What does this Kubernetes validator check?
It parses each YAML document, confirms top-level apiVersion / kind / metadata.name, and runs kind-specific structural checks: Pod requires spec.containers with name + image, Deployment requires spec.selector.matchLabels and spec.template.spec.containers, Service requires spec.ports, ConfigMap/Secret should have data or stringData, Ingress requires spec.rules, Job requires template containers, CronJob requires schedule + jobTemplate containers.
Does it replace kubectl --dry-run or kubeval?
No. This is a structural sanity check that runs in the browser without a cluster connection. kubectl --dry-run validates against the live API server (including admission controllers and CRDs); kubeval validates against the full OpenAPI schema for a specific Kubernetes version. Use this tool to catch the most common mistakes early; reach for kubectl/kubeval before merging to production.
How does it handle multi-document YAML?
Documents separated by --- are validated independently. Each issue reports its document index (doc #1, doc #2…) so you can locate the manifest in a long file or Helm-rendered output.
What kinds are supported?
Pod, Deployment, StatefulSet, DaemonSet, ReplicaSet, Service, ConfigMap, Secret, Ingress, Job, CronJob. Other kinds — including Custom Resources — pass the generic apiVersion / kind / name check but receive no kind-specific validation. For full CRD validation, use a schema-aware tool.
My manifest works in production but the validator complains — why?
Two possibilities. First, the validator runs a static structural check; if your manifest relies on kubectl apply --strategic-merge or admission webhooks to fill in fields, the static view will look incomplete. Second, parsing of complex YAML (anchors, aliases, multi-line scalars, very deep indentation) is approximate — paste a single document if a multi-doc file confuses the parser.
Is my manifest uploaded?
No. Parsing and validation run in JavaScript inside your browser. Manifests with secrets, registry credentials, internal hostnames, or proprietary configuration never leave the device. Verify in DevTools → Network — clicking Validate makes zero requests.
Can it validate Helm chart output?
Yes. Run helm template my-chart > rendered.yaml, paste rendered.yaml here, and the validator will check every document in the bundle. Helm subchart hooks and CRDs that lack a registered schema will pass the generic check.
How is this different from a YAML validator?
A YAML validator only confirms syntax — that the document parses. This Kubernetes validator goes further: it understands what fields each Kubernetes kind needs, so it catches missing apiVersion, missing containers, missing selector, and so on. Always start with valid YAML; this tool checks the next layer up.