Skip to Content

QueryPie KAC

Securely access Kubernetes clusters through QueryPie platform’s KAC (Kubernetes Access Control).

Key Features

  • Kubernetes cluster access through QueryPie KAC (Kubernetes Access Control)
  • Permission-based Kubernetes resource management
  • Secure kubectl command execution

Basic Information

Authentication Method

Authenticate using QueryPie platform username and password.

Input Parameters

  • Server URL (Required): QueryPie API server URL
  • Username (Required): QueryPie username
  • Password (Required): QueryPie password

Supported MCP Tools

KAC (Kubernetes Access Control) Tools

Manage Kubernetes cluster access through QueryPie’s Kubernetes access control functionality.

QueryPie KAC MCP only works with Kubernetes clusters managed by QueryPie.

list_accessible_k8s_roles

Retrieve a list of all accessible Kubernetes roles. You must select a role to use in subsequent commands.

list_accessible_k8s_clusters

Retrieve a list of all accessible Kubernetes clusters.

Input Parameters:

  • roleUuid (Required): Role UUID

list_k8s_namespaces

Retrieve a list of namespaces in the Kubernetes cluster.

Input Parameters:

  • roleUuid (Required): Role UUID
  • clusterUuid (Required): Cluster UUID

run_kubectl_command

Execute kubectl commands on the Kubernetes cluster.

Input Parameters:

  • roleUuid (Required): Role UUID
  • clusterUuid (Required): Cluster UUID
  • namespace (Optional): Namespace (default: default)
  • command (Required): kubectl command to execute

Usage Examples

For example,

  • When you input the prompt “Show me the list of Kubernetes clusters accessible through QueryPie”,
  • The LLM will sequentially call list_accessible_k8s_roles and list_accessible_k8s_clusters tools through QueryPie KAC MCP, then respond based on the results.

Precautions

  • Keep your QueryPie username and password secure.
  • Maintain security through proper permission settings.
  • Follow your organization’s security policies when accessing Kubernetes clusters.
  • Regularly review access logs.
  • Consider the impact on cluster resources when executing kubectl commands.
Last updated on