k8e

command module
v1.35.1-2026040...-dc2c513 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 5, 2026 License: Apache-2.0 Imports: 15 Imported by: 0

README ΒΆ


Typing SVG



Go Version Kubernetes License Stars Release Arch


k8e.sh β€” Open Source Agentic AI Sandbox Matrix. A CNCF-conformant Kubernetes distribution in a single binary under 100MB, purpose-built for secure, isolated AI agent execution at scale. Up and running in 60 seconds. Inspired by K3s.


curl -sfL https://k8e.sh/install.sh | sh -

That's it. Your agentic sandbox matrix is ready. πŸ€–


πŸ“– Table of Contents

# Section
1 πŸ€– What is K8E?
2 πŸ—οΈ Architecture
3 βš™οΈ Components
4 πŸš€ Quick Start
5 πŸ”’ Sandbox Runtime Setup
6 πŸ€– Sandbox MCP Skill
7 🐍 Python Client SDK
8 🟦 TypeScript Client SDK
9 πŸ–₯️ Advanced Installation
9 πŸ†š K8E vs Others
9 🀝 Contributing
10 πŸ™ Acknowledgments

πŸ€– What is K8E?

K8E is the Open Source Agentic AI Sandbox Matrix β€” a Kubernetes-native platform for running secure, isolated AI agent workloads at scale, packaged as a single binary under 100MB.

As autonomous AI agents increasingly generate and execute untrusted code, robust sandboxing infrastructure is no longer optional. K8E ships everything needed to spin up a production-grade cluster in under 60 seconds, with first-class primitives for agent isolation, resource governance, and ephemeral execution environments β€” purpose-built for the AI era.

πŸ”’ One cluster. Many agents. Zero trust between them.

Sandbox Capabilities

Capability Description
πŸ”’ Hardware Isolation Pluggable runtimes: gVisor (default), Kata Containers, Firecracker microVM
🌐 Network Policies Cilium eBPF toFQDNs egress control β€” per-session, no proxy process needed
βš–οΈ Resource Quotas CPU/memory caps per agent session to prevent runaway costs
πŸ—‘οΈ Ephemeral Workspaces Auto-cleanup after agent session ends
🧠 Warm Pool Pre-booted sandbox pods for sub-500ms session claim latency
🀝 agent-sandbox compatible Works with kubernetes-sigs/agent-sandbox
πŸ”„ MCP / A2A ready Any MCP-compatible agent (kiro, claude, gemini) connects via k8e sandbox-mcp

πŸ—οΈ Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                          K8E CLUSTER                            β”‚
β”‚                                                                 β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”‚
β”‚   β”‚                CONTROL PLANE (Server Node)              β”‚   β”‚
β”‚   β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”       β”‚   β”‚
β”‚   β”‚  β”‚  API Server  β”‚  β”‚  Scheduler  β”‚  β”‚   etcd   β”‚       β”‚   β”‚
β”‚   β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜       β”‚   β”‚
β”‚   β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚   β”‚
β”‚   β”‚  β”‚  Controller Mgr  β”‚  β”‚  SandboxMatrix Controller    β”‚ β”‚   β”‚
β”‚   β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚   β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β”‚
β”‚                              β”‚                                   β”‚
β”‚                 β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                     β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”‚
β”‚   β”‚      WORKER NODE        β”‚  β”‚      WORKER NODE        β”‚     β”‚
β”‚   β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”‚  β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”‚     β”‚
β”‚   β”‚  β”‚  sandbox-matrix β”‚    β”‚  β”‚  β”‚  sandbox-matrix β”‚    β”‚     β”‚
β”‚   β”‚  β”‚  grpc-gateway   β”‚    β”‚  β”‚  β”‚  grpc-gateway   β”‚    β”‚     β”‚
β”‚   β”‚  β”‚  :50051 (TLS)   β”‚    β”‚  β”‚  β”‚  :50051 (TLS)   β”‚    β”‚     β”‚
β”‚   β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β”‚  β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β”‚     β”‚
β”‚   β”‚           β”‚             β”‚  β”‚           β”‚             β”‚     β”‚
β”‚   β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”    β”‚  β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”    β”‚     β”‚
β”‚   β”‚  β”‚  Isolated Pods  β”‚    β”‚  β”‚  β”‚  Isolated Pods  β”‚    β”‚     β”‚
β”‚   β”‚  β”‚ gVisor/Kata/FC  β”‚    β”‚  β”‚  β”‚ gVisor/Kata/FC  β”‚    β”‚     β”‚
β”‚   β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β”‚  β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β”‚     β”‚
β”‚   β”‚  Cilium CNI (eBPF)      β”‚  β”‚  Cilium CNI (eBPF)      β”‚     β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β–²
         β”‚  gRPC (TLS)
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  k8e sandbox-mcpβ”‚  ← MCP stdio bridge
β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜
         β”‚  stdin/stdout
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  AI Agent       β”‚  (kiro / claude / gemini / any MCP client)
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

βš™οΈ Components

Component Version Purpose
☸️ Kubernetes v1.35.x Core orchestration engine
πŸ”· Cilium Latest eBPF networking & per-session egress policy
πŸ“¦ Containerd v1.7.x Container runtime
πŸ”‘ etcd v3.5.x Distributed key-value store
🌐 CoreDNS v1.11.x Cluster DNS
βš“ Helm Controller v0.16.x GitOps & chart management
πŸ“ˆ Metrics Server v0.7.x Resource metrics
πŸ’Ύ Local Path Provisioner v0.0.30 Persistent storage
πŸ›‘οΈ gVisor / Kata / Firecracker β€” Pluggable sandbox isolation runtimes
πŸ€– Sandbox MCP Server built-in k8e sandbox-mcp β€” agent tool bridge

πŸš€ Quick Start

Install the runtime shim before K8E so it is auto-detected on first startup. gVisor is recommended β€” no KVM required.

curl -fsSL https://gvisor.dev/archive.key | gpg --dearmor -o /usr/share/keyrings/gvisor-archive-keyring.gpg
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/gvisor-archive-keyring.gpg] \
  https://storage.googleapis.com/gvisor/releases release main" \
  > /etc/apt/sources.list.d/gvisor.list
apt-get update && apt-get install -y runsc

K8E detects runsc at startup and automatically injects the gVisor stanza into its containerd config (/var/lib/k8e/agent/etc/containerd/config.toml). Do not run runsc install β€” K8E manages its own containerd configuration.

Need stronger isolation? See Sandbox Runtime Setup for Kata Containers and Firecracker.

Step 2 β€” Install K8E

curl -sfL https://k8e.sh/install.sh | sh -

Step 3 β€” Verify Cluster

export KUBECONFIG=/etc/k8e/k8e.yaml
kubectl get nodes
kubectl get runtimeclass              # should show: gvisor
kubectl -n sandbox-matrix get pods   # Sandbox Matrix starts automatically

Step 4 β€” Connect Your AI Agent

sandbox-install-skill does two things at once:

  1. Writes the k8e-sandbox MCP server entry into the agent's config file
  2. Copies the sandbox skill files from /var/lib/k8e/server/skills/ into the agent's skills directory

K8E server must have started at least once before running this command (it stages the skill files on first boot).

k8e sandbox-install-skill all   # installs into kiro, claude, gemini at once

Then ask your agent naturally:

"Run this Python snippet in a sandbox"

That's it. The agent calls sandbox_run automatically β€” no session management needed.


πŸ”’ Sandbox Runtime Setup

K8E auto-detects installed runtimes and registers the corresponding RuntimeClass. Choose based on your isolation requirements:

Runtime Isolation Requirement Boot time
gVisor Syscall interception (userspace kernel) None ~10ms
Kata Containers VM-backed (QEMU) Nested virt or bare metal ~500ms
Firecracker Hardware microVM (KVM) /dev/kvm ~125ms
curl -fsSL https://gvisor.dev/archive.key | gpg --dearmor -o /usr/share/keyrings/gvisor-archive-keyring.gpg
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/gvisor-archive-keyring.gpg] \
  https://storage.googleapis.com/gvisor/releases release main" \
  > /etc/apt/sources.list.d/gvisor.list
apt-get update && apt-get install -y runsc

Do not run runsc install β€” K8E manages its own containerd config at /var/lib/k8e/agent/etc/containerd/config.toml and auto-injects the gVisor stanza on startup.


### Kata Containers

```bash
bash -c "$(curl -fsSL https://raw.githubusercontent.com/kata-containers/kata-containers/main/utils/kata-manager.sh) install-packages"
kata-runtime check

Firecracker (requires /dev/kvm)

ls /dev/kvm   # verify KVM is available

# Install firecracker-containerd shim + devmapper snapshotter
# See: https://github.com/firecracker-microvm/firecracker-containerd
mkdir -p /var/lib/firecracker-containerd/runtime
# Place hello-vmlinux.bin and default-rootfs.img here

Apply Changes

Install runtimes before starting K8E for zero-restart setup. If K8E is already running, restart it after installing a new runtime shim:

systemctl restart k8e
kubectl get runtimeclass
# NAME          HANDLER       AGE
# gvisor        runsc         10s
# kata          kata-qemu     10s
# firecracker   firecracker   10s   ← only if /dev/kvm present

πŸ€– Sandbox MCP Skill

k8e sandbox-mcp is a built-in MCP server that bridges any MCP-compatible AI agent to K8E's sandbox infrastructure over gRPC β€” no extra binaries, no manual endpoint config.

AI Agent (kiro / claude / gemini)
    β”‚  stdin/stdout
    β–Ό
k8e sandbox-mcp
    β”‚  gRPC (TLS, auto-discovered)
    β–Ό
sandbox-grpc-gateway:50051
    β”‚
    β–Ό
Isolated Pod (gVisor / Kata / Firecracker)

Install the Skill

sandbox-install-skill does two things in one command:

  1. Writes the k8e-sandbox MCP server entry into the agent's config file
  2. Copies skill files from /var/lib/k8e/server/skills/ into the agent's skills directory

K8E server must have started at least once before running this β€” it stages the skill files to /var/lib/k8e/server/skills/ on first boot.

# All supported agents at once
k8e sandbox-install-skill all

# Or per agent
k8e sandbox-install-skill kiro      # MCP config β†’ .kiro/settings.json (workspace)
                                    # Skills     β†’ .kiro/skills/k8e-sandbox-skill/
k8e sandbox-install-skill claude    # MCP config β†’ ~/.claude.json
                                    # Skills     β†’ ~/.claude/skills/k8e-sandbox-skill/
k8e sandbox-install-skill gemini    # MCP config β†’ ~/.gemini/settings.json
                                    # Skills     β†’ ~/.gemini/skills/k8e-sandbox-skill/

Manual setup β€” add to your agent's MCP config:

{
  "mcpServers": {
    "k8e-sandbox": {
      "command": "k8e",
      "args": ["sandbox-mcp"]
    }
  }
}

For claude code:

claude mcp add k8e-sandbox -- k8e sandbox-mcp

Verify

echo '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2024-11-05","clientInfo":{"name":"test","version":"1.0"},"capabilities":{}}}' \
  | k8e sandbox-mcp

Available Tools

Tool Description
sandbox_run Run code/commands β€” auto-manages full session lifecycle
sandbox_status Check if sandbox service is available
sandbox_create_session Create an isolated sandbox pod
sandbox_destroy_session Destroy session and clean up
sandbox_exec Run a command in a specific session
sandbox_exec_stream Run a command, get streaming output
sandbox_write_file Write a file into /workspace
sandbox_read_file Read a file from /workspace
sandbox_list_files List files modified since a timestamp
sandbox_pip_install Install Python packages via pip
sandbox_run_subagent Spawn a child sandbox (depth ≀ 1)
sandbox_confirm_action Gate irreversible actions on user approval

Configuration Overrides

The MCP server auto-discovers the local cluster. Override when needed:

K8E_SANDBOX_ENDPOINT=10.0.0.1:50051 k8e sandbox-mcp          # remote cluster
K8E_SANDBOX_CERT=/path/to/ca.crt k8e sandbox-mcp              # custom TLS cert
k8e sandbox-mcp --endpoint 10.0.0.1:50051 --tls-cert /path/to/ca.crt

Auto-discovery probe order:

  1. K8E_SANDBOX_ENDPOINT env var
  2. K8E_SANDBOX_CERT / K8E_SANDBOX_KEY env vars
  3. /var/lib/k8e/server/tls/serving-kube-apiserver.crt (server node, root)
  4. /etc/k8e/k8e.yaml kubeconfig CA (agent node / non-root)
  5. 127.0.0.1:50051 with system CA pool

🐍 Python Client SDK

The Python SDK talks directly to the sandbox gRPC gateway β€” no MCP process spawn, no stdio handshake (~1–5 ms vs ~500 ms for MCP stdio).

Install

python3 -m pip install grpcio grpcio-tools protobuf

Generate gRPC Stubs (once)

python3 -m grpc_tools.protoc -I proto \
  --python_out=sdk/python \
  --grpc_python_out=sdk/python \
  proto/sandbox/v1/sandbox.proto

# make the generated package importable
touch sdk/python/sandbox/__init__.py sdk/python/sandbox/v1/__init__.py

Usage

Run code (session auto-managed):

from sandbox_client import SandboxClient

with SandboxClient() as client:
    result = client.run("print('hello')", language="python")
    print(result.stdout)   # hello
    print(result.exit_code)  # 0

Generate 10 random numbers and compute the average:

from sandbox_client import SandboxClient

code = (
    "import random; nums = [random.randint(1,100) for _ in range(10)]; "
    "print('numbers:', nums); print('average:', sum(nums)/len(nums))"
)

with SandboxClient() as client:
    result = client.run(code, language="python")
    print(result.stdout)
# numbers: [39, 60, 50, 24, 53, 32, 85, 10, 81, 3]
# average: 43.7

Multi-step workflow (shared session):

with SandboxClient() as client:
    client.run("pip install pandas", "bash")   # session created
    result = client.run("python3 analyze.py", "bash")  # same session reused

Explicit session with custom options:

from sandbox_client import sandbox_session

with sandbox_session(runtime_class="kata", allowed_hosts=["github.com"]) as (client, sid):
    client.write_file(sid, "/workspace/main.py", code)
    result = client.exec(sid, "python3 /workspace/main.py")

SDK source: sdk/python/sandbox_client.py


🟦 TypeScript Client SDK

The TypeScript SDK talks directly to the sandbox gRPC gateway β€” no MCP process spawn, no stdio handshake (~1–5 ms vs ~500 ms for MCP stdio).

Install

npm install @grpc/grpc-js @grpc/proto-loader

Usage

Run code (session auto-managed):

import { SandboxClient } from "./sandbox_client";

const client = new SandboxClient();
const result = await client.run("print('hello')", "python");
console.log(result.stdout);   // hello
await client.close();

Generate 10 random numbers and compute the average:

const client = new SandboxClient();
const code = "import random; nums=[random.randint(1,100) for _ in range(10)]; print('numbers:',nums); print('average:',sum(nums)/len(nums))";
const result = await client.run(code, "python");
console.log(result.stdout);
// numbers: [39, 60, 50, 24, 53, 32, 85, 10, 81, 3]
// average: 43.7
await client.close();

Multi-step workflow (shared session):

const client = new SandboxClient();
await client.run("pip install pandas", "bash");   // session created
const result = await client.run("python3 analyze.py", "bash");  // same session reused
await client.close();

Explicit session with custom options:

const sid = await client.createSession({ runtimeClass: "kata", allowedHosts: ["github.com"] });
await client.writeFile(sid, "/workspace/main.py", code);
const result = await client.exec(sid, "python3 /workspace/main.py");
await client.destroySession(sid);

Streaming output:

for await (const chunk of client.execStream(sid, "python3 train.py")) {
  process.stdout.write(chunk);
}

One-shot helper:

import { sandboxRun } from "./sandbox_client";
const { stdout } = await sandboxRun("echo hello");

SDK source: sdk/typescript/sandbox_client.ts


πŸ–₯️ Advanced Installation

Add a Worker Node

# Get token from server node
cat /var/lib/k8e/server/node-token

# On worker machine
curl -sfL https://k8e.sh/install.sh | \
  K8E_TOKEN=<token> \
  K8E_URL=https://<server-ip>:6443 \
  INSTALL_K8E_EXEC="agent" \
  sh -

Disable Sandbox Matrix

curl -sfL https://k8e.sh/install.sh | INSTALL_K8E_EXEC="server --disable-sandbox-matrix" sh -

Key Environment Variables

K8E_TOKEN=<secret>              # cluster join token
K8E_URL=https://<server>:6443   # server URL (agent nodes)
K8E_KUBECONFIG_OUTPUT=<path>    # kubeconfig output path

πŸ†š K8E vs The Alternatives

Feature K8E πŸš€ K3s K8s (vanilla) MicroK8s
Install time ~60s ~90s ~20min ~5min
Binary size <100MB ~70MB ~1GB+ ~200MB
Agentic Sandbox βœ… Native ❌ No ⚠️ Manual ❌ No
eBPF networking βœ… Cilium ⚠️ Optional ⚠️ Optional ❌ No
MCP skill built-in βœ… Yes ❌ No ❌ No ❌ No
HA embedded etcd βœ… Yes βœ… Yes βœ… Yes ⚠️ Limited
CNCF conformant βœ… Yes βœ… Yes βœ… Yes βœ… Yes
Multi-arch βœ… Yes βœ… Yes βœ… Yes βœ… Yes

🀝 Contributing

git clone https://github.com/<your-username>/k8e.git && cd k8e
git checkout -b feat/my-feature
make && make test
git push origin feat/my-feature

πŸ›‘οΈ Security

Report vulnerabilities via GitHub Security Advisories. Do not open public issues for security bugs.


πŸ“„ License

Apache License 2.0 β€” see LICENSE.


πŸ™ Acknowledgments

Project Contribution
πŸ„ K3s Lightweight Kubernetes foundation that inspired K8E
☸️ Kubernetes The orchestration engine everything is built on
πŸ”· Cilium eBPF-powered networking and per-session egress control
πŸ€– agent-sandbox Kubernetes-native agent sandboxing primitives
🌐 CNCF Fostering the open-source cloud native ecosystem

k8e.sh β€” Open Source Agentic AI Sandbox Matrix

GitHub Website Docs

If K8E powers your agents, give us a ⭐ β€” it means the world to us!

Documentation ΒΆ

The Go Gopher

There is no documentation for this package.

Directories ΒΆ

Path Synopsis
cmd
agent command
cert command
completion command
containerd command
ctr command
encrypt command
etcdsnapshot command
k8e command
kubectl command
server command
token command
pkg
apis/k8e.cattle.io/v1
+k8s:deepcopy-gen=package +groupName=k8e.cattle.io
+k8s:deepcopy-gen=package +groupName=k8e.cattle.io
codegen command
codegen/cleanup command
crd
ctr
generated/clientset/versioned/fake
This package has the automatically generated fake clientset.
This package has the automatically generated fake clientset.
generated/clientset/versioned/scheme
This package contains the scheme of the automatically generated clientset.
This package contains the scheme of the automatically generated clientset.
generated/clientset/versioned/typed/k8e.cattle.io/v1
This package has the automatically generated typed clients.
This package has the automatically generated typed clients.
generated/clientset/versioned/typed/k8e.cattle.io/v1/fake
Package fake has the automatically generated clients.
Package fake has the automatically generated clients.
sandboxmatrix
Package sandboxmatrix implements the Agentic AI Sandbox Matrix controller.
Package sandboxmatrix implements the Agentic AI Sandbox Matrix controller.
sandboxmatrix/api/v1alpha1
+k8s:deepcopy-gen=package +groupName=k8e.cattle.io
+k8s:deepcopy-gen=package +groupName=k8e.cattle.io
sandboxmatrix/grpc
Package grpc implements the SandboxService gRPC gateway.
Package grpc implements the SandboxService gRPC gateway.
sandboxmcp
Package sandboxmcp implements the K8E Sandbox MCP server.
Package sandboxmcp implements the K8E Sandbox MCP server.
untar
Package untar untars a tarball to disk.
Package untar untars a tarball to disk.
vpn

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL