• This event has passed.

By default, pods are non-isolated; they accept traffic from any source. The D2iQ Konvoy solution to this security concern is Network Security Policy that lets developers control network access to their services.

D2iQ Konvoy comes preconfigured with Network Security Policy using Project Calico which can be used to secure your clusters.

This class will describe a few use cases for network policy and a live demo implementing each use case.

In this session, we will discuss and demo:

  • How Network Security Policy works
  • Common Use Cases for Network Security Policy
  • Live demo implementing Network Security Policy in a D2iQ Konvoy cluster


Subscribe to our newsletter

Get updates on webinars, blog posts, new releases and more!

Thanks for signing up. You must confirm your email address before we can send you. Please check your email and follow the instructions.


📣 Read our new O'Reilly eBook on Kubernetes Security and ObservabilityLearn more >>>