Why Kubeshark
Wireshark vs. Kubeshark
Kubeshark brings Wireshark-like capabilities to Kubernetes, with instant, cluster-wide PCAP access. You can still go deep with Wireshark. But Wireshark serves a different purpose: it is built for human inspection, which is limited in scale and takes a lot of time.
Wireshark requires a PCAP file, typically obtained through something like tcpdump. This works well for targeted analysis on a single machine. In Kubernetes, two things break down:
-
PCAP friction. Wireshark requires a PCAP file. The traditional process — install tcpdump on target pods, capture, copy files off the node — is high friction. One node, one file, might be reasonable. 100 nodes means 100x files and 100x the size. It doesn’t scale.
-
Human inspection. Wireshark assumes a network engineer will visually inspect the traffic. The volume of data in a Kubernetes cluster exceeds what a human can process.
-
Kubernetes context. Raw PCAPs contain IPs and ports — not pod names, service names, namespaces, or deployment labels. Without Kubernetes context you’re running blind, unable to tell who is who. Mapping IPs to workload identities is a challenge Wireshark was never designed to solve.
Kubeshark addresses all three problems. It delivers cluster-wide, instant access to L4 and L7 traffic — structured, Kubernetes-enriched, and optimized for AI consumption. AI agents can process massive network data without prohibitive token costs. The result: AI-driven RCA workflows capable of processing 10x the traffic in 1/10th the time.
When deep inspection is needed, Kubeshark delivers the right PCAP to Wireshark — small, filtered, and contextually relevant.
Challenges Processing Network Data
Three properties of Kubernetes networking make traffic difficult to capture and use:
-
Invisible. Pods communicate through virtual network interfaces in isolated namespaces. In-node pod-to-pod traffic never touches a physical interface. Span ports and physical taps cannot see it.
-
Enormous. A moderately busy cluster generates gigabytes of traffic per minute. Capturing, transferring, and processing it at scale is resource-intensive.
-
Ephemeral. Pods are created and destroyed continuously. The mapping between IPs/ports and services/deployments/namespaces shifts constantly.
The AI Gap
Network traffic is the richest source of information in a Kubernetes cluster, yet AI agents are effectively prohibited from processing it — the token cost of raw packet data would be unbearable.
Kubeshark closes this gap. It enables AI agents to slice and dice network data, serving it up significantly reduced in size and optimized to be digested by AI agents:
- Cluster-wide packets and dissected API calls, filtered to what matters
- Data sized for AI consumption
- Works in real-time and retrospectively
Think of Kubeshark as Google Search for network data — it indexes cluster-wide traffic so that querying it is fast and low-cost, whether the consumer is a human or an AI agent.
Kubeshark is built to integrate into AI-driven workflows — particularly incident response and root cause analysis — by providing AI-optimized access to the information hidden in network traffic.
What Kubeshark Does
-
Capture — Targets important workloads using eBPF at the kernel level. No packet loss. No sidecars. Hardly consumes any compute resources. Raw traffic is stored in short-term FIFO retention on each node, automatically cycling old data as new data arrives.
-
Snapshot and retain — PCAP snapshots can be created at any point from the short-term retention data, filtered by time window, nodes, and workloads. Snapshots can be exported to long-term, immutable cloud storage (AWS S3, Azure Blob, Google Cloud Storage).
-
Real-time inspection — A parallel and independent route from the capture-snapshot-dissect process. Traffic is dissected on the wire at the speed of Kubernetes, enabling real-time monitoring and real-time troubleshooting. Consumes CPU and memory resources on the nodes.
-
Retrospective dissection and indexing — Snapshots are parsed into application-layer protocols (HTTP, gRPC, Redis, Kafka, DNS, and more), indexed, and can respond to any query instantly. Every record is tagged with full Kubernetes context.
-
AI access via MCP — AI agents get tools to slice and dice, query, and correlate network data at a reasonable token cost.
-
Dashboard — A rich UI with Wireshark-like capabilities, giving human operators instant, cluster-wide visibility into L4 and L7 traffic.
What’s Next
- Installation — Get Kubeshark running in your cluster
- Real-time Traffic Inspection — See live traffic as it flows
- Incident Response — Investigate incidents with captured traffic
- Traffic Forensics — Reconstruct past events from recorded traffic
- AI Integration — Connect AI agents to your network data