PodIdentityAssociationArgs

data class PodIdentityAssociationArgs(val clusterName: Output<String>? = null, val namespace: Output<String>? = null, val roleArn: Output<String>? = null, val serviceAccount: Output<String>? = null, val tags: Output<Map<String, String>>? = null) : ConvertibleToJava<PodIdentityAssociationArgs>

Resource for managing an AWS EKS (Elastic Kubernetes) Pod Identity Association. Creates an EKS Pod Identity association between a service account in an Amazon EKS cluster and an IAM role with EKS Pod Identity. Use EKS Pod Identity to give temporary IAM credentials to pods and the credentials are rotated automatically. Amazon EKS Pod Identity associations provide the ability to manage credentials for your applications, similar to the way that EC2 instance profiles provide credentials to Amazon EC2 instances. If a pod uses a service account that has an association, Amazon EKS sets environment variables in the containers of the pod. The environment variables configure the Amazon Web Services SDKs, including the Command Line Interface, to use the EKS Pod Identity credentials. Pod Identity is a simpler method than IAM roles for service accounts, as this method doesn’t use OIDC identity providers. Additionally, you can configure a role for Pod Identity once, and reuse it across clusters.

Example Usage

Basic Usage

import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
const assumeRole = aws.iam.getPolicyDocument({
statements: [{
effect: "Allow",
principals: [{
type: "Service",
identifiers: ["pods&#46;eks&#46;amazonaws&#46;com"],
}],
actions: [
"sts:AssumeRole",
"sts:TagSession",
],
}],
});
const example = new aws.iam.Role("example", {
name: "eks-pod-identity-example",
assumeRolePolicy: assumeRole.then(assumeRole => assumeRole.json),
});
const exampleS3 = new aws.iam.RolePolicyAttachment("example_s3", {
policyArn: "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess",
role: example.name,
});
const examplePodIdentityAssociation = new aws.eks.PodIdentityAssociation("example", {
clusterName: exampleAwsEksCluster.name,
namespace: "example",
serviceAccount: "example-sa",
roleArn: example.arn,
});
import pulumi
import pulumi_aws as aws
assume_role = aws.iam.get_policy_document(statements=[{
"effect": "Allow",
"principals": [{
"type": "Service",
"identifiers": ["pods&#46;eks&#46;amazonaws&#46;com"],
}],
"actions": [
"sts:AssumeRole",
"sts:TagSession",
],
}])
example = aws.iam.Role("example",
name="eks-pod-identity-example",
assume_role_policy=assume_role.json)
example_s3 = aws.iam.RolePolicyAttachment("example_s3",
policy_arn="arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess",
role=example.name)
example_pod_identity_association = aws.eks.PodIdentityAssociation("example",
cluster_name=example_aws_eks_cluster["name"],
namespace="example",
service_account="example-sa",
role_arn=example.arn)
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Aws = Pulumi.Aws;
return await Deployment.RunAsync(() =>
{
var assumeRole = Aws.Iam.GetPolicyDocument.Invoke(new()
{
Statements = new[]
{
new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs
{
Effect = "Allow",
Principals = new[]
{
new Aws.Iam.Inputs.GetPolicyDocumentStatementPrincipalInputArgs
{
Type = "Service",
Identifiers = new[]
{
"pods.eks.amazonaws.com",
},
},
},
Actions = new[]
{
"sts:AssumeRole",
"sts:TagSession",
},
},
},
});
var example = new Aws.Iam.Role("example", new()
{
Name = "eks-pod-identity-example",
AssumeRolePolicy = assumeRole.Apply(getPolicyDocumentResult => getPolicyDocumentResult.Json),
});
var exampleS3 = new Aws.Iam.RolePolicyAttachment("example_s3", new()
{
PolicyArn = "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess",
Role = example.Name,
});
var examplePodIdentityAssociation = new Aws.Eks.PodIdentityAssociation("example", new()
{
ClusterName = exampleAwsEksCluster.Name,
Namespace = "example",
ServiceAccount = "example-sa",
RoleArn = example.Arn,
});
});
package main
import (
"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/eks"
"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
assumeRole, err := iam.GetPolicyDocument(ctx, &iam.GetPolicyDocumentArgs{
Statements: []iam.GetPolicyDocumentStatement{
{
Effect: pulumi.StringRef("Allow"),
Principals: []iam.GetPolicyDocumentStatementPrincipal{
{
Type: "Service",
Identifiers: []string{
"pods.eks.amazonaws.com",
},
},
},
Actions: []string{
"sts:AssumeRole",
"sts:TagSession",
},
},
},
}, nil)
if err != nil {
return err
}
example, err := iam.NewRole(ctx, "example", &iam.RoleArgs{
Name: pulumi.String("eks-pod-identity-example"),
AssumeRolePolicy: pulumi.String(assumeRole.Json),
})
if err != nil {
return err
}
_, err = iam.NewRolePolicyAttachment(ctx, "example_s3", &iam.RolePolicyAttachmentArgs{
PolicyArn: pulumi.String("arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess"),
Role: example.Name,
})
if err != nil {
return err
}
_, err = eks.NewPodIdentityAssociation(ctx, "example", &eks.PodIdentityAssociationArgs{
ClusterName: pulumi.Any(exampleAwsEksCluster.Name),
Namespace: pulumi.String("example"),
ServiceAccount: pulumi.String("example-sa"),
RoleArn: example.Arn,
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aws.iam.IamFunctions;
import com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;
import com.pulumi.aws.iam.Role;
import com.pulumi.aws.iam.RoleArgs;
import com.pulumi.aws.iam.RolePolicyAttachment;
import com.pulumi.aws.iam.RolePolicyAttachmentArgs;
import com.pulumi.aws.eks.PodIdentityAssociation;
import com.pulumi.aws.eks.PodIdentityAssociationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var assumeRole = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()
.statements(GetPolicyDocumentStatementArgs.builder()
.effect("Allow")
.principals(GetPolicyDocumentStatementPrincipalArgs.builder()
.type("Service")
.identifiers("pods.eks.amazonaws.com")
.build())
.actions(
"sts:AssumeRole",
"sts:TagSession")
.build())
.build());
var example = new Role("example", RoleArgs.builder()
.name("eks-pod-identity-example")
.assumeRolePolicy(assumeRole.applyValue(getPolicyDocumentResult -> getPolicyDocumentResult.json()))
.build());
var exampleS3 = new RolePolicyAttachment("exampleS3", RolePolicyAttachmentArgs.builder()
.policyArn("arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess")
.role(example.name())
.build());
var examplePodIdentityAssociation = new PodIdentityAssociation("examplePodIdentityAssociation", PodIdentityAssociationArgs.builder()
.clusterName(exampleAwsEksCluster.name())
.namespace("example")
.serviceAccount("example-sa")
.roleArn(example.arn())
.build());
}
}
resources:
example:
type: aws:iam:Role
properties:
name: eks-pod-identity-example
assumeRolePolicy: ${assumeRole.json}
exampleS3:
type: aws:iam:RolePolicyAttachment
name: example_s3
properties:
policyArn: arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
role: ${example.name}
examplePodIdentityAssociation:
type: aws:eks:PodIdentityAssociation
name: example
properties:
clusterName: ${exampleAwsEksCluster.name}
namespace: example
serviceAccount: example-sa
roleArn: ${example.arn}
variables:
assumeRole:
fn::invoke:
function: aws:iam:getPolicyDocument
arguments:
statements:
- effect: Allow
principals:
- type: Service
identifiers:
- pods.eks.amazonaws.com
actions:
- sts:AssumeRole
- sts:TagSession

Import

Using pulumi import, import EKS (Elastic Kubernetes) Pod Identity Association using the cluster_name and association_id separated by a comma (,). For example:

$ pulumi import aws:eks/podIdentityAssociation:PodIdentityAssociation example example,a-12345678

Constructors

Link copied to clipboard
constructor(clusterName: Output<String>? = null, namespace: Output<String>? = null, roleArn: Output<String>? = null, serviceAccount: Output<String>? = null, tags: Output<Map<String, String>>? = null)

Properties

Link copied to clipboard
val clusterName: Output<String>? = null

The name of the cluster to create the association in.

Link copied to clipboard
val namespace: Output<String>? = null

The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the pods that use the service account must be in this namespace.

Link copied to clipboard
val roleArn: Output<String>? = null

The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the pods that use this service account.

Link copied to clipboard
val serviceAccount: Output<String>? = null

The name of the Kubernetes service account inside the cluster to associate the IAM credentials with. The following arguments are optional:

Link copied to clipboard
val tags: Output<Map<String, String>>? = null

Key-value map of resource tags. If configured with a provider default_tags configuration block present, tags with matching keys will overwrite those defined at the provider-level.

Functions

Link copied to clipboard
open override fun toJava(): PodIdentityAssociationArgs