Your Kubernetes pods are humming along in Amazon EKS, but the data lives in Azure SQL. Crossing that cloud boundary without punching holes in firewalls or sprinkling static secrets is the kind of puzzle that keeps ops teams up at night. You want the pods talking to the database as if they were neighbors, yet every compliance audit insists on airtight identity and rotation.
Amazon EKS manages containers and workloads with Kubernetes at its core. Azure SQL, on the other hand, is a managed relational database that plays well with enterprise identity systems like Microsoft Entra ID (formerly Azure AD). Together they can form a cross-cloud powerhouse if connected securely and predictably. The trick lies in how you map workload identities between AWS and Azure without tying everything to hardcoded credentials.
The cleanest pattern is federation. EKS workloads can assume AWS IAM roles through the EKS OIDC provider. Those roles can then be exchanged for Azure tokens using Azure AD’s federated credential support. No secret files, no manual password sync. The pod authenticates to Azure SQL using an ephemeral token that expires quickly. What used to be a fragile network tunnel becomes an auditable, identity-aware handshake.
To pull this off, first align IAM roles with Azure App Registrations so each service account has a companion identity in Azure. Then configure Azure SQL to accept tokens from that identity provider. Connections flow through managed identities instead of static keys. The Kubernetes service account now defines exactly who can talk to what, which fits beautifully with least privilege.
Common snags include token audience mismatches and clock drift between clusters. Keep both sides synced with NTP and confirm that the Azure application’s expected audience matches the one issued by AWS. If tokens keep failing, inspect the OIDC thumbprint—it is often the villain.