Configure IAM in EKS clusters#

The best practice for implementing Amazon IAM in an EKS cluster is to use an EKS service account. This setup works with the hive.s3.iam-role catalog property, or with an S3 security mapping.

Using S3 security mapping with EKS cluster versions prior to version 1.19 requires a securityContext: definition in the Starburst Enterprise platform (SEP) Helm chart as in the following example:

securityContext:
  fsGroup: 65534

The SEP chart uses the default account for its defined namespace, therefore you must create the service account with the name “default”, as in the following example eksctl command:

$ eksctl create iamserviceaccount \
 --name default \
 --namespace dataservices \
 --cluster sepstaging \
 --attach-policy-arn arn:aws:iam::<policyID>:policy/eks_service_account_wm \
 --approve \
 --override-existing-serviceaccounts