Lens Alternatives

Similar projects and alternatives to lens

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better lens alternative or higher similarity.

Suggest an alternative to lens

Reviews and mentions

Posts with mentions or reviews of lens. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-12-04.
  • Gui app for managing the cluster,portainer?
    2 projects | reddit.com/r/kubernetes | 4 Dec 2021
    Lens maybe?
  • Overview of Kubernetes Lens
    2 projects | reddit.com/r/kubernetes | 2 Dec 2021
    I've been hitting this too, it's rather random and annoying. There's an open bug report for it though, and looks like they might be getting to the bottom of it.
  • Event exporter, observability something alternative for opsgenie stack
    3 projects | reddit.com/r/devops | 17 Nov 2021
    If you are looking for just an alternative to kubectl, you could look at https://k8slens.dev/
  • What is the biggest challenge you/your org faces while running k8s in production?
    3 projects | reddit.com/r/kubernetes | 10 Nov 2021
    https://k8slens.dev/ solves this exact issue via a feature called Spaces... Long story short, Cluster admin can give specific access to a Kubernetes cluster without sharing the KubeConfig file... You can create specific teams for your "Space" and give different access to each team via role bindings etc... It's pretty neat. Here's a blog that explains this in depth and how to do it... https://medium.com/k8slens/how-to-give-developers-secure-access-to-kubernetes-clusters-c6025f0dd288
  • How To Give Developers Secure Access to Kubernetes Clusters
    1 project | dev.to | 8 Nov 2021
    Navigate to the Lens website (https://k8slens.dev/) and download the latest version of Lens for your preferred OS. Once you have downloaded and installed, open the application, Lens IDE will automatically add your Kubeconfig (if done correctly, you will see a cluster icon on the left-hand-side). Lens works with any certified CNCF Kubernetes distro.
  • How to set up a Fabric node?
    3 projects | reddit.com/r/hyperledger | 5 Nov 2021
    If you are new to Kuberenetes, check out lens IDE to check all the K8 components without knowing Kubectl.
  • Help: Need feedback on K8s UI redesign
    2 projects | reddit.com/r/devops | 20 Oct 2021
    Have you seen Lens? https://k8slens.dev
  • Lens Open Source Project (OpenLens)
    1 project | reddit.com/r/devopskhan | 20 Oct 2021
  • Good way to understand Kubernetes
    5 projects | reddit.com/r/devops | 12 Oct 2021
    I also used minikube, k3s, and Lens (kubernetes ide)
  • From not knowing docker back in 2019 to selfhosting a 6 node Kubernetes cluster and going completely gafam free in 2021 ! Quite proud of myself !
    1 project | reddit.com/r/selfhosted | 27 Sep 2021
  • Is there a way to make the kubectl output more beautiful?
    4 projects | reddit.com/r/kubernetes | 26 Sep 2021
    If not you can try: https://k8slens.dev/ if you connect it to your cluster it can show you a lot of stuff in a nice overview.
  • Compiled list of ClusterRoles for better/safer RBAC
    2 projects | reddit.com/r/kubernetes | 21 Sep 2021
    apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: annotations: rbac.authorization.kubernetes.io/autoupdate: "true" labels: kubernetes.io/bootstrapping: rbac-defaults name: cluster-admin rules: - apiGroups: - '*' resources: - '*' verbs: - '*' - nonResourceURLs: - '*' verbs: - '*' ------- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: restricted-user-access rules: - apiGroups: ["","extensions", "apps"] ## "" represents the core group resources: ["*"] verbs: ["get"] - apiGroups: ["" ] resources: ["pods"] verbs: ["get", "list", "delete"] ------- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: secret-reader rules: - apiGroups: [""] resources: - secrets verbs: - get - watch - list ------- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: read-services-external-dns-ingress rules: - apiGroups: [""] resources: ["services"] verbs: ["get","watch","list"] - apiGroups: ["extensions"] resources: ["ingresses"] verbs: ["get","watch","list"] ------- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: portforward-access rules: - apiGroups: [""] resources: ["pods/portforward"] verbs: ["*"] ------- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: super-dev rules: - apiGroups: - "*" resources: - "configmaps" - "endpoints" - "persistentvolumeclaims" - "pods" - "pods/log" - "pods/portforward" - "podtemplates" - "replicationcontrollers" - "resourcequotas" - "secrets" - "services" - "events" - "daemonsets" - "deployments" - "replicasets" - "ingresses" - "networkpolicies" - "poddisruptionbudgets" verbs: - "*" ------- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: read-user-access rules: - apiGroups: ["", "extensions", "apps"] resources: ["*"] verbs: ["get","watch","list"] - apiGroups: ["batch"] resources: - jobs - cronjobs verbs: ["*"] ------- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: full-user-access rules: - apiGroups: ["", "extensions", "apps"] resources: ["*"] verbs: ["*"] - apiGroups: ["batch"] resources: - jobs - cronjobs verbs: ["*"] ------- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: non-resource-read-access rules: - nonResourceURLs: - '*' verbs: ["get","watch","list"] ------- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: non-resource-all-access rules: - nonResourceURLs: - '*' verbs: - '*' ------- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: non-namespaced-cluster-resources-read rules: #Copied from https://github.com/lensapp/lens/pull/644/files#diff-e8fd9c95df786da51f13c3a7442a1d88b3ac4294b786bc268ac92a4072bf50e7R5-R198 - nonResourceURLs: - /metrics verbs: - get - list - watch - apiGroups: - "" resources: - bindings - componentstatuses - configmaps - endpoints - events - limitranges - namespaces - namespaces/finalize - namespaces/status - nodes - nodes/proxy - nodes/status - persistentvolumeclaims - persistentvolumeclaims/status - persistentvolumes - persistentvolumes/status - pods - pods/attach - pods/binding - pods/eviction - pods/exec - pods/log - pods/proxy - pods/status - podtemplates - replicationcontrollers - replicationcontrollers/scale - replicationcontrollers/status - resourcequotas - resourcequotas/status - serviceaccounts - services - services/proxy - services/status verbs: - get - list - watch - apiGroups: - apps resources: - controllerrevisions - daemonsets - daemonsets/status - deployments - deployments/scale - deployments/status - replicasets - replicasets/scale - replicasets/status - statefulsets - statefulsets/scale - statefulsets/status verbs: - list - get - watch - apiGroups: - batch resources: - jobs - jobs/status verbs: - get - list - watch - apiGroups: - autoscaling resources: - horizontalpodautoscalers - horizontalpodautoscalers/status verbs: - get - list - watch - apiGroups: - storage.k8s.io resources: - csidrivers - csinodes - storageclasses - volumeattachments - volumeattachments/status verbs: - get - list - watch - apiGroups: - networking.k8s.io resources: - networkpolicies verbs: - get - list - watch - apiGroups: - scheduling.k8s.io resources: - priorityclasses verbs: - get - list - watch - apiGroups: - node.k8s.io resources: - runtimeclasses verbs: - get - list - watch - apiGroups: - extensions resources: - ingresses - ingresses/status verbs: - get - list - watch - apiGroups: - events.k8s.io resources: - events verbs: - get - list - watch - apiGroups: - apiextensions.k8s.io resources: - customresourcedefinitions - customresourcedefinitions/status verbs: - get - list - watch - apiGroups: - apiregistration.k8s.io resources: - apiservices - apiservices/status verbs: - get - list - watch - apiGroups: - discovery.k8s.io resources: - endpointslices verbs: - get - list - watch - apiGroups: - metrics.k8s.io resources: - pods - nodes verbs: - get - list - watch - apiGroups: - policy resources: - poddisruptionbudgets - poddisruptionbudgets/status - podsecuritypolicies verbs: - get - list - watch - apiGroups: - rbac.authorization.k8s.io resources: - clusterrolebindings - clusterroles - rolebindings - roles verbs: - get - list - watch # END - apiGroups: - "*" resources: - "componentstatuses" - "namespaces" - "nodes" - "persistentvolumes" - "mutatingwebhookconfigurations" - "validatingwebhookconfigurations" - "customresourcedefinitions" - "apiservices" - "tokenreviews" - "selfsubjectaccessreviews" - "selfsubjectrulesreviews" - "subjectaccessreviews" - "certificatesigningrequests" - "runtimeclasses" - "podsecuritypolicies" - "clusterrolebindings" - "clusterroles" - "priorityclasses" - "csidrivers" - "csinodes" - "storageclasses" - "volumeattachment" verbs: ["get", "list", "watch"] ## change this to * if you want admin rights on cluster resources
  • What is a simple, free monitoring tool for a Kubernetes cluster?
    4 projects | reddit.com/r/kubernetes | 5 Sep 2021
    I think Lens (https://k8slens.dev/) would be a good option. Just add the local kube config and your good to go. If needed it can install a metrics server from the configuration screen.
  • Determining how much RAM to allocate to Pods
    1 project | reddit.com/r/kubernetes | 27 Aug 2021
    Or you can fire up a tool like Lens and take a look at the CPU and memory usage. I believe viewing those usage graphs requires Prometheus to be running in your cluster already though.
  • Running Scripts On-Demand in K8s, without kubectl exec
    2 projects | reddit.com/r/kubernetes | 25 Aug 2021
    I think a good middle ground is to just setup RBAC roles to kubectl and using some kind of dashboard for the GUI. I've heard good things about lens dashboard. The SRE team will authenticate to the dashboard and only have access according to their role, being able to see resource usage and other diagnostics.

Stats

Basic lens repo stats
35
16,374
9.9
5 days ago

lensapp/lens is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.

SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
Find remote TypeScript jobs at our new job board 99remotejobs.com. There are 10 new remote jobs listed recently.
Are you hiring? Post a new remote job listing for free.