Congrats! You did it!
Let’s recap what you’ve learned
- Protecting East-West flows within your Kubernetes environment.
- Controlling egress using Calico DNS policy.
- Protecting Kubernetes host ports with Calico policy.
- Using Calico observability tools to understand the flows between the services and quickly pinpoint the culprit of an issue.
- Using compliance reports to provide proof of compliance.
- Using security alerts to notify security and operations teams of any strange, unsanctioned, or anomalous behavior.
- Capturing packets on demand for further forensic analysis.
Learn more about Tigera and Calico