IPCONTROL PLANE / K8S

SELF-HOSTED PLATFORM CONSOLE

InfraPilot

Kubernetes management, repository delivery and operations visibility in one console.

Give teams a production-ready control plane for applications, clusters, deployments, logs, metrics, infrastructure topology and guarded operational actions.

ScopeKubernetes + GitHubModelSelf-hostedControlsRBAC + Audit

PRODUCT OVERVIEW

A management console for teams that run Kubernetes, not just dashboards.

InfraPilot is built for companies that want a self-hosted platform layer above Kubernetes and GitHub. It gives administrators detailed control while giving less experienced users clear, guarded workflows.

01 / Application control

Projects, repositories and deployments stay connected

InfraPilot connects project context, namespaces, repositories, build records, deployed versions, domains, pods and runtime status. Buyers get one place to understand what is deployed and who owns it.

02 / Kubernetes operations

Cluster resources are visible without hiding Kubernetes

Namespaces, workloads, services, ingresses, PVCs, ConfigMaps, Secrets, events and YAML stay inspectable. The console explains phase, readiness, restarts and missing metrics instead of flattening them into vague health labels.

03 / GitHub delivery

Repository onboarding creates the delivery path

The platform manages GitHub workflow files, app-local Helm charts, image builds, registry handoff and rollout status. Links point back to the exact repository artifacts that drive the deployment.

04 / Governance

Every productive action is role-gated and auditable

Read-only users do not see write actions. Admin and operator actions explain target, impact, permissions, rollback notes and whether they affect GitHub, Kubernetes or local console state.

DIRECT CONSOLE SCREENSHOTS

Buyers can inspect the actual product surface.

The screenshots below come from the InfraPilot console and show the areas a customer uses to operate applications, deployments and the underlying cluster.

Operations home screenshot from the InfraPilot console
Operations homeCluster mode, active projects, repositories, deployment status and recent platform activity are visible immediately after login.
Application inventory screenshot from the InfraPilot console
Application inventoryApplications combine repository source, namespace, runtime state, domains, TLS and deployment context in a buyer-friendly overview.
Infrastructure map screenshot from the InfraPilot console
Infrastructure mapCluster, namespace, repository, deployment, service, route, pod, metrics, logs and events are presented as one operating model.

WHAT CUSTOMERS CAN DO

Operate applications, delivery and infrastructure from one place.

InfraPilot focuses on recurring operational work: onboarding repositories, understanding deployed state, inspecting Kubernetes resources, reviewing build and rollout history, and investigating runtime issues before they become production incidents.

  • Deploy applications from GitHub repositories into Kubernetes with build, image and rollout status visible in the console.
  • Inspect workloads, pods, services, routes, storage, config and secrets from role-aware views.
  • Use monitoring pages for CPU, memory, storage, pod readiness, restart reasons, Kubernetes events and logs.
  • Keep repeated operational commands discoverable through the command palette and scripted search actions.
  • Separate admin, deployment-manager, namespace-operator and read-only behavior across UI and API checks.
  • Run InfraPilot self-hosted as a static info site, protected web console, Fastify API and Helm-managed Kubernetes deployment.

BUYER OUTCOMES

The value is operational clarity, not another abstraction layer.

Faster onboarding

A new operator can see ownership, runtime state and next actions without learning every kubectl query first.

Lower deployment risk

GitHub, Helm, image and rollout state are connected, making failed handoffs easier to diagnose.

Clearer operations

Metrics, logs, events and infrastructure topology explain why an application is healthy, degraded or unknown.

Controlled access

Read-only and operator roles stay useful without granting broad cluster write access.

SECURITY AND GOVERNANCE

Productive actions are explainable, permission-aware and reviewable.

RBAC

Server-side role checks remain authoritative. The UI mirrors permissions, but the API enforces them.

Policy

Kubernetes write actions pass explicit policy checks before they can affect workloads, secrets or critical namespaces.

Audit

Operational changes record actor, target, parameters and result so administrators can review what happened.

Secrets

Sensitive values are only exposed through intentional, permission-aware views with clear warnings.

DELIVERY FLOW

From repository registration to Kubernetes rollout, every step stays traceable.

ProjectRepositoryGitHub workflowImage registryHelm chartKubernetes rollout

Customers can see which repository is connected, which workflow ran, which image version was produced, which Helm files were used, where the route points and which pods are actually serving traffic.