rbac-lookup
Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster (by FairwindsOps)
kubectl-dig
Deep kubernetes visibility from the kubectl (by sysdiglabs)
rbac-lookup | kubectl-dig | |
---|---|---|
3 | 1 | |
838 | 384 | |
1.2% | 0.8% | |
3.7 | 0.0 | |
9 days ago | 5 months ago | |
Go | Go | |
Apache License 2.0 | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
rbac-lookup
Posts with mentions or reviews of rbac-lookup.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-03-15.
-
Is there a way to see exactly what permissions the built-in group "system:readonly" has?
try using a tool such as rbac-lookup to find roles attached to a principal name https://github.com/FairwindsOps/rbac-lookup
-
Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing
RBAC Lookup is a CLI that allows you to easily find Kubernetes roles and cluster roles bound to any user, service account, or group name. It helps to provide visibility into Kubernetes auth.
-
Making Kubernetes Operations Easy with kubectl Plugins
rbac-lookup - Similar to the first plugin we mentioned, this plugin also helps with RBAC in your cluster. This can be used to perform reverse lookup of roles, giving you a list of roles that user, service account or group has assigned. For example, to find roles bound to service account named my-sa you use the following - kubectl rbac-lookup my-sa --kind serviceaccount --output wide.
kubectl-dig
Posts with mentions or reviews of kubectl-dig.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-10-01.
-
Making Kubernetes Operations Easy with kubectl Plugins
~ $ kubectl krew search dig # ... nothing relevant ~ $ git clone https://github.com/sysdiglabs/kubectl-dig.git && cd kubectl-dig ~ $ make build ~ $ cp _output/bin/kubectl-dig /home/martin/.krew/bin/kubectl-dig ~ $ kubectl dig Deep kubernetes visibility. Usage: dig dig [command] ...
What are some alternatives?
When comparing rbac-lookup and kubectl-dig you can also consider the following projects:
rbac-manager - A Kubernetes operator that simplifies the management of Role Bindings and Service Accounts.
k9s - 🐶 Kubernetes CLI To Manage Your Clusters In Style!
kubectl-kubesec - Security risk analysis for Kubernetes resources
kubepug - Kubernetes PreUpGrade (Checker)
rakkess - Review Access - kubectl plugin to show an access matrix for k8s server resources
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)
kubectl-tree - kubectl plugin to browse Kubernetes object hierarchies as a tree 🎄 (star the repo if you are using)
ksniff - Kubectl plugin to ease sniffing on kubernetes pods using tcpdump and wireshark
awesome-kubectl-plugins - Curated list of kubectl plugins
rbac-lookup vs rbac-manager
kubectl-dig vs k9s
rbac-lookup vs k9s
kubectl-dig vs kubectl-kubesec
rbac-lookup vs kubectl-kubesec
kubectl-dig vs kubepug
rbac-lookup vs rakkess
kubectl-dig vs rakkess
rbac-lookup vs kubelogin
kubectl-dig vs kubectl-tree
rbac-lookup vs ksniff
kubectl-dig vs awesome-kubectl-plugins