20
Public Services
20
Internal Services
4
Cloud Providers
9
Kubernetes Namespaces

Access Type Legend

WEB Web browser accessible
API API/programmatic access only
CLI Command-line/port-forward access
INTERNAL Cluster-internal services only

AI & Machine Learning 3 Services

DevOps & CI/CD 5 Services

Monitoring & Observability 5 Services

Infrastructure & Storage 1 Service

Project Management 2 Services

Standalone Enterprise Services 3 Services

Internal Cluster Services 20 Services

Accessing Internal Services

These services run within the Kubernetes cluster and are not directly accessible from external networks. Use one of the following methods:

Port Forwarding: kubectl port-forward -n <namespace> svc/<service-name> <local-port>:<service-port>

Example: kubectl port-forward -n security-scanning svc/grype 8080:8080

NodePort: Services marked with NodePort are accessible via <node-ip>:<nodeport>

For access assistance, contact the DevSecOps team

🛡️ Security Scanning & Vulnerability Assessment

CLI

Anchore Grype

security-scanning

Vulnerability scanner for container images and filesystems with comprehensive CVE database coverage

ClusterIP: 10.105.80.223:8080
CLI

OWASP ZAP

security-scanning

Web application security testing tool for finding vulnerabilities through automated and manual penetration testing

NodePort: 10.104.153.62:30808
INTERNAL

Trivy Operator

security-scanning

Kubernetes-native security scanner continuously monitoring containers, configurations, and compliance

ClusterIP: None (Operator)

⚙️ Infrastructure & Cluster Management

INTERNAL

Cert Manager

cert-manager

Automated X.509 certificate management for Kubernetes with support for Let's Encrypt, HashiCorp Vault, and custom CAs

ClusterIP: 10.109.156.172:9402
INTERNAL

Metrics Server

kube-system

Cluster-wide aggregator of resource usage metrics providing CPU and memory data for autoscaling decisions

ClusterIP: 10.103.45.136:443
CLI

K8sGPT

k8sgpt-operator

AI-powered Kubernetes cluster diagnostics using natural language processing for troubleshooting and analysis

ClusterIP: 10.100.16.44:8080
API

Internal Docker Registry

container-registry

Private container registry for internal builds and testing with NodePort access for development workflows

NodePort: 10.102.160.255:30500

💾 Data & Storage Services

INTERNAL

Elasticsearch

clearml

Distributed search and analytics engine powering ClearML experiment tracking and log aggregation

ClusterIP: None (Headless) - 9200/9300
INTERNAL

MongoDB

clearml

NoSQL document database storing ClearML metadata, experiments, and model information

ClusterIP: 10.105.84.204:27017
INTERNAL

Redis Master

clearml

In-memory data store providing caching and message brokering for ClearML platform services

ClusterIP: 10.107.44.184:6379
INTERNAL

PostgreSQL (SonarQube)

security-scanning

Relational database backend for SonarQube code analysis results and configuration data

ClusterIP: 10.97.228.6:5432
INTERNAL

PostgreSQL (ADAI)

adai-app

Dedicated database instance for ADAI application data persistence and transactional operations

ClusterIP: 10.103.52.155:5432
INTERNAL

PostgreSQL (Plane)

plane-stg

Database backend for Plane project management platform storing issues, projects, and user data

ClusterIP: 10.101.33.121:5432

🌐 Network & Proxy Services

INTERNAL

NGINX Ingress Controller

ingress-nginx

Kubernetes ingress controller managing external access to services with SSL/TLS termination and routing

NodePort: 10.101.249.212 (80:30080/443:30443)
INTERNAL

OAuth2 Proxy (Nexus)

artifact-management

Authentication proxy providing Keycloak SSO integration for Nexus Repository Manager

ClusterIP: 10.109.46.59:4180
INTERNAL

OAuth2 Proxy (K8s Dashboard)

kubernetes-dashboard

Authentication proxy securing Kubernetes Dashboard access through Keycloak SSO integration

ClusterIP: 10.99.70.86:4180
INTERNAL

Hubble (Cilium)

kube-system

Network observability platform providing visibility into service communications and network policies

ClusterIP: 10.108.0.210:443

Cloud Service Providers 4 Providers