ksniff
Kubectl plugin to ease sniffing on kubernetes pods using tcpdump and wireshark (by eldadru)
kubectl-neat
Clean up Kubernetes yaml and json output to make it readable (by itaysk)
Our great sponsors
ksniff | kubectl-neat | |
---|---|---|
9 | 10 | |
3,048 | 1,567 | |
- | - | |
0.0 | 1.8 | |
2 days ago | 4 months ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ksniff
Posts with mentions or reviews of ksniff.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-04-24.
-
unknown field "capabilities" in io.k8s.api.core.v1.PodSecurityContext (running tshark in a container/k8s pod)
so probably the right way is to use some tool like that (ksniff) or setup a sidecar container. But I am still curious to why I get the above error.
-
Running tcpdump on eks worker nodes
I've used https://github.com/eldadru/ksniff with success. Recently on this sub Kubeshark was also mentioned.
-
Getting started with kubectl plugins
Link to GitHub Repository
-
Kubeshark PCAP Export
There also is https://github.com/eldadru/ksniff which starts wireshart GUI
-
Tool for debugging a node: process list, tcpdump, etc
I have used Ksniff as a kubectl plugin that act as a "Wireshark tool" for containers https://github.com/eldadru/ksniff
-
How can I see mTLS traffic in a K8s cluster that also uses Istio?
I've found ksniff useful for monitoring Kubernetes traffic with wireshark: https://github.com/eldadru/ksniff
-
Viewing / troubleshooting at the network level
KSniff https://github.com/eldadru/ksniff lets you do full packet capture.
-
Making Kubernetes Operations Easy with kubectl Plugins
ksniff - known as sniff is a tool for debugging and capturing networking data. It's able to attach to a pod and using tcpdump to forward networking data to your local Wireshark. This tool also works pretty well with tshark - the command-line version of Wireshark.
-
Pod-to-pod network delays in AKS
Install ksniff - https://github.com/eldadru/ksniff#installation
kubectl-neat
Posts with mentions or reviews of kubectl-neat.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2024-01-06.
-
☸️ Kubernetes: A Pragmatic Kubectl Aliases Collection
It depends on kubectl-neat mentioned in pre-requisites.
-
Mounting volumes on pods
I if you are getting objects out in yaml i recomend you to use neat https://github.com/itaysk/kubectl-neat
-
Most Useful kubectl Plugins
Install [neat]((https://github.com/itaysk/kubectl-neat) plugin with krew :
- Operators are so much easier to click-install -- how do I get them back out as manifests?
-
All about Komodor :- A Kubernetes Troubleshooting Platform and more
Clean Now let’s talk about how you can use the "Clean" feature of ValidKube to clean and enhance your YAML files with an instant click. It's repository kubectl-neat is https://github.com/itaysk/kubectl-neat It works as shown in image below :-
-
[open-source] Validkube - Validate, Clean and Secure your K8s YAML
The idea behind Validkube is to fuse together the capabilities of three other popular open-source projects (kubeval, kubectl-neat & trivy) and present them in a single view, providing users with a way to ensure YAML code hygiene and security, in one place, with just a few clicks of the button.
- DevOps Environment on MacOS
-
Making Kubernetes Operations Easy with kubectl Plugins
neat - possibly my favourite of all the plugins is neat which removes all the generated, redundant fields from YAML output of Kubernetes resources. If you're tired of scrolling through all the managedFields and other garbage, then definitely give this one a try.
-
YAML output format question
There is a product that does this called kubectl-neat: https://github.com/itaysk/kubectl-neat
-
Store your Kubernetes Secrets in Git thanks to Kubeseal. Hello SealedSecret!
kubectl-neat (via Krew)
What are some alternatives?
When comparing ksniff and kubectl-neat you can also consider the following projects:
kubecolor - colorizes kubectl output
ketall - Like `kubectl get all`, but get really all resources
netshoot - a Docker + Kubernetes network trouble-shooting swiss-army container
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)
kubepug - Kubernetes PreUpGrade (Checker)
kubectx - Faster way to switch between clusters and namespaces in kubectl
outdated - Kubectl plugin to find and report outdated images running in a Kubernetes cluster
HomeBrew - 🍺 The missing package manager for macOS (or Linux)
powerline-go - A beautiful and useful low-latency prompt for your shell, written in go
krew - 📦 Find and install kubectl plugins