Using Azure AKS

CloudQuery Platform currently supports integration with Azure Kubernetes Service (AKS). This guide explains the required AWS account setup and configuration steps needed to enable CloudQuery to access your AKS clusters and run sync.

Prerequisites

First, follow the Azure integration setup guide to create the service principal. This will establish the access needed for CloudQuery to interact with your AKS resources.

Configure AKS Cluster Access

Granting the Cluster Access can be achieved by assigning the Azure Kubernetes Service Cluster User Role to the Service Principal created in the setup guide linked above.

If using the CLI, that can be done using the following command:

# Register the security provider
az role assignment create \
    --assignee "{APP_ID}" \
    --role "Azure Kubernetes Service Cluster User Role" \
    --scope "/subscriptions/{SUBSCRIPTION_ID}"

Creating K8s Integration

  1. Navigate to Data PipelinesIntegrations in CloudQuery Platform

  2. Click Create Integration and select K8s

  1. Update the YAML configuration with your cluster details:

kind: source
spec:
  name: k8s
  path: cloudquery/k8s
  version: v7.6.0 # latest version of source k8s plugin
  tables:
    - "*"
  spec:
    providers:
      - cluster: ${cluster_name}
        azure:
          # service principal details:
          client_id: ${service_principal_app_id}
          tenant_id: ${service_principal_tenant}
          client_secret: ${service_principal_password}
          # k8s cluster details:
          subscription_id: ${subscription_id}
          resource_group_name: ${resource_group_name}

Last updated

Was this helpful?