Skip to content

Commit 8319fec

Browse files
authored
Merge pull request #14 from miwithro/patch-212
Update use-pod-sandboxing.md
2 parents 7887930 + e0e34b0 commit 8319fec

File tree

1 file changed

+13
-36
lines changed

1 file changed

+13
-36
lines changed

articles/aks/use-pod-sandboxing.md

Lines changed: 13 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Pod Sandboxing (preview) with Azure Kubernetes Service (AKS)
33
description: Learn about and deploy Pod Sandboxing (preview), also referred to as Kernel Isolation, on an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
ms.topic: article
6-
ms.date: 02/21/2023
6+
ms.date: 02/22/2023
77

88
---
99

@@ -23,6 +23,8 @@ This article helps you understand this new feature, and how to implement it.
2323

2424
- Kubernetes version 1.24.0 and higher. Earlier versions of Kubernetes aren't supported.
2525

26+
- [Mariner](https://learn.microsoft.com/en-us/azure/aks/cluster-configuration#mariner-os) [Gen 2](https://learn.microsoft.com/en-us/azure/aks/cluster-configuration#mariner-os) OS SKU
27+
2628
- To manage a Kubernetes cluster, use the Kubernetes command-line client [kubectl][kubectl]. `kubectl` is already installed if you use Azure Cloud Shell. You can install kubectl locally using the [az aks install-cli][az-aks-install-cmd] command.
2729

2830
### Install the aks-preview Azure CLI extension
@@ -213,7 +215,7 @@ To demonstrate the deployed application on the AKS cluster isn't isolated and is
213215
pod/untrusted created
214216
```
215217
216-
## Verify isolation configuration
218+
## Verify Kernel Isolation configuration
217219
218220
219221
@@ -225,51 +227,26 @@ To demonstrate the deployed application on the AKS cluster isn't isolated and is
225227
226228
Kubectl connects to your cluster, runs `/bin/sh` inside the first container within the *untrusted* pod, and forward your terminal's input and output streams to the container's process. You can also start a shell session to the container hosting the *trusted* pod.
227229
228-
2. After starting a shell session to the container of the *untrusted* pod, you can run commands to verify that the *untrusted* container is running in a VM that has different number of CPUs and memory from the *trusted* container.
230+
2. After starting a shell session to the container of the *untrusted* pod, you can run commands to verify that the *untrusted* container is running in a Nested VM that has different kernel version from the *trusted* container.
229231
230-
To see the number of CPUs available, run:
232+
To see the kernel version run:
231233
232234
```bash
233-
cat /proc/cpuinfo
235+
uname -r
234236
```
235237
236-
The following example resembles consolidated output from the command:
238+
The following example resembles the nested VM kernel output from the command:
237239
238240
```output
239-
root@untrusted:/# cat /proc/cpuinfo
240-
processor : 0
241-
vendor_id : GenuineIntel
242-
cpu family : 6
243-
model : 85
244-
model name : Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
245-
stepping : 7
246-
microcode : 0xffffffff
247-
cpu MHz : 2593.905
248-
cache size : 36608 KB
249-
physical id : 0
250-
siblings : 1
251-
core id : 0
252-
cpu cores : 1
253-
```
254-
255-
To see how much memory is available, run:
256-
257-
```bash
258-
cat /proc/meminfo
241+
root@untrusted:/# uname -r
242+
5.15.48.1-8.cm2
259243
```
260244
261-
The following example resembles consolidated output from the command:
245+
246+
The following example resembles the shared VM kernel output from the command:
262247
263248
```output
264-
root@untrusted:/# cat /proc/meminfo
265-
MemTotal: 2042616 kB
266-
MemFree: 1963160 kB
267-
MemAvailable: 1949004 kB
268-
Buffers: 0 kB
269-
Cached: 55648 kB
270-
SwapCached: 0 kB
271-
Active: 1228 kB
272-
Inactive: 12824 kB
249+
5.15.80.mshv2-hvl1.m2
273250
```
274251
275252
## Cleanup

0 commit comments

Comments
 (0)