Skip to main content
Skip table of contents

AKS Cluster Access for Cloudaware

This guide explains how to grant Cloudaware read-only access to an Azure Kubernetes Service (AKS) cluster so Cloudaware can automatically discover Kubernetes resources.

Prerequisites

  • You have Owner/Contributor or appropriate permissions in Azure to view the enterprise applications and AKS configuration.

  • You have cluster-admin (or equivalent) permissions in the AKS cluster to apply RBAC objects.

  • You have kubectl installed and configured to connect to the target AKS cluster.

Overview

Cloudaware discovery requires access to Kubernetes API resources (pods, nodes, namespaces, etc.). The access model depends on whether your AKS cluster uses Entra ID (AD)-based authentication/authorization.

Entra ID integration is disabled (non-AD-managed cluster)

If your AKS cluster is not Entra ID (AD)–managed, grant Cloudaware the Azure permission:

  • Microsoft.ContainerService/managedClusters/listClusterUserCredential/read

This allows Cloudaware to retrieve cluster user credentials for discovery.

Entra ID integration is enabled (AD-managed cluster)

AKS can authorize access via Entra ID identities. Create a ClusterRoleBinding in Kubernetes for the Azure application (service principal) used by Cloudaware.

Continue with the steps below.

Step 1. Get the service principal Object ID for the Cloudaware Azure application

  1. Sign in to the Azure portal.

  2. Navigate to Microsoft Entra ID.

  3. Open Enterprise applications.

  4. Select the application you configured for Cloudaware, e.g., cloudaware-api-access.

  5. In Overview, copy the Object ID.

    AKS cluster access - enterprise applications - overview - copy object id .png

Use the Enterprise application Object ID (service principal Object ID), not the Application (client) ID.

Step 2. Create the RBAC manifest

Create a file cloudaware-rbac.yaml with the content below. Replace the placeholder {SERVICE-PRINCIPAL-OBJECT-ID} with your service principal Object ID.

CODE
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: cloudaware-reader
rules:
- apiGroups: ["*"]
  resources: ["*"]
  verbs: ["get", "watch", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
  name: cloudaware-reader-application-binding
roleRef:
  apiGroup: rbac.authorization.k8s.io
  kind: ClusterRole
  name: cloudaware-reader
subjects:
  - apiGroup: rbac.authorization.k8s.io
    kind: User
    name: {SERVICE-PRINCIPAL-OBJECT-ID}

What this does:

  • cloudaware-reader in ClusterRole grants read-only access (get, list, watch) across cluster resources.

  • cloudaware-reader-application-binding in ClusterRoleBinding binds that role to the Entra ID identity for Cloudaware’s enterprise application.

Step 3. Apply the manifest

Run the command:

CODE
kubectl create -f cloudaware-rbac.yaml

Allow up to 24 hours for AKS resources to appear in the Cloudaware CMDB.

If the AKS cluster is not reachable from Cloudaware due to private networking, use the Cloudaware Breeze agent for a secure connection. Read more

AKS objects discovered by Cloudaware

Cloudaware supports discovery of the following AKS cluster objects:

  • Azure AKS Cluster

  • Azure AKS Cluster Agent Pool Profile

  • Azure AKS Cluster Config Map

  • Azure AKS Cluster Daemon Set

  • Azure AKS Cluster Deployment

  • Azure AKS Cluster Endpoint

  • Azure AKS Cluster HPA

  • Azure AKS Cluster Ingress

  • Azure AKS Cluster Limit Range

  • Azure AKS Cluster Namespace

  • Azure AKS Cluster Network Policy

  • Azure AKS Cluster Network Policy Rule

  • Azure AKS Cluster Node

  • Azure AKS Cluster Node Address

  • Azure AKS Cluster Node Condition

  • Azure AKS Cluster Public IP Address Link

  • Azure AKS Cluster Public IP Prefix Link

  • Azure AKS Cluster Pod

  • Azure AKS Cluster Pod Container

  • Azure AKS Cluster Pod Disruption Budget

  • Azure AKS Cluster Replica Set

  • Azure AKS Cluster Role

  • Azure AKS Cluster Role Bindings

  • Azure AKS Cluster Resource Quota

  • Azure AKS Cluster Secret

  • Azure AKS Cluster Service

  • Azure AKS Cluster Stateful Set

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.