Authors: Adrian Reber (Red Hat) In my previous
article, Forensic container checkpointing in Kubernetes,
I introduced checkpointing in Kubernetes and how it has to be setup
and how it can be used.The name of the feature is Forensic
container checkpointing, but I did not go into any details how to
do the actual analysis of the checkpoint created by Kubernetes.In
this article I want to provide details how the checkpoint can be
analyzed. Checkpointing is still an alpha feature in Kubernetes and
this article wants to provide a preview how