Connections

Manage connectors and MCP servers for your CloudThinker environment to integrate with various services and tools.

Built-in Connections

CloudThinker provides several built-in connections for popular cloud services and databases.

Available Built-in Connections

Amazon Web Services

Connect to AWS services including EC2, S3, RDS, Lambda, and more for comprehensive cloud operations.

Google Cloud Platform

Integrate with Google Cloud services including Compute Engine, Cloud Storage, BigQuery, and Kubernetes Engine.

Microsoft Azure

Connect to Azure services including Virtual Machines, Blob Storage, SQL Database, and Container Instances.

PostgreSQL

Connect to PostgreSQL databases for monitoring and optimization operations.

Kubernetes

Integrate with Kubernetes clusters for workload management and monitoring.

MySQL

Connect to MySQL databases for performance monitoring and optimization tasks.

Managing Built-in Connections

Connecting a Service:
  1. Set up credentials: Follow our credential setup guide to create read-only access
  2. Click the Connect button on the desired service
  3. Provide the required credentials and configuration
  4. Test the connection to ensure proper setup
  5. Save the connection for use in operations
Connection States:
  • Ready to connect: Service is available but not yet configured
  • Connected: Service is active and ready for operations
  • Disconnected: Service was connected but is currently unavailable

Credential Setup Guide

Learn how to create secure, read-only access credentials for all supported services
Built-in connections are pre-configured with the most common settings for each service type. You can customize these connections after initial setup.

Connection Security

Best Practices

Credential Management

  • Use read-only credentials when possible
  • Implement proper access controls and permissions
  • Regularly rotate access keys and passwords
  • Store credentials securely with encryption

Network Security

  • Use HTTPS/TLS for all connections
  • Implement IP whitelisting where possible
  • Monitor connection logs for suspicious activity
  • Set appropriate timeout values

Troubleshooting Connections

Next Steps