac.authorization.k8s.io" kind = "ClusterRole" name = "cluster-admin" } subject { kind = "ServiceAccount" name = "jes-deploy-using-helm" namespace = var.KEPTN_NAMESPACE } }