A comprehensive debugging and troubleshooting toolkit for Kubernetes environments, packaged in a single container based on Debian slim.
- Kubernetes Tools: kubectl, helm, kustomize, kubectx/kubens, stern, krew
- Cluster Exploration: k9s, kubectl-neat, dive
- Security: trivy, kubeconform
- Development: telepresence
- Networking: iproute2, iputils-ping, netcat, tcpdump, dnsutils, socat
- JSON/YAML Processing: jq, yq
- Utilities: curl, wget, git, vim, fzf, and more
kubectl run sherlock --rm -it --image=ghcr.io/arunsanna/k8s-sherlock --restart=Never -- bash
The project includes GitHub Actions workflows for:
- Automated builds on pushes to main branch and tags
- Container image publishing to GitHub Container Registry
- Security scanning with Trivy to detect vulnerabilities
- Layer caching for faster builds
- Networking Tools: Comes with
iproute2
,iputils-ping
,netcat
,dnsutils
,tcpdump
, andsocat
- HTTP Tools:
curl
andwget
pre-installed for HTTP requests - Kubernetes Development: Full suite of K8s tools including kubectl plugins via krew
- Interactive Tools: Terminal-based UIs like k9s and fzf for better productivity
- A Kubernetes cluster up and running
- kubectl installed and configured
kubectl apply -f pod/sherlock.yml --namespace=<namespace_name>
You can also pull and run the container directly with Docker:
docker run -it --rm ghcr.io/arunsanna/k8s-sherlock
Once the K8s-Sherlock pod is up and running, you can exec
into it to use the tools.
bash
kubectl exec -it <pod-name> -- /bin/bash
We love contributions! Please read the Contributing Guidelines for more information on how to get involved.
This project is licensed under the MIT License. See the LICENSE file for details.