Connect an existing Amazon EKS (Elastic Kubernetes Service) cluster to the platform for unified management.
The cluster's Kubernetes version and settings meet the requirements in Version compatibility for importing standard Kubernetes clusters.
The image registry must support HTTPS and provide a valid TLS certificate issued by a public CA.
To comply with AWS EKS security practices, perform the following steps in AWS CloudShell.
Ensure network connectivity to the AWS Management Console.
Search for cloudshell, then open CloudShell.
Verify that the selected region matches your target cluster's region; switch if needed.
After CloudShell is ready, clear the terminal and run:
The environment is now ready. For subsequent steps such as Get cluster information and Import cluster, run any commands against the target cluster from within CloudShell.
KubeConfig from public‑cloud clusters cannot be used directly for import.
Refer to How do I get cluster information? to obtain the cluster import token.
In the left navigation, go to Cluster Management > Clusters.
Click Import Cluster.
Configure the parameters as follows.
| Parameter | Description |
|---|---|
| Image registry | Registry that stores platform component images required by the cluster. - Platform default: the registry configured when the global cluster was deployed. - Private registry: a pre-provisioned registry hosting required images. Provide the private registry address, port, username, and password. - Public registry: a public internet registry. Before use, obtain credentials as described in Update public registry cloud credentials. |
| Cluster information | Tip: Upload the kubeconfig file and let the platform parse it automatically. Cluster endpoint: the external API server address exposed by the target cluster. CA certificate: the cluster's CA certificate. Authentication: use the token created in the previous step with cluster administrator privileges. |
Click Check connectivity to verify network connectivity and automatically detect the cluster type. The detected type appears as a badge in the top-right of the form.
After the connectivity check passes, click Import, then confirm.
Tips:
status.conditions).Ensure the global cluster and the imported cluster have network connectivity. See Network Configuration for Imported Clusters.
If you need Ingress and storage capabilities, see Initialize Ingress for AWS EKS and Initialize storage for AWS EKS.
Adding nodes from the platform UI is not supported. Please add nodes through your cluster provider.
Kubernetes certificates: You can view the API server certificate only. Other Kubernetes certificates are not visible and are not auto-rotated.
Platform component certificates: Visible in the platform and support automatic rotation.
Audit data is not available.
ETCD, Scheduler, and Controller Manager metrics are not supported; a subset of API server charts is available.
Certificate details other than the Kubernetes API server certificate are not available.