
Closed
Posted
My EKS-based application is running in a Development cluster and currently throws 403 errors whenever the pods attempt to reach our S3 bucket. The root cause is clear: the Kubernetes service account has never been configured for IAM Roles for Service Accounts (IRSA). I need someone to walk through the entire IRSA setup, make the changes, and prove that the pods can finally read and write to S3 without hard-coded credentials. Scope of work • Discover the AWS account ID with AWS CLI. • Draft and apply the trust relationship JSON that lets the service account assume a new IAM role. • Create that IAM role, then craft a least-privilege S3 access policy and attach it. • Annotate the existing Kubernetes service account so it references the role. • Validate the annotation, restart the deployment, and demonstrate that the pods can list objects in the specified bucket (a simple aws s3 ls is enough). Acceptance criteria 1. kubectl describe serviceaccount <name> shows the correct [login to view URL] annotation. 2. kubectl get pods returns all pods in Running state after restart. 3. An exec into a pod followed by an AWS CLI command against the bucket succeeds with HTTP 200 and no 403. I work exclusively with AWS CLI today, so keep your solution and any scripts in that toolset. Please reply with a brief note on similar IRSA or IAM-for-Kubernetes work you have delivered; experience is the single most important selection factor for me.
Project ID: 40232417
97 proposals
Remote project
Active 20 days ago
Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
97 freelancers are bidding on average $35 USD/hour for this job

Dear , We carefully studied the description of your project and we can confirm that we understand your needs and are also interested in your project. Our team has the necessary resources to start your project as soon as possible and complete it in a very short time. We are 25 years in this business and our technical specialists have strong experience in Linux, Cloud Computing, Amazon Web Services, Node.js, Kubernetes, Cloud Security, DevOps, Containerization and other technologies relevant to your project. Please, review our profile https://www.freelancer.com/u/tangramua where you can find detailed information about our company, our portfolio, and the client's recent reviews. Please contact us via Freelancer Chat to discuss your project in details. Best regards, Sales department Tangram Canada Inc.
$30 USD in 5 days
7.8
7.8

Hi, I will set up, manage and potentially troubleshooting your AWS service to ensure seamless data backup. I have 10 years of expertise in amazon web services. I can set up aws ec2, aws s3 and other amazon products with the best configuration, S3 bucket creation, mounting bucket to different EC2 instances, uploading contents into bucket, Expanding volume in live ec2 instance without data loss, DNS fail over and recovering it from same or different region , Backup of instances, database, volumes, Auto scalingin in which if any of the instance will stop responding then a copy of instance will be loaded so that there will be no down time, Monitoring services, Cloud front, it help us to load contents of website from near by location, Amazon Relational Database Services. Please discuss, Thank you.
$35 USD in 1 day
7.4
7.4

I have over 10 years of experience in web and mobile development, with a strong focus on AWS technologies. I understand the challenge you are facing with your EKS-based application and the need to configure IAM Roles for Service Accounts (IRSA) to enable S3 access for your pods. In the past, I have successfully implemented similar solutions for clients in the fintech and eCommerce industries, ensuring secure and efficient access to cloud resources. My expertise in AWS CLI and experience in setting up IAM roles for Kubernetes work will allow me to walk through the entire IRSA setup for your project seamlessly. If you choose to work with me, I can guarantee a smooth and successful implementation of the required changes, enabling your pods to read and write to S3 without any issues. Feel free to reach out to discuss your project further and how I can assist you in resolving the IRSA S3 access issue within your budget and timeframe.
$40 USD in 15 days
6.7
6.7

⭐⭐⭐⭐⭐ Hello Valuable Client, CnELIndia, led by Raman Ladhani, has extensive hands-on experience implementing IRSA for EKS workloads and configuring least-privilege IAM roles for Kubernetes service accounts. We can help you by first discovering your AWS account ID using the AWS CLI, then drafting and applying the trust relationship JSON to create a new IAM role. We will attach a scoped S3 access policy, annotate your existing Kubernetes service account with the role ARN, and validate the annotation. After restarting your deployments, we will execute AWS CLI commands from the pods to confirm S3 read/write access without hard-coded credentials. Our team has successfully enabled similar IRSA setups for multiple production-grade EKS clusters, ensuring seamless pod access to S3 with full auditability and security compliance. We can schedule a session to perform the end-to-end setup and validation immediately.
$38 USD in 40 days
6.4
6.4

Hi I can configure IRSA end-to-end on your EKS development cluster and eliminate the 403 errors by replacing all hard-coded S3 credentials with a clean, AWS-native IAM role assumption flow. I’ve done multiple IRSA implementations where the main challenge is aligning the trust policy, OIDC provider, and service-account annotation so the pod can receive temporary credentials automatically—this is solved entirely through AWS CLI and kubectl, just as you require. I’ll discover the account ID, create the trust relationship JSON, build a least-privilege S3 policy, attach it to the new IAM role, annotate your existing Kubernetes service account, restart the deployment, and verify that pod-level AWS CLI calls return HTTP 200. You’ll get a repeatable, CLI-only setup with no manual console steps and no stored static credentials inside pods. Thanks, Hercules
$50 USD in 40 days
6.0
6.0

Hey, I have implemented IRSA and IAM-for-Kubernetes on multiple EKS clusters using AWS CLI and kubectl, including creating trust policies, least-privilege S3 roles, and validating pod access without embedded credentials. I'll discover your AWS account ID, draft and apply the trust relationship JSON, create the IAM role and attach a least-privilege S3 policy, annotate your existing Kubernetes service account, restart the deployment, and validate access with kubectl exec + aws s3 ls to prove there are no 403s. All changes and artifacts (trust JSON, policy JSON, and exact AWS CLI and kubectl commands) will be provided so you can review or reproduce them. Why We Work Together: - Proven IRSA EKS implementations using only AWS CLI - Focus on least-privilege IAM policies and auditability - Clear validation steps that match your acceptance criteria Best Regards, Sherman
$38 USD in 40 days
5.0
5.0

Hey there, I specialize in resolving IRSA S3 access issues like yours. With expertise in AWS CLI, I'll configure the Kubernetes service account for IAM Roles, allowing your pods seamless S3 access without hard-coded credentials. I have a proven track record in setting up IRSA and IAM roles, ensuring secure and efficient access to AWS services for Kubernetes workloads. Let me walk you through the entire setup and validate the solution. What's the best way to move forward with this?
$25 USD in 34 days
4.6
4.6

Hello! I understand you're seeking help to resolve the IRSA setup for your EKS-based application, ensuring your pods can access S3 without hard-coded credentials. I have extensive experience with IAM roles for Kubernetes, and can walk you through each step of this process, from drafting the trust relationship JSON to validating the configuration. I’ll ensure your service account is correctly annotated, the appropriate IAM role is created, and that the least-privilege policy is effectively applied. Once set up, I will confirm your pods can successfully interact with the S3 bucket, eliminating those pesky 403 errors. Please see my portfolios for examples of similar work. Regards, Davide
$50 USD in 6 days
4.7
4.7

With an AWS-certified profile and 5+ years of experience in backend development, DevOps engineering, and Kubernetes orchestration, I'm confident I can efficiently resolve the IRSA S3 access issue plaguing your EKS-based application. I'm well adept at using AWS CLI as a prominent tool across all my work, and my expertise in building serverless and containerized apps complements this skill perfectly. During my tenure, I've seamlessly integrated cutting-edge AI/ML solutions into numerous projects to amplify their efficacy - a proficiency that can certainly be put to use here. To summarize, as an AWS-certified professional proficient in backend development and DevOps techniques like CI/CD pipelines and infrastructure as code alongside vast experience deploying applications on Kubernetes platforms like EKS, I offer a well-rounded capability for resolving your IRSA woes comprehensively. My familiarity with security standards (like HIPAA, PCI-DSS) combined with a strong emphasis on scalable cloud infrastructures ensure not only swift issue-resolution but also robust end-results that meet high-performance criteria. Let's establish a thriving partnership to get your EKS application functioning optimally!
$50 USD in 40 days
4.7
4.7

Dear Satya M., I am a seasoned AWS expert with a strong focus on Kubernetes, Cloud Security, and DevOps. I understand the challenges you are facing with your EKS application's S3 access issues due to the lack of IRSA setup. I have successfully implemented similar IRSA configurations in the past, ensuring seamless and secure access to S3 buckets for Kubernetes pods. My approach will involve meticulously setting up the trust relationship, IAM role creation, policy attachment, service account annotation, and thorough validation to guarantee error-free S3 access for your pods. I will provide clear documentation and support throughout the process, ensuring a smooth transition. I am confident in my ability to deliver a robust solution tailored to your specific requirements. Let's discuss how we can collaborate to resolve your IRSA S3 access challenges effectively. Looking forward to further discussing your project. Best regards,
$38 USD in 40 days
4.4
4.4

Hello, I understand the issue you are facing with your EKS-based application not being able to access the S3 bucket due to missing IAM Roles for Service Accounts (IRSA). To resolve this, I will first discover the AWS account ID using AWS CLI, then set up the trust relationship JSON allowing the service account to assume a new IAM role. Following this, I will create the IAM role, implement a least-privilege S3 access policy, and annotate the Kubernetes service account accordingly. Finally, I will validate the setup, restart the deployment, and ensure the pods can successfully interact with the S3 bucket without any 403 errors. My expertise in Node.js, Amazon Web Services, Kubernetes, and Linux align perfectly with the requirements of this project. I have successfully implemented similar IRSA setups in the past, ensuring seamless integration between Kubernetes clusters and AWS services. Effective communication and collaboration are paramount to me, and I am committed to keeping you informed throughout the project. Best regards, Justin
$40 USD in 40 days
4.4
4.4

A 403 from S3 in EKS almost always points to missing or misconfigured IRSA, so your diagnosis makes sense. I’ve set up IAM Roles for Service Accounts in EKS before—creating the OIDC trust policy, crafting least-privilege S3 policies, annotating the service account, and validating access via aws s3 ls from inside the pod using only AWS CLI. I’ll walk through discovery of the account/OIDC provider, apply the correct trust relationship JSON, attach the policy, restart the deployment, and prove HTTP 200 access with no static credentials involved. Clean, minimal, and fully aligned with AWS CLI workflows. Looking forward for your positive response in the chatbox. Best Regards, Arbaz T
$40 USD in 40 days
4.0
4.0

Hi, there.. I have hands-on experience setting up IRSA for EKS applications. I can create a least-privilege IAM role, attach the S3 access policy, annotate your Kubernetes service account, and validate it so your pods can read/write to S3 without hard-coded credentials. I’ll confirm with kubectl describe, pod restart, and an aws s3 ls inside a pod. Best Regards. Jovica
$38 USD in 40 days
4.0
4.0

Hi, I am an expert in AWS cloud. I have worked with IRSA while connecting a EKS cluster with KMS recently. I can help. Lets chat
$50 USD in 2 days
4.2
4.2

As a seasoned Python developer and DevOps engineer, my four years of in-depth experience, specifically with AWS and Linux administration, align perfectly with your project requirements. I have successfully designed, developed, and maintained robust applications using AWS-based services such as S3 buckets, IAM roles, and service accounts. With my deep knowledge of AWS CLI and automation techniques, I can ensure smooth integration between your EKS-based app, Kubernetes service account, and IRSA. What sets me apart is my focus on scalability and efficiency. I understand the importance of implementing secure authentication and authorization measures for accessing critical resources like S3. Drawing upon this experience, I will expertly draft and apply the trust relationship JSON needed for your Kubernetes service account to assume the new IAM role smoothly. My proficiency with database systems like PostgreSQL and MySQL is an added advantage here as we may need to tweak any complex queries that may arise during implementation. Combine that with my strong collaborative abilities and you have a freelancer who can not only resolve your present issue but also contribute towards building a stable future-proof system
$30 USD in 40 days
3.9
3.9

When it comes to resolving your IRSA S3 access problem, my extensive experience in handling AWS services makes me the right fit for the job. Throughout my eight-year career, I've worked extensively with AWS CLI and Linux, which are crucial skills for this project. I have a proven track record of utilizing these tools to identify and rectify various backend issues and ensure seamless communication between your Kubernetes service account and IAM Roles for Service Accounts (IRSA). In addition to my deep understanding of the technical aspects behind IRSA and IAM-for-Kubernetes work, I'm a highly conscientious and detail-oriented professional. This means that in addition to accomplishing each task on your project scope, I will proactively anticipate any potential obstacles or conflicts along the way and provide well-thought-out solutions. To validate my capabilities further, my approach involves thorough documentation, effective communication, and going the extra mile. By engaging my services, you'll not only get someone who can help with your current challenge but also a partner who is dedicated to your long-term success. Let me use my expertise in solving system integration challenges to optimize your DevOps workflow.
$40 USD in 40 days
3.8
3.8

Hi there,Good evening I am Talha. I have read you project details i saw you need help with Cloud Computing, Kubernetes, Containerization, Node.js, DevOps, Amazon Web Services, Linux and Cloud Security I am pleased to present my proposal, highlighting our extensive experience and proven track record in delivering exceptional results. Our portfolio of success will showcase past projects that demonstrate our ability to meet and exceed client expectations. Glowing testimonials from satisfied clients will attest to our professionalism, dedication, and the quality of our work Please note that the initial bid is an estimate, and the final quote will be provided after a thorough discussion of the project requirements or upon reviewing any detailed documentation you can share. Could you please share any available detailed documentation? I'm also open to further discussions to explore specific aspects of the project. Thanks Regards. Talha Ramzan
$25 USD in 26 days
3.7
3.7

Greetings! I’m a top-rated freelancer with 16+ years of experience and a portfolio of 750+ satisfied clients. I specialize in delivering high-quality, professional IRSA S3 access resolving services tailored to your unique needs. Please feel free to message me to discuss your project and review my portfolio. I’d love to help bring your ideas to life! Looking forward to collaborating with you! Best regards, Revival
$25 USD in 40 days
3.2
3.2

Hi there, I can take this IRSA setup from end to end in your Dev EKS cluster using only the AWS CLI, with a focus on least privilege and clear validation. I’ll: - Identify your AWS account ID via AWS CLI and confirm the target bucket and region. - Draft and apply a precise trust relationship that allows your Kubernetes service account to assume the new IAM role. - Create the IAM role, attach a least-privilege S3 access policy (read/write to the specified bucket, no secrets in code), and verify the policy is in effect. - Annotate the existing Kubernetes service account so it references the role, then restart the deployment to apply changes. - Validate by listing bucket contents from a pod (aws s3 ls) and confirm HTTP 200 responses with no 403. - Provide clear acceptance evidence: serviceaccount annotation, pod status after restart, and successful S3 operations from a pod. In my prior IRSA/IAM-for-Kubernetes work, I’ve delivered end-to-end IRSA setups for multiple teams, including building trust policies, role creation with tight S3 permissions, and verification steps that eliminate hard-coded credentials while keeping access auditable and scoped. Best regards!
$25 USD in 17 days
2.7
2.7

I’ve helped a few teams fix IRSA setup issues in EKS clusters where pods couldn’t access S3 due to missing role annotations. The process you outlined fits what I’ve done many times using AWS CLI—discovering the account ID, creating the trust policy, setting up least-privilege roles, and linking those roles to Kubernetes service accounts. Before starting, do you already have an IAM role created for this, or should I handle everything from scratch? Also, it’s worth double-checking the existing service account name matches exactly, since a mismatch there often causes 403 errors even after the role is attached. I’ll follow each step, verify your acceptance criteria by exec’ing into a pod, running an aws s3 ls command, and confirming no 403 errors. This can be fixed quickly once the service account is properly annotated and the role policy applied correctly. Ready to get this IRSA issue resolved and prove pod access right away.
$25 USD in 7 days
2.9
2.9

Fort Collins, United States
Payment method verified
Member since Sep 20, 2025
$250-750 USD
₹37500-75000 INR
₹750-1250 INR / hour
$250-750 USD
$250-750 USD
$30-250 USD
$250-750 USD
$250-750 USD
$15-25 USD / hour
$250-750 AUD
₹750-1250 INR / hour
₹12500-37500 INR
min £36 GBP / hour
₹50000-55000 INR
$250-750 USD
₹100-400 INR / hour
£20-250 GBP
₹37500-75000 INR
$15-25 AUD / hour
$1500-3000 USD
$10-30 USD
$10-30 USD