https://github.com/kubestellar/console
World's first fully integrated and fully Automated Kubernetes management and orchestration solution
https://github.com/kubestellar/console
Last synced: 3 days ago
JSON representation
World's first fully integrated and fully Automated Kubernetes management and orchestration solution
- Host: GitHub
- URL: https://github.com/kubestellar/console
- Owner: kubestellar
- License: apache-2.0
- Created: 2026-01-16T06:32:19.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2026-04-30T03:31:06.000Z (13 days ago)
- Last Synced: 2026-04-30T03:35:20.221Z (13 days ago)
- Language: TypeScript
- Homepage: https://console.kubestellar.io
- Size: 89.5 MB
- Stars: 79
- Watchers: 1
- Forks: 62
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Security: SECURITY.md
- Support: docs/SUPPORT.md
- Governance: GOVERNANCE.md
- Roadmap: ROADMAP.md
- Maintainers: MAINTAINERS.md
- Agents: AGENTS.md
- Dco: DCO
Awesome Lists containing this project
- awesome-fiber - kubestellar/console - AI-powered multi-cluster Kubernetes dashboard built on Fiber, with real-time observability and CNCF integrations. (๐ Recipes / ๐ฑ Third Party)
- awesome-cloud - KubeStellar Console - cluster Kubernetes dashboard for managing hybrid and multi-cloud environments, with centralized control and observability. Part of a CNCF Sandbox project. (Multi-Cloud & Hybrid Tools)
- Awesome-AI-Agents - KubeStellar Console - Multi-cluster Kubernetes dashboard with AI operations agent (kc-agent) that bridges LLMs to live clusters via MCP for AI-assisted troubleshooting, observability, and management across edge and cloud. CNCF Sandbox project.  (Applications / Tools)
- awesome-claude-code-and-skills - kubestellar/console - square) (Productivity Tools / MCP Servers & Integrations)
- best-of-mcp-servers - GitHub - 0% open ยท โฑ๏ธ 29.04.2026) (Cloud Platforms)
- awesome-x-ops - KubeStellar Console - cluster Kubernetes dashboard with AI-powered operations, real-time observability, and CNCF project integrations across edge and cloud clusters. (FinOps)
- awesome-mcp-servers - KubeStellar Console kc-agent - cluster Kubernetes AI operations (CNCF Sandbox) | Go | (Servers / Cloud & Infrastructure)
- awesome-ai-tools - KubeStellar Console - cluster Kubernetes dashboard with AI-powered operations via MCP. Includes kc-agent for bridging AI coding agents (Claude, Copilot, Codex) to the Kubernetes API for natural-language cluster management, CNCF project integrations, and real-time observability across edge and cloud clusters. (3. <a name='Dev'></a>๐ป Dev)
- awesome-llm-devops - KubeStellar Console - Multi-cluster Kubernetes dashboard with LLM-powered operations and intelligent workload optimization (Features / Infrastructure productivity and maintainability)
- awesome-gemini-cli - KubeStellar Console kc-agent - Multi-cluster Kubernetes MCP server bridging Gemini CLI to kubeconfig and Kubernetes APIs. Manage clusters, policies, and 20+ CNCF project integrations across edge and cloud. Install via `brew tap kubestellar/tap && brew install kc-agent`. (MCP Servers)
- awesome-kubernetes-operator-resources - KubeStellar Console - Multi-cluster Kubernetes dashboard with AI-powered operations, real-time observability, and CNCF project integrations. (Multi-Cluster & Fleet Management)
- awesome-security-pipeline - KubeStellar Console - AI-powered multi-cluster Kubernetes dashboard with built-in Falco, Kyverno, and OPA/Gatekeeper integrations for unified security visibility across hybrid and edge clusters. CNCF Sandbox project.    (Kubernetes Security / Runtime Security)
- awesome-ops - kubestellar/console - 2.0|67|2026-01-16|2026-04-27 | ๅค้็พค Kubernetes ็ฎก็ไปช่กจๆฟ๏ผๅ ทๅค AI ้ฉฑๅจ็่ฟ็ปด่ฝๅใๅฎๆถๅฏ่งๆตๆงๅ CNCF ้กน็ฎ้ๆ๏ผๆฏๆ่พน็ผๅไบ้็พคใ | (K8S-Tools)
- awesome-dashboards - kubestellar/console - cluster_ _ai_ _cncf_ _observability_ (Awesome dashboards / Free dashboards list for you to use in your projects)
- awesome-opa - KubeStellar Console - Open source AI-powered multi-cluster Kubernetes dashboard with built-in OPA/Gatekeeper policy visualization, real-time compliance monitoring across hybrid edge and cloud environments. CNCF Sandbox project (Apache 2.0) (Kubernetes / Built with Wasm)
- awesome-agents - KubeStellar Console - cluster Kubernetes dashboard with AI-powered operations agent (kc-agent) providing MCP tools for managing workloads across edge and cloud clusters. CNCF project.  (Software Development)
- awesome-kubernetes-architecture-diagrams - https://github.com/kubestellar/console
- awesome-istio - KubeStellar Console - Open source AI-powered multi-cluster Kubernetes dashboard with built-in Istio service mesh integration for observability across hybrid edge and cloud. CNCF Sandbox project. (Uncategorized / Uncategorized)
- awesome-AI-driven-development - KubeStellar Console kc-agent - MCP server (kc-agent) bundled with KubeStellar Console for AI-driven multi-cluster Kubernetes operations โ natural-language chat, GitOps deploy missions, and real-time cluster dashboard via Claude/Copilot/Cursor (MCP Servers & Integrations / Other IDEs)
- awesome-mcp-servers - kubestellar/console - cluster Kubernetes MCP server (kc-agent) for AI-assisted operations across edge and cloud clusters. 50+ tools for workload placement, policy enforcement, and observability via natural language. (โ๏ธ Cloud Platforms & Services)
- awesome-platform-engineering - KubeStellar Console - Multi-cluster Kubernetes dashboard with AI-powered operations and real-time observability
- awesome-k8s-security - KubeStellar Console - Open source AI-powered multi-cluster Kubernetes dashboard
- awesome-mcp - kubestellar/console - powered multi-cluster Kubernetes dashboard with MCP server (kc-agent) for natural language operations โ`84` (Cloud & Infrastructure / Kubernetes)
- awesome-sre - KubeStellar Console - Multi-cluster Kubernetes dashboard with AI-powered operations, real-time observability, and CNCF project integrations across edge and cloud clusters. (10. Capacity Planning)
- awesome-edge-computing - KubeStellar Console - cluster Kubernetes dashboard for managing hybrid edge, cloud, and multi-cloud environments, with centralized control and observability. Part of a CNCF Sandbox project. (Open Source Projects)
- awesome-opentelemetry - KubeStellar Console - Open source AI-powered multi-cluster Kubernetes dashboard with OpenTelemetry support for real-time observability across hybrid edge and cloud. CNCF Sandbox project. (Components / UI)
- awesome-eks - KubeStellar Console - cluster Kubernetes dashboard with real-time observability, AI-powered operations, and CNCF project integrations across EKS and other clusters (Monitoring)
- Awesome-WebAssembly-Applications - [KubeStellar Console
- awesome-software-supply-chain-security - KubeStellar Console - Multi-cluster Kubernetes dashboard with integrated supply chain security (SBOM, SLSA, Sigstore/Cosign, Kyverno policy), CNCF Sandbox project. (Dependency intelligence / SCA and SBOM)
- awesome-autonomous-ops - KubeStellar Console - powered multi-cluster Kubernetes dashboard with built-in AI chat for autonomous cluster troubleshooting, mission-based operations, and AI-guided remediation. 20+ CNCF integrations (Argo, Kyverno, Prometheus, Falco, OPA/Gatekeeper). CNCF Sandbox project (Apache 2.0). (Agentic Remediation & Runbooks)
- awesome-websockets - KubeStellar Console - AI-powered multi-cluster Kubernetes dashboard using WebSockets for real-time cluster communication and live observability streams. (Tools per Language / Go)
- awesome-cloud-native - kubestellar - KubeStellar Console is an AI-powered multi-cluster Kubernetes dashboard with natural language operations, MCP support, and GitOps deployment management. (Dashboards & Portals)
- awesome-ai-infrastructure - KubeStellar Console - A CNCF Sandbox multi-cluster Kubernetes management dashboard for deploying and observing workloads across edge and cloud infrastructure. (Cloud Platforms)
- awesome-go-tools - KubeStellar Console - Multi-cluster Kubernetes dashboard with AI-powered operations and real-time observability across edge and cloud clusters. (DevOps Tools / Contents)
- awesome-sre-tools - KubeStellar Console - AI-powered multi-cluster Kubernetes management console with MCP server (kc-agent) for AI-assisted cluster operations, pod inspection, deployment management, and real-time observability across distributed environments. (AI SRE Tools & SRE Copilots / Incident Communication)
- awesome-container-security - KubeStellar Console - Multi-cluster Kubernetes dashboard with AI-powered operations, real-time observability, and CNCF project integrations across edge and cloud clusters. (Build Management / Commercial solutions)
- awesome-dashboard - KubeStellar Console - AI-powered multi-cluster Kubernetes dashboard with 150+ real-time monitoring cards and CNCF integrations. (Others)
- awesome-ai-devtools - KubeStellar Console kc-agent - cluster Kubernetes APIs. Enables natural language queries across clusters, workload placement, policy enforcement, and real-time observability. CNCF Sandbox project. (Agent Infrastructure / Configuration & Context Management)
- awesome-sqlite - kubestellar/console - - Multi-cluster Kubernetes dashboard using SQLite WASM in a Web Worker for persistent client-side caching. SWR pattern with IndexedDB fallback, keeping structured query performance off the main thread for real-time observability across edge and cloud clusters. Go/TypeScript. (Applications / Desktop)
- awesome-edge-computing - KubeStellar Console - powered (Engine)
README
# KubeStellar Console

[](https://console.kubestellar.io/acmm?repo=kubestellar%2Fconsole)
[](https://securityscorecards.dev/viewer/?uri=github.com/kubestellar/console)
[](https://www.bestpractices.dev/projects/12343)
[](https://github.com/kubestellar/console/issues)
AI-powered multi-cluster Kubernetes dashboard with guided install missions for 250+ CNCF projects.
[Contributing](CONTRIBUTING.md)

## Try it now (no install)
The fastest way to evaluate the console is the **hosted version** โ no Kubernetes cluster, no install, no configuration. Demo data is built in:
> ๐ **[console.kubestellar.io](https://console.kubestellar.io)**
The hosted demo is a self-contained showcase: it serves canned demo data and intentionally **does not** talk to a local agent (`LOCAL_AGENT_HTTP_URL` is disabled in the Netlify build, so the browser cannot reach a kc-agent on your laptop). Use it to explore the UI, browse missions, and test cards without touching your machine. To work against your **own** clusters or use AI features with your own keys, you need to self-host the console โ see the next section.
## Which path do I need?
| I want toโฆ | What to do | Need a cluster? | Need to install anything? |
|---|---|---|---|
| Explore the UI / evaluate the product | [console.kubestellar.io](https://console.kubestellar.io) | no | no |
| Connect the console to **my own** clusters | [**Self-host**](#local-install-self-host) the console **and** install [**kc-agent**](#kc-agent-bridge-self-hosted-console-to-your-clusters) on the same machine | yes | yes (curl + kc-agent) |
| Self-host the console (air-gapped, custom OAuth, etc.) | [**Local install**](#local-install-self-host) | optional | yes |
| Run the console **inside** a cluster | [`deploy.sh`](deploy.sh) | yes | Helm-style script |
> **Note**: `kc-agent` is **not** consumed by the hosted demo at [console.kubestellar.io](https://console.kubestellar.io). It bridges your **self-hosted** console (running at `localhost:8080`) to your kubeconfig contexts and to AI providers. If you want the convenience of the hosted UI plus your real cluster data, you currently have to run the console locally.
## Local install (self-host)
The quickest path to a working console with your own data. `start.sh` downloads the pre-built console binary and a pre-built `kc-agent`, starts both, and opens [http://localhost:8080](http://localhost:8080):
```bash
curl -sSL https://raw.githubusercontent.com/kubestellar/console/main/start.sh | bash
```
Deploy into a cluster instead with [`deploy.sh`](deploy.sh) (`--openshift`, `--ingress `, `--github-oauth`, `--uninstall`). For Helm chart installs that should talk to an in-cluster Kagenti backend, see [Connecting Kagenti](deploy/helm/kubestellar-console/README.md#connecting-kagenti).
## kc-agent (bridge self-hosted console to your clusters)
`kc-agent` is a small local HTTP/WS daemon that the **self-hosted** console talks to (default `http://127.0.0.1:8585`). It forwards requests from the browser to your kubeconfig contexts and to AI providers. The hosted demo at [console.kubestellar.io](https://console.kubestellar.io) cannot reach it (#6195) โ kc-agent is only useful when you self-host.
**You do not need kc-agent** if you only want to browse the UI / demo data โ just use the hosted demo. **`start.sh` already installs and launches a pre-built kc-agent for you**, so most users never need to install it manually. The instructions below are for development builds or platforms without a Homebrew formula:
**Prerequisites for kc-agent:**
- A kubeconfig that points at one or more reachable clusters (`kubectl get nodes` works locally)
- macOS, Linux, or Windows with WSL2 (see [Windows section](#windows-wsl2))
```bash
# macOS โ Homebrew formula (pre-built)
brew tap kubestellar/tap && brew install kc-agent
# Linux / from source โ requires Go 1.25+ (matches go.mod)
mkdir -p bin
go build -o bin/kc-agent ./cmd/kc-agent && ./bin/kc-agent
```
When both the self-hosted console and `kc-agent` are running, open [http://localhost:8080](http://localhost:8080) and your local clusters appear in the cluster picker.
## Windows (WSL2)
The console install scripts and `kc-agent` are POSIX shell + Go, so they run unchanged inside WSL2. Native Windows (PowerShell / CMD) is not supported โ install [WSL2 with Ubuntu](https://learn.microsoft.com/windows/wsl/install) and run everything from the WSL shell:
```powershell
# In PowerShell โ one-time setup
wsl --install -d Ubuntu
```
Then from inside the Ubuntu/WSL shell. **`start.sh` only needs `curl`** โ it downloads pre-built binaries, no Go toolchain required:
```bash
# Prerequisite: just curl
sudo apt-get update && sudo apt-get install -y curl
# Same install command as macOS / Linux
curl -sSL https://raw.githubusercontent.com/kubestellar/console/main/start.sh | bash
```
> **โ ๏ธ Windows PowerShell `curl` gotcha:** In PowerShell, `curl` is an alias
> for `Invoke-WebRequest`, which behaves completely differently from the real
> curl. If you need to test endpoints from PowerShell (outside WSL), always
> use **`curl.exe`** instead of `curl`, or use the native PowerShell cmdlet:
>
> ```powershell
> # Option 1 โ use curl.exe (the real curl shipped with Windows 10+)
> curl.exe -s http://localhost:8080/health
>
> # Option 2 โ use PowerShell native cmdlet
> Invoke-RestMethod http://localhost:8080/health
> ```
**Building `kc-agent` from source is a separate path** โ only needed if you want a development build of the agent rather than the prebuilt binary that `start.sh` already installs. It requires Go **1.25+** (the version pinned in `go.mod`) and `git`. Ubuntu's `golang-go` package usually lags the current release; use the [official Go install](https://go.dev/doc/install) or the `longsleep/golang-backports` PPA to get a recent version:
```bash
# add-apt-repository lives in software-properties-common โ install it
# first on minimal Ubuntu/WSL images that don't ship with it.
sudo apt-get update && sudo apt-get install -y software-properties-common
sudo add-apt-repository -y ppa:longsleep/golang-backports
sudo apt-get update && sudo apt-get install -y golang-1.25 git
git clone https://github.com/kubestellar/console.git
cd console
mkdir -p bin
go build -o bin/kc-agent ./cmd/kc-agent && ./bin/kc-agent
```
Open http://localhost:8080 in your **Windows** browser โ WSL2 forwards `localhost` automatically. Tracked by [#6185](https://github.com/kubestellar/console/issues/6185).
## GitHub authentication
The console uses **two** GitHub credentials (#6190). Most users need **neither** โ the hosted demo works without any GitHub auth at all.
| Credential | What it does | When you need it |
|---|---|---|
| **GitHub OAuth App** (`GITHUB_CLIENT_ID` + `GITHUB_CLIENT_SECRET`) | Sign-in for the **self-hosted** console at `localhost:8080` | Only if you self-host the console AND want user sign-in. Skip for the hosted demo. |
| **Consolidated GitHub PAT** (a.k.a. `FeedbackGitHubToken`) | Same single PAT powers everything: nightly E2E status, community activity, leaderboard widgets, and the `/issue` page that opens GitHub issues | Optional. Without it, `/issue` returns `503 Issue submission is not available` and the GitHub-powered dashboard widgets fall back to demo data. |
**Minimum to get started**: nothing โ hit [console.kubestellar.io](https://console.kubestellar.io). Everything above is opt-in.
### Setting the consolidated PAT
There are two equivalent ways to supply this PAT โ pick one. Both write to the same field (`FeedbackGitHubToken` in `pkg/api/handlers/feedback.go` and `pkg/api/handlers/github_proxy.go`), so you don't need to set both:
1. **`.env` file at the repo root** โ set on startup, no UI step needed:
```
FEEDBACK_GITHUB_TOKEN=ghp_โฆ
```
2. **Settings UI** (self-hosted only, **admin role required**) โ visit Settings โ GitHub Token โ paste. The UI POSTs to `/api/github/token` which is gated on the console `admin` role and returns `403 Console admin access required` for non-admin users (verified in `pkg/api/handlers/github_proxy.go:214`). Persisted to `~/.kc/settings.json` by the backend.
The hosted Netlify demo cannot persist a PAT โ it has no writable local backend โ so Settings UI saves don't work there. Use the env-var path for self-hosting.
### Setting up GitHub OAuth (self-hosted only)
If you self-host the console and want sign-in:
1. **Create a [GitHub OAuth App](https://github.com/settings/developers)**
- Homepage URL: `http://localhost:8080`
- Callback URL: `http://localhost:8080/auth/github/callback`
2. **Clone the repo** (if you haven't already):
```bash
git clone https://github.com/kubestellar/console.git
cd console
```
3. **Create a `.env` file in the repo root** (`console/.env`):
```
GITHUB_CLIENT_ID=your-client-id
GITHUB_CLIENT_SECRET=your-client-secret
```
4. **Start the console**:
```bash
./startup-oauth.sh
```
Open http://localhost:8080 and sign in with GitHub. For Kubernetes deployments, pass `--github-oauth` to `deploy.sh` instead.
### Consolidated PAT scopes
Whichever path you used above (env var or Settings UI), the [Personal Access Token](https://github.com/settings/tokens) needs **either**:
- A **classic** PAT with the `repo` scope, **or**
- A **fine-grained** PAT with both **Issues: Read & Write** *and* **Contents: Read & Write** (verified against `pkg/api/handlers/feedback.go:71` โ Contents is required, not just Issues).
## AI configuration
The console can use AI for adaptive card suggestions and mission help. AI is **optional** โ the UI, missions, and dashboards all work without any AI keys configured (#6191).
**Important**: AI BYOK only works on the **self-hosted** console. The hosted demo at [console.kubestellar.io](https://console.kubestellar.io) explicitly disables `LOCAL_AGENT_HTTP_URL` (verified in `web/src/lib/constants/network.ts`), so the browser cannot reach a local agent there. To use your own AI keys, self-host the console first.
### Supported AI providers (CLI-based and local LLMs)
The console uses **local CLI providers** and **self-hosted LLMs** to maintain full control over cluster access and tooling capabilities. Direct API-key providers (like raw `ANTHROPIC_API_KEY`, `OPENAI_API_KEY`, or `GOOGLE_API_KEY`) are **intentionally not supported** because they bypass the local CLI tooling model required for executing cluster commands (see `pkg/agent/registry.go:378` and [`docs/security/SECURITY-MODEL.md`](docs/security/SECURITY-MODEL.md#L175)).
**Recommended setup paths:**
1. **CLI-based agents** (with full tool execution capabilities):
```bash
# Install Claude Desktop or claude CLI โ https://claude.ai/download
# Install Gemini CLI โ follow official Google AI SDK instructions
# Install GitHub Copilot CLI โ gh extension install github/gh-copilot
# Install other CLI agents: codex, antigravity, goose, bob
# kc-agent will auto-detect installed CLI agents โ no env vars needed
./bin/kc-agent
```
2. **Local/self-hosted LLM servers** (OpenAI-compatible endpoints):
```bash
# Ollama (local)
export OLLAMA_URL=http://127.0.0.1:11434
export OLLAMA_MODEL=llama3.2
# Open WebUI (self-hosted gateway)
export OPEN_WEBUI_URL=https://your-openwebui.example.com
export OPEN_WEBUI_API_KEY=your-key
export OPEN_WEBUI_MODEL=gpt-4
# Other supported: llama.cpp, LocalAI, vLLM, LM Studio, Red Hat AI Inference Server
# See docs/security/SECURITY-MODEL.md for the full list
./bin/kc-agent
```
> **Why are direct API keys not supported?** The agent registry intentionally excludes upstream API-key providers (Anthropic API, OpenAI API, Google Gemini API) because they cannot execute cluster commands AND they route traffic to a specific vendor endpoint that the operator has no control over. The console's security model requires tool-capable agents that can run `kubectl`, `helm`, and other diagnostic commands locally. See `pkg/agent/registry.go:378-384` for the rationale.
> **A note on the Settings โ API Keys modal**: The console UI exposes a "Manage Keys" button under **Settings โ API Keys**. This modal is wired to the agent's `/settings/keys` endpoint, but in the current build that endpoint returns an empty providers list (`providers := []providerDef{}` in `pkg/agent/server_operations.go:288`) because API-key-driven agents are hidden. The modal is non-functional by design. **Use the CLI-based or local LLM setup paths above instead.**
**If no AI provider is configured**, AI-powered features fall back to deterministic / rule-based behavior. The card suggestions, missions, and dashboards remain fully usable.
**Security model, air-gapped deployments, and local / self-hosted LLMs** are covered in [`docs/security/SECURITY-MODEL.md`](docs/security/SECURITY-MODEL.md). That document explains the data flow between browser, Go backend, kc-agent, and AI providers; how to run the console with no external AI access; and the currently supported self-hosted path using kc-agent's CLI-based agents.
## How It Works
1. **Onboarding** โ Sign in with GitHub, answer role questions, get a personalized dashboard
2. **Adaptive AI** โ Tracks card interactions and suggests swaps when your focus shifts (Claude, OpenAI, or Gemini)
3. **MCP Bridge** โ Queries cluster state (pods, deployments, events, drift, security) via `kubestellar-ops` and `kubestellar-deploy`
4. **Missions** โ Step-by-step guided installs with pre-flight checks, validation, troubleshooting, and rollback
5. **Real-time** โ WebSocket-powered live event streaming from all connected clusters
## Architecture
See the full [Architecture documentation](https://kubestellar.io/docs/console/overview/architecture) on the KubeStellar website.
### Related Repositories
- **[console-kb](https://github.com/kubestellar/console-kb)** โ Knowledge base of guided installers for 250+ CNCF projects and solutions to common Kubernetes problems
- **[console-marketplace](https://github.com/kubestellar/console-marketplace)** โ Community-contributed monitoring cards per CNCF project
- **[kc-agent](cmd/kc-agent/)** โ Local agent bridging the browser to kubeconfig, coding agents (Codex, Copilot, Claude CLI), and MCP servers (`kubestellar-ops`, `kubestellar-deploy`)
- **[claude-plugins](https://github.com/kubestellar/claude-plugins)** โ Claude Code marketplace plugins for Kubernetes
- **[homebrew-tap](https://github.com/kubestellar/homebrew-tap)** โ Homebrew formulae for KubeStellar tools
- **[KubeStellar](https://kubestellar.io)** โ Multi-cluster configuration management
## Quality Assurance
Console uses AI tools (GitHub Copilot, Claude Code) to accelerate development. Quality is maintained through **layered feedback loops** โ every PR triggers the same automated checks regardless of author, and continuous monitoring catches what PR checks miss.
- **Before commit**: TypeScript build + Go build + 5 post-build safety checks + lint
- **Before merge**: nil-safety, ts-null-safety, array-safety, API contract, Playwright E2E, coverage gate, TTFI performance, CodeQL, Copilot code review, UI/UX standards scanner, visual regression
- **Visual regression**: 18 UI components documented as Storybook stories with theme support. Playwright captures screenshots and diffs against baselines on every PR that touches UI components.
- **After merge**: Targeted Playwright tests run against production (`console.kubestellar.io`); failures reopen the original issue
- **Continuous**: Hourly coverage (12 shards), 4x daily QA, nightly E2E, nightly security scanning, real-time GA4 error tracking, UI/UX standards nightly scan
When a regression class is identified, a maintainer adds an automated check to the earliest possible loop. See [docs/AI-QUALITY-ASSURANCE.md](docs/AI-QUALITY-ASSURANCE.md) for the full breakdown.
## License
Apache License 2.0 โ see [LICENSE](LICENSE).