The tool is to use the 'tcpdump' to capture the network trace of the pod
- The access to create privileged pod
- The access to view the pod you would like to capture
- Input the "name" of the pod and "namespace" of the pod to the "xxx.json". Example is "example/test.json"
- Run "./k8sTcpdump -p xxx.json" and it will bring up pods on the corresponding nodes to capture the network traces of the target pods. The '.cap' file will be downoaded to the current folder.