EKS Pod Identity session policy AccessDenied errors clearly state the cause
While testing EKS Pod Identity session policies, I was surprised by how helpful the error messages are.
IAM AccessDenied errors are notoriously vague, but session policy denials explicitly state the cause:
s3:CreateBucket on resource: "arn:aws:s3:::xxx"
because no session policy allows the s3:CreateBucket actionec2:DescribeInstances
because no identity-based policy allows the ec2:DescribeInstances actionno session policy allows means you need to add the action to the session policy. no identity-based policy allows means the IAM role's own policy needs updating. Knowing which one to fix at a glance is a huge win for operations.
