You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/use-pod-sandboxing.md
+13-36Lines changed: 13 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Pod Sandboxing (preview) with Azure Kubernetes Service (AKS)
3
3
description: Learn about and deploy Pod Sandboxing (preview), also referred to as Kernel Isolation, on an Azure Kubernetes Service (AKS) cluster.
4
4
services: container-service
5
5
ms.topic: article
6
-
ms.date: 02/21/2023
6
+
ms.date: 02/22/2023
7
7
8
8
---
9
9
@@ -23,6 +23,8 @@ This article helps you understand this new feature, and how to implement it.
23
23
24
24
- Kubernetes version 1.24.0 and higher. Earlier versions of Kubernetes aren't supported.
25
25
26
+
-[Mariner](https://learn.microsoft.com/en-us/azure/aks/cluster-configuration#mariner-os)[Gen 2](https://learn.microsoft.com/en-us/azure/aks/cluster-configuration#mariner-os) OS SKU
27
+
26
28
- To manage a Kubernetes cluster, use the Kubernetes command-line client [kubectl][kubectl]. `kubectl` is already installed if you use Azure Cloud Shell. You can install kubectl locally using the [az aks install-cli][az-aks-install-cmd] command.
27
29
28
30
### Install the aks-preview Azure CLI extension
@@ -213,7 +215,7 @@ To demonstrate the deployed application on the AKS cluster isn't isolated and is
213
215
pod/untrusted created
214
216
```
215
217
216
-
## Verify isolation configuration
218
+
## Verify Kernel Isolation configuration
217
219
218
220
219
221
@@ -225,51 +227,26 @@ To demonstrate the deployed application on the AKS cluster isn't isolated and is
225
227
226
228
Kubectl connects to your cluster, runs `/bin/sh` inside the first container within the *untrusted* pod, and forward your terminal's input and output streams to the container's process. You can also start a shell session to the container hosting the *trusted* pod.
227
229
228
-
2. After starting a shell session to the container of the *untrusted* pod, you can run commands to verify that the *untrusted* container is running in a VM that has different number of CPUs and memory from the *trusted* container.
230
+
2. After starting a shell session to the container of the *untrusted* pod, you can run commands to verify that the *untrusted* container is running in a Nested VM that has different kernel version from the *trusted* container.
229
231
230
-
To see the number of CPUs available, run:
232
+
To see the kernel version run:
231
233
232
234
```bash
233
-
cat /proc/cpuinfo
235
+
uname -r
234
236
```
235
237
236
-
The following example resembles consolidated output from the command:
238
+
The following example resembles the nested VM kernel output from the command:
237
239
238
240
```output
239
-
root@untrusted:/# cat /proc/cpuinfo
240
-
processor : 0
241
-
vendor_id : GenuineIntel
242
-
cpu family : 6
243
-
model : 85
244
-
model name : Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz
245
-
stepping : 7
246
-
microcode : 0xffffffff
247
-
cpu MHz : 2593.905
248
-
cache size : 36608 KB
249
-
physical id : 0
250
-
siblings : 1
251
-
core id : 0
252
-
cpu cores : 1
253
-
```
254
-
255
-
To see how much memory is available, run:
256
-
257
-
```bash
258
-
cat /proc/meminfo
241
+
root@untrusted:/# uname -r
242
+
5.15.48.1-8.cm2
259
243
```
260
244
261
-
The following example resembles consolidated output from the command:
245
+
246
+
The following example resembles the shared VM kernel output from the command:
0 commit comments