diff --git a/infrastructure/sandbox/PreProvisioner/main.tf b/infrastructure/sandbox/PreProvisioner/main.tf index aea093a05b..44c5505810 100644 --- a/infrastructure/sandbox/PreProvisioner/main.tf +++ b/infrastructure/sandbox/PreProvisioner/main.tf @@ -257,7 +257,7 @@ resource "aws_ecs_task_definition" "main" { }, { name = "QUEUED_INSTANCES" - value = data.aws_caller_identity.current.account_id == 411315989055 ? "20" : "5" + value = "20" }, { name = "TF_VAR_redis_address" diff --git a/infrastructure/sandbox/SharedInfrastructure/eks.tf b/infrastructure/sandbox/SharedInfrastructure/eks.tf index 04db20a465..936560a4d6 100644 --- a/infrastructure/sandbox/SharedInfrastructure/eks.tf +++ b/infrastructure/sandbox/SharedInfrastructure/eks.tf @@ -27,8 +27,8 @@ locals { cluster_version = "1.21" account_role_mapping = { # Add nonprod or other deployed accounts here - 411315989055 = "AWSReservedSSO_SandboxDevAdmins_6cfa1b6052653825" - 968703308407 = "AWSReservedSSO_SandboxProdAdmins_9ccaa4f25c2eada0" + 411315989055 = "AWSReservedSSO_SandboxProdAdmins_9ccaa4f25c2eada0" + 968703308407 = "AWSReservedSSO_SandboxDevAdmins_6cfa1b6052653825" } # Role Generated by SSO but needs admin to EKS # This hack is needed because "aws_iam_role" returns an unsusable ARN for EKS on SSO roles.