---
title: Getting Started with Datadog
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: Docs > Infrastructure > Datadog Resource Catalog
---

# aws_eks_podidentityassociation{% #aws_eks_podidentityassociation %}

## `account_id`{% #account_id %}

**Type**: `STRING`

## `association_arn`{% #association_arn %}

**Type**: `STRING`**Provider name**: `associationArn`**Description**: The Amazon Resource Name (ARN) of the association.

## `association_id`{% #association_id %}

**Type**: `STRING`**Provider name**: `associationId`**Description**: The ID of the association.

## `cluster_name`{% #cluster_name %}

**Type**: `STRING`**Provider name**: `clusterName`**Description**: The name of the cluster that the association is in.

## `created_at`{% #created_at %}

**Type**: `TIMESTAMP`**Provider name**: `createdAt`**Description**: The timestamp that the association was created at.

## `disable_session_tags`{% #disable_session_tags %}

**Type**: `BOOLEAN`**Provider name**: `disableSessionTags`**Description**: The state of the automatic sessions tags. The value of true disables these tags. EKS Pod Identity adds a pre-defined set of session tags when it assumes the role. You can use these tags to author a single role that can work across resources by allowing access to Amazon Web Services resources based on matching tags. By default, EKS Pod Identity attaches six tags, including tags for cluster name, namespace, and service account name. For the list of tags added by EKS Pod Identity, see [List of session tags added by EKS Pod Identity](https://docs.aws.amazon.com/eks/latest/userguide/pod-id-abac.html#pod-id-abac-tags) in the Amazon EKS User Guide.

## `modified_at`{% #modified_at %}

**Type**: `TIMESTAMP`**Provider name**: `modifiedAt`**Description**: The most recent timestamp that the association was modified at.

## `namespace`{% #namespace %}

**Type**: `STRING`**Provider name**: `namespace`**Description**: The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the Pods that use the service account must be in this namespace.

## `owner_arn`{% #owner_arn %}

**Type**: `STRING`**Provider name**: `ownerArn`**Description**: If defined, the EKS Pod Identity association is owned by an Amazon EKS add-on.

## `role_arn`{% #role_arn %}

**Type**: `STRING`**Provider name**: `roleArn`**Description**: The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the Pods that use this service account.

## `service_account`{% #service_account %}

**Type**: `STRING`**Provider name**: `serviceAccount`**Description**: The name of the Kubernetes service account inside the cluster to associate the IAM credentials with.

## `tags`{% #tags %}

**Type**: `UNORDERED_LIST_STRING`

## `target_role_arn`{% #target_role_arn %}

**Type**: `STRING`**Provider name**: `targetRoleArn`**Description**: The Amazon Resource Name (ARN) of the target IAM role to associate with the service account. This role is assumed by using the EKS Pod Identity association role, then the credentials for this role are injected into the Pod.
