How to Import Azure Kubernetes Service (AKS) Containers
The Cado platform allows you to collect key logs and forensic artifacts from containers running in Azure Kubernetes Service (AKS).
To acquire distroless containers, please use Cado Host.
Import Steps
-
Navigate to Import > Cloud.
-
Select the Azure credentials configured under Azure > Cross Subscription and Tenancy.
-
Choose the resource group associated with the AKS cluster.
-
Follow the steps to select your Cluster, Pod, and Container.
-
Confirm the details and click Start Import.
Cado will automatically collect all key logs and forensic artifacts from the container for investigation. For most acquisitions, the import and processing will take just a few minutes to complete.
Private Cluster Support
As of release v2.31.0, the Cado platform supports capturing data from AKS Private Clusters. This functionality is achieved using the Azure Command Invoke APIs.
There are two key considerations with this method:
- Capturing from a private cluster is significantly slower than from a public cluster.
- The Azure API spins up a pod within the cluster to execute Cado Host. Ensure that your cluster has enough resources and nodes to schedule this command pod.
The newly created pod will automatically shut down and remove itself after 1 hour.
Scoping Down the Role for Access to AKS
The Cado platform requires specific permissions to access and execute code in containers. You can use the following role definition to limit the permissions required for Cado to access and acquire data from AKS:
{
"id": "",
"properties": {
"roleName": "ScopedDownAKSTest",
"description": "",
"assignableScopes": [
""
],
"permissions": [
{
"actions": [
"Microsoft.Resources/subscriptions/operationresults/read",
"Microsoft.Resources/subscriptions/read",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.ContainerService/managedClusters/runCommand/action",
"Microsoft.ContainerService/managedClusters/commandResults/read",
"Microsoft.ContainerService/managedClusters/privateEndpointConnections/read",
"Microsoft.ContainerService/managedClusters/listClusterAdminCredential/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}