mirror of
https://github.com/awesome-foss/awesome-sysadmin.git
synced 2026-05-06 02:18:54 -05:00
[PR #767] Add rustnet to Troubleshooting #5878
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/awesome-foss/awesome-sysadmin/pull/767
Author: @domcyrus
Created: 4/22/2026
Status: 🔄 Open
Base:
master← Head:add-rustnet📝 Commits (1)
fe565d2Add rustnet to Troubleshooting📊 Changes
1 file changed (+1 additions, -0 deletions)
View changed files
📝
README.md(+1 -0)📄 Description
Thank you for taking the time to work on a PR for Awesome-Sysadmin!
To ensure your PR is dealt with swiftly please check the following:
DemoandClientsare optional.Do not add a duplicate
Source codelink if it is the same as the main link.Keep the short description under 80 characters and use sentence case
for it, even if the project's webpage or readme uses another capitalisation.
Demolinks should only be used for interactive demos, i.e. not video demonstrations.- [Name](http://homepage/) - Short description, under 250 characters, sentence case. ([Demo](http://url.to/demo), [Source Code](http://url.of/source/code), [Clients](https://url.to/list/of/related/clients-or-apps)) `License` `Language`Languagetag is the main server-side requirement for the software. Don't include frameworks or specific dialects.Suggested titles: "Add aaa to bbb" for adding software aaa to section bbb,
"Remove aaa from bbb" for removing, "Fix license for aaa", etc.
Please take some time to answer the following questions as best you can:
It fills a real gap between
netstat/ss(which show sockets but no live traffic) and Wireshark/tcpdump(which show packets but not which process owns them). rustnet combines packet capture with OS-level socket introspection which e.g. is using eBPF on Linux,/procfallback, and platform APIs on macOS(PKTAP)/Windows/FreeBSD. This ensures that every connection is attributed to its owning process, with built-in deep packet inspection (HTTPS/TLS with SNI extraction, DNS, SSH, QUIC, DHCP, mDNS, SNMP). It's a TUI and therefore it also runs cleanly over SSH on headless servers.Yes, I've been building and using it since April 2025, about a year. Daily use as my default tool for "what is this machine actually talking to right now."
Both. Personally: debugging home network issues, investigating device traffic, identifying noisy processes. Professionally: diagnosing connection problems on servers and containers, auditing what a given service is opening connections to.
As the author I'll answer this in terms of adoption signals rather than personal deployments, since the question is really aimed at users:
~2,000 GitHub stars, 63 forks
Independent write-ups: NetBeez, OSTechNix
Third-party Nix derivation (isomarcte/rustnet-nix) packaged by someone outside the project
Arch linux (https://archlinux.org/packages/extra/x86_64/rustnet/) packaged by someone outside the project
21 releases, last v1.2.0 on 2026-04-09
Companion projects:
kubectl-rustnetfor running it as a debug pod on Kubernetes nodesBiggest pros/cons compared to other solutions?
Pros:
iftop/nethogsdo bandwidth-per-process but no protocol detail; Wireshark does protocol detail but no process attribution;bandwhichis closest in spirit but narrower in scope and Linux/macOS onlyCons:
Younger than decades-old alternatives
Parses fewer protocols than Wireshark, it's a live-monitoring tool, not a full protocol analyzer
Not a replacement for deep post-capture analysis workflows but can be used together with wireshark and rustnet pcap output with additional process information
Any other comments about your use case, things you've found excellent, limitations you've encountered... ?
Things I've found really useful in day-to-day use:
ss -tnpoutput with packet captures by hand.access_bpfgroup (via Wireshark's ChmodBPF helper ordseditgroup) lets it run unprivileged, falling back tolsoffor process attribution. Both work; PKTAP is the better one when you have the permission for it.Limitations I've hit:
/procscraping, which can miss very short-lived connections.🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.