Skip to content

Commit f814742

Browse files
authored
Update use-pod-sandboxing.md
1 parent e957a94 commit f814742

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/aks/use-pod-sandboxing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ To demonstrate the deployed application on the AKS cluster isn't isolated and is
234234
235235
```output
236236
root@untrusted:/# uname -r
237-
5.15.48.1-8.cm2
237+
5.15.80.mshv2-hvl1.m2
238238
```
239239
240240
3. Start a shell session to the container of the *trusted* pod to verify the kernel output:
@@ -252,7 +252,7 @@ To demonstrate the deployed application on the AKS cluster isn't isolated and is
252252
The following example resembles output from the VM that is running the *trusted* pod, which is a different kernel than the *untrusted* pod running within the pod sandbox:
253253
254254
```output
255-
5.15.80.mshv2-hvl1.m2
255+
5.15.48.1-8.cm2
256256
257257
## Cleanup
258258
@@ -308,4 +308,4 @@ kubectl delete pod pod-name
308308
[csi-secret-store driver]: csi-secrets-store-driver.md
309309
[az-aks-update]: /cli/azure/aks#az-aks-update
310310
[mariner-cluster-config]: cluster-configuration.md#mariner-os
311-
[register-the-katavmisolationpreview-feature-flag]: #register-the-katavmisolationpreview-feature-flag
311+
[register-the-katavmisolationpreview-feature-flag]: #register-the-katavmisolationpreview-feature-flag

0 commit comments

Comments
 (0)