Connecting a cluster
Upload your kubeconfig
Upload a kubeconfig file or paste its contents into the form. Give the cluster a display name.
What InfraAudit collects
After connecting a cluster, InfraAudit syncs the following workload data:| View | What’s shown |
|---|---|
| Clusters | All registered clusters with health status and resource counts |
| Namespaces | Namespaces per cluster with pod counts |
| Deployments | Deployments across all clusters with replica status |
| Pods | Individual pods with status, namespace, and node assignment |
| Services | ClusterIP, NodePort, and LoadBalancer services |
Drift detection for Kubernetes
InfraAudit detects two types of Kubernetes drift: Baseline snapshots — InfraAudit captures a baseline of your workloads on first sync. Subsequent scans flag configuration changes including:- Image tag changes (e.g.
nginx:1.24→nginx:latest) - Replica count changes made outside of a deployment rollout
- Resource limits removed or modified
- Environment variables added or changed
Vulnerability scanning for Kubernetes
For Kubernetes workloads, Trivy scans the container images referenced in your pods and deployments. Trigger a scan:vulnerability_scan job under Jobs to run against your Kubernetes providers automatically.
Multi-cluster management
InfraAudit shows a unified view across all registered clusters. Use the Cluster dropdown at the top of any workload view to filter by cluster.CLI reference
Next steps
- Drift detection — run drift scans against your Kubernetes workloads
- Vulnerabilities — review CVE findings for your container images
- Connecting cloud accounts — detailed RBAC and credential requirements