Learn how the use of network policies could have prevented the Log4j vulnerability, and how to secure your environment against similar future attacks| Tigera - Creator of Calico
Before we start this blog post, let’s acknowledge that the only way to secure your environment from any vulnerability is to update the vulnerable hardware or software with patches that the author or the project...| Tigera - Creator of Calico
Control traffic to/from endpoints using Calico network policy rules.| docs.tigera.io
Learn about the Kubernetes networking model, common implementations, and key concepts like services, DNS, NAT, and dual stack.| Tigera - Creator of Calico
A Kubernetes network policy is a specification that defines how pods are allowed to communicate with each other and other network endpoints in a Kubernetes cluster.| Tigera - Creator of Calico
Learn how extended Berkeley Packet Filter (eBPF) lets you run programs directly on the Linux kernel with huge benefits for security, networking, and observability.| Tigera - Creator of Calico