Modern Kubernetes visibility. Local-first. No account. No cloud dependency. Blazing Fast. radarhq.io · Docs · Releases Topology, event timeline, and service traffic — plus resource browsing, Helm management, and GitOps support for FluxCD and ArgoCD. Visualize your cluster topology, browse resources, stream logs, exec into pods, inspect container image filesystems, manage Helm releases, monitor
Add this skill
npx mdskills install skyhook-io/radarComprehensive Kubernetes UI with MCP server providing rich cluster visibility and management tools
1# Radar23<a href="https://www.producthunt.com/products/radar-7?embed=true&utm_source=badge-top-post-badge&utm_medium=badge&utm_campaign=badge-radar-42edb7b0-e388-4fa8-9ba5-4876c2c0d638" target="_blank"><img src="https://api.producthunt.com/widgets/embed-image/v1/top-post-badge.svg?post_id=1130618&theme=neutral&period=daily" alt="Radar - The missing open-source Kubernetes UI | Product Hunt" width="250" height="54" /></a>45**Modern Kubernetes visibility.**6<br>Local-first. No account. No cloud dependency. Blazing Fast.78🌐 **[radarhq.io](https://radarhq.io)** · [Docs](https://radarhq.io/docs) · [Releases](https://github.com/skyhook-io/radar/releases)910Topology, event timeline, and service traffic — plus resource browsing, Helm management, and GitOps support for FluxCD and ArgoCD.1112[](https://github.com/skyhook-io/radar/actions/workflows/ci.yml)13[](https://github.com/skyhook-io/radar/releases/latest)14[](https://goreportcard.com/report/github.com/skyhook-io/radar)15[](https://github.com/skyhook-io/radar/releases)16[](LICENSE)17[](https://go.dev/)1819Visualize your cluster topology, browse resources, stream logs, exec into pods, inspect container image filesystems, manage Helm releases, monitor GitOps workflows (FluxCD & ArgoCD), and forward ports - all from a single binary with zero cluster-side installation.2021<p align="center">22 <img src="docs/screenshot.png" alt="Radar Screenshot" width="800">23</p>2425**Install and run in 30 seconds:**26```bash27curl -fsSL https://get.radarhq.io | sh && kubectl radar28```29[More installation options ↓](#installation)3031## Why Radar?3233- **Zero install on your cluster** — runs on your laptop, talks to the K8s API directly34- **Single binary** — no dependencies, no agents, no CRDs35- **Blazing fast** - smart caching, progressive loading, parallelization and other optimizations36- **Airgapped-ready** — no external network calls, works in isolated environments37- **Real-time** — watches your cluster via informers, pushes updates to the browser via SSE38- **Works everywhere** — GKE, EKS, AKS, minikube, kind, k3s, or any conformant cluster39- **AI-ready** — built-in [MCP server](docs/mcp.md) lets AI assistants query your cluster through Radar40- **In-cluster option** — deploy with Helm for shared team access with RBAC-scoped permissions4142---4344## Installation4546**Quick Install:**47```bash48curl -fsSL https://get.radarhq.io | sh49```5051**Homebrew:**52```bash53brew install skyhook-io/tap/radar54```5556Then run: `kubectl radar` (or simply `radar`)5758<details>59<summary><b>More install options</b> — Desktop App (macOS/Linux/Windows), Krew, Scoop, In-Cluster Helm</summary>6061#### CLI6263**Krew (kubectl plugin manager):**64```bash65kubectl krew install radar66```6768**Scoop (Windows):**69```powershell70scoop bucket add skyhook https://github.com/skyhook-io/scoop-bucket71scoop install radar72```7374**PowerShell (Windows):**75```powershell76irm https://get.radarhq.io/install.ps1 | iex77```7879**Direct download** — [GitHub Releases](https://github.com/skyhook-io/radar/releases) for macOS, Linux, or Windows.8081#### Desktop App8283Native desktop app — no terminal needed.8485**Homebrew (macOS):**86```bash87brew install --cask skyhook-io/tap/radar-desktop88```8990**Debian/Ubuntu:**91```bash92sudo apt install ./radar-desktop_*.deb93```9495**Fedora/RHEL:**96```bash97sudo rpm -i radar-desktop_*.rpm98```99100**Scoop (Windows):**101```powershell102scoop bucket add skyhook https://github.com/skyhook-io/scoop-bucket103scoop install radar-desktop104```105106**Windows (direct download)** — [GitHub Releases](https://github.com/skyhook-io/radar/releases).107108#### In-Cluster Deployment109110Deploy to your cluster for shared team access:111112```bash113helm repo add skyhook https://skyhook-io.github.io/helm-charts114helm install radar skyhook/radar -n radar --create-namespace115```116117See the [In-Cluster Deployment Guide](docs/in-cluster.md) for ingress, authentication, and RBAC configuration.118119</details>120121---122123## Usage124125```bash126# Opens browser automatically127kubectl radar128129# Or simply130radar131```132133**CLI Flags**134135| Flag | Default | Description |136|------|---------|-------------|137| `--kubeconfig` | `~/.kube/config` | Path to kubeconfig file |138| `--kubeconfig-dir` | | Comma-separated directories containing kubeconfig files |139| `--namespace` | (all) | Initial namespace filter (supports multi-select in the UI; also used as RBAC fallback for namespace-scoped users) |140| `--port` | `9280` | Server port |141| `--no-browser` | `false` | Don't auto-open browser |142| `--timeline-storage` | `memory` | Timeline storage backend: `memory` or `sqlite` |143| `--timeline-db` | `~/.radar/timeline.db` | Path to SQLite database (when using sqlite storage) |144| `--history-limit` | `10000` | Maximum events to retain in timeline |145| `--disable-exec` | `false` | Disable terminal and debug shell |146| `--disable-helm-write` | `false` | Disable Helm write operations |147| `--disable-local-terminal` | `false` | Disable local terminal feature |148| `--prometheus-url` | (auto-discover) | Manual Prometheus/VictoriaMetrics URL (skips auto-discovery) |149| `--auth-mode` | `none` | Authentication mode: `none`, `proxy`, or `oidc` ([details](docs/authentication.md)) |150| `--no-mcp` | `false` | Disable MCP server for AI tool integration |151| `--version` | | Show version and exit |152153See [Configuration Guide](docs/configuration.md) for details on cluster connection precedence, multiple kubeconfig files, and context switching.154155---156157## Views158159### Topology160161Interactive graph showing how your Kubernetes resources are connected in real-time.162163<p align="center">164 <img src="docs/screenshots/topology-view.png" alt="Topology View" width="800">165 <br><em>Topology View — Visualize resource relationships</em>166</p>167168- Two modes: **Resources** (full hierarchy) and **Traffic** (network flow path)169- Group by namespace, app label, or view ungrouped170- Filter by resource kind — click any node for full details171- Auto-layout powered by ELK.js, live updates via SSE172173### Resources174175Table-based resource browser with smart columns per resource kind.176177<p align="center">178 <img src="docs/screenshots/resources-view.png" alt="Resources View" width="800">179 <br><em>Resources View — Browse and filter all cluster resources</em>180</p>181182- Browse all resource types including CRDs183- Search by name, filter by status or problems (CrashLoopBackOff, ImagePullBackOff, etc.)184- Click any resource for YAML manifest, related resources, logs, and events185186### Image Filesystem Viewer187188Inspect container image filesystems directly from the Pod view — no need to pull images locally or exec into containers.189190<p align="center">191 <img src="docs/screenshots/image-filesystem-viewer.png" alt="Image Filesystem Viewer" width="800">192 <br><em>Image Filesystem Viewer — Browse container image contents</em>193</p>194195- Click any container image in a Pod to browse its complete filesystem196- Tree view with file sizes, permissions, and symlink targets197- Search files by name across the entire image198- Download individual files for inspection199- Works with public images (Docker Hub, Quay, GHCR) and private registries (GCR, ECR, ACR) using your cluster's ImagePullSecrets200- Disk-based layer caching for fast repeated access201202### Timeline203204Unified timeline of Kubernetes events and resource changes.205206<p align="center">207 <img src="docs/screenshots/timeline-view.png" alt="Timeline View" width="800">208 <br><em>Timeline View — Track cluster activity in real-time</em>209</p>210211- Filter by event type (all or warnings only)212- Resource change diffs showing what changed (replicas, images, etc.)213- Real-time updates as new events occur214215### Helm216217Manage Helm releases deployed in your cluster.218219<p align="center">220 <img src="docs/screenshots/helm-view.png" alt="Helm View" width="800">221 <br><em>Helm View — Manage your Helm deployments</em>222</p>223224- View all releases across namespaces with status, chart version, and app version225- Inspect values, compare revisions, view release history226- Upgrade, rollback, or uninstall releases directly from the UI227228### TLS Certificate Management229230View TLS certificate details and expiry dates across all namespaces — catch expiring certificates before they cause outages.231232- Parses TLS secrets to show certificate subject, issuer, and validity period233- Dashboard-level certificate expiry overview234- Available from the resource detail view for any TLS-type Secret235236### GitOps237238Monitor and manage FluxCD and ArgoCD resources with unified status views and actions.239240- **FluxCD**: GitRepository, OCIRepository, HelmRepository, Kustomization, HelmRelease, Alert241- **ArgoCD**: Application, ApplicationSet, AppProject242- Real-time sync status, health indicators, and reconciliation countdowns243- Trigger reconciliation, suspend/resume resources, and view managed resource inventory244- Problem detection with clear alerts for degraded or out-of-sync resources245- **Note**: Topology connections between GitOps resources and managed workloads only appear when both are in the same cluster. FluxCD typically deploys to its own cluster. ArgoCD often manages remote clusters — connect Radar to the target cluster to see workloads, or to the ArgoCD cluster to see Application status.246247### Traffic248249Visualize live network traffic between services using Hubble or Caretta.250251<p align="center">252 <img src="docs/screenshots/traffic-view.png" alt="Traffic View" width="800">253 <br><em>Traffic View — See how services communicate in real-time</em>254</p>255256- Auto-detects Hubble (Cilium), Caretta, or Istio as traffic data sources257- Animated flow graph showing requests per second between services258- Filter by namespace, protocol, or status code259- Setup wizard to install a traffic source if none is detected260261### Cost Insights262263Track Kubernetes spending with OpenCost integration — no additional configuration needed.264265- Cluster hourly and projected monthly cost, top namespaces by spend266- Cost trend charts with 6h/24h/7d range selector267- Namespace and workload-level cost breakdowns with efficiency scoring268- Node costs with instance type and region pricing269- Appears automatically when OpenCost metrics are detected in Prometheus270271### Cluster Audit272273Proactive best-practices scanner with 31 checks across security, reliability, and efficiency — inspired by Polaris, Kubescape, Trivy, and NSA/CISA guidelines. Runs instantly against cached data with zero cluster-side installation.274275- Security: privileged containers, privilege escalation, dangerous/insecure capabilities, host namespaces, container runtime socket mounts, sensitive host paths, secrets in ConfigMaps, auto-mounted service account tokens276- Reliability: missing probes, image tag `latest`, single-replica deployments, missing PDB/topology spread, pod HA risk (all replicas on same node), orphan services/ingresses, deprecated API versions277- Efficiency: missing CPU/memory requests and limits, orphan ConfigMaps/Secrets, resource utilization vs requests278- Grouped-by-resource and by-namespace views with search, category/severity/framework filters279- Each finding includes description and remediation guidance, with inline hide actions (per-check, per-category, per-namespace)280- Configurable: ignored namespaces (with wildcard patterns), disabled checks, persisted across sessions281- Framework labels: NSA/CISA, CIS benchmarks282- MCP tool (`get_cluster_audit`) for AI-assisted cluster analysis283284### AI Integration (MCP) <sup>beta</sup>285286Radar includes a built-in [Model Context Protocol](https://modelcontextprotocol.io) (MCP) server that lets AI assistants — Claude, Cursor, Copilot, and others — query your cluster through Radar.287288Instead of raw `kubectl` output (verbose YAML that burns through LLM context windows), your AI gets pre-processed, token-optimized data: topology graphs, health assessments, deduplicated events, and filtered logs. Read tools are strictly read-only; write tools (restart, scale, sync) are clearly annotated and non-destructive.289290Enabled by default. Disable with `--no-mcp`. See the **[MCP Guide](docs/mcp.md)** for setup instructions.291292### Authentication293294For shared in-cluster deployments, Radar supports optional user authentication with per-user Kubernetes RBAC.295296- **Proxy mode** — works with oauth2-proxy, Pomerium, Cloudflare Access, or any auth proxy that sets forwarded headers297- **OIDC mode** — built-in login via Google, Okta, Dex, Keycloak, or any OIDC provider298- Per-user namespace scoping and write authorization via K8s impersonation299- UI adapts automatically — buttons only appear if the user has RBAC permission300301No auth by default (local use). See the **[Authentication Guide](docs/authentication.md)** for setup.302303---304305## Supported Resources306307Radar auto-discovers any CRD in your cluster. Popular tools get [dedicated integrations](docs/integrations.md) with topology edges, detail views, and AI summaries.308309| Category | Resources |310|----------|-----------|311| **Workloads** | Deployments, DaemonSets, StatefulSets, ReplicaSets, Pods, Jobs, CronJobs |312| **Networking** | Services, Ingresses, NetworkPolicies, Endpoints, PodDisruptionBudgets |313| **Configuration** | ConfigMaps, Secrets (names only, values hidden) |314| **Storage** | PersistentVolumeClaims, PersistentVolumes, StorageClasses |315| **Autoscaling** | HorizontalPodAutoscalers, VerticalPodAutoscalers |316| **Cluster** | Nodes, Namespaces, ServiceAccounts, Events |317| **GitOps (FluxCD)** | GitRepository, OCIRepository, HelmRepository, Kustomization, HelmRelease, Alert |318| **GitOps (ArgoCD)** | Application, ApplicationSet, AppProject |319| **Argo Rollouts** | Rollout |320| **Argo Workflows** | Workflow, WorkflowTemplate |321| **cert-manager** | Certificate, CertificateRequest, Order, Challenge, Issuer, ClusterIssuer |322| **Gateway API** | Gateway, GatewayClass, HTTPRoute, GRPCRoute, TCPRoute, TLSRoute |323| **Istio** | VirtualService, DestinationRule, Gateway, ServiceEntry, PeerAuthentication, AuthorizationPolicy |324| **Traefik** | IngressRoute, IngressRouteTCP, IngressRouteUDP, Middleware, MiddlewareTCP, TraefikService, ServersTransport, ServersTransportTCP, TLSOption, TLSStore |325| **Contour** | HTTPProxy |326| **Knative Serving** | Service, Configuration, Revision, Route, DomainMapping |327| **Knative Eventing** | Broker, Trigger, EventType, Channel, InMemoryChannel, Subscription |328| **Knative Sources** | PingSource, ApiServerSource, ContainerSource, SinkBinding |329| **Knative Flows** | Sequence, Parallel |330| **Knative Networking** | Ingress, Certificate, ServerlessService |331| **Karpenter** | NodePool, NodeClaim (+ provider-specific NodeClasses via auto-discovery) |332| **KEDA** | ScaledObject, ScaledJob, TriggerAuthentication, ClusterTriggerAuthentication |333| **Prometheus Operator** | ServiceMonitor, PodMonitor, PrometheusRule, Alertmanager |334| **Security (Trivy)** | VulnerabilityReport, ConfigAuditReport, ExposedSecretReport, ClusterComplianceReport, SbomReport, RbacAssessmentReport, InfraAssessmentReport |335| **Velero** | Backup, Restore, Schedule, BackupStorageLocation, VolumeSnapshotLocation |336| **External Secrets** | ExternalSecret, ClusterExternalSecret, SecretStore, ClusterSecretStore |337| **CloudNativePG** | Cluster, Backup, ScheduledBackup, Pooler |338| **Kyverno** | Policy, ClusterPolicy, PolicyReport, ClusterPolicyReport |339| **Sealed Secrets** | SealedSecret |340| **Cost (OpenCost)** | Namespace/workload/node cost breakdown via Prometheus (no CRDs) |341| **CRDs** | Any Custom Resource Definition in your cluster (auto-discovered) |342343---344345## Keyboard Shortcuts346347| Shortcut | Action |348|----------|--------|349| `1`–`6` | Switch view (Home, Topology, Resources, Timeline, Helm, Traffic) |350| `t` | Toggle dark/light theme |351| `?` | Show keyboard shortcuts |352| `⌘K` | Open command palette |353| `/` | Focus search (context-aware) |354| `f` | Fit topology to screen |355| `+` / `-` / `0` | Zoom in / out / reset (topology) |356| `j` / `k` | Navigate rows (resources, helm) |357| `g g` / `G` | Jump to first / last row |358| `Enter` / `d` | Open selected resource detail |359| `y` | Open YAML view |360| `l` | Open logs (pods/workloads) |361| `[` / `]` | Previous / next resource kind |362| `Escape` | Close panel/modal/search |363364**Topology:** Pan (drag), Zoom (scroll), Select (click), Multi-select (Shift+click)365366---367368## Development369370See the **[Development Guide](DEVELOPMENT.md)** for building from source, architecture details, API reference, and contributing.371372Quick start:373```bash374git clone https://github.com/skyhook-io/radar.git375cd radar376make deps377378# Terminal 1: Frontend with hot reload (port 9273)379make watch-frontend380381# Terminal 2: Backend with hot reload (port 9280)382make watch-backend383```384385---386387## Contributing388389Contributions are welcome! Please read our [Contributing Guide](CONTRIBUTING.md) for details on the development workflow, pull request process, and coding standards.390391---392393## About394395Radar is built and maintained by [Skyhook](https://skyhook.io) (YC W23) and is open source under Apache-2.0. The OSS version is fully featured and the recommended way to run Radar.396397For teams that want hosted multi-cluster Radar with SSO and shared dashboards, we also offer [Radar Cloud](https://radarhq.io).398399---400401## License402403Apache 2.0 — see [LICENSE](LICENSE)404405---406407<p align="center">408 <strong>Open source. Free forever.</strong>409 <br>410 <sub>Built by <a href="https://skyhook.io">Skyhook</a></sub>411</p>412
Full transparency — inspect the skill content before installing.