Find the Best Cosmetic Hospitals

Explore trusted cosmetic hospitals and make a confident choice for your transformation.

“Invest in yourself — your confidence is always worth it.”

Explore Cosmetic Hospitals

Start your journey today — compare options in one place.

AWS Tutorial: How to Give AWS Permissions to Pods in EKS?

Here’s a comprehensive tutorial on how to assign AWS permissions to Pods running in Amazon EKS, covering:

  • The problem it solves
  • All available options
  • Pros and cons of each method
  • A comparison table
  • Implementation guide for the recommended ones (IRSA and Pod Identity)


🧩 Problem Statement

In Kubernetes (EKS), your Pods often need to access AWS resources like:

  • S3 buckets to read/write files
  • DynamoDB to store session data
  • VPC Lattice for service networking
  • CloudWatch for logging

But how do we securely give AWS IAM permissions to a Pod?


🔍 The Core Challenge

Unlike EC2 instances, Pods don’t have IAM roles by default. So, we need a secure way to assign IAM permissions to Pods.


✅ Available Options

Option No.MethodRecommendedFine-GrainedSecureRequires OIDCNotes
1IAM Roles for Service Accounts (IRSA)✅ Yes✅ Yes✅ Yes✅ YesWidely used
2EKS Pod Identity (Agent-based)✅ Yes✅ Yes✅ Yes❌ NoNewer method
3EC2 Instance IAM Role❌ No❌ No❌ No❌ NoAll Pods share role
4AWS Credentials in Secrets/Env Vars❌ No✅ Yes❌ No❌ NoInsecure
5Custom Identity Proxy/Sidecar Relay⚠️ Maybe✅ Yes✅ Yes❌ NoComplex, flexible

🔎 Option 1: IAM Roles for Service Accounts (IRSA)

🔧 How it works:

  • You associate an IAM Role with a Kubernetes Service Account.
  • EKS uses OIDC (OpenID Connect) to let your Pod assume that IAM role.

🛠 Prerequisites:

  • EKS Cluster with OIDC provider enabled
  • IAM Role with trust relationship
  • Annotated Kubernetes ServiceAccount

✅ Pros:

  • Secure & fine-grained
  • Widely supported in production
  • Works with eksctl, Terraform, AWS CLI

❌ Cons:

  • Requires OIDC setup
  • Slightly more steps

📘 IRSA Setup Guide:

  1. Enable OIDC for your cluster (only once): eksctl utils associate-iam-oidc-provider --cluster <cluster-name> --approve
  2. Create IAM policy (example for S3 access): aws iam create-policy \ --policy-name MyAppS3Access \ --policy-document file://s3-policy.json
  3. Create IAM role for ServiceAccount: eksctl create iamserviceaccount \ --cluster <cluster-name> \ --namespace <namespace> \ --name <sa-name> \ --attach-policy-arn arn:aws:iam::<account-id>:policy/MyAppS3Access \ --approve
  4. Use the ServiceAccount in your deployment: serviceAccountName: <sa-name>

🔎 Option 2: EKS Pod Identity

🔧 How it works:

  • Amazon EKS runs a Pod Identity Agent on each node.
  • Your Pod’s ServiceAccount is annotated with an IAM role.
  • The agent helps the Pod assume that IAM role — no OIDC needed.

✅ Pros:

  • No need to set up OIDC
  • Easier for beginners
  • Native integration, evolving fast

❌ Cons:

  • Requires Pod Identity Agent (minor extra setup)
  • Newer, evolving feature

📘 Pod Identity Setup Guide:

  1. Install Pod Identity Agent: eksctl enable pod-identity --cluster <cluster-name>
  2. Create IAM policy: aws iam create-policy \ --policy-name MyAppS3Access \ --policy-document file://s3-policy.json
  3. Create IAM role and bind to service account: eksctl create iamidentitymapping \ --cluster <cluster-name> \ --service-name <sa-name> \ --namespace <namespace> \ --arn arn:aws:iam::<account-id>:role/MyAppS3Access
  4. Annotate your ServiceAccount: kubectl annotate serviceaccount <sa-name> \ eks.amazonaws.com/role-arn=arn:aws:iam::<account-id>:role/MyAppS3Access \ -n <namespace>

🔎 Option 3: EC2 IAM Role for Node

🛠 How it works:

  • Attach the IAM role directly to EC2 instance/node.
  • All Pods on that node share the same permissions.

❌ Why it’s bad:

  • Not secure for multi-tenant or microservice workloads.
  • No fine-grained control — violates least privilege.

🔎 Option 4: Hardcoded AWS Credentials

🛠 How it works:

  • Manually inject AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY into the pod.

❌ Why it’s risky:

  • Credentials can leak
  • Hard to rotate and audit
  • Breaks cloud-native best practices

🔎 Option 5: Custom Sidecar Token Relay

🛠 How it works:

  • You run a sidecar container (e.g., Vault Agent, identity proxy) alongside your app.
  • The sidecar securely handles IAM calls or credential fetching.

✅ When useful:

  • Complex enterprise setups with custom identity management
  • Using Vault for dynamic credential delivery

📊 Final Comparison Table

Feature / MethodIRSAPod IdentityEC2 RoleEnv VarsSidecar Proxy
Secure
Granular per-Pod IAM Roles
OIDC Required
Easy to Set Up⚠️ Medium✅ Easy❌ Complex
Production-ready✅ (new)⚠️ Yes if done right
AWS-recommended

🚀 Conclusion: What Should You Use?

If you’re…Use this method
Starting fresh in 2024+✅ Pod Identity
Existing setup using IRSA✅ Stick with IRSA
Insecure or legacy app❌ Avoid Env/EC2 roles
Complex identity control needed⚠️ Sidecar/Proxy + Vault

Find Trusted Cardiac Hospitals

Compare heart hospitals by city and services — all in one place.

Explore Hospitals
I’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at <a href="https://www.cotocus.com/">Cotocus</a>. I share tech blog at <a href="https://www.devopsschool.com/">DevOps School</a>, travel stories at <a href="https://www.holidaylandmark.com/">Holiday Landmark</a>, stock market tips at <a href="https://www.stocksmantra.in/">Stocks Mantra</a>, health and fitness guidance at <a href="https://www.mymedicplus.com/">My Medic Plus</a>, product reviews at <a href="https://www.truereviewnow.com/">TrueReviewNow</a> , and SEO strategies at <a href="https://www.wizbrand.com/">Wizbrand.</a> Do you want to learn <a href="https://www.quantumuting.com/">Quantum Computing</a>? <strong>Please find my social handles as below;</strong> <a href="https://www.rajeshkumar.xyz/">Rajesh Kumar Personal Website</a> <a href="https://www.youtube.com/TheDevOpsSchool">Rajesh Kumar at YOUTUBE</a> <a href="https://www.instagram.com/rajeshkumarin">Rajesh Kumar at INSTAGRAM</a> <a href="https://x.com/RajeshKumarIn">Rajesh Kumar at X</a> <a href="https://www.facebook.com/RajeshKumarLog">Rajesh Kumar at FACEBOOK</a> <a href="https://www.linkedin.com/in/rajeshkumarin/">Rajesh Kumar at LINKEDIN</a> <a href="https://www.wizbrand.com/rajeshkumar">Rajesh Kumar at WIZBRAND</a> <a href="https://www.rajeshkumar.xyz/dailylogs">Rajesh Kumar DailyLogs</a>

Related Posts

Terraform Backend Tutorial

Terraform is a popular open-source infrastructure as code tool used to create and manage infrastructure resources. The state of the infrastructure resources managed by Terraform is stored…

Read More

Best Tools for Software Composition Analysis (SCA)

Here’s a clear and professional explanation of the three related concepts you asked about — all of which are critical parts of secure software development, especially in…

Read More

Top 10 AI Code Review Tools in 2026: Features, Pros, Cons & Comparison

Introduction In 2026, AI code review tools have become essential for developers aiming to enhance code quality, streamline workflows, and accelerate software delivery. These tools leverage advanced…

Read More

Top 10 Expense Management Tools in 2026: Features, Pros, Cons & Comparison

Introduction Expense management tools are critical for businesses of all sizes in 2026 as they help streamline financial processes, improve budgeting, ensure compliance, and enhance financial visibility….

Read More

Top 10 Web Application Firewall (WAF) Tools in 2026: Features, Pros, Cons & Comparison

Introduction In the rapidly evolving landscape of cybersecurity, Web Application Firewalls (WAFs) have become a critical component in defending web applications from malicious attacks such as SQL…

Read More

Top 10 Endpoint Management Tools in 2026: Features, Pros, Cons & Comparison

Introduction In 2026, businesses of all sizes are increasingly reliant on a variety of devices—laptops, desktops, mobile devices, and other endpoints—that connect to their networks. With the…

Read More
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x