Connect to databases, internal tools, and APIs running in your clusters — without exposing them publicly or managing VPNs. Tunnel routes traffic through mogenius with full RBAC enforcement and audit logging. No kubeconfig required.
When you create a tunnel, mogenius establishes a secure WebSocket connection between your browser (or CLI) and the target service in your cluster. The connection is authenticated through your mogenius account and authorized based on your workspace and cluster permissions.
Connect your local database client (pgAdmin, DBeaver, TablePlus) to PostgreSQL, MySQL, or Redis running in Kubernetes. No public endpoint. No credential sharing.
Access admin panels, monitoring dashboards, or management interfaces securely. Grafana, Prometheus, phpMyAdmin, custom admin UIs — all reachable without Ingress exposure.
Troubleshoot services that aren't exposed via Ingress. Test internal APIs from your local machine. Connect local dev tools to staging or production services safely.
Create tunnels from the mogenius dashboard. Navigate to Tunnels or click the Tunnel button on any service in the Resource Browser. Get a unique URL to access your service directly.
Use mocli port-forward to create tunnels from your terminal. Perfect for scripting, local development workflows, and connecting CLI-based database clients.
Kubeconfigs to distribute or manage
Tunnel sessions logged with user identity
Time to connect — click and go
Workspace permissions enforced on every tunnel
Tunnels provide direct TCP access to services in your cluster. That's powerful — and mogenius ensures it's governed. Your existing workspace RBAC controls who can create tunnels. Every session is logged with user identity, target service, and timestamps.
No credential sharing. No VPN configs to leak. No "who left that port-forward running?" Sessions auto-close after the configured duration or 30 minutes of inactivity. Tunnel URLs are unique per session and can't be reused or shared.
Workspace permissions checked at tunnel creation. Same roles you already defined — no separate access layer.
User identity, service, namespace, start time, duration. Full trail for compliance and incident reconstruction.
Sessions close after configured duration or inactivity. No forgotten open connections.
Secure tunnels to any Kubernetes service — governed, logged, and ready in seconds.