Skip to content

Commit 7887930

Browse files
committed
updated next steps section
1 parent 2ec087c commit 7887930

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/aks/use-pod-sandboxing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,6 +215,8 @@ To demonstrate the deployed application on the AKS cluster isn't isolated and is
215215
216216
## Verify isolation configuration
217217
218+
219+
218220
1. To access a container inside the AKS cluster, start a shell session by running the [kubectl exec][kubectl-exec] command. In this example you're accessing the container inside the *untrusted* pod.
219221
220222
```bash
@@ -286,8 +288,6 @@ kubectl delete pod pod-name
286288

287289
## Next steps
288290

289-
* Learn about [Confidential virtual machines on AKS][cvm-on-aks] with AMD SEV-SNP support to protect data-in-use with full VM memory encryption for your highly sensitive container workloads.
290-
291291
* Learn more about [Azure Dedicated hosts][azure-dedicated-hosts] for nodes with your AKS cluster to use hardware isolation and control over Azure platform maintenance events.
292292

293293
<!-- EXTERNAL LINKS -->

0 commit comments

Comments
 (0)