Kubernetes cluster security and network observability : Chapter 2

Kubernetes cluster security and network observability : Chapter 2

This week, in the observability session’s second part, we will continue talking about policy design by exploring selectors and actions. More importantly, we will examine how to enable flow logs and use them to write policies.

Topics that will be covered in this session:
* Policy design
– Selectors
– Actions
* Networking flow logs
* Calico, fluent-bit integration