Your cluster’s humming. Your pods are deploying. Then someone asks for access to data living inside Firestore. Cue silence, Slack messages, and a half-hour detour through IAM hell. You can make Amazon EKS talk cleanly to Firestore, but only if you understand how identity and permissions travel between two very different worlds.
Amazon EKS runs Kubernetes workloads on AWS infrastructure, using IAM roles and policies to define who can touch what. Firestore, part of Google Cloud, speaks via service accounts and OAuth tokens. When you need EKS pods to query Firestore without sprinkling secrets all over your YAML, the trick is aligning those authentication models instead of hardcoding them.
The flow looks like this. You create an identity bridge using OpenID Connect, mapping AWS IAM roles directly to a Firestore-friendly service account. Pods assume this role at runtime and receive short-lived tokens from AWS STS. Those tokens authenticate to Firestore via a workload identity federation endpoint on Google Cloud. The outcome: your app reads and writes to Firestore securely, no long-lived API keys, no brittle custom proxy glue.
If your data plane feels stuck, check token expiration handling first. Amazon EKS rotates credentials automatically, but Firestore tokens may need explicit refresh logic depending on SDK version. Audit across both environments to confirm roles match least-privilege principles. Tie AWS IAM Condition keys to namespaces, labels, or service names to keep the blast radius small.
Quick answer: To connect Amazon EKS workloads to Firestore without service-account keys, federate AWS IAM roles through OIDC and map them to Google Cloud service accounts. This lets pods access Firestore securely using short-lived, rotated credentials.