github kubeshark/kubeshark v52.3.73

latest releases: v52.3.82, v52.3.79, v52.3.78...
one month ago

v52.3.73 (2024-08-08)

Release Highlights

Keywords: performance, support, capture filters, prometheus,

In this release, one of the main focus points was to allow more granularity in deciding what traffic to process and when, resulting in much-improved resource consumption and reduction of noise (e.g., traffic you're not interested in).

The first feature is a simple yet super useful ability to control Kubeshark resource consumption. Think of it like a dynamic on/off switch: when set to "on," Kubeshark functions as expected, and when set to "off," Kubeshark lays dormant and consumes almost no resources. This is especially useful if you want to have Kubeshark installed but not actually processing traffic and consuming resources, yet ready to start on command (manual or automated).

The second feature is the ability to configure the list of supported protocol dissectors and remove protocols that are of less interest (e.g., DNS). This results in less noise and less resource consumption as the traffic will not be processed. Traffic is captured, but if it belongs to a protocol that isn't supported or is disabled in the configuration, it will not be processed and will be discarded.

The third feature in this group is the ability to exclude namespaces for the pod targeting rules. Until now, we could only add namespaces to the list; now, we can also exclude them. This is useful for specifying what we don’t want to target, as opposed to what we do want to target. An example is excluding kube-system or istio-system, which can be busy yet of no interest.

A simple yet very useful feature is the ability to export any custom metric to Prometheus, making Kubeshark a very useful monitoring tool.

New Features & Bug Fixes

  • Added a dashboard ability to dynamically start and stop Kubeshark from processing traffic. When Kubeshark is stopped, it becomes dormant, consuming close to zero resources.
  • Added an ability to determine the default start/stop behavior in Helm as a Helm value. The default behavior is set to start Kubeshark stopped and require an explicit action in the dashboard to start traffic processing.
  • Removed the replay functionality.
  • Added more granularity in determining duplicate traffic.
  • Added online support option using Intercom. This option can be disabled by using --set supportChatEnabled=false. The default value is set to true.
  • Added capability to export custom metrics to Prometheus in scripting.
  • Deprecated the kubeshark pro command.
  • Added an ability to configure supported protocol dissectors and remove any protocols that are of no interest (e.g., DNS when it is not interesting).
  • Added an ability to exclude namespaces from pod targeting. This is only a backend implementation and can be configured in the Helm values. Dashboard implementation that will allow dynamically changing the list of excluded namespaces is yet to be implemented.

Download Kubeshark for your platform

Mac (x86-64/Intel)

curl -Lo kubeshark https://github.com/kubeshark/kubeshark/releases/download/v52.3.73/kubeshark_darwin_amd64 && chmod 755 kubeshark

Mac (AArch64/Apple M1 silicon)

rm -f kubeshark && curl -Lo kubeshark https://github.com/kubeshark/kubeshark/releases/download/v52.3.73/kubeshark_darwin_arm64 && chmod 755 kubeshark

Linux (x86-64)

curl -Lo kubeshark https://github.com/kubeshark/kubeshark/releases/download/v52.3.73/kubeshark_linux_amd64 && chmod 755 kubeshark

Linux (AArch64)

curl -Lo kubeshark https://github.com/kubeshark/kubeshark/releases/download/v52.3.73/kubeshark_linux_arm64 && chmod 755 kubeshark

Windows (x86-64)

curl -LO https://github.com/kubeshark/kubeshark/releases/download/v52.3.73/kubeshark.exe

Checksums

SHA256 checksums available for compiled binaries.
Run shasum -a 256 -c kubeshark_OS_ARCH.sha256 to verify.

Don't miss a new kubeshark release

NewReleases is sending notifications on new releases.