ClusterName=hrdkorea-cluster
CUSTOMER_Node_Role_Name=$(aws eks describe-nodegroup --cluster-name ${ClusterName} --nodegroup-name hrdkorea-customer-ng --query 'nodegroup.nodeRole' --region us-east-1 --output text | awk -F/ '{print $NF}')
PRODUCT_Node_Role_Name=$(aws eks describe-nodegroup --cluster-name ${ClusterName} --nodegroup-name hrdkorea-product-ng --query 'nodegroup.nodeRole' --region us-east-1 --output text | awk -F/ '{print $NF}')
ORDER_Node_Role_Name=$(aws eks describe-nodegroup --cluster-name ${ClusterName} --nodegroup-name hrdkorea-order-ng --query 'nodegroup.nodeRole' --region us-east-1 --output text | awk -F/ '{print $NF}')
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/CloudWatchFullAccess --policy-arn arn:aws:iam::aws:policy/CloudWatchAgentServerPolicy --policy-arn arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess --role-name $CUSTOMER_Node_Role_Name
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/CloudWatchFullAccess --policy-arn arn:aws:iam::aws:policy/CloudWatchAgentServerPolicy --policy-arn arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess --role-name $PRODUCT_Node_Role_Name
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/CloudWatchFullAccess --policy-arn arn:aws:iam::aws:policy/CloudWatchAgentServerPolicy --policy-arn arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess --role-name $ORDER_Node_Role_Name
kubectl apply -f <https://raw.githubusercontent.com/aws-samples/amazon-cloudwatch-container-insights/latest/k8s-deployment-manifest-templates/deployment-mode/daemonset/container-insights-monitoring/cloudwatch-namespace.yaml>
aws eks create-addon --cluster-name $ClusterName --addon-name amazon-cloudwatch-observability > /dev/null



