Network Observability for the AI Era
Give AI agents and SREs real-time and retrospective access to every packet and API call, cluster-wide — purpose-built to plug into AI-driven workflows.
Deep Visibility for Engineers
Kubeshark delivers cluster-wide, real-time, identity and protocol-aware, visibility into API (L7) and L4 (TCP, UDP, SCTP) traffic, including encrypted (TLS) payloads, as it flows through your containers, pods, namespaces, nodes, and clusters.

Network Data for AI-Driven Workflows
Slice and dice cluster-wide network data with AI agents. Token-efficient, queryable, real-time and retrospective — not raw packet dumps.
The above is a recording of a live session
Why Kubeshark?
Incident Response
Powering AI-driven IR workflows— Like a CCTV + flight recorder for Kubernetes. Export PCAPs from any point in time with immutable retention.
Root Cause Analysis
Crush MTTR — from hours to minutes. AI agents slice and dice network data, query any point in time cluster-wide, and get to the root cause at scale.
Network Observability
Instant, cluster-wide visibility. Wireshark-like capabilities for Kubernetes, with real-time and retrospective deep packet inspection and PCAP access.
Security & Compliance
AI agents scan traffic for sensitive data, anomalies, policy violations, and suspicious behavior. Immutable retention for forensic evidence and compliance.
Protocol Support
Kubeshark supports 20+ protocols across multiple layers, with automatic TLS decryption:
| Category | Protocols |
|---|---|
| HTTP/REST | HTTP/1.0, HTTP/1.1, HTTP/2, WebSocket, GraphQL |
| Messaging | Apache Kafka, AMQP (RabbitMQ), Redis |
| RPC | gRPC over HTTP/2 |
| Authentication | LDAP, RADIUS, DIAMETER |
| Network | DNS, ICMP, TCP, UDP, SCTP |
| Security | TLS (with automatic decryption) |
TLS Decryption: Kubeshark can intercept encrypted traffic without requiring access to private keys by hooking into runtime cryptographic libraries (OpenSSL, Go crypto/tls, BoringSSL).
View full protocol documentation →
Next Steps
- Installation Guide - Detailed setup instructions
- Dashboard Overview - Learn the Kubeshark interface
- Best Practices - Production deployment tips
- Capture Filters - Target specific traffic