QueryPie KAC
Securely access Kubernetes clusters through QueryPie platform’s KAC (Kubernetes Access Control).
Key Features
- Kubernetes cluster access through QueryPie KAC (Kubernetes Access Control)
- Permission-based Kubernetes resource management
- Secure kubectl command execution
Basic Information
Authentication Method
Authenticate using QueryPie platform username and password.
Input Parameters
- Server URL (Required): QueryPie API server URL
- Username (Required): QueryPie username
- Password (Required): QueryPie password
Supported MCP Tools
KAC (Kubernetes Access Control) Tools
Manage Kubernetes cluster access through QueryPie’s Kubernetes access control functionality.
QueryPie KAC MCP only works with Kubernetes clusters managed by QueryPie.
list_accessible_k8s_roles
Retrieve a list of all accessible Kubernetes roles. You must select a role to use in subsequent commands.
list_accessible_k8s_clusters
Retrieve a list of all accessible Kubernetes clusters.
Input Parameters:
roleUuid
(Required): Role UUID
list_k8s_namespaces
Retrieve a list of namespaces in the Kubernetes cluster.
Input Parameters:
roleUuid
(Required): Role UUIDclusterUuid
(Required): Cluster UUID
run_kubectl_command
Execute kubectl commands on the Kubernetes cluster.
Input Parameters:
roleUuid
(Required): Role UUIDclusterUuid
(Required): Cluster UUIDnamespace
(Optional): Namespace (default: default)command
(Required): kubectl command to execute
Usage Examples
For example,
- When you input the prompt “Show me the list of Kubernetes clusters accessible through QueryPie”,
- The LLM will sequentially call
list_accessible_k8s_roles
andlist_accessible_k8s_clusters
tools through QueryPie KAC MCP, then respond based on the results.
Precautions
- Keep your QueryPie username and password secure.
- Maintain security through proper permission settings.
- Follow your organization’s security policies when accessing Kubernetes clusters.
- Regularly review access logs.
- Consider the impact on cluster resources when executing kubectl commands.
Last updated on