You have EKS running beautifully on AWS. Then someone asks to standardize infrastructure via Google Cloud Deployment Manager. Suddenly your weekend plans blur into YAML. Getting EKS and Deployment Manager to cooperate feels unnatural, but with the right model for identity and policy, it can become a power move instead of a migraine.
EKS manages Kubernetes clusters the AWS way, built around IAM, roles, and service accounts. Google Cloud Deployment Manager runs declarative infrastructure as code for GCP resources. When you integrate the two, you can coordinate multi-cloud provisioning using templates that define clusters, network policies, and associated services in one repeatable manifest. The secret is making AWS and Google’s identity worlds recognize each other without babysitting tokens.
To connect EKS to Google Cloud Deployment Manager, you start by defining a deployment configuration that invokes the AWS API. This happens through a service account or workload identity that can assume specific IAM roles. The Deployment Manager template describes what to create, and AWS IAM enforces who can do it. With OpenID Connect (OIDC) federation, you can let Google identity services hand temporary credentials to EKS, avoiding static keys completely. That’s your trust chain: GCP issues short-lived tokens, AWS validates them, EKS gets configured, and no one pastes API secrets into chat again.
Best practices revolve around guardrails. Map RBAC groups tightly to IAM roles so that cluster-level permissions follow your organization’s principle of least privilege. Rotate OIDC tokens frequently and enforce session expiry. Centralize audit logs across clouds using CloudTrail and Cloud Logging, then normalize them for SIEM ingestion. The goal is one clear trail of who changed what and when, regardless of cloud.
Quick answer: To link EKS and Google Cloud Deployment Manager, use OIDC-based identity federation with well-scoped IAM roles. It lets Google’s deployment engine automatically provision and update AWS-based Kubernetes clusters without storing long-term keys.