rbac-lookup
ksniff
rbac-lookup | ksniff | |
---|---|---|
1 | 9 | |
542 | 3,063 | |
- | - | |
6.2 | 0.0 | |
over 2 years ago | 18 days ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
rbac-lookup
-
Making Kubernetes Operations Easy with kubectl Plugins
~ $ kubectl krew search NAME DESCRIPTION INSTALLED access-matrix Show an RBAC access matrix for server resources no advise-psp Suggests PodSecurityPolicies for cluster. no allctx Run commands on contexts in your kubeconfig no apparmor-manager Manage AppArmor profiles for cluster. no ... ~ $ kubectl krew search rbac-lookup NAME DESCRIPTION INSTALLED rbac-lookup Reverse lookup for RBAC no ~ $ kubectl krew info rbac-lookup NAME: rbac-lookup INDEX: default URI: https://github.com/reactiveops/rbac-lookup/releases/download/v0.6.4/rbac-lookup_0.6.4_Linux_x86_64.tar.gz SHA256: 9f6f63b2ee6f5420530b6aa589b4c8c4a4685bf87447286881d37afdd80a7fb2 VERSION: v0.6.4 HOMEPAGE: https://github.com/reactiveops/rbac-lookup DESCRIPTION: Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster.
ksniff
-
unknown field "capabilities" in io.k8s.api.core.v1.PodSecurityContext (running tshark in a container/k8s pod)
so probably the right way is to use some tool like that (ksniff) or setup a sidecar container. But I am still curious to why I get the above error.
-
Running tcpdump on eks worker nodes
I've used https://github.com/eldadru/ksniff with success. Recently on this sub Kubeshark was also mentioned.
-
Getting started with kubectl plugins
Link to GitHub Repository
-
Kubeshark PCAP Export
There also is https://github.com/eldadru/ksniff which starts wireshart GUI
-
Tool for debugging a node: process list, tcpdump, etc
I have used Ksniff as a kubectl plugin that act as a "Wireshark tool" for containers https://github.com/eldadru/ksniff
-
How can I see mTLS traffic in a K8s cluster that also uses Istio?
I've found ksniff useful for monitoring Kubernetes traffic with wireshark: https://github.com/eldadru/ksniff
-
Viewing / troubleshooting at the network level
KSniff https://github.com/eldadru/ksniff lets you do full packet capture.
-
Making Kubernetes Operations Easy with kubectl Plugins
ksniff - known as sniff is a tool for debugging and capturing networking data. It's able to attach to a pod and using tcpdump to forward networking data to your local Wireshark. This tool also works pretty well with tshark - the command-line version of Wireshark.
-
Pod-to-pod network delays in AKS
Install ksniff - https://github.com/eldadru/ksniff#installation
What are some alternatives?
kubectl-tree - kubectl plugin to browse Kubernetes object hierarchies as a tree 🎄 (star the repo if you are using)
kubecolor - colorizes kubectl output
k9s - 🐶 Kubernetes CLI To Manage Your Clusters In Style!
netshoot - a Docker + Kubernetes network trouble-shooting swiss-army container
kube-capacity - A simple CLI that provides an overview of the resource requests, limits, and utilization in a Kubernetes cluster
kubepug - Kubernetes PreUpGrade (Checker)
kubectl-neat - Clean up Kubernetes yaml and json output to make it readable
outdated - Kubectl plugin to find and report outdated images running in a Kubernetes cluster
kubelogin - kubectl plugin for Kubernetes OpenID Connect authentication (kubectl oidc-login)
kubectx - Faster way to switch between clusters and namespaces in kubectl
rbac-lookup - Easily find roles and cluster roles attached to any user, service account, or group name in your Kubernetes cluster