Skip to content

kubewall - Single-Binary Kubernetes Dashboard with Multi-Cluster Management & AI Integration. (OpenAI / Claude 4 / Gemini / DeepSeek / OpenRouter / Ollama / Qwen / LMStudio)

License

Notifications You must be signed in to change notification settings

kubewall/kubewall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

kubewall

Install | Guide | Releases | Source Code

kubewall is a Open-Source, Single-Binary Kubernetes Dashboard with Multi-Cluster Management & AI Integration.

It provides a simple and rich realtime interface to manage and investigate your clusters.

FeatureΒ Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β  Benefit
πŸ”— Multi-Cluster Management Control unlimited Kubernetes clusters from one intuitive interface, saving time on tool-switching and boosting productivity for DevOps teams.
πŸ€– AI-Powered Leverage AI (OpenAI / Claude 4 / Gemini / DeepSeek / OpenRouter / Ollama / Qwen / LMStudio) for automated troubleshooting, config optimization, and smart recommendations - a game-changer for complex environments.
πŸ“Š Real-Time Monitoring Get live views of cluster, pods, services, and metrics, enabling quick issue detection without manual queries.
πŸš€ Single-Binary Deployment Install effortlessly as a lightweight binary on Mac, Windows, or Linux - no dependencies, zero config.
πŸ” In-Depth Resource Views Dive into detailed manifests, logs, and configurations through an intuitive dashboard, making debugging a breeze for novices and pros alike.
🌐 Browser-Based Access Access securely via any browser with optional HTTPS setup, perfect for remote teams managing on-premises or cloud clusters.
🧭 Search & Filter Instantly locate namespaces, labels, images, nodes, and workloads with powerful search and filteringβ€”streamlining navigation across large clusters.
πŸ›‘ Privacy by Default Maintain full control with zero cloud dependency, ensuring your cluster data stays local and secure by design.
πŸ”„ Live Refresh Experience seamless auto-updates for resources, eliminating manual refresh cycles and keeping your dashboard perpetually current.
πŸ“œ Aggregated Pod Logs Stream logs across pods and containers with advanced search and tail optionsβ€”perfect for monitoring multi-replica applications with ease.
πŸ–₯️ Clean Resource Management Enjoy streamlined views for Deployments, Pods, Services, ConfigMaps, and more scale deployments, restart pods, perform rollout restarts, and apply manifests with a single click for unmatched efficiency.

πŸŽ₯ Intro

kubewall

Important

Please keep in mind that kubewall is still under active development.

πŸ”‹ Install

🐳 Docker

docker run -p 7080:7080 -v kubewall:/.kubewall ghcr.io/kubewall/kubewall:latest

πŸ’‘ To access local kind cluster you can use "--network host" docker flag.

β›΅ Helm

helm install kubewall oci://ghcr.io/kubewall/charts/kubewall -n kubewall-system --create-namespace

πŸ›‘οΈ With helm kubewall runs on port 8443 with self-signed certificates. View chart β†’

🍺 Homebrew

brew install --cask kubewall/tap/kubewall

πŸ§ƒ Snap

sudo snap install kubewall

🐧 Arch Linux

yay -S kubewall-bin

πŸͺŸ Winget

winget install --id=kubewall.kubewall -e

πŸ“¦ Scoop

scoop bucket add kubewall https://github.com/kubewall/scoop-bucket.git
scoop install kubewall

πŸ“ Binary

MacOS Binary ( Multi-Architecture )

Linux (Binaries) amd64 | arm64 | i386

Windows (exe) amd64 | arm64 | i386

FreeBSD (Binaries) amd64 | arm64 | i386

Manually πŸ“‚ Download the pre-compiled binaries from the Release! page and copy them to the desired location or system path.

Tip

After installation, you can access kubewall at http://localhost:7080

If you're running it in a Kubernetes cluster or on an on-premises server, we recommend using HTTPS. When not used over HTTP/2 SSE suffers from a limitation to the maximum number of open connections. Mozilla‴

You can start kubewall with HTTPS using the following command:

$ kubewall --certFile=/path/to/cert.pem --keyFile=/path/to/key.pem

πŸ“š Guide

Flags

Since kubewall runs as binary there are few of flag you can use.

> kubewall --help

Usage:
  kubewall [flags]
  kubewall [command]

Available Commands:
  completion  Generate the autocompletion script for the specified shell
  help        Help about any command
  version     Print the version of kubewall

Flags:
      --certFile string        absolute path to certificate file
  -h, --help                   help for kubewall
      --k8s-client-burst int   Maximum burst for throttle (default 200)
      --k8s-client-qps int     maximum QPS to the master from client (default 100)
      --keyFile string         absolute path to key file
  -l, --listen string          IP and port to listen on (e.g., 127.0.0.1:7080 or :7080) (default "127.0.0.1:7080")
      --no-open-browser        Do not open the default browser

πŸ” Setting up HTTPS locally

You can use your own certificates or create new local trusted certificates using mkcert‴.

Important

You'll need to install mkcert‴ separately.

  1. Install mkcert on your computer.
  2. Run the following command in your terminal or command prompt:

mkcert kubewall.test localhost 127.0.0.1 ::1

  1. This command will generate two files: a certificate file and a key file (the key file will have -key.pem at the end of its name).
  2. To use these files with kubewall, use --certFile= and --keyFile= flags.
kubewall --certFile=kubewall.test+3.pem --keyFile=kubewall.test+3-key.pem

When using Docker

When using Docker, you can attach volumes and provide certificates by using specific flags.

In the following example, we mount the current directory from your host to the /.certs directory inside the Docker container:

docker run -p 7080:7080 \
    -v kubewall:/.kubewall \
    -v $(pwd):/.certs \
    ghcr.io/kubewall/kubewall:latest \
    --certFile=/.certs/kubewall.test+3.pem \
    --keyFile=/.certs/kubewall.test+3-key.pem

πŸ›°οΈ Custom Address/Port Configuration

You can run kubewall on any IP and port combination using the --listen flag. This flag controls which interface and port the application binds to.

πŸ”“ Bind to all interfaces

kubewall --listen :7080

🌐 Bind to a specific network interface

kubewall --listen 192.168.1.10:8080

Useful when exposing kubewall to a known private subnet or container network.

πŸ‘¨β€πŸ’» Developers

🀝 Contribution

This project welcomes your PR and issues. For example, refactoring, adding features, correcting English, etc.

If you need any help, you can contact us from the above Developers sections.

Thanks to all the people who already contributed and using the project.

βš–οΈ License

kubewall is licensed under Apache License, Version 2.0