AKS Inspector Setup
Deploy the KorPro Inspector into your Azure Kubernetes Service cluster and start analyzing unused resources automatically.
Prerequisites
- kubectl connected to your AKS cluster
- Helm 3+
- Your KorPro license key from Settings → Inspector
Step 1: Connect to your AKS cluster
Run the following command to configure kubectl for your cluster:
az aks get-credentials --resource-group <resource-group> --name <cluster-name>
Verify with:
kubectl config current-context
Step 2: Install the Inspector via Helm
helm install korpro-inspector oci://ghcr.io/kortechnologies/charts/korpro-inspector \ --namespace korpro-system \ --create-namespace \ --set licenseKey="<your-license-key>"
This creates a ClusterRole, ServiceAccount, Secret, and a CronJob that runs every 6 hours.
Step 3: Verify the installation
kubectl get cronjobs -n korpro-system
You should see korpro-inspector listed with schedule 0 */6 * * *.
Step 4: Trigger an immediate test scan
kubectl create job korpro-test --from=cronjob/korpro-inspector -n korpro-system
Then follow the logs:
kubectl logs -n korpro-system -l job-name=korpro-test --follow
Step 5: View results
Your cluster appears in the KorPro dashboard under Settings → Inspector → Connected Clusters after the first successful scan.
Troubleshooting
RBAC errors?
The Inspector prints the exact ClusterRole YAML needed if permissions are missing.
Cluster name wrong?
Override with --set scanner.clusterName="my-cluster".