All posts

The simplest way to make Drone EKS work like it should

Half your CI jobs are stuck waiting for permissions. The rest are failing because someone forgot to attach the right IAM role. If that feels familiar, you’re probably running Drone on Amazon EKS and wondering why this combo that should save time sometimes costs hours. Drone handles pipelines, EKS handles compute. Put together right, they create a scalable, identity-aware build system that runs anything you throw at it. But if you skip a few small details—service account mapping, token scoping,

Free White Paper

EKS Access Management + End-to-End Encryption: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Half your CI jobs are stuck waiting for permissions. The rest are failing because someone forgot to attach the right IAM role. If that feels familiar, you’re probably running Drone on Amazon EKS and wondering why this combo that should save time sometimes costs hours.

Drone handles pipelines, EKS handles compute. Put together right, they create a scalable, identity-aware build system that runs anything you throw at it. But if you skip a few small details—service account mapping, token scoping, or secret rotation—the workflow can drift into chaos. Getting Drone EKS right means wiring those parts so your automation runs with the least privilege and the most reliability.

Here’s the logic, minus the fluff. Drone’s runners live inside Kubernetes pods. Each runner needs temporary access to AWS resources for deployment, tests, or artifact storage. EKS provides Kubernetes-level isolation and IAM Roles for Service Accounts (IRSA) so those pods can assume scoped credentials automatically. Done well, this integration removes the need for static tokens across pipelines. Done poorly, it creates a hundred leaky service accounts that auditors will hate.

To align the two, start with identity. Map Drone’s runner service accounts to defined IAM roles in EKS using IRSA. Assign the exact permissions needed per pipeline, not per project. Rotate secrets through Kubernetes Secrets Manager or AWS Secrets Manager, but never store them as plain environment variables in Drone repos. For OIDC-enabled identity flows, Okta or other providers can issue temporary credentials that expire immediately after each job.

If you want a quick rule of thumb:
Drone EKS integrates by using Kubernetes service accounts tied to IAM roles via IRSA, allowing Drone runners to securely obtain temporary AWS credentials for each pipeline run without hard-coded secrets. That’s the entire safety story in one sentence.

Continue reading? Get the full guide.

EKS Access Management + End-to-End Encryption: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Best results come from a few consistent practices:

  • One IAM role per pipeline type or environment.
  • Automatic rotation for any external credentials.
  • Clear RBAC policies so developers can add new pipelines without waiting weeks for access.
  • Consistent logging through CloudWatch for full traceability.
  • A single internal policy doc that maps Drone jobs to AWS resources to cut audit overhead.

You’ll feel the speed difference. Developers no longer need manual approvals just to deploy staging builds. Onboarding a new engineer becomes “add them to the team and push a commit.” The CI/CD flow feels like a conversation instead of a ticket queue.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Instead of wondering who can run what, you define once and get identity-aware access across clusters and cloud accounts. It’s a practical way to keep compliance steady while speeding up delivery.

And if you’re adding AI copilots to your Drone pipelines, this model matters even more. Those agents need scoped credentials, not blanket access. IRSA and identity-aware proxies make it safe for automation to perform real work without exposing production secrets or violating SOC 2 boundaries.

How do I connect Drone and EKS securely?
Use IRSA to assign IAM roles to Drone runner pods, then restrict each role’s scope to the specific AWS resources the pipeline touches. This design removes hard-coded AWS keys and lets Kubernetes manage authentication dynamically.

When Drone EKS is set up right, builds run faster, security teams sleep better, and developers stop writing apology messages to DevOps. The two tools don’t just coexist—they create a clean, auditable bridge between automation and infrastructure.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts