Skip to content

Commit 8392667

Browse files
committed
인프라 이것 저것 갱신 (#2838)
1 parent af754ba commit 8392667

File tree

7 files changed

+52
-108
lines changed

7 files changed

+52
-108
lines changed

.vscode/settings.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -14,5 +14,6 @@
1414
"svelte.enable-ts-plugin": true,
1515
"svelte.plugin.svelte.defaultScriptLanguage": "ts",
1616
"typescript.tsdk": "node_modules/typescript/lib",
17-
"typescript.enablePromptUseWorkspaceTsdk": true
17+
"typescript.enablePromptUseWorkspaceTsdk": true,
18+
"workbench.activityBar.orientation": "vertical"
1819
}

apps/bedrock/pulumi/aws/iam.ts

+47-1
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,7 @@ const datadogIntegration = new aws.iam.Role('integration@datadog', {
8787
assumeRolePolicy: aws.iam.assumeRolePolicyForPrincipal({
8888
AWS: '417141415827',
8989
}),
90+
managedPolicyArns: [aws.iam.ManagedPolicy.SecurityAudit],
9091
});
9192

9293
new aws.iam.RolePolicy('integration@datadog', {
@@ -116,6 +117,8 @@ new aws.iam.RolePolicy('integration@datadog', {
116117
'dynamodb:List*',
117118
'dynamodb:Describe*',
118119
'ec2:Describe*',
120+
'ec2:GetTransitGatewayPrefixListReferences',
121+
'ec2:SearchTransitGatewayRoutes',
119122
'ecs:Describe*',
120123
'ecs:List*',
121124
'elasticache:Describe*',
@@ -129,12 +132,12 @@ new aws.iam.RolePolicy('integration@datadog', {
129132
'es:ListTags',
130133
'es:ListDomainNames',
131134
'es:DescribeElasticsearchDomains',
132-
'events:CreateEventBus',
133135
'fsx:DescribeFileSystems',
134136
'fsx:ListTagsForResource',
135137
'health:DescribeEvents',
136138
'health:DescribeEventDetails',
137139
'health:DescribeAffectedEntities',
140+
'iam:ListAccountAliases',
138141
'kinesis:List*',
139142
'kinesis:Describe*',
140143
'lambda:GetPolicy',
@@ -148,6 +151,8 @@ new aws.iam.RolePolicy('integration@datadog', {
148151
'logs:TestMetricFilter',
149152
'organizations:Describe*',
150153
'organizations:List*',
154+
'pi:GetResourceMetrics',
155+
'pi:DescribeDimensionKeys',
151156
'rds:Describe*',
152157
'rds:List*',
153158
'redshift:DescribeClusters',
@@ -169,6 +174,8 @@ new aws.iam.RolePolicy('integration@datadog', {
169174
's3:ListAllMyBuckets',
170175
's3:ListBucket',
171176
's3:PutBucketNotification',
177+
'servicequotas:ListServiceQuotas',
178+
'servicequotas:GetServiceQuota',
172179
'ses:Get*',
173180
'sns:List*',
174181
'sns:Publish',
@@ -177,6 +184,8 @@ new aws.iam.RolePolicy('integration@datadog', {
177184
'states:DescribeStateMachine',
178185
'support:DescribeTrustedAdvisor*',
179186
'support:RefreshTrustedAdvisorCheck',
187+
'synthetics:DescribeCanaries',
188+
'synthetics:GetCanaryRuns',
180189
'tag:GetResources',
181190
'tag:GetTagKeys',
182191
'tag:GetTagValues',
@@ -186,6 +195,43 @@ new aws.iam.RolePolicy('integration@datadog', {
186195
Effect: 'Allow',
187196
Resource: '*',
188197
},
198+
{
199+
Action: [
200+
'application-autoscaling:DescribeScalingActivities',
201+
'application-autoscaling:DescribeScalingPolicies',
202+
'athena:ListWorkGroups',
203+
'backup:ListRecoveryPointsByBackupVault',
204+
'bcm-data-exports:GetExport',
205+
'bcm-data-exports:ListExports',
206+
'cassandra:Select',
207+
'cur:DescribeReportDefinitions',
208+
'ec2:GetSnapshotBlockPublicAccessState',
209+
'glacier:GetVaultNotifications',
210+
'glue:ListRegistries',
211+
'iam:GenerateCredentialReport',
212+
'iam:GetAccountAuthorizationDetails',
213+
'iam:GetAccountSummary',
214+
'iam:GetPolicyVersion',
215+
'iam:ListVirtualMFADevices',
216+
'kafka:ListClustersV2',
217+
'lightsail:GetInstancePortStates',
218+
's3:ListAccessGrants',
219+
'savingsplans:DescribeSavingsPlanRates',
220+
'savingsplans:DescribeSavingsPlans',
221+
'sqs:getqueueattributes',
222+
'timestream:DescribeEndpoints',
223+
'timestream:ListTables',
224+
'waf-regional:ListRuleGroups',
225+
'waf-regional:ListRules',
226+
'waf:ListRuleGroups',
227+
'waf:ListRules',
228+
'wafv2:GetIPSet',
229+
'wafv2:GetRegexPatternSet',
230+
'wafv2:GetRuleGroup',
231+
],
232+
Effect: 'Allow',
233+
Resource: '*',
234+
},
189235
],
190236
},
191237
});

apps/bedrock/pulumi/aws/rds.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ const instance = new aws.rds.ClusterInstance('penxle-1', {
5757
identifier: 'penxle-1',
5858

5959
engine: 'aurora-postgresql',
60-
instanceClass: 'db.t4g.medium',
60+
instanceClass: 'db.r7g.large',
6161

6262
availabilityZone: subnets.private.az1.availabilityZone,
6363
caCertIdentifier: 'rds-ca-rsa2048-g1',

apps/bedrock/pulumi/k8s/infra/tailscale.ts

-87
This file was deleted.

apps/bedrock/pulumi/k8s/kube-system/karpenter.ts

+1
Original file line numberDiff line numberDiff line change
@@ -247,6 +247,7 @@ new k8s.apiextensions.CustomResource('default', {
247247
{ key: 'karpenter.sh/capacity-type', operator: 'In', values: ['spot'] },
248248
{ key: 'karpenter.k8s.aws/instance-category', operator: 'In', values: ['c', 'm', 'r'] },
249249
{ key: 'karpenter.k8s.aws/instance-generation', operator: 'Gt', values: ['5'] },
250+
{ key: 'topology.kubernetes.io/zone', operator: 'In', values: ['ap-northeast-2a'] },
250251
],
251252
},
252253
},

apps/bedrock/pulumi/k8s/monitoring/datadog.ts

-18
Original file line numberDiff line numberDiff line change
@@ -47,27 +47,9 @@ new k8s.apiextensions.CustomResource('datadog', {
4747
},
4848

4949
features: {
50-
apm: {
51-
enabled: true,
52-
},
53-
5450
clusterChecks: {
5551
useClusterChecksRunners: true,
5652
},
57-
58-
prometheusScrape: {
59-
enabled: true,
60-
},
61-
62-
otlp: {
63-
receiver: {
64-
protocols: {
65-
grpc: {
66-
enabled: true,
67-
},
68-
},
69-
},
70-
},
7153
},
7254
},
7355
});

cspell.config.json

+1
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,7 @@
115115
"vbank",
116116
"vcpu",
117117
"vite",
118+
"wafv2",
118119
"wonka",
119120
"xlarge",
120121
"xvda",

0 commit comments

Comments
 (0)