Directory › Connections › Kubernetes

How to Add a Kubernetes Connection in CyberVision

Purpose

Create a Kubernetes connection to access workloads (pods/containers) through the cluster API in a controlled way.

Prerequisites

  • Permission to create connections in the Connections module.
  • Kubernetes API server endpoint.
  • API port (commonly 6443).
  • Defined authentication method (client certificate/key, depending on environment).
  • Target namespace/pod/container (when applicable).
  • (Optional) Proxy/jump host.

Step-by-step

1) Create the connection

1. Open Connections.

2. Click Add.

2) Set general connection details

In the Connection section:

  • Name: define a clear name (example: K8s - Production Cluster).
  • Protocol: select Kubernetes.

Why?

  • Name improves operational clarity and ownership.
  • Protocol switches the form/engine to Kubernetes-specific parameters.

3) Configure Proxy

In the Proxy section:

  • Hostname
  • Port

Why?

  • Many cluster APIs are internal-only.
  • Proxy/jump keeps access controlled without broad network exposure.

4) (Optional) Apply usage restrictions

Configure:

  • Date/time usage windows.
  • Allowed/blocked schedules.
  • Allowed/blocked source hosts.

Why?

  • Limits unauthorized access opportunities.
  • Supports governance and compliance controls.

5) Configure Kubernetes protocol parameters

In kubernetes: Protocol Parameters:

Network

  • Hostname: API server IP/DNS.
  • Port: usually 6443.
  • Use SSL/TLS: enable.
  • Ignore server certificate: only if strictly necessary.

Container

  • Namespace
  • Pod name
  • Container name
  • Command (exec)

Authentication

  • Client certificate
  • Client key

Why?

  • Hostname/Port define the control-plane endpoint.
  • SSL/TLS protects confidentiality/integrity.
  • Ignore server certificate reduces trust validation and should be exceptional.
  • Namespace/Pod/Container define exact execution scope.
  • Command (exec) defines initial shell/command behavior.
  • Client cert/key enables strong mTLS-based identity.

6) (Optional) Enable recordings

In the Recordings section:

  • Enable session recording
  • Enable keystroke recording (if available in your setup)

Why?

  • Creates an auditable trail of interactive operational actions.

7) Save

  • Click Save.

Post-creation validation

1. Confirm the connection appears in the Connections list.

2. Start the session and validate:

  • API connectivity,
  • authentication success,
  • access to expected namespace/pod/container,
  • TLS/certificate behavior,
  • recording behavior (if enabled).

Best practices

  • Use naming standard: K8s - <Environment> - <Cluster>.
  • Do not use Ignore server certificate in production unless formally justified.
  • Scope access to required namespaces only.
  • Apply time/source restrictions for high-sensitivity clusters.
  • Periodically review and retire stale connections.
Was this helpful?
Yes: 0 · No: 0