AKS Inspector Setup

Deploy the KorPro Inspector into your Azure Kubernetes Service cluster and start analyzing unused resources automatically.

Prerequisites

  • kubectl connected to your AKS cluster
  • Helm 3+
  • Your KorPro license key from Settings → Inspector

Step 1: Connect to your AKS cluster

Run the following command to configure kubectl for your cluster:

az aks get-credentials --resource-group <resource-group> --name <cluster-name>

Verify with:

kubectl config current-context

Step 2: Install the Inspector via Helm

helm install korpro-inspector oci://ghcr.io/kortechnologies/charts/korpro-inspector \
  --namespace korpro-system \
  --create-namespace \
  --set licenseKey="<your-license-key>"

This creates a ClusterRole, ServiceAccount, Secret, and a CronJob that runs every 6 hours.

Step 3: Verify the installation

kubectl get cronjobs -n korpro-system

You should see korpro-inspector listed with schedule 0 */6 * * *.

Step 4: Trigger an immediate test scan

kubectl create job korpro-test --from=cronjob/korpro-inspector -n korpro-system

Then follow the logs:

kubectl logs -n korpro-system -l job-name=korpro-test --follow

Step 5: View results

Your cluster appears in the KorPro dashboard under Settings → Inspector → Connected Clusters after the first successful scan.

Troubleshooting

RBAC errors?

The Inspector prints the exact ClusterRole YAML needed if permissions are missing.

Cluster name wrong?

Override with --set scanner.clusterName="my-cluster".