diff --git a/main.tf b/main.tf index 93a1976..726adbd 100644 --- a/main.tf +++ b/main.tf @@ -47,11 +47,11 @@ module "loki_irsa_role" { attach_encrypted_object_manager_policy = true s3_bucket_arns = [ - module.loki-s3.s3_bucket_arn, - "${module.loki-s3.s3_bucket_arn}/*", + module.loki_s3.s3_bucket_arn, + "${module.loki_s3.s3_bucket_arn}/*", ] kms_key_arns = [ - module.loki-s3.kms_key_arn + module.loki_s3.kms_key_arn ] oidc_providers = { @@ -155,7 +155,7 @@ resource "helm_release" "loki" { } set { name = "serviceAccount.annotations.eks\\.amazonaws\\.com/role-arn" - value = module.loki-irsa-role.iam_role_arn + value = module.loki_irsa_role.iam_role_arn } set { name = "memberlist.service.publishNotReadyAddresses" @@ -165,15 +165,15 @@ resource "helm_release" "loki" { ##### Storage ##### set { name = "loki.storage.bucketNames.chunks" - value = module.loki-s3.s3_requested_bucket_name + value = module.loki_s3.s3_requested_bucket_name } set { name = "loki.storage.bucketNames.ruler" - value = module.loki-s3.s3_requested_bucket_name + value = module.loki_s3.s3_requested_bucket_name } set { name = "loki.storage.bucketNames.admin" - value = module.loki-s3.s3_requested_bucket_name + value = module.loki_s3.s3_requested_bucket_name } set { name = "loki.storage.type" @@ -191,7 +191,7 @@ resource "helm_release" "loki" { name = "loki.storage_config.aws.s3" value = format("s3://%v/%v", var.region, - module.loki-s3.s3_requested_bucket_name + module.loki_s3.s3_requested_bucket_name ) } set {