The challenge of testing code in Kubernetes
When you update application code in Kubernetes, every new iteration typically requires a full build-and-deploy cycle:- Build a Docker image
- Push it to a registry
- Update your Deployment manifest
- Apply the changes
Each code change triggers this manual sequence—packaging, pushing, manifest editing, and redeployment—turning a quick test into a multi-minute ordeal.
Manual vs. Telepresence development workflow
| Step | Manual Kubernetes Cycle | Telepresence Flow |
|---|---|---|
| Code change | Edit, build, push, deploy | Edit locally |
| Build time | Minutes | Zero |
| Cluster DNS resolution | Inaccessible from laptop | Fully supported |
| Live debugging | Difficult, remote logs | Debug with IDE locally |
Local development vs. Kubernetes networking
A common scenario is running Service A locally while the rest of the cluster (e.g., Service B) remains in Kubernetes. However, built-in networking makes this challenging:- Pod CIDR: 172.16.0.0/16
- Service CIDR: 10.0.0.0/16
- In-cluster DNS (kube-dns)
Without a tunnel, your laptop can’t resolve or reach in-cluster Pod/Service IPs or DNS names.
Two-way proxy tunnel
Telepresence solves this by establishing a transparent two-way proxy between your laptop and the Kubernetes cluster:
- Access pod and service CIDR ranges as if local
- Perform in-cluster DNS lookups:
- Use Kubernetes APIs and services transparently
Intercepts for live debugging
Telepresence’s intercept feature lets you run an exact copy of a service locally, retaining its environment:- Telepresence captures the pod’s network namespace, environment variables, and volumes.
- Cluster traffic destined for that service is redirected to your local process.

- Step through code with your IDE
- Hot-reload changes instantly
- Preserve in-cluster configuration and secrets
Simplified cloud resource access
Since Telepresence makes your laptop look like a cluster pod, you automatically inherit existing network permissions:- No extra VPNs or bastion hosts required
- Direct connectivity to cloud services (e.g., AWS RDS)
- Secure access using in-cluster service accounts
Summary of benefits

- Establishing a two-way proxy tunnel between laptop and cluster
- Enabling your machine to operate as if inside Kubernetes
- Intercepting traffic for live debugging of local services
- Preserving pod networking, environment variables, and volumes
- Providing seamless access to in-cluster and cloud resources