I am trying out the capability where 2 pods deployed to the same worker node in EKS are associated to different service accounts. Below are the steps
- Each service account is associated to a different role one with access to SQS and other without access.
- Used eksutil to associate OIDC provider with cluster and also created iamserviceaccount with service account in kubernetes and role with policy for accessing SQS attached (implicit annotation of service account with IAM role provided by eksctl create iamserviceaccount).
But when I try to start the pod which has service account tied to role with SQS access, I am getting access denied for SQS, however if I add SQS permissions to worker node instance role, its working fine.
Am I missing any steps and is my understanding correct?