CloudQuery Platform
  • Introduction
    • Welcome to CloudQuery Platform
    • Getting Help
  • Quickstart
    • Creating a New Account
    • Platform Activation
  • Core Concepts
    • Integrations
    • Syncs
    • Filters & Queries
    • SQL Console
    • Reports
  • Integration Guides
    • Setting up an AWS Integration
    • Setting up an AWS Cost and Usage Integration
    • Setting up a GCP Integration
    • Setting up an Azure Integration
    • Setting up a GitHub Integration
    • Setting up a K8s Integration
      • Using AWS EKS
      • Using Azure AKS
      • Using GCP GKE
    • General Integration Setup Guide
    • General Destination Setup Guide
  • Syncs
    • Setting up a Sync
    • Monitoring Sync Status
  • Cloud insights
    • From cloud asset inventory to insights
      • Security-focused queries
      • Compliance-focused queries
      • FinOps-focused queries
  • Production Deployment
    • Enabling Single Sign-on (SSO)
      • Single Sign-On with Google
      • Single Sign-On with Microsoft
      • Single Sign-On with Okta
  • User Management
    • Platform Roles Overview
    • Workspace Roles Overview
  • Advanced Topics
    • Custom Columns
    • Understanding Platform Views
    • Performance Tuning
  • Reference
    • Search & Filter Query Syntax
  • API Reference
  • CLI Docs
  • CloudQuery Hub
Powered by GitBook
On this page
  • Prerequisites
  • Configure AKS Cluster Access
  • Creating K8s Integration

Was this helpful?

  1. Integration Guides
  2. Setting up a K8s Integration

Using Azure AKS

PreviousUsing AWS EKSNextUsing GCP GKE

Last updated 29 days ago

Was this helpful?

CloudQuery Platform currently supports integration with Azure Kubernetes Service (AKS). This guide explains the required AWS account setup and configuration steps needed to enable CloudQuery to access your AKS clusters and run sync.

Prerequisites

First, follow the to create the service principal. This will establish the access needed for CloudQuery to interact with your AKS resources.

Configure AKS Cluster Access

Granting the Cluster Access can be achieved by assigning the Azure Kubernetes Service Cluster User Role to the Service Principal created in the setup guide linked above.

If using the CLI, that can be done using the following command:

# Register the security provider
az role assignment create \
    --assignee "{APP_ID}" \
    --role "Azure Kubernetes Service Cluster User Role" \
    --scope "/subscriptions/{SUBSCRIPTION_ID}"

Creating K8s Integration

  1. Navigate to Data Pipelines → Integrations in CloudQuery Platform

  2. Click Create Integration and select K8s

  1. Update the YAML configuration with your cluster details:

kind: source
spec:
  name: k8s
  path: cloudquery/k8s
  version: v7.6.0 # latest version of source k8s plugin
  tables:
    - "*"
  spec:
    providers:
      - cluster: ${cluster_name}
        azure:
          # service principal details:
          client_id: ${service_principal_app_id}
          tenant_id: ${service_principal_tenant}
          client_secret: ${service_principal_password}
          # k8s cluster details:
          subscription_id: ${subscription_id}
          resource_group_name: ${resource_group_name}
Azure integration setup guide