-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Add support for Cross Account Pod Identity Associations #8425
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
naclonts
wants to merge
27
commits into
eksctl-io:main
Choose a base branch
from
naclonts:pod-identity-cross-account
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
…y arent modified when no flag provided
cheeseandcereal
approved these changes
Jul 23, 2025
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Add support for setting up cross-account resource access with pod identity.
Specifically, eksctl now accepts
targetRoleARN
anddisableSessionTags
parameters when creating or updating Pod Identity Associations.Manual testing
Tested with a few different scenarios:
- 1. Using existing role in source account -
Set up the roles and policies in the cross-account pod identity blog post.
Then create the cluster with eksctl:
And check access:
- 2. Creating a new role in source account based on
permissionPolicyARNs
-Instead of creating the EKS account's role ahead of time, eksctl can create it based on passed-in
permissionPolicyARNs
,wellKnownPolicies
, andpermissionsBoundaryARNs
. This follows the existing pattern for pod identity creation with eksctl.Example:
In account B, ensure the role created above is in the Trust Relationships for account-b-role.
And check access:
- 3. Create with CLI -
In account B, ensure the role created above is in the Trust Relationships for
account-b-role
.- 4. Update existing Pod Identity Association -
After creating the above, update the
disableSessionTags
param:The
disableSessionTags
value does not change to false if the flag isn't providedPassing
no-disable-session-tags
will set it to false:Checklist
README.md
, or theuserdocs
directory)area/nodegroup
) and kind (e.g.kind/improvement
)BONUS POINTS checklist: complete for good vibes and maybe prizes?! 🤯