Skip to main content

Agent Scope

Read-Only Access Model

The OpsWorker Kubernetes Agent operates in read-only mode. It gathers data for investigations but never modifies your cluster.

Allowed Operations

OperationKubernetes VerbsExamples
GetgetRetrieve a specific resource by name
ListlistList resources in a namespace or cluster-wide
WatchwatchObserve resource changes
Logsget (pods/log)Read container stdout/stderr

Blocked Operations

The agent cannot perform any write operations:

OperationKubernetes Verbs
Createcreate
Updateupdate, patch
Deletedelete
Executecreate (pods/exec)

Resources Accessed

ResourceWhat's ReadWhat's Not Read
PodsStatus, spec, labels, annotations, logs
DeploymentsSpec, status, replicas, strategy
ServicesSpec, selectors, ports, endpoints
IngressesRules, backends, TLS config
ConfigMapsContents (non-sensitive config)
SecretsMetadata (name, labels, annotations)Values are never read
EventsAll event details
NodesStatus, conditions, capacity
NamespacesNames, labels, status

Data That Leaves the Cluster

During an investigation, the following data is sent to OpsWorker's cloud for AI analysis:

  • Resource metadata (names, labels, annotations, specs)
  • Pod logs (recent container output)
  • Kubernetes events
  • Service endpoint status
  • Resource configurations (sanitized)

Data That Stays in the Cluster

  • Secret values — Only secret metadata (names, labels) is read; values never leave the cluster
  • Raw filesystem data — The agent doesn't mount or read container filesystems
  • Network traffic — The agent doesn't capture or inspect network traffic

Namespace Scoping

By default, the agent can access resources across all namespaces. You can restrict access to specific namespaces using RBAC. See RBAC Configuration.

Next Steps