AI-Powered Analysis

Coming Soon — V2.00: MCP integration is coming as part of Kubeshark V2.00. Read the announcement.

Your AI assistant can now see inside your cluster. Every API call. Every connection. Every payload. Real-time and historical.

Kubeshark bridges AI to your production network via the Model Context Protocol (MCP)—the open standard used by Claude, Cursor, and other AI tools. The result: network investigation through conversation.


The Problem

When production breaks, you piece together clues from logs, metrics, and traces—none of which show you what actually happened. You guess. You add logging. You try to reproduce. Hours pass.

What if your AI could just look?


What Changes

Guessing → Seeing

AI sees the exact request that failed—headers, payload, response, timing. No inference required.

Hours → Seconds

Ask "why did checkout fail?" and get an answer with evidence. Instant root cause analysis.

Reactive → Proactive

AI spots anomalies in traffic patterns before they become outages.

Code → Production

AI coding tools deploy, observe network behavior, and fix issues—closed-loop development.


Real Investigation

You: “Something broke around 2pm. What happened?”

AI: Queries traffic, analyzes patterns…

I found a cascade failure starting at 14:02 UTC:

  1. Root cause: payment-service returning 503s—connection pool exhaustion to stripe-gateway
  2. Impact: 847 failed checkout requests over 12 minutes
  3. Evidence: TCP handshake RTT to stripe-gateway spiked to 450ms (normally 2ms)

Here are the first 5 failed requests with full payloads…

You: “Show me the network flows to stripe-gateway”

AI: Fetches L4 data…

Active flows show elevated latency:

  • P50 RTT: 180ms (expected: <5ms)
  • P99 RTT: 450ms
  • 23 connections in TIME_WAIT

This indicates upstream congestion or a network path issue.


Use Cases

Incident Investigation

When production breaks, describe the problem and let AI investigate:

“The checkout flow failed at 2:15 PM. Find all API calls to payment services and identify what went wrong.”

“Users report 504 errors on /api/orders. Trace the request path and find the timeout.”

“Pod order-service crashed 10 minutes ago. Show its network activity before the crash.”

Security Analysis

Network traffic reveals what logs miss:

“Find API calls without Authorization headers that should have them.”

“Are any pods making outbound connections to IPs not in our allow list?”

“Which internal services are accessible from the public namespace? Show the traffic.”

“Find sensitive data patterns (credit cards, API keys) in request/response bodies.”

Architecture Discovery

Understand how services actually communicate:

“Map all services that communicate with inventory-service. What calls it? What does it call?”

“Show the complete request flow when a user places an order—every service-to-service call.”

“Which services would be affected if redis-cache goes down?”

“Find services that talk to the database directly instead of through the data-access layer.”

Performance Debugging

Find where time is spent:

“The /api/checkout endpoint is slow. Break down where time is spent across the request chain.”

“Find API calls with response times over 500ms. Which services are slowest?”

“Compare response times for product-service today vs. yesterday.”

“Which database queries are taking more than 100ms?”

Network Health

TCP handshake timing reveals infrastructure issues:

“Show TCP flows with handshake times over 10ms. Which connections have network latency?”

“What’s the P99 TCP handshake time to external services? Is our egress healthy?”

“Find cross-namespace flows and check their RTT. Any bottlenecks?”

Compliance & Auditing

Network traffic provides immutable audit trails:

“Create a report of all API calls that accessed customer PII in the last 24 hours.”

“Export traffic to payment-gateway between 3-4 PM yesterday for the security team.”

“Generate an audit trail for order ID 12345—every API call that processed it.”


What AI Sees

ResourceAccess
L7 API TrafficEvery HTTP request/response, gRPC call, Kafka message—full payloads
L4 Network FlowsTCP/UDP connections, bytes, packets, handshake timing
Traffic SnapshotsPoint-in-time captures for forensic investigation
Kubernetes ContextPod names, services, namespaces, labels—not just IPs
Historical DataAny moment within your retention window

Works With Your Tools

ToolUse Case
Claude DesktopInteractive troubleshooting
Claude CodeTerminal-based debugging
CursorAI coding with network feedback
VS Code + ContinueIDE-integrated analysis

One Kubeshark deployment. Every AI tool connected.


Get Started

# Connect Claude Code
claude mcp add kubeshark -- kubeshark mcp --url https://your-kubeshark.example.com

# Or use proxy mode
claude mcp add kubeshark -- kubeshark mcp --proxy

Then ask:

“What services are running? Show me any errors.”


What’s Next