diff --git a/assets/images/kubernetes_agent.png b/assets/images/kubernetes_agent.png
new file mode 100644
index 0000000..1783762
Binary files /dev/null and b/assets/images/kubernetes_agent.png differ
diff --git a/docs/deploy-kubernetes.md b/docs/deploy-kubernetes.md
new file mode 100644
index 0000000..8ebfa18
--- /dev/null
+++ b/docs/deploy-kubernetes.md
@@ -0,0 +1,39 @@
+# Installing Monasca via Helm
+
+We have a Helm chart for Monasca and all of its microservices. This can be found at [Monasca Helm][1]. The charts are
+hosted via github pages on [monasca.io][2]
+
+# Quick Start
+
+To install Monasca on a running Kubernetes cluster follow the following steps:
+{% highlight bash %}
+helm repo add monasca http://monasca.io/monasca-helm-repo
+helm install monasca/monasca --name monasca --namespace monitoring
+{% endhighlight %}
+
+More detailed configuration for installing Monasca can be found in the charts' [README][3]
+
+## Default Grafana graphs
+
+Grafana is deployed when bringing up Monasca and by default is configured with the Monasca datasource. Default
+dashboards are also created for Deployments, Namespaces, Pod, Daemonset and Nodes.
+
+Grafana can be accessed by port-forwarding the grafana service to localhost.
+
+Setting up grafana port-forward:
+```bash
+$ kubectl get pods -n monitoring -l component=grafana
+$ kubectl port-forward {{ grafana_pod_name_from_output_above }} -n monitoring 3000
+```
+
+After the above is set up you can visit [grafana][4] with the default credentials mini-mon/password.
+
+## Future Work
+* Expand on Default graphs that are being created
+* Include default Kubernetes alarms on deploy
+* Intergrate Helm work into official charts
+
+[1]: https://github.com/monasca/monasca-helm
+[2]: http://monasca.io/monasca-helm-repo/
+[3]: https://github.com/monasca/monasca-helm/blob/master/monasca/README.md
+[4]: http://localhost:3000
diff --git a/docs/kubernetes.md b/docs/kubernetes.md
new file mode 100644
index 0000000..57653e0
--- /dev/null
+++ b/docs/kubernetes.md
@@ -0,0 +1,82 @@
+# Kubernetes
+
+Monasca can be deployed into Kubernetes to monitor containers, services and Kubernetes itself.
+
+## Monitoring Kubernetes
+
+A deamonset/deployment of the [monasca-agent][1] will be brought up when deploying Monasca into Kubernetes. The
+daemonset will monitor pod/node workloads and the deployment will monitor Kubernetes status/health. They both do
+autodetection on Prometheus endpoints to scrape metrics from and send into the Monasca pipeline.
+
+
+
+### Daemonset Monasca Agent
+
+The Daemonset monasca-agent runs on every node in the cluster and collects metrics on pod/node workloads and autodetects
+prometheus endpoints on pods.
+
+#### Pod Usage Monitoring
+
+Pod monitoring is accomplished by first querying Kubelet on each node to grab all running pods and their associated
+metadata and then querying cAdvisor for container usage (memory, cpu, network, etc.). The agent then correlates the
+container data from cAdvisor to the running pods to report usage metrics on each pod (container data is aggregated up
+to the pod level).
+
+The agent can be configured to report container metrics on top of the pod metrics if desired.
+
+More information on the metrics we are collecting for pods can be seen in the plugin's [documentation][2]
+
+#### Node Usage Monitoring
+
+Node monitoring is accomplish by querying cAdvisor for the nodes usage metrics. The complete metric list can be found in
+the plugin's [documentation][3]
+
+#### Prometheus Endpoint Monitoring on Pods
+
+The monasca agent on each node will autodetect Prometheus endpoints to scrape metrics from by querying the Kubelet for
+each running pod and looking at their annotations.
+
+These annotations being:
+
+* prometheus.io/scrape: Only scrape pods that have a value of 'true'
+* prometheus.io/path: If the metrics path is not '/metrics' override this.
+* prometheus.io/port: Scrape the pod on the indicated port instead of the default of '9102'.
+
+If the pod contains the scrape annotation the agent will attempt to scrape metrics from it and send through Monasca.
+
+### Deployment Monasca Agent
+
+The Deployment monasca-agent collects metrics on the Kubernetes cluster and autodetects prometheus endpoints on
+services.
+
+#### Kubernetes Cluster Monitoring
+
+The monasca agent queries the Kubernetes API for metrics such as component health, replica counts
+(on deployments/replicaton controllers), host status flags.
+
+The full list of the metrics being collected can be seen in the plugin's [documentation][4]
+
+#### Prometheus Endpoint Monitoring on Services
+
+The monasca agent queries the Kubernetes API for services and then looks at the annotations correlated with each
+service to determine to scrape or not.
+
+These annotations being:
+
+* prometheus.io/scrape: Only scrape services that have a value of 'true'
+* prometheus.io/path: If the metrics path is not '/metrics' override this.
+* prometheus.io/port: Scrape the service on the indicated port instead of the default of '9102'.
+
+If the service contains the scrape annotation the agent will attempt to scrape metrics from it to send through Monasca.
+
+## Future Work
+* Iterate on the Prometheus autodetection to match what Prometheus Server does for autodetection
+* Intergrate Monasca in Kubernetes Custom Metric API
+* Look into integrating Kubernetes RBAC into Monasca.
+
+[1]: https://github.com/openstack/monasca-agent
+[2]: https://github.com/openstack/monasca-agent/blob/master/docs/Plugins.md#kubernetes
+[3]: https://github.com/openstack/monasca-agent/blob/master/docs/Plugins.md#cadvisor_host
+[4]: https://github.com/openstack/monasca-agent/blob/master/docs/Plugins.md#kubernetes_api
diff --git a/index.html b/index.html
index d78e468..07f1567 100644
--- a/index.html
+++ b/index.html
@@ -63,13 +63,13 @@
In posuere eleifend odio. Quisque semper augue mattis wisi. Maecenas ligula. Pellentesque viverra vulputate enim. Aliquam erat volutpat. Donec leo, vivamus fermentum nibh in augue praesent a lacus at urna congue rutrum.