AKS
Learn how to add and manage an Azure Kubernetes Service (AKS) cluster in StrongDM.
Overview
Prerequisites
Resource Configuration in StrongDM
sdm loginNAME: sdm admin clusters add aks - create AKS cluster USAGE: sdm admin clusters add aks [command options] <name> OPTIONS: --allow-resource-role-bypass (For legacy orgs) allows users to fallback to the existing authentication mode (Leased Credential or Identity Set) when a resource role is not provided. --bind-interface value IP address on which to listen for connections to this resource on clients. Specify "default", "loopback", or "vnm" to automatically allocate an available address from the corresponding IP range configured in the organization. (default: "default") --certificate-authority value (secret) --client-certificate value (secret) --client-key value (secret) --discovery-enabled Enable discovery for the cluster. --discovery-username value The user to impersonate in the cluster when running discovery. Required if the cluster is configured for identity aliases. (conditional) --egress-filter value apply filter to select egress nodes e.g. 'field:name tag:key=value ...' --healthcheck-namespace default This path will be used to check the health of your connection. Defaults to default. --hostname value (required) --identity-alias-healthcheck-username value (conditional) --identity-set-id value --identity-set-name value set the identity set by name --port value (required) (default: 443) --port-override value Port on which to listen for connections to this resource on clients. Specify "-1" to automatically allocate an available port. (default: -1) --proxy-cluster-id value proxy cluster id --secret-store-id value secret store id --subdomain value, --bind-subdomain value DNS subdomain through which this resource may be accessed on clients (e.g. "app-prod" allows the resource to be accessed as "app-prod.<your-org-name>.<sdm-proxy-domain>"). Only applicable to HTTP-based resources or resources using virtual networking mode. --tags value tags e.g. 'key=value,...' --template, -t display a JSON template --timeout value set time limit for commandsdm admin clusters add aks "aks-cluster-prod" --hostname "aks-prod01.acme.internal" --port 443 --certificate-authority "/etc/strongdm/certs/aks-ca.crt" --client-certificate "/etc/strongdm/certs/aks-client.crt" --client-key "/etc/strongdm/certs/aks-client.key" --identity-set-name "AKS Cluster Admins" --identity-alias-healthcheck-username "svc_aks_health" --discovery-enabled --discovery-username "sdm-discovery" --healthcheck-namespace "default" --bind-interface "default" --port-override -1 --egress-filter 'field:name tag:env=prod tag:region=us-east' --proxy-cluster-id "plc_0123456789abcdef" --secret-store-id "ss_abcdef0123456789" --subdomain "aks-prod01" --tags "env=prod,cloud=azure,platform=kubernetes,team=devops" --timeout 30sdm admin clusters list
Resource properties
Property
Requirement
Description
Display name
Client credentials
Server CA
Client certificate
Client key
Secret Store
Test the Connection
Help
Last updated
Was this helpful?

