kubeshark
ksniff
kubeshark | ksniff | |
---|---|---|
16 | 9 | |
10,562 | 3,048 | |
0.9% | - | |
9.4 | 0.0 | |
7 days ago | 7 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kubeshark
-
Show HN: Alaz: Open-Source, Self-Hosted, eBPF-Based K8s Monitoring
The one similar product I had come across is Kubeshark (https://github.com/kubeshark/kubeshark). But admittedly the eBPF way seems more performant theoretically (given you can afford to have a modern-enough kernel). I'm really excited to see how this project develops out.
The eBPF-mode of innovation is pretty exciting, truly a fresh lens to building software. I'm also following Akita Software - the company building an eBPF paradigm of monitoring.
-
Top open source security devtools you need to know about
GitHub: https://github.com/kubeshark/kubeshark Website: https://kubeshark.co/
-
Can't make kubeshark work
Can you send us the logs using: `kubeshark logs` (you can also use the issues page or slack)
-
Diagnosing high Cloud NAT usage for a CI cluster
Yes there are, but Cloud NAT alone won't be able to help you with that. You can either use a standalone proxy or a 3rd party firewall appliance through which you can route your traffic, or use more modern approaches with tools such as Kubeshark or Cillium.
-
Monitoring service network traffic
https://github.com/kubeshark/kubeshark - somewhat like Wireshark for Kubernetes. LMK if you have any questions
-
Tips on enumerating unknown APIs in my environment?
For example, this open-source project gives instant visibility into API traffic in kubernetes environments: https://github.com/kubeshark/kubeshark
-
Kubeshark PCAP Export
Check out the GitHub repository: https://github.com/kubeshark/kubeshark
- Kubeshark: The API Traffic Viewer for Kubernetes
ksniff
-
unknown field "capabilities" in io.k8s.api.core.v1.PodSecurityContext (running tshark in a container/k8s pod)
so probably the right way is to use some tool like that (ksniff) or setup a sidecar container. But I am still curious to why I get the above error.
-
Running tcpdump on eks worker nodes
I've used https://github.com/eldadru/ksniff with success. Recently on this sub Kubeshark was also mentioned.
-
Getting started with kubectl plugins
Link to GitHub Repository
-
Kubeshark PCAP Export
There also is https://github.com/eldadru/ksniff which starts wireshart GUI
-
Tool for debugging a node: process list, tcpdump, etc
I have used Ksniff as a kubectl plugin that act as a "Wireshark tool" for containers https://github.com/eldadru/ksniff
-
How can I see mTLS traffic in a K8s cluster that also uses Istio?
I've found ksniff useful for monitoring Kubernetes traffic with wireshark: https://github.com/eldadru/ksniff
-
Viewing / troubleshooting at the network level
KSniff https://github.com/eldadru/ksniff lets you do full packet capture.
-
Making Kubernetes Operations Easy with kubectl Plugins
ksniff - known as sniff is a tool for debugging and capturing networking data. It's able to attach to a pod and using tcpdump to forward networking data to your local Wireshark. This tool also works pretty well with tshark - the command-line version of Wireshark.
-
Pod-to-pod network delays in AKS
Install ksniff - https://github.com/eldadru/ksniff#installation
What are some alternatives?
kui - A hybrid command-line/UI development experience for cloud-native development
kubecolor - colorizes kubectl output
cli - Snyk CLI scans and monitors your projects for security vulnerabilities.
netshoot - a Docker + Kubernetes network trouble-shooting swiss-army container
kwok - Kubernetes WithOut Kubelet - Simulates thousands of Nodes and Clusters.
kubepug - Kubernetes PreUpGrade (Checker)
fake-k8s - [Moved to https://github.com/kubernetes-sigs/kwok] fake-k8s is a tool for running Fake Kubernetes clusters, It can be used as an alternative to Kind in some scenarios where you donโt need to actually run the Pod
outdated - Kubectl plugin to find and report outdated images running in a Kubernetes cluster
alaz - Alaz: Advanced eBPF Agent for Kubernetes Observability โ Effortlessly monitor K8s service interactions and performance metrics in your K8s environment. Gain in-depth insights with service maps, metrics, distributed tracing, and more, while staying alert to crucial system anomalies ๐
kubectx - Faster way to switch between clusters and namespaces in kubectl
Packer - Packer is a tool for creating identical machine images for multiple platforms from a single source configuration.
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)