LogoLogo
Metadata for Integration Config
Metadata for Integration Config
  • INTEGRATION METADATA
    • Amazon Account
    • AWS EC2 SSH
    • Elastic Kubernetes Service (EKS)
    • AWS Lambda Custom Integration
    • Amazon Organization
    • AWS RDS MySQL
    • AWS RDS PostgreSQL
    • Amazon RDS
    • Entra ID (Azure AD) Groups
    • Azure Kubernetes Service (AKS)
    • Azure Management Group
    • Azure MySQL
    • Azure PostgreSQL
    • Azure Subscription
    • Azure VM SSH
    • Cloud Function Custom Integration
    • F5 Network
    • Google AlloyDB
    • Google BigQuery
    • Google Cloud SQL - MySQL
    • Google Cloud SQL - PostgreSQL
    • Google Kubernetes Engine (GKE)
    • Google Organization
    • Google Project
    • Github
    • JumpCloud
    • Kubernetes Proxy
    • Kubernetes
    • LDAP Group
    • MariaDB
    • Mongo Atlas Portal
    • MongoDB Atlas
    • MongoDB
    • Microsoft SQL Server
    • MySQL
    • Okta Group
    • OneLogin Group
    • 1Password
    • OpenVPN
    • Oracle Database
    • PostgreSQL
    • RabbitMQ
    • Rancher
    • RDP
    • Redis Cloud (Redislabs)
    • Amazon Redshift
    • Snowflake
    • SSH
    • Vertica Database
    • Web App
    • Windows Domain Controller
Powered by GitBook
On this page
  • Example Usage
  • Schema
  • Integration Config

Was this helpful?

Export as PDF
  1. INTEGRATION METADATA

Kubernetes

Kubernetes is an open-source container orchestration system for automating software deployment, scaling, and management.

Example Usage


k8s-roles-integration.tf
resource "apono_integration" "k8s-roles-integration" {
  name                     = "Kubernetes"
  type                     = "k8s-roles"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["k8s-cluster"]
  metadata = {
    cluster_name = "<kubeconfig Cluster Name>"
    kubeconfig_api_server_url = "<kubeconfig Server URL>"
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  kubernetes_secret = {
    name      = "name_template_value"
    namespace = "namespace_template_value"
  }
}
k8s-roles-integration.tf
resource "apono_resource_integration" "k8s-roles-integration" {
  name                     = "Kubernetes"
  type                     = "k8s-roles"
  connector_id             = "apono-connector-id"
  connected_resource_types = ["k8s-cluster"]
  integration_config = {
    cluster_name = "<kubeconfig Cluster Name>"
    kubeconfig_api_server_url = "<kubeconfig Server URL>"
    server_url = "<Server URL>"
    certificate_authority = "<Certificate Authority>"
    credentials_rotation_period_in_days = "<Credentials rotation period (in days)>"
    credentials_cleanup_period_in_days = "<User cleanup after access is revoked (in days)>"
  }
  secret_store_config = {
    kubernetes = {
      name      = "name_template_value"
      namespace = "namespace_template_value"
    }
}

Schema


  • type k8s-roles

  • connected_resource_types List of resource types to sync.

Available resource types you can use
  • k8s-cluster

  • k8s-namespace

  • k8s-secret

  • k8s-configmap

  • k8s-deployment

  • k8s-statefulset

  • k8s-ingress

  • k8s-cronjob

  • k8s-job

Integration Config


  • cluster_name (Required | String) kubeconfig Cluster Name

  • kubeconfig_api_server_url (Required | String) kubeconfig Server URL

  • server_url (Optional | String) Server URL

  • certificate_authority (Optional | String) Certificate Authority

  • credentials_rotation_period_in_days (Optional | String) Credentials rotation period (in days)

  • credentials_cleanup_period_in_days (Optional | String) User cleanup after access is revoked (in days)

PreviousKubernetes ProxyNextLDAP Group

Last updated 4 hours ago

Was this helpful?