Amazon EKS
User Guide

Amazon EKS Worker Node IAM Role

The Amazon EKS worker node kubelet daemon makes calls to AWS APIs on your behalf. Worker nodes receive permissions for these API calls through an IAM instance profile and associated policies. Before you can launch worker nodes and register them into a cluster, you must create an IAM role for those worker nodes to use when they are launched. This requirement applies to worker nodes launched with the Amazon EKS-optimized AMI provided by Amazon, or with any other worker node AMIs that you intend to use. Before you create worker nodes, you must create an IAM role with the following IAM policies:

Check for an Existing Worker Node Role

You can use the following procedure to check and see if your account already has the Amazon EKS worker node role.

To check for the NodeInstanceRole in the IAM console

  1. Open the IAM console at

  2. In the navigation pane, choose Roles.

  3. Search the list of roles for NodeInstanceRole. If the role does not exist, see Creating the Amazon EKS Worker Node Role to create the role. If the role does exist, select the role to view the attached policies.

  4. Choose Permissions.

  5. Ensure that the AmazonEKSWorkerNodePolicy, AmazonEKS_CNI_Policy, and AmazonEC2ContainerRegistryReadOnly managed policies are attached to the role. If the policies are attached, your Amazon EKS worker node role is properly configured.

  6. Choose Trust Relationships, Edit Trust Relationship.

  7. Verify that the trust relationship contains the following policy. If the trust relationship matches the policy below, choose Cancel. If the trust relationship does not match, copy the policy into the Policy Document window and choose Update Trust Policy.

    { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "" }, "Action": "sts:AssumeRole" } ] }

Creating the Amazon EKS Worker Node Role

If you created your worker nodes by following the steps in the Getting Started with the AWS Management Console or Getting Started with eksctl topics, then the worker node role account already exists and you don't need to manually create it. You can use the following procedure to create the Amazon EKS worker node role if you do not already have one for your account.

To create your Amazon EKS worker node role in the IAM console

  1. Open the IAM console at

  2. Choose Roles, then Create role.

  3. Choose EC2 from the list of services, then Next: Permissions.

  4. Select the following policies:

    • AmazonEKSWorkerNodePolicy

    • AmazonEKS_CNI_Policy

    • AmazonEC2ContainerRegistryReadOnly

  5. Choose Next: Tags.

  6. (Optional) Add metadata to the role by attaching tags as key–value pairs. For more information about using tags in IAM, see Tagging IAM Entities in the IAM User Guide.

  7. Choose Next: Review.

  8. For Role name, enter a unique name for your role, such as NodeInstanceRole, then choose Create role.

To create your Amazon EKS instance role with AWS CloudFormation

  1. Save the following AWS CloudFormation template to a text file on your local system.

    --- AWSTemplateFormatVersion: '2010-09-09' Description: 'Amazon EKS Worker Node Role' Resources: NodeInstanceRole: Type: AWS::IAM::Role Properties: AssumeRolePolicyDocument: Version: 2012-10-17 Statement: - Effect: Allow Principal: Service: Action: sts:AssumeRole Path: "/" ManagedPolicyArns: - arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy - arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy - arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly Outputs: RoleArn: Description: The role that the worker node kubelet uses to make calls to the Amazon EKS API on your behalf Value: !GetAtt NodeInstanceRole.Arn Export: Name: !Sub "${AWS::StackName}-RoleArn"
  2. Open the AWS CloudFormation console at

  3. Choose Create stack.

  4. For Specify template, select Upload a template file, and then choose Choose file.

  5. Choose the file you created earlier, and then choose Next.

  6. For Stack name, enter a name for your role, such as NodeInstanceRole, and then choose Next.

  7. On the Configure stack options page, choose Next.

  8. On the Review page, review your information, acknowledge that the stack might create IAM resources, and then choose Create stack.