Authors: Adrian Reber (Red Hat) In my previous article, Forensic container checkpointing in Kubernetes, I introduced checkpointing in Kubernetes and how it has to be setup and how it can be used.The name of the feature is Forensic container checkpointing, but I did not go into any details how to do the actual analysis of the checkpoint created by Kubernetes.In this article I want to provide details how the checkpoint can be analyzed. Checkpointing is still an alpha feature in Kubernetes and this article wants to provide a preview how

Just published by Kubernetes: Read more