Analysing network traffic with tcpdump sidecars in OpenShift and Kubernetes
Analysing network traffic between containers in a container platform like OpenShift and Kubernetes can be a challenge. This video shows an approach that uses sidecar containers to capture a POD's network traffic with 'tcpdump'. The PCAP file that 'tcpdump' creates is analysed with Wireshark.
This is the sidecar configuration I use in this video:
- name: tcpdump
image: corfr/tcpdump
command:
- /bin/sleep
- infinity
The command to display all the containers in an OpenShift namespace: oc get pods -o=custom-columns=NameSpace:.metadata.namespace,NAME:.metadata.name,CONTAINERS:.spec.containers[*].name
The command used to login to the 'tcpdump' container in the POD: oc rsh -c tcpdump rhpam7-mortgage-kieserver-2-rs4tm
The 'tcpdump' command to capture the traffic: tcpdump -s 0 -n -w /tmp/kieserver.pcap
The command to retrieve the PCAP file from the container: oc cp -c tcpdump rhpam7-mortgage-kieserver-2-rs4tm:tmp/kieserver.pcap kieserver.pcap
Видео Analysing network traffic with tcpdump sidecars in OpenShift and Kubernetes автора PythonКоординаты для новичков
Видео Analysing network traffic with tcpdump sidecars in OpenShift and Kubernetes автора PythonКоординаты для новичков
Информация
4 декабря 2023 г. 3:40:24
00:08:01
Похожие видео