Import Standard Kubernetes Cluster
Use this procedure to import an existing standard Kubernetes cluster, such as a cluster deployed with kubeadm, as a third-party cluster.
TOC
TerminologyPrerequisitesNotesObtain Registry AddressCheck if Extra Registry Config is NeededGet Cluster InfoIntegrate ClusterNetwork ConfigurationPost-import ConfigurationFAQWhy is the "Add Node" button disabled?Which certificates are supported?Which features are unsupported?How to fix Containerd runtime causing distributed storage deployment failures?Terminology
Prerequisites
- Kubernetes and related components in the cluster must meet the version and parameter requirements.
- If the runtime is Containerd, update the Containerd configuration before integration to ensure distributed storage can be deployed successfully.
Notes
By default, the platform monitors NIC traffic matching eth.*|en.*|wl.*|ww.*. If your NIC uses a different naming convention, update the configuration after integration following Collect Network Data from Custom Named Network Cards.
Obtain Registry Address
-
To use the registry deployed by the platform during global cluster installation, run the following on a global control node:
-
To use an external registry, set REGISTRY manually:
Check if Extra Registry Config is Needed
-
Run the following to check if the registry supports HTTPS with a trusted CA certificate:
-
If check fails, see How to trust an insecure registry?
Get Cluster Info
See How to fetch cluster information?.
Integrate Cluster
-
In the left navigation, go to Cluster Management > Clusters.
-
Click Import Cluster.
-
Configure parameters as below:
-
Click Check Connectivity. The platform verifies network access and auto-detects cluster type.
-
If successful, click Import to complete.
Progress can be viewed via the execution progress dialog (status.conditions). Once integrated, the cluster appears as healthy in the list.
Network Configuration
Ensure connectivity between the global cluster and the imported cluster.
Post-import Configuration
If you need the platform to collect audit data from an imported standard Kubernetes cluster, configure Kubernetes API server audit logging on the cluster after import. See How to configure audit collection for imported standard Kubernetes clusters?.
FAQ
Why is the "Add Node" button disabled?
Adding nodes through the platform UI is not supported for imported standard Kubernetes clusters. Add nodes directly in the target cluster or through the cluster provider.
Which certificates are supported?
- Kubernetes Certificates: Only API Server certificates can be viewed; other certificates are unsupported and will not auto-rotate.
- Platform Component Certificates: Viewable and auto-rotatable.
Which features are unsupported?
- Provider-managed Kubernetes services: Audit logs are not available.
- Provider-managed Kubernetes services: ETCD, Scheduler, and Controller Manager monitoring are not supported. Only API Server metrics are available.
- All clusters: Certificates other than API Server are not supported.
How to fix Containerd runtime causing distributed storage deployment failures?
When using Containerd, distributed storage deployment fails unless you adjust Containerd settings on all nodes:
- Edit
/etc/systemd/system/containerd.service, setLimitNOFILE=1048576. - Run
systemctl daemon-reload. - Restart Containerd:
systemctl restart containerd. - On control nodes, restart distributed storage pods: