Connect an Azure AKS Cluster with Cloudcraft
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
By scanning your Azure AKS clusters, Cloudcraft allows you to generate system architecture diagrams to help visualize your deployed workloads and pods.
Cloudcraft uses Azure’s Kubernetes Service Cluster User Role, and requires no special software or agent to look inside your clusters.
The ability to scan Azure AKS clusters and Azure accounts is only available to Cloudcraft Pro subscribers. Refer to
Cloudcraft's pricing page for more information.
Prerequisites
Before connecting your Azure AKS clusters with Cloudcraft, you must connect your Azure account and generate diagrams that include your clusters. For more information, see Connect your Azure account with Cloudcraft.
Authorizing the Cloudcraft IAM user for view-only access
Start by opening a blueprint with an existing Azure AKS cluster, or using the Auto Layout feature to generate a new blueprint.
With your Azure environment mapped into a blueprint, select the Azure AKS cluster that you wish to scan, and click the Enable cluster scanning button that appears in the component toolbar.
The next screen provides step-by-step instructions to complete in Azure.
- Click the first link to open your Azure Subscriptions page, then click Access control (IAM) on the left sidebar.
- Click Add and select Add role assignment.
- Search for and select Azure Kubernetes Service Cluster User Role, then click Next.
- Click Select members.
- Search for the IAM user that you want to grant access to your Azure AKS cluster—usually named cloudcraft—and click Select.
- Click Review + assign twice to complete the process.
Testing access to the cluster
To test that Cloudcraft can access to the cluster, click Test cluster access at the bottom of the Enable Kubernetes Cluster Scanning screen.