Cluster audit runs a set of static checks against your live K8s state and surfaces failures inline on each affected resource. No CRDs to install, no extra controllers - it’s part of the Radar binary.Documentation Index
Fetch the complete documentation index at: https://radarhq.io/docs/llms.txt
Use this file to discover all available pages before exploring further.
What it checks
The check set covers three categories. Defaults skip stylistic checks; they flag misconfigurations only.Security
- Containers running as root.
- Containers without
readOnlyRootFilesystem. allowPrivilegeEscalation: true.- Privileged containers.
hostNetwork,hostPID,hostIPC.- Missing or wide securityContext.
- Service accounts with cluster-admin (or wildcards in bindings).
- Workloads that mount the default ServiceAccount.
- Secrets with no
typeor withOpaqueand weak keys. - Pod Security Admission level inconsistencies.
Reliability
- Missing
livenessProbe/readinessProbe. - Missing CPU / memory
requestsandlimits. - Single-replica Deployments / StatefulSets in production-ish namespaces.
- Pods without PodDisruptionBudget for replicated workloads.
- Image tag is
latest(or no tag). imagePullPolicy: Alwayson a digest-pinned image.- Anti-affinity not set on multi-replica workloads.
- HPA min replicas = max replicas.
Efficiency
- CPU / memory requests way above observed usage (over-requested).
- Limits with no requests (CPU throttling risk).
- Workloads with zero replicas left running.
- Stale ReplicaSets / pods.
How to read it
Open Cluster audit in the sidebar. You see:- Summary - total findings, broken down by category and severity.
- By resource - rows of resources sorted by issue count.
- By check - rows of checks sorted by frequency. Click any check for the rationale, the affected resources, and a remediation snippet.
Ignore patterns
Some findings are noise for your specific environment - a sandbox namespace wherelatest tags are fine, a system DaemonSet that legitimately needs hostNetwork. Ignore them in Settings → Audit:
~/.radar/audit-ignore.json.
In-app remediation
Most checks come with a one-click “Apply suggested patch” that opens a YAML editor pre-filled with the fix. The editor uses server-side apply so it won’t clobber unrelated managed fields.API + MCP
Audit findings are available programmatically:GET /api/audit- cluster-wideGET /api/audit/resource/{kind}/{namespace}/{name}- single resource- MCP tool
audit_findings- filterable by category / severity / namespace
See also
- Resource browser - the inline audit chip per row.
- AI via MCP - have an AI explain or remediate findings.
- Fleet checks - audit findings rolled up across all clusters in your org (Cloud).