Tiny tool to help capture network traces in the pods running in k8s cluster
The tool is to use the 'tcpdump' to capture the network trace of the pod The access to create privileged pod The access…
- Input the “name” of the pod and “namespace” of the pod to the “xxx.json”. Example is “example/test.json”
- Run “./k8sTcpdump -p xxx.json” and it will bring up pods on the corresponding nodes to capture the network traces of the target pods. The ‘.cap’ file will be downloaded to the current folder.
You could refer to the GIF https://github.com/Shuanglu/k8sTcpdump/blob/main/doc/k8sTcpdump.gif as well