Parallel Works lets you bring your own Kubernetes clusters and manage them through a unified interface. Once connected, you can deploy workloads, manage access through groups, and monitor resources across all of your clusters from a single pane of glass.
Before connecting a cluster, make sure you have the following:
https://k8s.example.com:6443).OIDC Requirement
Your cluster must be configured to accept OIDC-based authentication. Parallel Works uses OIDC token federation to authenticate users against connected clusters. See Security Model below for details.
After the cluster is added, you are redirected to the cluster definition page where you can verify the connection and configure access.
Naming Restrictions
The cluster name cannot contain special characters. Only lowercase letters and numbers are allowed (e.g. prodcluster01).
Once a cluster is added, Parallel Works verifies the connection by querying the Kubernetes API for the cluster's node list. On the Clusters page, each connected cluster displays:
If the platform cannot reach the cluster, the cluster still appears in the list but shows zero resources. This typically indicates a network connectivity issue or an invalid CA certificate.
Connectivity Check
If a cluster shows 0 CPUs and 0 memory, double-check that the endpoint is reachable from the platform and that the CA certificate is correct.
Organization admins can share clusters with specific groups to control who has access. When a cluster is shared with a group:
admin-level access within the namespace.To share a cluster:
When a group is removed from a cluster, the associated RoleBinding is deleted but the namespace is preserved to prevent accidental data loss.
Group Prerequisites
Groups must be created in the organization before they can be shared with a cluster. The reserved group name cluster-admins cannot be used as a regular group name — it is managed internally by the platform.
The Kubernetes section provides a unified view across all connected clusters. From the sidebar, you can access:
All resource views support filtering by cluster and namespace, making it straightforward to manage resources across a large fleet of clusters.
Parallel Works uses OIDC token federation to authenticate users against connected Kubernetes clusters. This eliminates the need to distribute long-lived kubeconfig files or service account tokens.
https://<platform-host>/api/oidc).| Property | Value |
|---|---|
| TTL | 10 minutes |
| Audience | The specific cluster ID |
| Subject | user:<username> |
| Issuer | https://<platform-host>/api/oidc |
Each OIDC token includes group claims that map to Kubernetes RBAC:
cluster-scope — Included in every token. Grants read-only access to cluster-scoped resources like storage classes and runtime classes via a dedicated ClusterRole.cluster-admins — Included for organization admins and platform admins. Grants full administrative access to the cluster.admin access within the corresponding namespace.This model ensures that regular users can only access namespaces belonging to their groups, while organization admins retain full cluster-level access. All tokens are short-lived, reducing the risk associated with credential leakage.