Skip to main content
Version: Next (unreleased)

Install

Getting started

Install kubediag for fast incident diagnosis.

The release flow is intentionally simple: grab a signed binary, install from source, or expose the same binary as a kubectl plugin. The right choice depends on how much control your environment expects over provenance and update cadence.

Signed release assetsSBOMs publishedPlugin-compatible binary
Fastest path

Binary download

Best when you want a known release artifact with checksums, signatures, and no build step in the critical path.

Developer path

Go install

Best when you already manage Go tooling locally and want the public module path as the source of truth.

kubectl workflow

Plugin mode

Best when operators already live inside kubectl and want kubediag to feel like part of the native CLI surface.

Binary install

Use GitHub Releases when provenance matters.

GitHub Releases is the canonical distribution channel. Each release includes platform archives plus checksum, signature, and certificate material.

curl -L https://github.com/khvedela/kubediag/releases/latest/download/kubediag_darwin_arm64.tar.gz | tar xz
chmod +x triage
mv kubediag /usr/local/bin/triage

Swap the archive name for the platform you actually run. Published artifacts currently cover linux amd64/arm64, darwin amd64/arm64, and windows amd64.

Source install

Use the public module path when source-based tooling is standard.

This is the cleanest option for local development machines and internal environments that already trust Go modules.

go install github.com/khvedela/kubediag@latest

The binary lands in your Go bin directory and carries the same CLI behavior as the release build.

kubectl plugin mode

Expose the same binary as kubectl-kubediag.

kubediag does not need a second build target to behave like a kubectl plugin. The binary checks how it was invoked and switches its command surface accordingly.

ln -s "$(which triage)" ~/.local/bin/kubectl-kubediag
kubectl kubediag pod my-pod -n default

This is useful for teams that want a kubectl-native incident flow without maintaining a separate plugin implementation.

Verify release integrity

Each release publishes:

  • checksums.txt
  • checksums.txt.sig
  • checksums.txt.pem
  • per-archive SBOM files

Use those artifacts with your normal verification flow. The important point is not the specific verification tool, but that binary distribution, provenance, and dependency disclosure are already part of the release surface.

Homebrew and Krew status

Homebrew tap publication and Krew index publication are planned, but not live yet. The repository already carries the release structure and Krew manifest needed to support those channels later, so binary install and go install are the production-ready paths today.

Choose the next step

Continue to Quickstart to see how the first diagnosis flow should feel once the binary is installed.