| Line 5: |
Line 5: |
| | The content of container checkpoints can be further analyzed with the [https://github.com/checkpoint-restore/checkpointctl checkpointctl] tool. This allows to perform forensic analysis in case of security incidents (e.g., suspected compromise, data exfiltration) or application failures by inspecting the saved process memory, open files, sockets, and execution context captured in the checkpoint. | | The content of container checkpoints can be further analyzed with the [https://github.com/checkpoint-restore/checkpointctl checkpointctl] tool. This allows to perform forensic analysis in case of security incidents (e.g., suspected compromise, data exfiltration) or application failures by inspecting the saved process memory, open files, sockets, and execution context captured in the checkpoint. |
| | | | |
| − | This feature is developed by community-driven effort at the [https://github.com/kubernetes/community/tree/master/wg-checkpoint-restore Kubernetes Checkpoint/Restore Working Group] and we are always looking for new contributors to join us! | + | This feature is developed as a community-driven effort at the [https://github.com/kubernetes/community/tree/master/wg-checkpoint-restore Kubernetes Checkpoint/Restore Working Group]. If you want to get more involved by contributing to Kubernetes, join our [https://groups.google.com/a/kubernetes.io/g/wg-checkpoint-restore mailing list] and Slack channel at [https://kubernetes.slack.com/messages/wg-checkpoint-restore #wg-checkpoint-restore]. |
| | | | |
| | == Kubelet Checkpoint API == | | == Kubelet Checkpoint API == |
| Line 185: |
Line 185: |
| | kubectl apply -f restore-pod.yaml | | kubectl apply -f restore-pod.yaml |
| | </pre> | | </pre> |
| | + | |
| | + | == Related Publications, Talks & Blog Posts == |
| | + | * Research Papers |
| | + | ** [https://radostin.io/files/vspisakova-jsspp25.pdf Kubernetes Scheduling with Checkpoint/Restore: Challenges and Open Problems] |
| | + | ** [https://doi.org/10.48550/arXiv.2502.16631 CRIUgpu: Transparent Checkpointing of GPU-Accelerated Workloads] |
| | + | ** [https://doi.org/10.1145/3678015.3680477 Towards Efficient End-to-End Encryption for Container Checkpointing Systems] |
| | + | |
| | + | * KubeCon & CloudNative Talks |
| | + | ** [https://kccnceu2025.sched.com/event/1tx7i Efficient Transparent Checkpointing of AI ML Workloads in Kubernetes] |
| | + | ** [https://sched.co/1dCVs End-to-End Encryption for Container Checkpointing in Kubernetes] |
| | + | ** [https://sched.co/1YeT4 Enabling Coordinated Checkpointing for Distributed HPC Applications] |
| | + | |
| | + | * Kubernetes Blog Articles |
| | + | ** [https://kubernetes.io/blog/2023/03/10/forensic-container-analysis/ Forensic Container Analysis] |
| | + | ** [https://kubernetes.io/blog/2022/12/05/forensic-container-checkpointing-alpha/ Forensic Container Checkpointing in Kubernetes] |