Skip to main content
Skip table of contents

Kubernetes Integration for Microsoft AKS

Microsoft AKS

The Mend Kubernetes (K8s) integration can connect with your Microsoft AKS service using your provided access and secret keys.

Prerequisites before you Configure Mend’s Kubernetes Integration for Microsoft AKS

  • Your Mend user must be an organization administrator.

  • Private-only AKS clusters are not supported.

Set up the Mend Kubernetes Integration for Microsoft AKS in the Mend AI Native AppSec Platform UI

image-20250904-064447.png

Step 1 - General Details

  1. Fill in the desired Display Name (mandatory).

  2. Add a Description (optional).

  3. Select the Environment (Production/Dev/QA/Staging). (Mandatory; multi-selection is supported).

    image-20240320-073237.png

Step 2 - Authentication

Fill in the following authentication details for your Microsoft AKS:

  • Tenant (Directory) ID (mandatory)

  • Subscription ID (mandatory)

  • Client (Application) ID (mandatory)

  • Client Secret (mandatory)

  • Resource Group (optional)

image-20250904-064544.png

Once all mandatory fields are filled, the Test Connection button will become clickable. Use it to verify connectivity and proceed to the next step.

image-20250904-065308.png
image-20250904-065112.png
image-20250904-065220.png

Step 3 - Clusters

The summary of detected clusters will be displayed. Click Next to proceed to the next step.

image-20250714-160644.png

Step 4 - Configuration

Fill in the Configuration information to define your scan schedule:

image-20250714-134143.png
  • Enable Schedule - Toggle off to disable scheduling.

  • Scan Time

  • Frequency

  • Scan on Connect - While toggled on, it means a scan will be triggered automatically once the integration setup is completed.

Scheduling image registry scans is crucial for maintaining the security and integrity of your container images. By default, a scan interval of 7 days will be applied. You can change the scan interval in 1-day increments or select specific days of the week when you wish for scans to be executed.

Note: After the first scan (in which the latest 10 tags are scanned), in every scheduled scan only newly pushed images from the registry or changed images will be scanned. This is because vulnerability and package updates occur automatically in an asynchronous manner, keeping the security information up-to-date without requiring new scans.

Click the Next (image-20240727-113029.png) button at the bottom right to move on to the next step.

Step 5 - Summary

In this step, the summary of your input from the previous steps will be displayed. You can go back to the previous screens of the wizard to make changes, by clicking the ‘Back’ button at the bottom right corner of the screen. If you wish to confirm your configuration and add your registry, click the ‘Done’ button:

image-20240727-114442.png
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.