Monitor and debug Kubernetes network traffic in real-time with this open source ...
GitHub RepoImpressions1.3k

Monitor and debug Kubernetes network traffic in real-time with this open source ...

@githubprojectsPost Author

Project Description

View on GitHub

See Inside Your Kubernetes Cluster with Kubeshark

Debugging network issues in Kubernetes can feel like detective work without a magnifying glass. You know something's off—a service is slow, a connection is dropping, or a request is failing—but tracing the exact flow of traffic between pods is a murky, frustrating process. What if you could just see it all, in real time?

Enter Kubeshark. It’s an open-source tool that acts like Wireshark for your Kubernetes cluster, giving you a live, unfiltered view of all internal network traffic. No more guesswork, no more piecing together logs from five different services. You just get a clear, real-time map of what's talking to what.

What It Does

Kubeshark deploys as a DaemonSet on your cluster, meaning it runs a small agent on each node. These agents capture network traffic—specifically, the API-level protocols like HTTP, HTTPS, AMQP, Kafka, and Redis—right at the source. It then aggregates this data and presents it in a clean, web-based UI. You can watch live requests and responses, filter by namespace, pod, or protocol, and even inspect the body of messages.

Think of it as giving your cluster a transparent shell. Instead of seeing just the external ingress and egress, you see every internal conversation between your microservices.

Why It's Cool

The magic of Kubeshark is in its simplicity and depth. You don't need to instrument your code or change your deployments. Once it's installed, it just starts working, capturing traffic without being intrusive. The UI is surprisingly intuitive for a debugging tool; you can click on any request to see the full headers and body, search for specific transactions, and watch traffic flow in real time.

It’s particularly powerful for:

  • Debugging API issues: See exactly what one service is sending to another and how it's responding.
  • Performance analysis: Identify slow or failing requests between specific pods.
  • Security reviews: Observe internal traffic patterns to spot anomalies.
  • Learning/Onboarding: New to the cluster? Kubeshark provides an instant, visual understanding of how services interconnect.

It turns a traditionally complex, packet-level task into something any developer can use in minutes.

How to Try It

Getting started is straightforward. The quickest way is to use the Helm chart. If you have Helm and kubectl configured for your cluster, you can be up and running in a few commands:

# Add the Kubeshark Helm repository
helm repo add kubeshark https://kubeshark.github.io/helm-charts
helm repo update

# Install Kubeshark in its own namespace
helm install kubeshark kubeshark/kubeshark --namespace kubeshark --create-namespace

Once the pods are running, port-forward to the service to open the dashboard in your browser:

kubectl port-forward -n kubeshark service/kubeshark 8899:80

Then, head to http://localhost:8899. You should see traffic starting to populate the dashboard. For more detailed installation options, including CLI installation and configuration, check out the Kubeshark GitHub repository.

Final Thoughts

Kubeshark is one of those tools that feels like it should have been part of the Kubernetes ecosystem from the start. It fills a glaring visibility gap without adding operational overhead. While it’s not a replacement for structured logging or metrics, it’s an incredible companion for those moments when you need to see exactly what’s happening on the wire.

For developers, it demystifies the black box of inter-service communication. Next time you're stuck on a tricky distributed bug, instead of adding more print statements, you might just pop open Kubeshark and follow the traffic. It’s a pragmatic, powerful addition to your toolkit.


@githubprojects

Back to Projects
Project ID: 9c5d5dae-4159-4915-874a-542c6165f65bLast updated: January 15, 2026 at 05:59 PM