Getting Started Guide
Welcome to the Managed Kubernetes Cloud Temple Getting Started Guide.
The goal of this section is to guide you to the resources needed to get started with your cluster.
Before you begin
To interact with your cluster, several elements are required:
- The
kubeconfigfile: This file, provided to you by the Cloud Temple teams upon service delivery, contains all the information needed to connect securely. - The
kubectltool: This is the standard command-line interface for managing a Kubernetes cluster. - The
kubelogintool (if OIDC is used): If your cluster is configured to authenticate via an OIDC identity provider (such as Entra ID/Azure AD), you must install thekubelogintool to handle the authentication flow. Follow the kubelogin installation guide.
:::info[Recommended GUI Tools: ] For a more visual experience and simplified resource management, we recommend using Lens. It is a powerful Kubernetes tool that allows you to explore your cluster, manage your applications, and visualize their status graphically. Some of our tutorials will use Lens to illustrate the procedures. You can download it here: https://k8slens.dev/. :::
Access your Managed Kubernetes cluster
Your production cluster is identified by a 5-letter code (6 letters in Dev/Test). This code is used to construct the URLs for the various interfaces. In the tutorials, we will use "ctodev".
The URLs are:
-
Kubernetes API (used in kubeconfig):
- identifier.mk.ms-cloud-temple.com:6443 (so in our example: https://ctodev.mk.ms-cloud-temple.com:6443 )
-
Public URLs:
- k10.external-secured.identifier.mk.ms-cloud-temple.com
- grafana.external-secured.identifier.mk.ms-cloud-temple.com
- harbor.external-secured.identifier.mk.ms-cloud-temple.com
- opencost.external-secured.identifier.mk.ms-cloud-temple.com
- opencost-mcp.external-secured.identifier.mk.ms-cloud-temple.com
:::info[Secure URLs ] The URLs above are only accessible from known public IPs, configured in the solution's firewall. If you wish to add a public IP, you must submit a support request. :::
- Internal URLs:
- ceph.internal.identifier.mk.ms-cloud-temple.com
- argocd.internal.identifier.mk.ms-cloud-temple.com
- hubble.internal.identifier.mk.ms-cloud-temple.com
:::info[Internal URLs ] The URLs above are not exposed on the Internet. They are only accessible on the Managed Kubernetes Internal network. :::
Your permissions
:::warning[Dev/Test ] For "Dev/Test" managed Kubernetes clusters, the service account provided to you has all permissions across the entire cluster (ClusterAdmin) :::
On "Production" clusters, your permissions are limited. You have an "Extended Viewer" right on cluster resources. This right grants read-only access to key resources, both at the cluster level and for diagnostics:
- Namespaces: allow tenants to list namespaces for tools and dashboards.
- Pods, deployments, replicaset...: allow tenants to list resources deployed on the cluster.
- Nodes: provide visibility into node capacity, taints, and labels to understand the scheduler's behavior.
- StorageClasses, PVs, PVCs, VolumeAttachments, and CSIDrivers: allow tenants to identify available storage classes and troubleshoot PVC-to-PV binding issues or CSI driver-related errors.
- IngressClasses: inform users about available ingress controllers for application routing.
- NetworkPolicies, ResourceQuotas, LimitRanges, and Events: essential for diagnosing network restrictions, scheduling failures, or resource quota violations.
The service account provided to you has also been made the owner of a first Capsule tenant. You can create Namespaces, which will be attached to your Capsule tenant. External accounts (OIDC) are members of this same Capsule tenant, allowing them to interact freely within the namespaces associated with the tenant. (See the "Manage permissions with Capsule" tutorial)
Some actions are not permitted:
- list / create Capsule tenants
- create CRDs: If you need to deploy an application with CRDs (e.g., a Helm chart for an operator), you will need to contact support to have these CRDs imported (by extracting the YAML files from the Helm chart). You can then deploy your Helm chart using the
--skip-crdsoption. See: Helm 3 Documentation
Tutorial: Deploy your first application
Follow a detailed guide to connect, deploy a "Hello World" application, and expose it to the Internet.
Tutorial: Understand networking
Learn about the addressing scheme, Ingress Controllers, and how to expose your services securely.
Tutorial: Manage permissions with Capsule
Learn how to use Capsule to create tenants and delegate permissions to your teams.