Kubeshark - Kubernetes Network Observability

Think Wireshark—reimagined for Kubernetes. Capture every packet, inspect every API call, and investigate ongoing and past incidents with complete traffic history—all with minimal production overhead.

Kubeshark delivers cluster-wide, real-time, identity and protocol-aware, visibility into API (L7) and L4 (TCP, UDP, SCTP) traffic, including encrypted (TLS) payloads, as it flows through your containers, pods, namespaces, nodes, and clusters.

Kubeshark UI

Investigate network data with AI-powered natural language prompts. Identify anomalies, detect security threats, optimize costs and improve performance, like never before.


Why Kubeshark?

Cluster-Wide API Visibility

Inspect real-time, cluster-wide API calls with full Kubernetes and operating system contexts. Troubleshoot your applications, trace service dependencies, and accelerate root cause analysis.

AI-Powered Root Cause Analysis

Identify root causes at the speed of LLMs. Provide direct access to L4, L7, and API traffic data. Ask in natural language: "Which APIs violate their OAS specs?" or "What services show poor health?"

AI-Driven Incident Response

Never lose a packet. At the onset of an incident—or first symptoms—trigger a snapshot of recent hours traffic from involved workloads and replay every step like CCTV footage.

Continuous Forensics

Store all raw traffic indefinitely and create a snapshot from any time window—days, weeks, or months later. When a customer complains, rewind to the exact moment and replay every packet and API call.


How It Works

Kubeshark offers two powerful modes for different use cases:

Real-Time API Dissection

See traffic as it happens. Kubeshark captures and dissects API calls in real-time, giving you immediate visibility into what’s happening across your cluster. This is ideal for:

  • Live debugging - Diagnose issues as they occur
  • Root cause analysis - See the exact request/response that caused a failure
  • Development workflows - Watch API calls while testing

Traffic Recording & Deferred Analysis

For comprehensive forensics, Kubeshark can capture complete L4 traffic (PCAP) and analyze it later:

  CAPTURE          STORE           ANALYZE          ENRICH
     |                |                |                |
     v                v                v                v
Lightweight      Complete PCAP    L7 dissection    Kubernetes
L4 capture  ---> retained for ---> on-demand or ---> context
on prod nodes    full history     scheduled        added

This enables:

  • Complete traffic history for forensic investigation
  • Minimal production overhead when you don’t need real-time analysis
  • Long-term retention for compliance and auditing

Protocol Support

Kubeshark supports 20+ protocols across multiple layers, with automatic TLS decryption:

CategoryProtocols
HTTP/RESTHTTP/1.0, HTTP/1.1, HTTP/2, WebSocket, GraphQL
MessagingApache Kafka, AMQP (RabbitMQ), Redis
RPCgRPC over HTTP/2
AuthenticationLDAP, RADIUS, DIAMETER
NetworkDNS, ICMP, TCP, UDP, SCTP
SecurityTLS (with automatic decryption)

TLS Decryption: Kubeshark can intercept encrypted traffic without requiring access to private keys by hooking into runtime cryptographic libraries (OpenSSL, Go crypto/tls, BoringSSL).

View full protocol documentation →


AI Integration

Kubeshark connects AI assistants directly to your network data via the Model Context Protocol (MCP)—the open standard for AI tool integration. Ask questions in natural language, investigate incidents, and analyze traffic patterns—all through your preferred AI tool.

Learn more about AI Integration →


Quick Start

Get Kubeshark running in 60 seconds:

# Add the Helm repository
helm repo add kubeshark https://helm.kubeshark.com

# Install Kubeshark
helm install kubeshark kubeshark/kubeshark

Then open the dashboard:

kubectl port-forward svc/kubeshark-front 8899:80

Open http://localhost:8899 in your browser.

Full installation guide →


Next Steps