Register and connect your Kubernetes clusters to Skyhook
Connect your Kubernetes clusters to Skyhook to enable monitoring, resource management, and automated deployments. Skyhook works with existing clusters; no need to provision new infrastructure.
New to Skyhook? Consider using the Onboarding Guide for guided setup. It walks you through cluster connection, ArgoCD installation, and addon configuration automatically.
This guide covers manual cluster connection for users who prefer direct control or already have infrastructure in place.
cert-manager - Automated certificate issuance and renewal
Without nginx-ingress and cert-manager, Skyhook can still monitor your cluster, but you’ll need to manually handle ingress configuration and certificate management for your services.
No manual configuration needed! When you install cert-manager through Skyhook’s addon system (via ArgoCD), a ClusterIssuer is automatically created and configured with Let’s Encrypt.
The addon takes care of:
Creating the letsencrypt ClusterIssuer
Configuring HTTP01 challenge solver
Setting up the necessary secrets
You can view and modify the ClusterIssuer configuration through the Addons page.
If you installed cert-manager manually with helm, you’ll need to create a ClusterIssuer yourself:
If you already have a kubectl context for the cluster, the fastest path is:
skyhook onboard cluster connect
skyhook onboard cluster connect detects your cluster from the current kubectl context, auto-fills the cloud provider / account / region, registers the cluster with Skyhook, and runs the helm install for the connector — all in one shot. You can pass --context <ctx> to target a specific context, --all to register every unconnected context at once, or --dry-run to preview.Once the connector comes online, skip to Step 5: Verify Connection below.For users who prefer the UI, or clusters where the CLI’s auto-detection doesn’t fit your environment, the per-provider flows below walk through it manually.
Return to Clusters → List in the Skyhook UI. Your cluster status should change from WAITING FOR CHECK-IN (blue) to ONLINE (green) in under a minute.The Cluster Connector fetches cluster data on-demand when you use the Skyhook UI, ensuring you always see current information without unnecessary polling.
Return to Clusters → List in the Skyhook UI. Your cluster status should change from WAITING FOR CHECK-IN to ONLINE within 2-3 minutes.
Azure support is currently in private beta.
Contact us to request access to the Azure private beta.
Once you’re enrolled in the beta, we’ll provide specific instructions for connecting your AKS clusters.
Skyhook supports any conformant Kubernetes cluster - on-prem, bare-metal, OVH, DigitalOcean, Linode, Civo, k3s, or any other distribution.
We strongly recommend installing ArgoCD on BYOK clusters. While Skyhook’s CI/CD pipelines work without it, ArgoCD unlocks the full platform experience: automated addon management (cert-manager, nginx-ingress, OpenCost), GitOps-based configuration, drift detection, and multi-cluster consistency. The onboarding wizard will guide you through ArgoCD installation after connecting your cluster.
Most Skyhook features work identically on BYOK clusters. A few things to be aware of:
Logging links: Skyhook won’t generate cloud-specific log console links (e.g., CloudWatch, Cloud Logging). Configure a custom logging URL template in your organization settings if you use Grafana, ELK, or another logging platform.
Cloud console links: Links to cloud provider consoles (GCP Console, AWS Console) won’t appear for BYOK clusters.
Cost tracking: FinOps cloud cost integration requires a cloud billing account. OpenCost still provides cluster-level resource metrics without cloud billing data.
Container registry: Use any OCI-compliant registry (Docker Hub, GitHub Container Registry, Harbor, Quay, etc.). Configure imagePullSecrets in your cluster if your registry requires authentication.
Secrets management: External Secrets Operator works with any backend (HashiCorp Vault, AWS Secrets Manager, etc.). For BYOK, Vault or Sealed Secrets are common choices.
Storage classes: Addons that need persistent storage (e.g., Prometheus via OpenCost) default to the standard StorageClass. If your cluster uses a different default, update the storage class in the addon configuration.
Ingress: nginx-ingress works on any cluster. Cloud-specific ingress controllers (AWS ALB, GCE) are not applicable.
Find your cluster’s external load balancer IP in the Cluster detail page (Networking section) or in your cloud provider’s console.Create an A record in your DNS provider:
example.com → A → <CLUSTER_LOAD_BALANCER_IP>*.example.com → A → <CLUSTER_LOAD_BALANCER_IP>
If you’re using a global load balancer across multiple clusters, continue managing DNS through your existing setup. Skyhook doesn’t currently automate multi-cluster load balancing.