I am trying out the capability where 2 pods deployed to the same worker node in EKS are associated to different service accounts. Below are the steps
But when I try to start the pod which has service account tied to role with SQS access, I am getting access denied for SQS, however if I add SQS permissions to worker node instance role, its working fine.
Am I missing any steps and is my understanding correct?
So, there are a few things required to get IRSA to work:
eks.amazonaws.com/role-arn
.serviceAccountName
in its spec
, as per the API docs.AssumeRoleWithWebIdentity
API call. Weirdly, the aws-sdk-go-v2
SDK doesn't currently support it at all (the "old" aws-sdk-go
does).It's working with the node role because one of the requirements above isn't met, meaning the credential chain "falls through" to the underlying node role.