Skip to content

Platform Overview

Shoehorn is the Intelligent Developer Platform: one place to see every service, who owns it, how it’s running, and which standards it meets. It pulls metadata from Kubernetes, GitHub, and YAML manifests in your repos, then makes it queryable, scoreable, and actionable.

Every service, library, API, infrastructure component, and team is represented as an entity. Entities are discovered three ways: Kubernetes workloads register themselves through the K8s agent, GitHub repos contribute via .shoehorn/manifest.yml, and existing Backstage catalog-info.yaml files import as-is. Supported entity types are Service, Library, API, Website, Infrastructure, Resource, Component, System, Domain, Platform, and Team.

Once you connect a cluster with the agent, Shoehorn tracks Deployments, StatefulSets, DaemonSets, CronJobs, and Jobs in real time — pod status, restart counts, resource usage, ArgoCD/FluxCD sync state, and drift. 25+ annotations let you enrich entities directly from Kubernetes metadata without round-tripping through a manifest.

Insights surfaces bus-factor risk, code freshness, and dependency topology. Governance lets you write rules (“every service must have an owner”) and tracks which entities pass. Scorecards go further — define what production-ready means for your org, then score every service against it automatically.

Forge runs self-service workflows: scaffold a new service, create a repo, provision infrastructure, kick off a multi-step automation. Workflows (“molds”) are YAML templates with form-based input and optional approval gates.

Teams, an org chart, and RBAC live inside the platform. Group membership can sync from Zitadel, Okta. GitHub repository topics can drive ownership inference, so you don’t have to maintain ownership in two places.

Full-text search with fuzzy matching across entities, teams, and documentation. Sub-50ms responses, powered by Meilisearch.

GitHub for repo discovery, manifest reading, and PR creation. Identity providers (Zitadel, Okta) for auth. Webhooks for outbound events. The marketplace for community extensions.

OIDC for authentication, Cerbos for fine-grained authorization, scoped API keys for automation, and PostgreSQL Row-Level Security for multi-tenant isolation. Security findings track open vulnerabilities per entity.

Every service exposes Prometheus metrics, Grafana dashboards ship with the Helm chart, Jaeger traces requests across microservices, and logs are JSON with correlation IDs.