kubeshark v40.5 releases: API traffic analyzer for Kubernetes
Kubeshark is an API Traffic Analyzer for Kubernetes providing real-time, protocol-level visibility into Kubernetes’ internal network, capturing and monitoring all traffic and payloads going in, out, and across containers, pods, nodes, and clusters.
Think TCPDump and Wireshark re-invented for Kubernetes
Kubeshark can sniff parts or all OSI L4 (TCP and UDP) traffic in your cluster, record it into PCAP files and dissect the following application layer protocols:
Kubeshark recognizes gRPC over HTTP/2, GraphQL over HTTP/1.1, and GraphQL over HTTP/2.
Kubeshark uses extended BPF (eBPF) to trace function calls in both the kernel space and the user space.
Kubeshark can sniff the encrypted traffic (TLS) in your cluster using eBPF without actually doing decryption. In fact, it hooks into entry and exit points in certain functions inside the OpenSSL library and Go’s crypto/tls package.
Kubeshark can recognize service mesh solutions like Istio, Linkerd, and other service mesh solutions that use Envoy Proxy under the hood.
Actionable Automation, Scripts & L4/L7 Hooks
With a combination of a scripting language, hooks, helpers, and jobs, Kubeshark can detect suspicious network behaviors and trigger actions supported by the available integrations (e.g. Slack, AWS S3, InfluxDB, Elasticsearch, and more).
- All namespaces are now tapped by default and there’s no need to use the
-nflag can be used to specify a certain namespaces.
- Starting to use node-level persistent volumes to ensure no data loss. As a result of this change, certain changes follow:
- Added a
PersistentVolumeClaimthat the worker DaemonSet mounts.
- Changed the
storagelimitoption’s format from
200Mifor complying with Kubernetes’ internal quantity parser.
storageclassoption to set the
PersistentVolumeClaim. Default value is
- The above is a breaking change: You need to run
kubeshark config -rto regenerate the
~/.kubeshark/config.yamlincase of an existing configuration file.
Install & Use
Copyright 2022 Kubeshark