Four integrations that appear when their CRDs are present. No configuration required.
The dashboard checks for known CRD groups at startup. If the CRDs exist, the corresponding UI section appears in the navigation automatically. If they don't, the section is hidden. Nothing to configure, no environment variables to set.
On startup, the API backend queries the Kubernetes discovery API for known CRD groups. If the group is present, the corresponding navigation item and API routes are activated. If not, the section is silently omitted. No restart required once a CRD is installed — a page refresh is enough.
| Extension | CRD Group Detected | UI Section | Status |
|---|---|---|---|
| Certificate Manager | cert-manager.io |
Certificates, Issuers, ClusterIssuers | Auto-detected |
| MetalLB | metallb.io |
IP Address Pools, L2 Advertisements | Auto-detected |
| Kubescape Security | spdx.softwarecomposition.kubescape.io |
Compliance scores, CVE findings | Auto-detected |
| Gateway API | gateway.networking.k8s.io |
GatewayClasses, Gateways, HTTPRoutes | Auto-detected |
When cert-manager CRDs are detected, a dedicated Certificate Manager section appears with full read access to all cert-manager resources. See certificate status, renewal timelines, issuer health, and ACME challenge state — without needing kubectl or cmctl.
cert-manager.io CRD group is presentTo install cert-manager: kubectl apply -f https://github.com/cert-manager/cert-manager/releases/latest/download/cert-manager.yaml
Clusters running MetalLB get a dedicated load balancer management view. See all IP Address Pools, their configured ranges, and which pools are being advertised via L2. Useful for understanding address allocation without kubectl-ing through MetalLB CRs.
metallb.io CRD group is presentTo install MetalLB: kubectl apply -f https://raw.githubusercontent.com/metallb/metallb/main/config/manifests/metallb-native.yaml
When the Kubescape Operator is running, the dashboard reads its scan results and surfaces them as compliance scores and CVE findings per workload. No separate Kubescape UI needed — security findings appear inline alongside the resource data you already have.
spdx.softwarecomposition.kubescape.io CRDs are presentTo install Kubescape Operator: helm upgrade --install kubescape kubescape/kubescape-operator -n kubescape --create-namespace
Clusters using the Kubernetes Gateway API get a dedicated section for GatewayClasses, Gateways, and HTTPRoutes. As Gateway API continues to replace Ingress as the standard traffic management model, this view grows with it.
gateway.networking.k8s.io CRDs are presentTo install Gateway API CRDs: kubectl apply -f https://github.com/kubernetes-sigs/gateway-api/releases/latest/download/standard-install.yaml
Five pods. One kubectl apply. Extensions appear automatically as you add tools to your cluster.