kubectl-dig
Deep kubernetes visibility from the kubectl (by sysdiglabs)
rbac-lookup
Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster (by FairwindsOps)
Our great sponsors
kubectl-dig | rbac-lookup | |
---|---|---|
1 | 3 | |
384 | 838 | |
1.8% | 2.6% | |
0.0 | 3.7 | |
4 months ago | 5 days ago | |
Go | Go | |
- | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubectl-dig
Posts with mentions or reviews of kubectl-dig.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-10-01.
-
Making Kubernetes Operations Easy with kubectl Plugins
~ $ kubectl krew search dig # ... nothing relevant ~ $ git clone https://github.com/sysdiglabs/kubectl-dig.git && cd kubectl-dig ~ $ make build ~ $ cp _output/bin/kubectl-dig /home/martin/.krew/bin/kubectl-dig ~ $ kubectl dig Deep kubernetes visibility. Usage: dig dig [command] ...
rbac-lookup
Posts with mentions or reviews of rbac-lookup.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-03-15.
-
Is there a way to see exactly what permissions the built-in group "system:readonly" has?
try using a tool such as rbac-lookup to find roles attached to a principal name https://github.com/FairwindsOps/rbac-lookup
-
Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing
RBAC Lookup is a CLI that allows you to easily find Kubernetes roles and cluster roles bound to any user, service account, or group name. It helps to provide visibility into Kubernetes auth.
-
Making Kubernetes Operations Easy with kubectl Plugins
rbac-lookup - Similar to the first plugin we mentioned, this plugin also helps with RBAC in your cluster. This can be used to perform reverse lookup of roles, giving you a list of roles that user, service account or group has assigned. For example, to find roles bound to service account named my-sa you use the following - kubectl rbac-lookup my-sa --kind serviceaccount --output wide.
What are some alternatives?
When comparing kubectl-dig and rbac-lookup you can also consider the following projects:
k9s - 🐶 Kubernetes CLI To Manage Your Clusters In Style!
rbac-manager - A Kubernetes operator that simplifies the management of Role Bindings and Service Accounts.
kubepug - Kubernetes PreUpGrade (Checker)
kubectl-kubesec - Security risk analysis for Kubernetes resources
kubectl-tree - kubectl plugin to browse Kubernetes object hierarchies as a tree 🎄 (star the repo if you are using)
rakkess - Review Access - kubectl plugin to show an access matrix for k8s server resources
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)
kubectl-neat - Clean up Kubernetes yaml and json output to make it readable
ksniff - Kubectl plugin to ease sniffing on kubernetes pods using tcpdump and wireshark