New AWS CDK Bootstrap Features and EKS Cluster Integration Alex, 27 May 202529 April 2025 The AWS Cloud Development Kit (CDK) has received a significant update in its bootstrap process. The new features simplify deployment workflows, introduce better security controls, and align with modern cloud-native practices. One of the most anticipated capabilities includes tighter integration with Amazon Elastic Kubernetes Service (EKS), addressing long-standing friction for teams deploying infrastructure and workloads in tandem. What’s Changed in CDK Bootstrap? The bootstrap process is the foundation for deploying CDK stacks that require assets like Lambda code, container images, and configuration files. The latest version introduces structured changes to make this more robust. Key Improvements: Modern Stack Versioning: Bootstrap stacks now use versioning that explicitly declares supported features, ensuring consistent behavior across environments. Asset Publishing with IAM Roles: The new bootstrap template creates roles for deploying assets, reducing the attack surface and allowing for fine-grained permissions. Support for Asset Bundling: More efficient asset bundling is now supported using native container environments, improving build performance. Cross-Environment Deployment Ready: The updated bootstrap can support deployments across multiple AWS accounts and regions with better isolation. These updates directly reduce the manual configuration often needed in multi-account setups, enabling better separation of duties and simplifying pipeline automation. EKS Integration: A Stronger Bridge Between Infrastructure and Workloads EKS has been supported by CDK for some time, but previous workflows often required extra coordination between teams managing infrastructure and those deploying application workloads. The new CDK bootstrap features address this friction by improving context sharing and permission handling. Highlights of EKS-Related Improvements: IRSA-Compatible Roles Automatically ConfiguredIAM Roles for Service Accounts (IRSA) can be tricky to set up manually. The updated bootstrap process provisions the required roles and trust relationships for seamless IRSA integration. Kubeconfig Outputs from CDK StacksCDK stacks can now output kubeconfig connection details directly, streamlining Kubernetes access without external scripts. Managed Add-ons with Configurable VersionsCDK supports defining EKS managed add-ons (e.g., CoreDNS, kube-proxy) with version pinning, reducing drift between environments. Simplified Nodegroup ManagementCDK now supports managed and self-managed node groups with tighter control over launch templates, taints, labels, and capacity type (spot vs. on-demand). CDK Pipelines with EKS DeploymentsWorkloads can be deployed directly to EKS using cdk-pipelines with Kubernetes deployment steps embedded in the workflow. Step-by-Step EKS Bootstrap and Deployment Example Below is a simplified deployment flow using the updated bootstrap and EKS integration features: Bootstrap the Environment cdk bootstrap aws://ACCOUNT-ID/REGION Create the EKS Stack const cluster = new eks.Cluster(this, 'MyCluster', { version: eks.KubernetesVersion.V1_29, defaultCapacity: 2, albController: { version: eks.AlbControllerVersion.V2_6_1 } }); Configure IRSA Roles cluster.addServiceAccount('MyAppAccount'); Output Kubeconfig Connection Info new CfnOutput(this, 'ClusterName', { value: cluster.clusterName }); new CfnOutput(this, 'KubeconfigCommand', { value: `aws eks update-kubeconfig --name ${cluster.clusterName}` }); Pipeline Integration for DeploymentUse cdk-pipelines and shellStep or KubernetesManifest constructs to deploy application YAML manifests post-infrastructure provisioning. Security Considerations The updated bootstrap template enables stronger separation of deploy-time roles: FilePublishingRole and ImagePublishingRole can be scoped to CI pipelines. LookupRole can be scoped to read-only actions needed during synth or diff. DeployRole can be delegated to specific accounts or users using role assumption. These roles are not only more secure but also enable audit-friendly controls in larger organizations. Final Thoughts The updated CDK bootstrap features reflect a shift toward secure, scalable, and automated infrastructure deployments. The tighter integration with EKS fills a critical gap by merging infrastructure provisioning with Kubernetes-native deployment workflows. By aligning CDK’s capabilities with the needs of platform and application teams, AWS has turned infrastructure-as-code into a more complete and production-ready system for modern Kubernetes environments. Cloud & Infrastructure