kubectl-dig
ksniff
Our great sponsors
kubectl-dig | ksniff | |
---|---|---|
1 | 9 | |
384 | 3,048 | |
1.8% | - | |
0.0 | 0.0 | |
4 months ago | 3 days ago | |
Go | Go | |
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubectl-dig
-
Making Kubernetes Operations Easy with kubectl Plugins
~ $ kubectl krew search dig # ... nothing relevant ~ $ git clone https://github.com/sysdiglabs/kubectl-dig.git && cd kubectl-dig ~ $ make build ~ $ cp _output/bin/kubectl-dig /home/martin/.krew/bin/kubectl-dig ~ $ kubectl dig Deep kubernetes visibility. Usage: dig dig [command] ...
ksniff
-
unknown field "capabilities" in io.k8s.api.core.v1.PodSecurityContext (running tshark in a container/k8s pod)
so probably the right way is to use some tool like that (ksniff) or setup a sidecar container. But I am still curious to why I get the above error.
-
Running tcpdump on eks worker nodes
I've used https://github.com/eldadru/ksniff with success. Recently on this sub Kubeshark was also mentioned.
-
Getting started with kubectl plugins
Link to GitHub Repository
-
Kubeshark PCAP Export
There also is https://github.com/eldadru/ksniff which starts wireshart GUI
-
Tool for debugging a node: process list, tcpdump, etc
I have used Ksniff as a kubectl plugin that act as a "Wireshark tool" for containers https://github.com/eldadru/ksniff
-
How can I see mTLS traffic in a K8s cluster that also uses Istio?
I've found ksniff useful for monitoring Kubernetes traffic with wireshark: https://github.com/eldadru/ksniff
-
Viewing / troubleshooting at the network level
KSniff https://github.com/eldadru/ksniff lets you do full packet capture.
-
Making Kubernetes Operations Easy with kubectl Plugins
ksniff - known as sniff is a tool for debugging and capturing networking data. It's able to attach to a pod and using tcpdump to forward networking data to your local Wireshark. This tool also works pretty well with tshark - the command-line version of Wireshark.
-
Pod-to-pod network delays in AKS
Install ksniff - https://github.com/eldadru/ksniff#installation
What are some alternatives?
k9s - 🐶 Kubernetes CLI To Manage Your Clusters In Style!
kubecolor - colorizes kubectl output
rbac-lookup - Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster
netshoot - a Docker + Kubernetes network trouble-shooting swiss-army container
kubepug - Kubernetes PreUpGrade (Checker)
kubectl-kubesec - Security risk analysis for Kubernetes resources
outdated - Kubectl plugin to find and report outdated images running in a Kubernetes cluster
kubectl-tree - kubectl plugin to browse Kubernetes object hierarchies as a tree 🎄 (star the repo if you are using)
kubectx - Faster way to switch between clusters and namespaces in kubectl
rakkess - Review Access - kubectl plugin to show an access matrix for k8s server resources
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)