Kubernetes Access Controller
QueryPie KAC is a solution for Kubernetes API protection, enabling centralized management of cloud infrastructures like AWS EKS
and on-premises clusters. Administrators can manage access, monitor API requests, and replay container command executions.
Key Features of KAC
QueryPie KAC provides RBAC and ABAC controls for precise access management in Kubernetes, automatically acquiring IAM permissions.
Enjoy real-time visibility with audit logs, session recordings, and streamlined multi-cluster access, all backed by automatic KUBECONFIG configuration.
RBAC/ABAC Access Control
Implement role-based (RBAC) access for Kubernetes clusters, managing API access with tailored policies. Use attribute-based (ABAC) conditions to ensure permissions align with specific user attributes.
Automatic Access Permission Acquisition
Automatically register admin access permissions for cloud-based Kubernetes clusters like AWS EKS by simply assigning IAM permissions.
Audit Logging Session & Recording
Gain visibility into user actions across multiple clusters in near real-time through audit logs and pod session recordings.
Multi-Cluster Access Centralization
Automatically record sessions when users connect to containers, monitoring their actions. Apply access control rules based on K8S resource names (RegEx) not supported in standard K8S RBAC.
Automatic KUBECONFIG Configuration
Optimize cloud environments by synchronizing distributed resources and managing multiple Kubernetes integrations. Automate resource synchronization and track change history with scheduling functions.
How QueryPie KAC Works
QueryPie KAC seamlessly connects users to Kubernetes clusters with powerful access control and auditing capabilities.
The QueryPie Agent generates secure kubeconfig files, allowing users to effortlessly connect to Kubernetes clusters using tools like kubectl, Lens, and more.
Serving as the control hub, QueryPie KAC ensures precise role-based access management and comprehensive auditing of all Kubernetes activities.

Entirely Protect Your Kubernetes
QueryPie supercharges your Kubernetes protection, keeping your environment secure both inside and outside namespaces.
While QueryPie SAC handles tight access control and audits SSH connections to nodes,
QueryPie KAC shines in managing and monitoring all API interactions with Kubernetes resources, ensuring everything runs smoothly and securely.

Easy & Quick Cloud Synchronization
Sync your cloud resources effortlessly with QueryPie! Designed for seamless cloud environments, it streamlines Kubernetes integrations and automates resource synchronization with smart scheduling, all while tracking changes with ease.


Integrated Management in Multi-K8S Environment
Manage permissions from a single console, eliminating the need to configure RBAC settings for each Kubernetes cluster. Use wildcards to apply the same permission policy across multiple clusters, streamlining access control.
Segmented K8S Resource Unit Policy Management
Simplify access control with wildcard and regular expression support for resources, adapting to variable names while filtering responses based on user permissions. Enjoy detailed policy management for API groups, verbs, resource types, namespaces, and resource names for precise control.


Kubernetes API Execution History Logging
Say goodbye to confusing Kubernetes API audit logs! QueryPie’s Proxy logs all API requests across multiple clusters, focusing on essential actions for efficient tracking while reducing unnecessary load on the master server.
Container Shell Command Execution History Recording
Keep tabs on user activity in containers with session recordings that allow you to replay all actions after connecting to the pod. This feature provides comprehensive oversight and control.


Kubernetes Access Right Auto Setup
Automatically generate kubeconfig files for each user based on assigned roles. Users can easily access these files through QueryPie Agent, allowing them to choose accessible clusters with existing Kubernetes tools like kubectx.
3 Minutes to Wow !
Let us show you how QueryPie can transform the way you govern and share your sensitive data.