Congrats! You did it!

Let’s recap what you’ve learned

  1. Protecting East-West flows within your Kubernetes environment.
  2. Controlling egress using Calico DNS policy.
  3. Protecting Kubernetes host ports with Calico policy.
  4. Using Calico observability tools to understand the flows between the services and quickly pinpoint the culprit of an issue.
  5. Using compliance reports to provide proof of compliance.
  6. Using security alerts to notify security and operations teams of any strange, unsanctioned, or anomalous behavior.
  7. Capturing packets on demand for further forensic analysis.

Learn more about Tigera and Calico