Kubernetes Clusters
Kubernetes Clusters
Planton can create Kubernetes clusters for you through Infra Hub (GKE, EKS, AKS, DOKS). But many organizations already have clusters running β production clusters that predate Planton, clusters managed by a separate platform team, or clusters in environments that Planton doesn't manage directly.
Kubernetes cluster connections let you bring those existing clusters into Planton. Once connected, you can deploy services to them through Service Hub, manage workloads through Cloud Ops, and include them in your environment authorization model alongside cloud provider credentials.
When to Use Kubernetes Cluster Connections
- Existing production clusters β You have clusters already running and want to deploy services to them through Planton without recreating them.
- Hybrid cloud β Some clusters are managed by Planton, others are managed externally. Connecting external clusters gives you a unified deployment surface.
- Migration β You're moving to Planton gradually and want to deploy new services to existing clusters before migrating the cluster management itself.
- Multi-cluster architectures β Your workloads span multiple clusters, some of which Planton created and some of which it didn't.
Supported Providers
Kubernetes cluster connections support four managed Kubernetes providers. Each requires different credentials depending on how the provider handles authentication.
Google Kubernetes Engine (GKE)
The most complete implementation. GKE connections use a service account key to authenticate.
| Field | Description |
|---|---|
| Cluster Endpoint | The API server endpoint of your GKE cluster |
| Cluster CA Data | Base64-encoded certificate authority data for TLS verification |
| Service Account Key | Base64-encoded JSON key for a GCP service account with Kubernetes Engine access |
To find these values:
- In the Google Cloud Console, navigate to your GKE cluster's details page.
- The Endpoint and Cluster CA certificate are on the cluster details page.
- Create a GCP service account with the
Kubernetes Engine DeveloperorKubernetes Engine Adminrole and generate a JSON key.
DigitalOcean Kubernetes (DOKS)
DOKS connections use a kubeconfig file.
| Field | Description |
|---|---|
| Kubeconfig | The kubeconfig content for your DOKS cluster |
To get your kubeconfig:
- In the DigitalOcean control panel, navigate to your Kubernetes cluster.
- Download the kubeconfig file from the cluster details page, or use the CLI:
doctl kubernetes cluster kubeconfig show my-cluster.
Amazon EKS
Note: EKS cluster connection support is defined in the API but the credential configuration is not yet implemented. EKS clusters created by Planton through Infra Hub work automatically β this connection type is for externally managed EKS clusters. Check back for updates.
Azure AKS
Note: AKS cluster connection support is defined in the API but the credential configuration is not yet implemented. AKS clusters created by Planton through Infra Hub work automatically β this connection type is for externally managed AKS clusters. Check back for updates.
Connecting via the Web Console
- Navigate to Connections and click the Kubernetes card under Infrastructure.
- Name your connection β use a name that identifies the cluster (e.g., "prod-gke-us-east", "legacy-doks-cluster").
- Select the provider β GKE or DigitalOcean DOKS.
- Provide the credentials listed above for your provider.
- Create the connection.
Authentication Modes
Like cloud provider connections, Kubernetes cluster connections support inline and runner-delegated authentication:
- Inline β Provide the cluster credentials directly (endpoint, CA cert, service account key or kubeconfig). Simplest option.
- Runner-delegated β A Planton Runner deployed with access to the cluster handles authentication. Useful when the cluster is in a private network and credentials should not leave the network perimeter.
How Kubernetes Connections Are Used
Once connected, external clusters become deployment targets:
- Service Hub β When creating a service deployment target, you can select a connected external cluster alongside clusters that Planton created through Infra Hub.
- Cloud Ops β You can browse pods, stream logs, and exec into containers on connected clusters through the Cloud Ops interface, as long as a Runner with access to the cluster is configured.
- Infra Hub β Cloud resources with Kubernetes deployment components (Helm charts, operators, custom resources) can target connected clusters.
Practical Guidance
Cluster Naming
Name connections by cluster identity and purpose, not by how they were created:
prod-gke-us-central1β identifies the cluster's role, provider, and regionstaging-doks-nyc1β clear and specificlegacy-app-clusterβ useful during migration
Credential Scope
The credentials you provide should have the minimum permissions needed for your use case:
- Service deployments only: The service account needs permissions to create and manage Deployments, Services, ConfigMaps, Secrets, and Ingress resources in the target namespaces.
- Cloud Ops access: Additionally needs pod list, log read, and exec permissions.
- Full Infra Hub management: Needs cluster-admin or equivalent broad permissions.
Keep Credentials Current
Kubernetes credentials (especially kubeconfig tokens and service account keys) have expiration policies. Monitor connection health and rotate credentials before they expire to avoid deployment failures.
Related Documentation
- Connections Overview β Understanding the Connect system
- Cloud Providers β Connect cloud provider accounts for creating new clusters
- CI/CD: Deployment Targets β How services target Kubernetes clusters
- Operations β Runtime operations on connected clusters
Next article