kubeshark

The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Inspired by Wireshark, purposely built for Kubernetes

APACHE-2.0 License

Stars
10.9K
Committers
47

Bot releases are hidden (Show)

kubeshark - v52.3.72

Published by alongir 3 months ago

v52.3.72 (2024-07-27)

Release Highlights

Keywords:

New Features & Bug Fixes

  • Add an ability to stop Kubeshark from processing new traffic (making it dormant consuming close to zero resources), and restart processing traffic on-demand
  • Add an ability to determine the default start/stop behavior in the helm as a helm value (https://github.com/kubeshark/kubeshark/pull/1557).
  • Added an ability to determine start/stop behavior dynamically from the UI
  • Removed the replay functionality
  • Added more granularity in determining duplicate traffic (https://github.com/kubeshark/kubeshark/pull/1561)
  • Added online support option using Intercom
  • Added an option to disable online support (https://github.com/kubeshark/kubeshark/pull/1573)
  • Added capability to export custom metrics to Prometheus in scripting.
  • Improved performance of AF_PACKET based packet capture
kubeshark - v52.0.0

Published by alongir 10 months ago

v52.0.0 (2023-12-22)

Release Highlights

Keywords: Traffic Recorder, Half-Connection, API

This release introduces a new traffic recorder feature, enhanced analysis of half-connections, and more.

Additional Enhancements and Changes

  • Traffic Recorder: A powerful tool for capturing and analyzing network traffic.
  • Half-Connection Viewing: Enhanced ability to view half-connections in supported protocols.
  • New API Endpoints: Addition of Hub and Worker API endpoints, enabling data consumption via a WebSocket without the need for scripts or dashboard access.
  • EFS Persistent Volume Support: Improved storage options with EFS persistent volume support. See Pull Request #1455 for details.
  • Security Context Capabilities: Assign security context capabilities based on the features in use, reducing the need for elevated capabilities when they are not necessary.