containers-roadmap icon indicating copy to clipboard operation
containers-roadmap copied to clipboard

[EKS] [Addon]: Allow image/repository override for EKS managed add-ons (e.g., AWS Pod Identity Agent)

Open STPersonenverkehr opened this issue 5 months ago • 1 comments

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Tell us about your request What do you want us to build?

Due to our enterprise security and network policies, our EKS clusters run with strict egress controls, and all container images must be sourced from approved internal registries. We also maintain hardened, scanned, and signed images to meet compliance requirements. Because of this setup, we must be able to customize the container images used by EKS managed add-ons.

Which service(s) is this request for? EKS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard? What outcome are you trying to achieve, ultimately, and why is it hard/impossible to do right now? What is the impact of not having this problem solved? The more details you can provide, the better we'll be able to understand and solve the problem.

The AWS EKS managed add-on for the AWS Pod Identity Agent currently allows changing only the imagePullPolicy. It does not expose settings to override the container image (repository and tag/digest). The upstream Helm chart already supports overriding the image repository and tag, so the capability exists in principle but is not surfaced by the managed add-on.

Without the ability to set the image repository and tag/digest, we cannot deploy the add-on in our restricted environments. This blocks adoption of the AWS Pod Identity Agent and, more broadly, limits our ability to use other EKS managed add-ons under the same constraints.

Please enhance the AWS EKS managed add-on for the AWS Pod Identity Agent to allow overriding:

  • image repository
  • image tag (and ideally digest)
  • imagePullPolicy (already supported)
  • imagePullSecrets (for private registries)

We also kindly request that this baseline functionality (image repository and tag/digest override, plus imagePullPolicy and imagePullSecrets) be standardized across all current and future EKS managed add-ons. Without it, we are unable to use these add-ons in production.

Are you currently working around this issue?

Deploying the upstream Helm chart directly works for us because it supports image overrides; however, we prefer the AWS managed add-on for its lifecycle management, compatibility assurances, and operational simplicity. CDK also integrated with this Addon and will not work without it (L2 Construct for ServiceAccounts)

Additional context

Our environments are private and tightly controlled (no direct public egress). We must pull only from approved internal registries and often mirror or rebuild vendor images for compliance. The upstream Helm charts already support these values; exposing them in the managed add-ons should be a relatively small change and would significantly improve enterprise adoption.

Attachments If you think you might have additional information that you'd like to include via an attachment, please do - we'll take a look. (Remember to remove any personally-identifiable information.)

STPersonenverkehr avatar Dec 01 '25 15:12 STPersonenverkehr

Part of the value proposition of EKS addons is the version matrix and testing against K8s versions of our addons. If you replace the image we ship with, what value are you getting out of EKS addons vs just using a helm chart?

mikestef9 avatar Dec 04 '25 01:12 mikestef9

I completely understand your point, for most customers the default behavior makes perfect sense.

However, there are a few special cases with the EKS Pod Identity project:

  • It does not provide a published Helm chart, only a repository you can clone.
  • If you choose to deploy the raw manifests yourself, you lose the ability to use CDK features such as automatic ServiceAccount creation.

These are just examples, but they highlight why flexibility is important. In general, customers should always have the option to use their own image, whether for security, compliance, or other operational requirements.

STPersonenverkehr avatar Dec 11 '25 16:12 STPersonenverkehr

I agree customers should always have the option to DIY images/manifests with EKS, we will never change that stance. But it just doesn't make sense to me with addons because that's a major part of the feature on its own.

To me this seems more a request to have a published helm chart for the pod identity agent

mikestef9 avatar Dec 11 '25 18:12 mikestef9

That makes sense and I agree that addons provide value precisely because they simplify things.

However, even with a published Helm chart, the challenge with CDK would still remain. The CDK logic around how the addon is deployed would also need to change to support this use case. (https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_eks.IdentityType.html#pod_identity)

Providing an option in the addon (similar to the one that already exists in the Helm chart) feels like the most flexible and customer-friendly approach. It doesn’t force anyone to use a custom image, but it enables those who need it! Whether for security, compliance, workflow reasons or CDK Limitations.

Since the Helm chart already supports this capability, aligning the addon with it seems like a natural next step.

STPersonenverkehr avatar Dec 12 '25 07:12 STPersonenverkehr

As already mentioned, customers with isolated clusters (without outgoing Internet traffic) are currently unable to take advantage of EKS add-ons and their benefits. These customers are left out and have to invest more in operations and development to achieve the same goal.

mengmann avatar Dec 12 '25 07:12 mengmann