Sniff Kubernetes Pod requests and headers using tpcdump
When your fancy observability tools have failed you there’s still trusty tpcdump
The was done on Ubuntu. YMMV on other distros.
Exec into a pod
Run
It should return a number, the container eth id
Now run
To find out the node it’s running on
SSH into the node then run below to find the eni id
Now use tcpdump to sniff the requests coming in
To capture a specific header