ReInvent 2023: Trying out Pod Identity Agent

Daniel Tapia
Binome
Published in
4 min readNov 28, 2023

--

Out of re:Invent 2023 one of the features that caught my eye is the new EKS add on: Pod Identity Agent that promises to simplify IAM permissions for EKS, and a necessity to be sure, as IAM permission on EKS are amongst one of the main reasons my wall continues to gain depth as I bang my head against it whenever I have to deal with roles and permissions on AWS.

The present

Currently, the way it works if you don’t adopt the new feature — assuming no configuration is done on a brand-new provisioned cluster — is that you create your node group with a role. Whenever a pod authenticates to AWS, it does so with the role of the node. So, the role of the pod is equal to the role of the node. Let’s go through an example with a Deployment called api-service in the namespace api-service.

Default Setting For IAM Assume Role

The problem is that if you host multiple pods on the same node, they all share the same IAM role, and your infrastructure doesn’t respect the principle of least privilege. An upgrade of this model was done at re:Invent 2022, which allows pods to assume a role via a service account

apiVersion: v1
kind: ServiceAccount
metadata:
annotations:
eks.amazonaws.com/role-arn: arn:aws:iam::xxxxxxxxxxxx:role/api-service
name: api-service
namespace: api-service

--

--

Binome
Binome

Published in Binome

Notes on GenAI and Cloud Infrastructure technologies

Daniel Tapia
Daniel Tapia

Written by Daniel Tapia

Cloud Engineer at tray.io | Kubernetes| Kong| Terraform | AWS | AI | Langchain @danielftapiar29

Responses (2)