• Cloud-Native Container ProductsCloud-Native Container Products
    • KubeSphere Enterprisehot
    • KubeSphere Virtualizationhot
    • KubeSphere Enterprise HCI
  • Cloud-Native ServiceCloud-Native Service
    • KubeSphere Backuphot
    • KubeSphere Litenew
    • KubeSphere Inspectornew
  • Public Cloud Container ServicePublic Cloud Container Service
    • KubeSphere on AWS
    • KubeSphere on DigitalOcean

KubeSphere Inspector

KubeSphere Inspector is developed based on the KubeEye open-source project. It is a cluster health inspection-as-a-service designed for Kubernetes multi-cloud environments. It checks whether cluster nodes, components, and other configurations comply with best practices, identifies CVE problems of cluster components, services, and ports, regularly analyzes the operational risks of Kubernetes, and then provides reports.

Documentation

top_bg

Feature Highlights

  • Unified Management of Kubernetes Clusters

    Unified Management of Kubernetes Clusters

    Support unified management of Kubernetes clusters on any cloud, centrally monitor all inspection results, and configure scheduled inspections, so that users have real-time control over the health status of clusters, nodes, and applications.

  • Commercial-grade Health Check

    Commercial-grade Health Check

    Fully detect business-level requirements of control plane and node issues, such as kube-apiserver, etcd, and kube-controller-manage, CPU utilization, memory and disk pressure, and validation YAML specifications.

  • Periodic Risk Check

    Periodic Risk Check

    Support scheduled health checks for cluster nodes and services and generate inspection reports to periodically assess cluster health and promptly address any anomalies or risks.

  • Visualized Display and Reports

    Visualized Display and Reports

    Support score of cluster health with one click, visualized display of inspection results, export of inspection results, and periodic report by email, which greatly helps users monitor cluster health and change modifications when necessary.

Use Cases

  • Routine O&M

    Routine O&M

    Eliminate security vulnerabilities and blind spots that occur during the routine operation of Kubernetes clusters, which ensures the availability and business continuity of applications on Kubernetes with the established DevSecOps mechanism.

  • Security Compliance Audit

    Security Compliance Audit

    Proactively detect container vulnerabilities and compliance of security configurations and applications during project acceptance to mitigate security risks in advance.

  • Environment Scan & Report

    Environment Scan & Report

    Regularly scan Kubernetes clusters or links and periodically send reports to users by email.

  • Reduced Cost

    Reduced Cost

    Help users understand resource consumption so that users can dynamically adjust the configurations, which reduces Kubernetes costs and maximizes the effectiveness of computing resources.