Skip to content

Commit 1765c49

Browse files
committed
fixed markdown
1 parent 69bc855 commit 1765c49

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

defender-xdr/investigate-respond-container-threats.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,9 @@ To determine the full scope of a container attack, you can deepen your investiga
124124

125125
In the [Advanced hunting](advanced-hunting-overview.md) page, you can extend your search for container-related activities using the **CloudProcessEvents** and **CloudAuditEvents** tables.
126126

127-
The [CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md) table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine. On the other hand, the [CloudAuditEvents](advanced-hunting-cloudauditevents-table.md) table contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events.
127+
The [CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md) table contains information about process events in multi-cloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine.
128+
129+
The [CloudAuditEvents](advanced-hunting-cloudauditevents-table.md) table contains cloud audit events from cloud platforms protected by Microsoft Defender for Cloud. It also contains Kubeaudit logs, which holds information about Kubernetes-related events.
128130

129131
## Troubleshoot issues
130132

@@ -150,7 +152,7 @@ Learn how to access the Cloud Shell and check your network plugins by following
150152
2. Above the **Essential** information, select **Connect** button and follow the instructions.
151153
3. The Cloud Shell opens at the bottom of your browser. In the command line interface, run the following command to check your network plugins:
152154

153-
**kubectl get pods --all-namespaces -o json | jq -r '.items[].metadata.labels["k8s-app"]' | uniq | grep -E 'azure-npm|calico-node|cilium|aws-node' | head -n 1**
155+
> kubectl get pods --all-namespaces -o json | jq -r '.items[].metadata.labels["k8s-app"]' | uniq | grep -E 'azure-npm|calico-node|cilium|aws-node' | head -n 1
154156
155157
The results should mention any of the specified plugins in the network policy requirement. An empty line means that the supported plugin is not installed.
156158

@@ -159,7 +161,7 @@ The results should mention any of the specified plugins in the network policy re
159161
1. Navigate your cluster in Google Cloud Portal.
160162
2. Select **Connect** above the name of the cluster. In the small window that appears, copy the following command and run it in your local terminal.
161163

162-
**kubectl get pods --all-namespaces -o json | jq -r '.items[].metadata.labels["k8s-app"]' | uniq | grep -E 'azure-npm|calico-node|cilium|aws-node' | head -n 1**
164+
> kubectl get pods --all-namespaces -o json | jq -r '.items[].metadata.labels["k8s-app"]' | uniq | grep -E 'azure-npm|calico-node|cilium|aws-node' | head -n 1
163165

164166
3. You can also choose **Run in Cloud Shell** to run a shell session that opens at the bottom of your browser. You can copy the command in the interface to check your network plugins.
165167

@@ -170,15 +172,16 @@ The results should mention any of the specified plugins in the network policy re
170172
1. Navigate to your cluster in AWS Cloud Portal.
171173
2. Select **CloudShell** on the top-right corner. A Cloud Shell session opens at the bottom of your browser, which provides a command-line interface to manage your AWS resources.
172174
3. Connect to your cluster by running the following command:</br></br>
173-
**aws eks --region &lt;cluster region&gt; update-kubeconfig --name &lt;cluster name&gt;**
175+
> aws eks --region &lt;cluster region&gt; update-kubeconfig --name &lt;cluster name&gt;**
176+
174177
> [!NOTE]
175178
> Ensure that the aws-node is deleted or disabled for the Calico and Cilium plugins.
176179
177180
### The terminate pod action failed
178181

179182
You need to confirm that the target pod's state is active or valid. To check if the pod is active, run the following command in the Cloud Shell:
180183

181-
**kubectl get pod &lt;pod-name&gt;**
184+
> kubectl get pod &lt;pod-name&gt;
182185
183186
## See also
184187

0 commit comments

Comments
 (0)