kubectl-kubesec
ksniff
Our great sponsors
kubectl-kubesec | ksniff | |
---|---|---|
2 | 9 | |
500 | 3,048 | |
1.0% | - | |
5.9 | 0.0 | |
4 months ago | 3 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubectl-kubesec
-
Looking for the simplest way to store secrets
It depends what level of security you need. As far as simple goes: https://kubesec.io/
-
Making Kubernetes Operations Easy with kubectl Plugins
kubesec - known as kubesec-scan in krew is plugin for scanning resources with https://kubesec.io/ scanner. When you run this plugin against your manifests, it will tell you recommended changes to improve security of your workloads. To view all rules that the scanner uses visit the above website.
ksniff
-
unknown field "capabilities" in io.k8s.api.core.v1.PodSecurityContext (running tshark in a container/k8s pod)
so probably the right way is to use some tool like that (ksniff) or setup a sidecar container. But I am still curious to why I get the above error.
-
Running tcpdump on eks worker nodes
I've used https://github.com/eldadru/ksniff with success. Recently on this sub Kubeshark was also mentioned.
-
Getting started with kubectl plugins
Link to GitHub Repository
-
Kubeshark PCAP Export
There also is https://github.com/eldadru/ksniff which starts wireshart GUI
-
Tool for debugging a node: process list, tcpdump, etc
I have used Ksniff as a kubectl plugin that act as a "Wireshark tool" for containers https://github.com/eldadru/ksniff
-
How can I see mTLS traffic in a K8s cluster that also uses Istio?
I've found ksniff useful for monitoring Kubernetes traffic with wireshark: https://github.com/eldadru/ksniff
-
Viewing / troubleshooting at the network level
KSniff https://github.com/eldadru/ksniff lets you do full packet capture.
-
Making Kubernetes Operations Easy with kubectl Plugins
ksniff - known as sniff is a tool for debugging and capturing networking data. It's able to attach to a pod and using tcpdump to forward networking data to your local Wireshark. This tool also works pretty well with tshark - the command-line version of Wireshark.
-
Pod-to-pod network delays in AKS
Install ksniff - https://github.com/eldadru/ksniff#installation
What are some alternatives?
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)
kubecolor - colorizes kubectl output
kubectl-neat - Clean up Kubernetes yaml and json output to make it readable
netshoot - a Docker + Kubernetes network trouble-shooting swiss-army container
kube-capacity - A simple CLI that provides an overview of the resource requests, limits, and utilization in a Kubernetes cluster
kubepug - Kubernetes PreUpGrade (Checker)
rbac-lookup - Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster
outdated - Kubectl plugin to find and report outdated images running in a Kubernetes cluster
rakkess - Review Access - kubectl plugin to show an access matrix for k8s server resources
kubectx - Faster way to switch between clusters and namespaces in kubectl
k9s - 🐶 Kubernetes CLI To Manage Your Clusters In Style!