You need to run commands, patch nodes, or debug Pods in production, but you cannot risk handing out SSH keys. AWS EC2 Systems Manager (SSM) and Linkerd solve this from opposite ends. SSM gives you controlled access into EC2 instances without bastion hosts. Linkerd handles identity, encryption, and service-level policies for your Kubernetes workloads. Together, EC2 Systems Manager Linkerd becomes a zero-trust tunnel that operators and services can both trust.
SSM connects to instances using the AWS identity model. There are no inbound ports or long-lived keys. It runs as an agent, talking out to AWS APIs, so you can reach the host from anywhere IAM allows. Linkerd, on the other hand, injects a lightweight proxy beside each Pod, issuing mTLS certificates based on Kubernetes ServiceAccounts. This automatically enforces encryption in transit and verifies workload identity without touching your code.
When you pair EC2 Systems Manager with Linkerd, you’re blending two trust planes. Machines enroll through IAM. Pods authenticate with mTLS. The integration point is how you define who can talk to what—and log it all.
How the integration works
- Operators launch a Session Manager session to the node through SSM, authenticated by IAM or SSO.
- That ephemeral session runs commands inside the node, which can reach in-cluster services through the Linkerd proxy.
- Linkerd enforces mTLS between sidecars and validates certificates, so even internal commands never cross untrusted channels.
- Everything is captured in AWS CloudTrail and Linkerd tap logs, giving you a full audit trail without extra agents.
The trick is aligning IAM roles with Kubernetes ServiceAccounts. If your operations team uses Okta or another OIDC provider, you can federate that identity downstream so human and service actions trace back to a single source. Rotate those IAM sessions aggressively. The shorter the credential life, the smaller the blast radius.