You just want your cluster to talk to your cloud storage without babysitting credentials. Instead, you’re juggling Kubernetes service accounts, Azure roles, and identity tokens that expire at the worst possible time. The good news is that Azure Storage and Amazon EKS can actually play nice together if you respect their trust boundaries.
Azure Storage is Microsoft’s reliable blob and file platform: durable, cheap, and universally supported. EKS is AWS’s managed Kubernetes engine that developers love for its automation and lifecycle control. Getting them to cooperate sounds odd, but many teams run Kubernetes on AWS while keeping storage in Azure for downstream systems or compliance reasons. When you wire identity and network access correctly, this hybrid model works better than expected.
At its core, the Azure Storage EKS workflow depends on federated identity. Instead of hardcoding secrets into pods, you let EKS use OpenID Connect (OIDC) to mint tokens that Azure trusts. Once verified by Azure Active Directory (Entra ID), those tokens map to roles with scoped permissions for actions like reading blobs or writing logs. This avoids the horror of long-lived keys floating around CI pipelines.
If you hit a 403 error, it usually means your claim mapping or role assignment is off. Check the AAD app registration and make sure your subject claim matches the Kubernetes service account. Use distinct managed identities for read and write workloads to reduce blast radius. Rotate trust policies quarterly, even if tokens are ephemeral. These small habits save hours of debugging later.
Quick answer:
To connect Azure Storage and EKS securely, create an AAD application mapped to your EKS OIDC provider, grant it RBAC in Azure Storage, and configure your Kubernetes service accounts to use that trusted identity. You get fine‑grained, short‑lived access with no static secrets.