Why Teams Need a Unified Kubernetes Platform
Managing Kubernetes at scale means juggling kubectl, monitoring dashboards, alerting tools, security scanners, and compliance reports — often across multiple clusters. SRExpert consolidates all of that into a single self-hosted platform that runs inside your own infrastructure.
This guide walks you through the complete setup: from Helm installation to adding your first cluster. The entire process takes about 5 minutes if you already have a Kubernetes cluster running.
Prerequisites
Before you begin, make sure you have:
- Kubernetes cluster running version 1.25 or higher (tested through 1.30)
- kubectl configured and connected to your cluster
- Helm v3.x installed
- StorageClass configured for Persistent Volumes
- Ingress Controller installed (NGINX recommended)
- Cert-Manager recommended for automatic TLS certificates
- Metrics Server recommended for resource monitoring
Minimum cluster resources: 2 CPU cores, 4 GB memory, 20 GB disk (recommended: 4 cores, 8 GB, 50 GB).
SRExpert runs on any Kubernetes distribution — AWS EKS, Azure AKS, GCP GKE, DigitalOcean DOKS, Linode, on-premise (kubeadm, k3s, RKE/RKE2, OpenShift), and even local environments like minikube, kind, or Docker Desktop.
Step 1: Install SRExpert via Helm
Add the Helm Repository
Fetch the latest SRExpert charts from our private registry:
helm repo add srexpert-helm https://nexus.srexpert.io/repository/srexpert-helm/
helm repo update
Create the Namespace
kubectl create namespace srexpert
Deploy the Backend
First, create a values-backend.yaml with your configuration. The most critical setting is frontendUrl — it must match the exact domain where your SRExpert frontend will be accessible:
frontendUrl: https://srexpert.yourdomain.com
This URL is used by the backend to generate links in password recovery emails, Stripe payment redirects, and team invitation links. If misconfigured, all of these will break. Make sure it uses https:// and does not include a trailing slash.
Now deploy:
helm upgrade --install srexpert-backend srexpert-helm/srexpert-backend \
--namespace srexpert \
-f values-backend.yaml
Wait for PostgreSQL and the backend pods to be ready before proceeding.
Deploy the Frontend
Create a values-frontend.yaml configuring your ingress:
hosts:
- host: srexpert.yourdomain.com
paths:
- path: /api/v1/
pathType: Prefix
backend: srexpert-backend
backendPort: 8000
- path: /
pathType: Prefix
tls:
- secretName: srexpert-tls
hosts:
- srexpert.yourdomain.com
Deploy the frontend:
helm upgrade --install srexpert-frontend srexpert-helm/srexpert-frontend \
--namespace srexpert \
-f values-frontend.yaml
Verify the Installation
kubectl get pods -n srexpert
kubectl get svc -n srexpert
kubectl get ingress -n srexpert
All pods should show Running status. Your SRExpert instance is now accessible at the domain you configured in the ingress.
Persistent Volume requirements:
| Component | Minimum Size | Purpose |
|---|---|---|
| PostgreSQL | 10 Gi | Database storage |
| Redis | 2 Gi | Cache and sessions |
| Helm Cache | 5 Gi | Chart repository caching |
Check PVC status with kubectl get pvc -n srexpert.
Step 2: Network Whitelist
Your cluster needs outbound HTTPS access (port 443) to three endpoints:
| Endpoint | Purpose |
|---|---|
registry.srexpert.io | Container images |
nexus.srexpert.io | Helm charts |
backoffice-api.srexpert.io | Licensing and activation |
If your cluster runs behind a corporate proxy or firewall, add these to your allow list before proceeding.
Step 3: Register Your Account
Open your browser and navigate to the domain you configured — for example, https://srexpert.yourdomain.com.
On the login page, click "Don't have an account yet? Register here" and fill in:
- Name — your full name
- Email — this becomes your login credential
- Company — your organization name
- Password — minimum 8 characters with letters and numbers
After registering, you can log in and access the SRExpert dashboard. It will be empty — time to connect your clusters.
Step 4: Add Your First Cluster
Navigate to Settings → Cluster Management → Add Cluster. SRExpert offers three methods to connect clusters:
Method 1: Generic Kubernetes (Agent) — Recommended
This is the recommended method, especially for clusters behind firewalls, NAT, or private networks. The agent establishes a reverse tunnel to your SRExpert instance, so no inbound ports need to be opened.
- Select Generic Kubernetes in the wizard
- Enter a cluster name and optional region
- SRExpert generates a unique install command with a registration token
- Run the command on your target cluster with kubectl
- The agent connects within 60 seconds
The agent installs as a DaemonSet in the srexpert-system namespace and only requires outbound HTTPS access to your SRExpert instance. It works behind firewalls, NAT, VPNs, and private networks without exposing your Kubernetes API to the internet.
This is what makes SRExpert different from tools that require direct API access — you can monitor clusters in air-gapped environments, on-premise data centers, or behind strict corporate firewalls without any network changes.
Method 2: Cloud Provider Integration
If you run EKS, AKS, or GKE, SRExpert can import clusters directly using cloud provider credentials:
- Select your cloud provider (AWS, Azure, or GCP)
- Provide API credentials (access keys, service principal, or service account JSON)
- SRExpert auto-discovers all available clusters
- Select the clusters you want to import
- Credentials are stored encrypted
Method 3: Kubeconfig (Manual)
For clusters with direct API access from the SRExpert backend:
- Enter cluster details
- Paste your kubeconfig YAML (get it with
kubectl config view --raw) - Test the connection
- Save
Note: The kubeconfig method requires the Kubernetes API to be reachable from the SRExpert backend pod. For clusters behind firewalls, use the Agent method instead.
After adding a cluster via any method, it appears in your dashboard with Connected status and data collection begins within 1–2 minutes.
Step 5: Explore the Dashboard
Once your cluster is connected, the dashboard comes alive with:
- Workload overview — deployments, pods, services, jobs, and their health status at a glance
- Resource monitoring — CPU, memory, disk, and network metrics across nodes and namespaces
- Security scanning — container image vulnerabilities, misconfigurations, and secrets detection
- Alerting — set up smart alerts with noise reduction so you only get paged when it matters
- Compliance — run SOC 2, HIPAA, and PCI-DSS checks against your clusters
- Helm management — browse, install, and manage Helm charts from the UI
- RBAC visualization — see who has access to what across your clusters
- AI diagnostics — ask the built-in AI assistant about failing workloads and get root cause analysis
For a complete walkthrough of every feature, visit docs.srexpert.cloud.
Step 6: Invite Your Team
Go to Settings → Users and click Invite User. Enter their email, assign a role (Admin, Editor, or Viewer), and send the invitation. They will receive an email to complete their registration.
For larger teams, create Groups under Settings → Groups and assign cluster permissions at the group level instead of per user. This is the recommended approach for organizations with more than a few engineers.
SRExpert also supports SSO via Azure AD, Okta, and Google Workspace on Professional plans and above. Configure it under Settings → Authentication → SSO. See the SSO setup guide for details.
Optional: Upgrade Your Plan
The Starter plan is free and includes 1 user, 1 group, and 1 cluster with full feature access. When your team grows, upgrade from Settings → Billing → Upgrade Plan:
| Plan | Users | Clusters | Price |
|---|---|---|---|
| Starter | 1 | 1 | Free |
| Professional | 5 | 5 | €89/mo |
| Business | 20 | 20 | €399/mo |
| Enterprise | Unlimited | Unlimited | Custom |
Annual billing saves 20%. All plans include a 14-day money-back guarantee. See our pricing page for full details.
What You Just Set Up
In about 5 minutes, you deployed a platform that replaces what most teams build by stitching together 4–6 separate tools:
- Monitoring — no more switching between Grafana, Prometheus, and kubectl
- Alerting — built-in smart alerts instead of a separate PagerDuty/OpsGenie setup
- Security — vulnerability scanning and compliance without Trivy, Falco, or Polaris running separately
- Helm management — a visual chart browser instead of CLI-only workflows
- RBAC — clear visibility into permissions without decoding YAML
- AI diagnostics — root cause analysis without scrolling through thousands of log lines
That is the SRExpert value proposition: one platform, one namespace, full visibility.
Next Steps
- Explore all platform capabilities on our features page
- Read the full documentation for advanced configuration
- Check our roadmap to see what is coming next
- Set up notification plugins for Slack, Teams, or email alerts
- Try the SRE CLI for command-line power users
Need help? Open a ticket at our support portal or reach us at [email protected].
Your team deserves better than a pile of disconnected tools. You just took the first step toward unified Kubernetes operations.

