The cluster was burning hot with activity when you opened K9S. Pods flickered, logs scrolled, users came and went. You needed to know who touched what, and when. Not guesses. Not partial data. Precise, verifiable answers.
K9S is more than a Kubernetes CLI with a nice UI. It can become your real-time audit lens for cluster access. With proper configuration, it surfaces user events, resource changes, and timestamps. You can trace any action back to the exact moment it happened.
To make “who accessed what and when” possible, you first need Kubernetes audit logs enabled. These logs capture CRUD operations, API calls, and authentication context. K9S can read these logs and present them alongside pod, node, and namespace views. This turns raw JSON events into navigable data you can act on.
Cluster operators often combine K9S with RBAC inspection. By viewing both the role bindings and the audit trail, you see not only the actions taken but the permissions that made them possible. This closes the loop between intention, capability, and execution.