Kubeshark - Kubernetes Network Observability

Think Wireshark—reimagined for Kubernetes. Capture every packet, inspect every API call, and investigate ongoing and past incidents with complete traffic history—all with minimal production overhead.

Kubeshark delivers cluster-wide, real-time, identity and protocol-aware, visibility into API (L7) and L4 (TCP, UDP, SCTP) traffic, including encrypted (TLS) payloads, as it flows through your containers, pods, namespaces, nodes, and clusters.

Kubeshark UI

Investigate network data with AI-powered natural language prompts. Identify anomalies, detect security threats, optimize costs and improve performance, like never before.


Why Kubeshark?

Real-Time API Visibility

Inspect real-time, cluster-wide API calls with full Kubernetes and operating system contexts. Troubleshoot your applications, trace service dependencies, and accelerate root cause analysis.

Complete Packet Retention

An alternative to tcpdump. Kubeshark continuously captures cluster-wide traffic with minimal overhead—always on, zero setup. Export as PCAP for analysis in Wireshark.

AI-Powered Traffic Analysis

Ask any question about your network data using natural language prompts. For example: "Which APIs violate their OAS specs?" or "What services show poor health?"—instant answers.

Forensic Investigation

Investigate ongoing or past incidents. Go back in time and replay the exact network state—every API call, payload, and error at the moment of the incident. Never lose a packet. Always have answers.


What’s New in v2.00

v2.00 introduces a fundamentally new architecture that delivers deep packet inspection with minimal production impact.

FeatureBenefit
Complete L4 Traffic RetentionNever miss a packet—all network flows are captured and stored for later inspection
Delayed DissectionResource-intensive L7 analysis happens off-production, keeping your nodes lean
Improved ReliabilitySignificant improvements in API dissection accuracy through extensive bug fixes
AI-Ready (MCP Server)Expose raw traffic and insights to AI tools for intelligent analysis

How It Works

Kubeshark offers two powerful modes for different use cases:

Real-Time API Dissection

See traffic as it happens. Kubeshark captures and dissects API calls in real-time, giving you immediate visibility into what’s happening across your cluster. This is ideal for:

  • Live debugging - Diagnose issues as they occur
  • Root cause analysis - See the exact request/response that caused a failure
  • Development workflows - Watch API calls while testing

Traffic Recording & Deferred Analysis

For comprehensive forensics, Kubeshark can capture complete L4 traffic (PCAP) and analyze it later:

  CAPTURE          STORE           ANALYZE          ENRICH
     |                |                |                |
     v                v                v                v
Lightweight      Complete PCAP    L7 dissection    Kubernetes
L4 capture  ---> retained for ---> on-demand or ---> context
on prod nodes    full history     scheduled        added

This enables:

  • Complete traffic history for forensic investigation
  • Minimal production overhead when you don’t need real-time analysis
  • Long-term retention for compliance and auditing

Protocol Support

Kubeshark supports 20+ protocols across multiple layers, with automatic TLS decryption:

CategoryProtocols
HTTP/RESTHTTP/1.0, HTTP/1.1, HTTP/2, WebSocket, GraphQL
MessagingApache Kafka, AMQP (RabbitMQ), Redis
RPCgRPC over HTTP/2
AuthenticationLDAP, RADIUS, DIAMETER
NetworkDNS, ICMP, TCP, UDP, SCTP
SecurityTLS (with automatic decryption)

TLS Decryption: Kubeshark can intercept encrypted traffic without requiring access to private keys by hooking into runtime cryptographic libraries (OpenSSL, Go crypto/tls, BoringSSL).

View full protocol documentation →


AI Integration

Kubeshark connects AI assistants directly to your network data via the Model Context Protocol (MCP)—the open standard for AI tool integration.

What This Enables

Natural Language Queries

Ask questions in plain English instead of writing complex queries. "Show me all failed requests to the payment service in the last hour"—the AI handles the rest.

AI-Driven Investigation

The AI doesn't just fetch data—it analyzes patterns, correlates errors with causes, and suggests root causes based on network evidence.

Closed-Loop Development

AI coding tools (Claude Code, Cursor) can deploy code, then use Kubeshark to verify it works correctly—catching integration bugs before they reach production.

Full Kubernetes Context

Every query includes pod names, services, namespaces, and labels. The AI understands your infrastructure, not just raw IPs and ports.

Example Prompts

Use CaseExample
Incident Investigation“Something broke at 2pm. Show me what failed and why.”
Architecture Discovery“Map out how services communicate. What calls what?”
Security Analysis“Find all requests without authentication headers.”
Performance Debugging“Why is checkout slow? Where is time being spent?”
Compliance“Export traffic from the payments namespace for the audit.”

The Bridge to Production

Kubeshark doesn’t write code—it bridges the gap between AI coding tools and production reality. When AI assistants can see actual network behavior, they can:

  • Verify code works correctly before release
  • Identify integration bugs that unit tests miss
  • Fix issues based on real evidence, not guesswork

Learn more about AI Integration →


Quick Start

Get Kubeshark running in 60 seconds:

# Add the Helm repository
helm repo add kubeshark https://helm.kubeshark.com

# Install Kubeshark
helm install kubeshark kubeshark/kubeshark

Then open the dashboard:

kubectl port-forward svc/kubeshark-front 8899:80

Open http://localhost:8899 in your browser.

Full installation guide →


Key Capabilities

CapabilityDescription
Raw CaptureContinuous L4 packet capture with minimal CPU overhead
Traffic SnapshotsFreeze historical traffic before it’s recycled
Real-time DissectionLive L7 protocol analysis as traffic flows
Delayed DissectionRun L7 analysis on captured traffic using non-production compute
AI-Powered AnalysisQuery network data using natural language via MCP
TLS DecryptionSee encrypted traffic in plaintext without certificates
L4/L7 Workload MapVisualize service dependencies and traffic flows
Service Mesh SupportNative Istio, Linkerd integration with mTLS visibility

Next Steps