Some clusters still keep credentials wrapped in ConfigMaps like it’s 2016. Then someone changes a password and half your pods crash. If you’ve ever spent an afternoon chasing expired env vars, you already know why AWS Secrets Manager and EKS deserve to be best friends.
AWS Secrets Manager holds your sensitive values—database passwords, tokens, API keys—behind IAM-controlled access. Amazon EKS orchestrates containerized workloads on Kubernetes. When you wire them together properly, Secrets Manager becomes the single source of truth while EKS retrieves fresh, authorized secrets at runtime without exposing them. That pairing replaces brittle YAML with verifiable policy.
The typical workflow centers on identity. Pods assume an IAM role through Kubernetes service account bindings. That role has granular permission to read specific secrets from AWS Secrets Manager. When an app starts, it calls the AWS SDK to fetch its secret, using its identity instead of a hardcoded credential. Rotation happens transparently because the SDK always reads the latest version. This isn’t magic, it’s just good architecture: no secrets in Git, no frantic redeploys, no sticky approvals.
Quick answer: You connect AWS Secrets Manager to EKS by assigning IAM roles to Kubernetes service accounts through IRSA, allowing workloads to fetch secrets directly using temporary credentials from AWS STS.
To keep things clean, align your RBAC model with IAM scopes. Overlapping roles lead to confused audits. Use tagging in Secrets Manager to classify environment boundaries (dev, staging, prod). Enable secret rotation where supported—30, 60, or 90 days—depending on compliance posture. Monitor CloudTrail for access events and push alerts through CloudWatch metrics when anything looks out of pattern. Good guardrails make chaos predictable.