Summary
We looked at how to use Kata Containers to build a secure container runtime and how to employ hardware virtualization technology to improve workload isolation. We have also looked at how to enable the Kata add-on and run a sample application.
We discussed best practices for establishing container security on your production-grade cluster. We also noticed how the MicroK8s add-on option has made it simpler to activate Kata Containers, which can dramatically improve the security and isolation of your container operations.
With Kata Containers maturing into a production-ready container runtime and subsequent uptake, there is a great opportunity to improve the hosted build and development environment approach to address the noisy neighbor problem and handle unique and privileged requirements without affecting current host settings or policies.
In the following chapter, we will continue our next use case of implementing strict confinement for isolated containers.