Google Cloud Platform1.17 млн
Опубликовано 20 ноября 2019, 0:19
What happens if an attacker escapes a container and compromises your node? Is it game over for the whole cluster, or can you limit the blast radius?
Tim Allclair and Greg Castle, give us a recap from their #KubeCon + #CloudNativeCon presentation about "node isolation" and how Kubernetes scheduling can be used to to execute workloads on separate nodes.
Watch other episodes in the KubeCon, San Diego playlist → goo.gle/KubeConSD
Subscribe to the GCP YouTube Channel →goo.gle/GCP
Tim Allclair and Greg Castle, give us a recap from their #KubeCon + #CloudNativeCon presentation about "node isolation" and how Kubernetes scheduling can be used to to execute workloads on separate nodes.
Watch other episodes in the KubeCon, San Diego playlist → goo.gle/KubeConSD
Subscribe to the GCP YouTube Channel →goo.gle/GCP