[zh] update blog: 2023-03-10-forensic-container-analysis/
parent
251fd30545
commit
b698d4b618
|
@ -11,12 +11,12 @@ date: 2023-03-10
|
|||
slug: forensic-container-analysis
|
||||
-->
|
||||
|
||||
**作者:** [Adrian Reber](https://github.com/adrianreber) (Red Hat)
|
||||
**作者:**[Adrian Reber](https://github.com/adrianreber) (Red Hat)
|
||||
<!--
|
||||
**Authors:** Adrian Reber (Red Hat)
|
||||
-->
|
||||
|
||||
**译者**:[Paco Xu](https://github.com/pacoxu) (Daocloud)
|
||||
**译者:**[Paco Xu](https://github.com/pacoxu) (DaoCloud)
|
||||
|
||||
<!--
|
||||
In my previous article, [Forensic container checkpointing in
|
||||
|
@ -26,8 +26,8 @@ feature is Forensic container checkpointing, but I did not go into
|
|||
any details how to do the actual analysis of the checkpoint created by
|
||||
Kubernetes. In this article I want to provide details how the
|
||||
checkpoint can be analyzed.
|
||||
-->
|
||||
在我之前的文章 [Kubernetes 中的取证容器检查点][forensic-blog] 中,我介绍了检查点以及如何创建和使用它。
|
||||
-->
|
||||
我之前在 [Kubernetes 中的取证容器检查点][forensic-blog] 一文中,介绍了检查点以及如何创建和使用它。
|
||||
该特性的名称是取证容器检查点,但我没有详细介绍如何对 Kubernetes 创建的检查点进行实际分析。
|
||||
在本文中,我想提供如何分析检查点的详细信息。
|
||||
|
||||
|
@ -35,11 +35,11 @@ checkpoint can be analyzed.
|
|||
Checkpointing is still an alpha feature in Kubernetes and this article
|
||||
wants to provide a preview how the feature might work in the future.
|
||||
-->
|
||||
检查点仍然是 Kubernetes 中的一个 alpha 功能,本文希望提供该功能未来如何工作的预览。
|
||||
检查点仍然是 Kubernetes 中的一个 Alpha 特性,本文将展望该特性未来可能的工作方式。
|
||||
|
||||
<!--
|
||||
## Preparation
|
||||
-->
|
||||
-->
|
||||
## 准备
|
||||
|
||||
<!--
|
||||
|
@ -51,16 +51,17 @@ As an example I prepared a container image (`quay.io/adrianreber/counter:blog`)
|
|||
which I want to checkpoint and then analyze in this article. This container allows
|
||||
me to create files in the container and also store information in memory which
|
||||
I later want to find in the checkpoint.
|
||||
-->
|
||||
有关如何配置 Kubernetes 和底层 CRI 实现以启用检查点支持的详细信息,请参阅 [Kubernetes 中的取证容器检查点][forensic-blog]文章。
|
||||
-->
|
||||
有关如何配置 Kubernetes 和底层 CRI 实现以启用检查点支持的详细信息,
|
||||
请参阅 [Kubernetes 中的取证容器检查点][forensic-blog]一文。
|
||||
|
||||
作为示例,我准备了一个容器镜像(`quay.io/adrianreber/counter:blog`),我想对其进行检查点,然后在本文中进行分析。
|
||||
这个容器允许我在容器中创建文件,并将信息存储在内存中,稍后我想在检查点中找到这些信息。
|
||||
作为示例,我准备了一个容器镜像(`quay.io/adrianreber/counter:blog`),我想对其设定检查点,
|
||||
然后在本文中进行分析。这个容器允许我在容器中创建文件,并将信息存储在内存中,稍后我想在检查点中找到这些信息。
|
||||
|
||||
<!--
|
||||
To run that container I need a pod, and for this example I am using the following Pod manifest:
|
||||
-->
|
||||
要运行该容器,我需要一个 pod,在本示例中,我使用以下 Pod 清单:
|
||||
要运行该容器,我需要一个 Pod,在本例中我使用以下 Pod 清单:
|
||||
|
||||
```yaml
|
||||
apiVersion: v1
|
||||
|
@ -78,7 +79,7 @@ This results in a container called `counter` running in a pod called `counters`.
|
|||
|
||||
Once the container is running I am performing following actions with that
|
||||
container:
|
||||
-->
|
||||
-->
|
||||
这会导致一个名为 `counter` 的容器在名为 `counters` 的 Pod 中运行。
|
||||
|
||||
容器运行后,我将对该容器执行以下操作:
|
||||
|
@ -104,11 +105,12 @@ the checkpoint. As described in the previous article this requires access to the
|
|||
For a container named *counter* in a pod named *counters* in a namespace named
|
||||
*default* the *kubelet* API endpoint is reachable at:
|
||||
-->
|
||||
1. 第一次访问在容器中创建一个名为 `test-file` 的文件,其内容为 `test-file`;
|
||||
2. 第二次访问将我的秘密信息(`RANDOM_1432_KEY`)存储在容器内存中的某处;
|
||||
3. 最后一次访问在内部日志文件中添加了一行。
|
||||
1. 第一次访问时在容器中创建一个名为 `test-file` 的文件,其内容为 `test-file`;
|
||||
2. 第二次访问时将我的 Secret 信息(`RANDOM_1432_KEY`)存储在容器内存中的某处;
|
||||
3. 最后一次访问时在内部日志文件中添加了一行。
|
||||
|
||||
在分析检查点之前的最后一步是告诉 Kubernetes 创建检查点。如上一篇文章所述,这需要访问 **kubelet** 唯一的“检查点” API 端点。
|
||||
在分析检查点之前的最后一步是告诉 Kubernetes 创建检查点。
|
||||
如上一篇文章所述,这需要访问 **kubelet** 唯一的 `checkpoint` API 端点。
|
||||
|
||||
对于 **default** 命名空间中 **counters** Pod 中名为 **counter** 的容器,
|
||||
可通过以下方式访问 **kubelet** API 端点:
|
||||
|
@ -128,8 +130,9 @@ curl -X POST "https://localhost:10250/checkpoint/default/counters/counter"
|
|||
For completeness the following `curl` command-line options are necessary to
|
||||
have `curl` accept the *kubelet*'s self signed certificate and authorize the
|
||||
use of the *kubelet* `checkpoint` API:
|
||||
-->
|
||||
为了完整起见,以下 curl 命令行选项对于让 curl 接受 **kubelet** 的自签名证书并授权使用 **kubelet** 检查点 API 是必要的:
|
||||
-->
|
||||
为了完整起见,以下 `curl` 命令行选项对于让 `curl` 接受 **kubelet** 的自签名证书并授权使用
|
||||
**kubelet** 检查点 API 是必要的:
|
||||
|
||||
```shell
|
||||
--insecure --cert /var/run/kubernetes/client-admin.crt --key /var/run/kubernetes/client-admin.key
|
||||
|
@ -138,18 +141,18 @@ use of the *kubelet* `checkpoint` API:
|
|||
<!--
|
||||
Once the checkpointing has finished the checkpoint should be available at
|
||||
`/var/lib/kubelet/checkpoints/checkpoint-<pod-name>_<namespace-name>-<container-name>-<timestamp>.tar`
|
||||
-->
|
||||
-->
|
||||
检查点操作完成后,检查点应该位于 `/var/lib/kubelet/checkpoints/checkpoint-<pod-name>_<namespace-name>-<container-name>-<timestamp>.tar`
|
||||
|
||||
<!--
|
||||
In the following steps of this article I will use the name `checkpoint.tar`
|
||||
when analyzing the checkpoint archive.
|
||||
-->
|
||||
-->
|
||||
在本文的以下步骤中,我将在分析检查点归档时使用名称 `checkpoint.tar`。
|
||||
|
||||
<!--
|
||||
## Checkpoint archive analysis using `checkpointctl`
|
||||
-->
|
||||
-->
|
||||
## 使用 `checkpointctl` 进行检查点归档分析
|
||||
|
||||
<!--
|
||||
|
@ -180,10 +183,10 @@ runtime and container engine. It also lists the size of the checkpoint (`CHKPT
|
|||
SIZE`). This is mainly the size of the memory pages included in the checkpoint,
|
||||
but there is also information about the size of all changed files in the
|
||||
container (`ROOT FS DIFF SIZE`).
|
||||
-->
|
||||
这展示了有关该检查点归档中的检查点的一些信息。我们可以看到容器的名称、有关容器运行时和容器引擎的信息。
|
||||
-->
|
||||
这展示了有关该检查点归档中与检查点有关的一些信息。我们可以看到容器的名称、有关容器运行时和容器引擎的信息。
|
||||
它还列出了检查点的大小(`CHKPT SIZE`)。
|
||||
这主要是检查点中包含的内存页的大小,同时也有有关容器中所有更改文件的大小的信息(`ROOT FS DIFF SIZE`)。
|
||||
这主要是检查点中包含的内存页的大小,同时也包含有关容器中所有已更改文件的大小信息(`ROOT FS DIFF SIZE`)。
|
||||
|
||||
<!--
|
||||
The additional parameter `--print-stats` decodes information in the checkpoint
|
||||
|
@ -197,8 +200,9 @@ memory pages were analyzed and written during checkpoint creation.
|
|||
|
||||
<!--
|
||||
## Digging deeper
|
||||
-->
|
||||
-->
|
||||
## 深入挖掘
|
||||
|
||||
<!--
|
||||
With the help of `checkpointctl` I am able to get some high level information
|
||||
about the checkpoint archive. To be able to analyze the checkpoint archive
|
||||
|
@ -206,7 +210,13 @@ further I have to extract it. The checkpoint archive is a *tar* archive and can
|
|||
be extracted with the help of `tar xf checkpoint.tar`.
|
||||
|
||||
Extracting the checkpoint archive will result in following files and directories:
|
||||
-->
|
||||
借助 `checkpointctl`,我可以获得有关检查点归档的一些高级信息。为了能够进一步分析检查点归档,
|
||||
我必须将其提取。检查点归档是 **tar** 归档文件,可以借助 `tar xf checkpoint.tar` 进行解压。
|
||||
|
||||
展开检查点存档时,将创建以下文件和目录:
|
||||
|
||||
<!--
|
||||
* `bind.mounts` - this file contains information about bind mounts and is needed
|
||||
during restore to mount all external files and directories at the right location
|
||||
* `checkpoint/` - this directory contains the actual checkpoint as created by
|
||||
|
@ -219,30 +229,25 @@ Extracting the checkpoint archive will result in following files and directories
|
|||
to display dump statistics (`--print-stats`)
|
||||
* `rootfs-diff.tar` - this file contains all changed files on the container's
|
||||
file-system
|
||||
-->
|
||||
借助 `checkpointctl`,我可以获得有关检查点归档的一些高级信息。为了能够进一步分析检查点归档,我必须将其提取。
|
||||
检查点归档是 **tar** 归档文件,可以借助 `tar xf checkpoint.tar` 进行解压。
|
||||
|
||||
展开检查点存档时,将创建以下文件和目录:
|
||||
|
||||
* `bind.mounts` - 该文件包含有关绑定挂载的信息,并且需要在恢复期间需要将所有外部文件和目录挂载到正确的位置。
|
||||
* `checkpoint/` - 该目录包含 CRIU 创建的实际检查点,
|
||||
* `config.dump` 和 `spec.dump` - 这些文件包含恢复期间所需的有关容器的元数据。
|
||||
* `dump.log` - 该文件包含在检查点期间创建的 CRIU 的调试输出。
|
||||
* `stats-dump` - 此文件包含 `checkpointctl` 用于通过 `--print-stats` 显示转储统计信息的数据。
|
||||
* `rootfs-diff.tar` - 该文件包含容器文件系统上所有已更改的文件。
|
||||
-->
|
||||
* `bind.mounts` - 该文件包含有关绑定挂载的信息,并且需要在恢复期间将所有外部文件和目录挂载到正确的位置
|
||||
* `checkpoint/` - 该目录包含 CRIU 创建的实际检查点
|
||||
* `config.dump` 和 `spec.dump` - 这些文件包含恢复期间所需的有关容器的元数据
|
||||
* `dump.log` - 该文件包含在检查点期间创建的 CRIU 的调试输出
|
||||
* `stats-dump` - 此文件包含 `checkpointctl` 用于通过 `--print-stats` 显示转储统计信息的数据
|
||||
* `rootfs-diff.tar` - 该文件包含容器文件系统上所有已更改的文件
|
||||
|
||||
<!--
|
||||
### File-system changes - `rootfs-diff.tar`
|
||||
-->
|
||||
-->
|
||||
### 更改文件系统 - `rootfs-diff.tar`
|
||||
|
||||
<!--
|
||||
The first step to analyze the container's checkpoint further is to look at
|
||||
the files that have changed in my container. This can be done by looking at the
|
||||
file `rootfs-diff.tar`:
|
||||
-->
|
||||
进一步分析容器检查点的第一步是查看容器内已更改的文件。这可以通过引用 `rootfs-diff.tar` 文件来完成。
|
||||
-->
|
||||
进一步分析容器检查点的第一步是查看容器内已更改的文件。这可以通过查看 `rootfs-diff.tar` 文件来完成。
|
||||
|
||||
```console
|
||||
$ tar xvf rootfs-diff.tar
|
||||
|
@ -252,7 +257,7 @@ home/counter/test-file
|
|||
|
||||
<!--
|
||||
Now the files that changed in the container can be studied:
|
||||
-->
|
||||
-->
|
||||
现在你可以检查容器内已更改的文件。
|
||||
|
||||
```console
|
||||
|
@ -272,15 +277,16 @@ was created just as expected.
|
|||
|
||||
With the help of `rootfs-diff.tar` it is possible to inspect all files that
|
||||
were created or changed compared to the base image of the container.
|
||||
-->
|
||||
-->
|
||||
与该容器所基于的容器镜像(`quay.io/adrianreber/counter:blog`)相比,
|
||||
它包含容器提供的服务的所有访问信息以及预期创建的 `logfile` 可以检查 `test-file` 文件。
|
||||
我可以看到文件 `logfile` 包含了访问该容器所提供服务相关的所有信息,
|
||||
并且文件 `test-file` 如预期一样被创建了。
|
||||
|
||||
在 `rootfs-diff.tar` 的帮助下,可以根据容器的基本镜像检查所有创建或修改的文件。
|
||||
|
||||
<!--
|
||||
### Analyzing the checkpointed processes - `checkpoint/`
|
||||
-->
|
||||
-->
|
||||
### 分析检查点进程 - `checkpoint/`
|
||||
|
||||
<!--
|
||||
|
@ -290,11 +296,12 @@ consists of different [image files][image-files] which can be analyzed with the
|
|||
help of the tool [CRIT][crit] which is distributed as part of CRIU.
|
||||
|
||||
First lets get an overview of the processes inside of the container:
|
||||
-->
|
||||
-->
|
||||
目录 `checkpoint/` 包含 CRIU 在容器内对进程进行检查点时创建的数据。
|
||||
目录 `checkpoint/` 的内容由各种[镜像文件][image-files] 组成,可以使用作为 CRIU 一部分分发的 [CRIT][crit] 工具进行分析。
|
||||
目录 `checkpoint/` 的内容由各种[镜像文件][image-files] 组成,可以使用作为 CRIU
|
||||
一部分分发的 [CRIT][crit] 工具进行分析。
|
||||
|
||||
首先,我们先了解一下容器的内部流程。
|
||||
首先,我们先概览了解一下容器内的进程。
|
||||
|
||||
```console
|
||||
$ crit show checkpoint/pstree.img | jq .entries[].pid
|
||||
|
@ -312,10 +319,11 @@ restore exactly these PIDs will be recreated. From the outside of the
|
|||
container's PID namespace the PIDs will change after restore.
|
||||
|
||||
The next step is to get some additional information about these three processes:
|
||||
-->
|
||||
-->
|
||||
此输出意味着容器的 PID 命名空间内有 3 个进程(PID 为 1、7 和 8)。
|
||||
|
||||
这只是容器 PID 命名空间的内部视图。这些 PID 在恢复过程中会准确地重新创建。从容器的 PID 命名空间外部,PID 将在恢复后更改。
|
||||
这只是容器 PID 命名空间的内部视图。这些 PID 在恢复过程中会准确地被重新创建。
|
||||
从容器的 PID 命名空间外部,PID 将在恢复后更改。
|
||||
|
||||
下一步是获取有关这三个进程的更多信息。
|
||||
|
||||
|
@ -334,9 +342,9 @@ interpreter) and `tee`. For details about the parent child relations of these pr
|
|||
is more data to be analyzed in `checkpoint/pstree.img`.
|
||||
|
||||
Let's compare the so far collected information to the still running container:
|
||||
-->
|
||||
-->
|
||||
这意味着容器内的三个进程是 `bash`、`counter.py`(Python 解释器)和 `tee`。
|
||||
`checkpoint/pstree.img` 中有更多数据可供分析,以获取有关进程起源的详细信息。
|
||||
有关这些进程的父子关系,可以参阅 `checkpoint/pstree.img` 所分析的更多数据。
|
||||
|
||||
让我们将目前为止收集到的信息与仍在运行的容器进行比较。
|
||||
|
||||
|
@ -359,7 +367,7 @@ tee
|
|||
In this output I am first retrieving the PID of the first process in the
|
||||
container and then I am looking for that PID and child processes on the system
|
||||
where the container is running. I am seeing three processes and the first one is
|
||||
"bash" which is PID 1 inside of the containers PID namespace. Then I am looking
|
||||
"bash" which is PID 1 inside of the containers PID namespace. Then I am looking
|
||||
at `/proc/<PID>/comm` and I can find the exact same value
|
||||
as in the checkpoint image.
|
||||
|
||||
|
@ -369,7 +377,7 @@ processes.
|
|||
|
||||
One last example of what `crit` can tell us about the container is the information
|
||||
about the UTS namespace:
|
||||
-->
|
||||
-->
|
||||
在此输出中,我们首先获取容器中第一个进程的 PID。在运行容器的系统上,它会查找其 PID 和子进程。
|
||||
你应该看到三个进程,第一个进程是 `bash`,容器 PID 命名空间中的 PID 为 1。
|
||||
然后查看 `/proc/<PID>/comm`,可以找到与检查点镜像完全相同的值。
|
||||
|
@ -397,21 +405,22 @@ This tells me that the hostname inside of the UTS namespace is `counters`.
|
|||
For every resource CRIU collected during checkpointing the `checkpoint/`
|
||||
directory contains corresponding image files which can be analyzed with the help
|
||||
of `crit`.
|
||||
-->
|
||||
-->
|
||||
这里输出表示 UTS 命名空间中的主机名是 `counters`。
|
||||
|
||||
对于检查点创建期间收集的每个资源 CRIU,`checkpoint/` 目录包含相应的镜像文件。可以使用 `crit` 来分析该镜像文件。
|
||||
对于检查点创建期间收集的每个资源 CRIU,`checkpoint/` 目录包含相应的镜像文件,
|
||||
你可以借助 `crit` 来分析该镜像文件。
|
||||
|
||||
<!--
|
||||
#### Looking at the memory pages
|
||||
-->
|
||||
-->
|
||||
#### 查看内存页面
|
||||
|
||||
<!--
|
||||
In addition to the information from CRIU that can be decoded with the help
|
||||
of CRIT, there are also files containing the raw memory pages written by
|
||||
CRIU to disk:
|
||||
-->
|
||||
-->
|
||||
除了可以借助 CRIT 解码的 CRIU 信息之外,还有包含 CRIU 写入磁盘的原始内存页的文件:
|
||||
|
||||
```console
|
||||
|
@ -422,7 +431,7 @@ checkpoint/pages-1.img checkpoint/pages-2.img checkpoint/pages-3.img
|
|||
<!--
|
||||
When I initially used the container I stored a random key (`RANDOM_1432_KEY`)
|
||||
somewhere in the memory. Let see if I can find it:
|
||||
-->
|
||||
-->
|
||||
当我最初使用该容器时,我在内存中的某个位置存储了一个随机密钥。让我看看是否能找到它:
|
||||
|
||||
```console
|
||||
|
@ -436,21 +445,22 @@ of all memory pages of the processes in the container, but it is also
|
|||
important to remember that anyone that can access the checkpoint
|
||||
archive has access to all information that was stored in the memory of the
|
||||
container's processes.
|
||||
-->
|
||||
-->
|
||||
确实有我的数据。通过这种方式,我可以轻松查看容器中进程的所有内存页面的内容,
|
||||
但需要注意的是可以访问检查点存档的任何人都可以访问存储在容器进程内存中的所有信息。
|
||||
但需要注意的是,你只要能访问检查点存档,就可以访问存储在容器进程内存中的所有信息。
|
||||
|
||||
<!--
|
||||
#### Using gdb for further analysis
|
||||
-->
|
||||
#### 使用 gdb 进行进一步分析
|
||||
-->
|
||||
#### 使用 gdb 进一步分析
|
||||
|
||||
<!--
|
||||
Another possibility to look at the checkpoint images is `gdb`. The CRIU repository
|
||||
contains the script [coredump][criu-coredump] which can convert a checkpoint
|
||||
into a coredump file:
|
||||
-->
|
||||
查看检查点镜像的另一种方法是 `gdb`。CRIU 存储库包含脚本 [coredump][criu-coredump],它可以将检查点转换为 coredump 文件:
|
||||
-->
|
||||
查看检查点镜像的另一种方法是 `gdb`。CRIU 存储库包含脚本 [coredump][criu-coredump],
|
||||
它可以将检查点转换为 coredump 文件:
|
||||
|
||||
```console
|
||||
$ /home/criu/coredump/coredump-python3
|
||||
|
@ -462,8 +472,9 @@ core.1 core.7 core.8
|
|||
Running the `coredump-python3` script will convert the checkpoint images into
|
||||
one coredump file for each process in the container. Using `gdb` I can also look
|
||||
at the details of the processes:
|
||||
-->
|
||||
运行 `coredump-python3` 脚本会将检查点镜像转换为容器中每个进程一个的 coredump 文件。 使用 `gdb` 我还可以查看进程的详细信息:
|
||||
-->
|
||||
运行 `coredump-python3` 脚本会将检查点镜像转换为容器中每个进程一个的 coredump 文件。
|
||||
使用 `gdb` 我还可以查看进程的详细信息:
|
||||
|
||||
```console
|
||||
$ echo info registers | gdb --core checkpoint/core.1 -q
|
||||
|
@ -500,16 +511,17 @@ fs 0x0 0
|
|||
gs 0x0 0
|
||||
```
|
||||
|
||||
<!--
|
||||
In this example I can see the value of all registers as they were during
|
||||
checkpointing and I can also see the complete command-line of my container's PID
|
||||
1 process: `bash -c /home/counter/counter.py 2>&1 | tee /home/counter/logfile`
|
||||
|
||||
-->
|
||||
在这个例子中,我可以看到所有寄存器的值,因为它们在检查点,我还可以看到容器的 PID 1 进程的完整命令行:
|
||||
`bash -c /home/counter/counter.py 2>&1 | tee /home/counter/logfile`。
|
||||
|
||||
<!--
|
||||
## Summary
|
||||
-->
|
||||
-->
|
||||
## 总结
|
||||
|
||||
<!--
|
||||
|
@ -525,13 +537,13 @@ The different examples I have shown in this article how to analyze a checkpoint
|
|||
are just the starting point. Depending on your requirements it is possible to
|
||||
look at certain things in much more detail, but this article should give you an
|
||||
introduction how to start the analysis of your checkpoint.
|
||||
-->
|
||||
-->
|
||||
借助容器检查点,可以在不停止容器且在容器不知情的情况下,为正在运行的容器创建检查点。
|
||||
在 Kubernetes 中对容器创建一个检查点的结果是检查点存档文件;
|
||||
使用不同的工具,如 `checkpointctl`、`tar`、`crit` 和 `gdb`,可以分析检查点。
|
||||
使用诸如 `checkpointctl`、`tar`、`crit` 和 `gdb` 等不同的工具,可以分析检查点。
|
||||
即使使用像 `grep` 这样的简单工具,也可以在检查点存档中找到信息。
|
||||
|
||||
我在本文中展示的如何分析检查点的不同示例,这只是一个起点。
|
||||
我在本文所展示的如何分析检查点的不同示例只是一个起点。
|
||||
根据你的需求,可以更详细地查看某些内容,本文向你介绍了如何开始进行检查点分析。
|
||||
|
||||
<!--
|
||||
|
@ -541,11 +553,15 @@ introduction how to start the analysis of your checkpoint.
|
|||
|
||||
<!--
|
||||
You can reach SIG Node by several means:
|
||||
-->
|
||||
你可以通过多种方式联系到 SIG Node。
|
||||
|
||||
* Slack: [#sig-node][slack-sig-node]
|
||||
* Slack: [#sig-security][slack-sig-security]
|
||||
* [Mailing list][sig-node-ml]
|
||||
-->
|
||||
你可以通过多种方式联系到 SIG Node:
|
||||
|
||||
* Slack:[#sig-node][slack-sig-node]
|
||||
* Slack:[#sig-security][slack-sig-security]
|
||||
* [邮件列表][sig-node-ml]
|
||||
|
||||
[forensic-blog]: https://kubernetes.io/zh-cn/blog/2022/12/05/forensic-container-checkpointing-alpha/
|
||||
|
|
Loading…
Reference in New Issue