The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Top 23 Kubectl Open-Source Projects
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
vcluster
vCluster - Create fully functional virtual Kubernetes clusters - Each vcluster runs inside a namespace of the underlying k8s cluster. It's cheaper than creating separate full-blown clusters and it offers better multi-tenancy and isolation than regular namespaces.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
kubectl-tree
kubectl plugin to browse Kubernetes object hierarchies as a tree 🎄 (star the repo if you are using)
-
kubectl-debug
This repository is no longer maintained, please checkout https://github.com/JamesTGrant/kubectl-debug.
-
Fast-Kubernetes
This repo covers Kubernetes with LABs: Kubectl, Pod, Deployment, Service, PV, PVC, Rollout, Multicontainer, Daemonset, Taint-Toleration, Job, Ingress, Kubeadm, Helm, etc.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
kubectx: brew install kubectx
Authenticating with Kyma is a (in my opinion) unnecessary challenge as it leverages the OIDC-login plugin for kubectl. You find a description of the setup here. This works fine when on a Mac but can give you some headaches on a Windows and on Linux machine especially when combined with restrictive setups in corporate environments. For Windows I can only recommend installing krew via chocolatey and then install the OIDC plugin via kubectl krew install oidc-login. At least for me that was the only way to get this working on Windows.
Project mention: Amazon EC2 Enhances Defense in Depth with Default IMDSv2 | news.ycombinator.com | 2023-11-27Kubernetes? You mean the container orchestration system where they forgot to add Multi-tenancy? And no namespaces are not Multi-tenancy...
https://www.vcluster.com/
Project mention: Devtron - End-to-End Software Delivery for Kubernetes Applications | /r/kubernetes | 2023-10-05
I meant bash/zsh PS1 prompt. Not PowerShell :) Check this out https://github.com/jonmosco/kube-ps1
# autocomplete kubectl & helm source <(kubectl completion zsh) source <(helm completion zsh) alias k=kubectl # when using below aliases, print kubectl command and then execute it function kctl() { echo "+ kubectl $@" && command kubectl $@ } # add aliases collection like 'kgpo' for 'kubectl get pods` from https://github.com/ahmetb/kubectl-aliases [ ! -f ~/.kube/aliases.sh ] && curl -fsSL "https://raw.githubusercontent.com/ahmetb/kubectl-aliases/master/.kubectl_aliases" > ~/.kube/aliases.sh && sed -i -e 's/kubectl/kctl/g' ~/.kube/aliases.sh source ~/.kube/aliases.sh # set default namespace alias kn='kctl config set-context --current --namespace' # get events sorted by last timestamp alias kgel='kctl get events --sort-by=.lastTimestamp' # get events sorted by creation timestamp alias kgec='kctl get events --sort-by=.metadata.creationTimestamp' # get pod's descending events function kger() { kctl get events --sort-by=.lastTimestamp --field-selector involvedObject.name="$@" } # get 'real' all alias kgworld='kctl get $(kubectl api-resources --verbs=list --namespaced -o name | paste -sd ",")' # display all nodes resources request and limits alias kgnr="k get nodes --no-headers | awk '{print \$1}' | xargs -I {} sh -c 'echo {} ; kubectl describe node {} | grep Allocated -A 5 | grep -ve Event -ve Allocated -ve percent -ve -- ; echo '" # start a debug pod (including lots of troubleshooting tools) alias kdebug="kctl -n default run debug-$USER --rm -it --tty --image leodotcloud/swiss-army-knife:v0.12 --image-pull-policy=IfNotPresent -- bash" # get pod's containers list function kgpc() { kctl get pod -o jsonpath="{.spec.containers[*].name}" "$@" && echo "" } # ping a service, ex: 'kping whoami:8080' alias kping='kctl run httping -it --image bretfisher/httping --image-pull-policy=IfNotPresent --rm=true --' # get existing pod's yaml without forbidden fields, ex: 'kyaml pod whoami' function kyaml() { kubectl get "$@" -o yaml | kubectl-neat } # display and delete failed pods in current namespace alias krmfailed='kctl delete pods --field-selector=status.phase=Failed'
Project mention: unknown field "capabilities" in io.k8s.api.core.v1.PodSecurityContext (running tshark in a container/k8s pod) | /r/codehunter | 2023-05-06so probably the right way is to use some tool like that (ksniff) or setup a sidecar container. But I am still curious to why I get the above error.
Thanks buddy. I have seen a tool recently by robusta but not sure if helpful or not. Haven't tried it yet. https://github.com/robusta-dev/krr
KubeDoom is The next level of chaos engineering! Kill pods inside your Kubernetes cluster by shooting them in Doom! - KubeDoom
Project mention: Fast-Terraform: Terraform Tutorial, How-To: Hands-on LABs, and AWS Hands-on Sample Usage Scenarios (Infrastructure As Code) | /r/hashicorp | 2023-05-03
Authenticating with Kyma is a (in my opinion) unnecessary challenge as it leverages the OIDC-login plugin for kubectl. You find a description of the setup here. This works fine when on a Mac but can give you some headaches on a Windows and on Linux machine especially when combined with restrictive setups in corporate environments. For Windows I can only recommend installing krew via chocolatey and then install the OIDC plugin via kubectl krew install oidc-login. At least for me that was the only way to get this working on Windows.
Big fan of Talos, have used it in some homelab + cloud clusters over the years, currently powers all my self-hosting. The `talosctl` command is great, and any time you need to do node-level debugging, there's always something like node-shell [1].
[1] https://github.com/kvaps/kubectl-node-shell
You can check https://github.com/sozercan/kubectl-ai it generates manifests
Kubectl related posts
- Giving Kyma a little spin ... a SpinKube
- Mirantis K8s Lens closed its source
- There are only 12 binaries in Talos Linux
- Building a Kubernetes Operator with the Operator Framework
- ☸️ Kubernetes: A Pragmatic Kubectl Aliases Collection
- Kubernetes Üzerinde Hyperledger Fabric Ağının Kurulumu
- Krew: Package Manager for Kubectl Plugins
-
A note from our sponsor - WorkOS
workos.com | 27 Apr 2024
Index
What are some of the best open-source Kubectl projects? This list will help you:
Project | Stars | |
---|---|---|
1 | kubectx | 16,894 |
2 | krew | 6,122 |
3 | vcluster | 5,577 |
4 | devtron | 3,848 |
5 | kube-ps1 | 3,408 |
6 | kubectl-aliases | 3,256 |
7 | ksniff | 3,048 |
8 | kubectl-tree | 2,819 |
9 | kui | 2,744 |
10 | kube-shell | 2,369 |
11 | kubectl-debug | 2,285 |
12 | krr | 2,192 |
13 | kubectl-trace | 1,974 |
14 | kubedoom | 1,950 |
15 | kube-prompt | 1,769 |
16 | kubie | 1,766 |
17 | Fast-Kubernetes | 1,688 |
18 | kpt | 1,632 |
19 | kubelogin | 1,522 |
20 | kubectl-node-shell | 1,302 |
21 | rakkess | 1,257 |
22 | kubectl-ai | 981 |
23 | geodesic | 914 |
Sponsored