rakkess
ksniff
rakkess | ksniff | |
---|---|---|
3 | 9 | |
1,257 | 3,063 | |
- | - | |
0.0 | 0.0 | |
about 1 year ago | 19 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
rakkess
-
Getting started with kubectl plugins
Link to GitHub Repository
-
Most Useful kubectl Plugins
Install access-matrix plugin with krew :
-
Making Kubernetes Operations Easy with kubectl Plugins
rakkess - known as access-matrix in krew is plugin for showing and reviewing access to kubernetes resources. This can be very useful when designing RBAC roles - you can for example run kubectl access-matrix --as other-user --namespace some-ns to verify that user or service account has desired access rights in specified namespace.
ksniff
-
unknown field "capabilities" in io.k8s.api.core.v1.PodSecurityContext (running tshark in a container/k8s pod)
so probably the right way is to use some tool like that (ksniff) or setup a sidecar container. But I am still curious to why I get the above error.
-
Running tcpdump on eks worker nodes
I've used https://github.com/eldadru/ksniff with success. Recently on this sub Kubeshark was also mentioned.
-
Getting started with kubectl plugins
Link to GitHub Repository
-
Kubeshark PCAP Export
There also is https://github.com/eldadru/ksniff which starts wireshart GUI
-
Tool for debugging a node: process list, tcpdump, etc
I have used Ksniff as a kubectl plugin that act as a "Wireshark tool" for containers https://github.com/eldadru/ksniff
-
How can I see mTLS traffic in a K8s cluster that also uses Istio?
I've found ksniff useful for monitoring Kubernetes traffic with wireshark: https://github.com/eldadru/ksniff
-
Viewing / troubleshooting at the network level
KSniff https://github.com/eldadru/ksniff lets you do full packet capture.
-
Making Kubernetes Operations Easy with kubectl Plugins
ksniff - known as sniff is a tool for debugging and capturing networking data. It's able to attach to a pod and using tcpdump to forward networking data to your local Wireshark. This tool also works pretty well with tshark - the command-line version of Wireshark.
-
Pod-to-pod network delays in AKS
Install ksniff - https://github.com/eldadru/ksniff#installation
What are some alternatives?
kubectl-kubesec - Security risk analysis for Kubernetes resources
kubecolor - colorizes kubectl output
kubectl-neat - Clean up Kubernetes yaml and json output to make it readable
netshoot - a Docker + Kubernetes network trouble-shooting swiss-army container
kubectl-explore - A better kubectl explain with the fuzzy finder
kubepug - Kubernetes PreUpGrade (Checker)
rbac-lookup - Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster
outdated - Kubectl plugin to find and report outdated images running in a Kubernetes cluster
ketall - Like `kubectl get all`, but get really all resources
kubectx - Faster way to switch between clusters and namespaces in kubectl
kube-capacity - A simple CLI that provides an overview of the resource requests, limits, and utilization in a Kubernetes cluster
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)