Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's all handled as part of the manifests as well as we can have our clusters pulled if we are caught using non approved containers and they are all scanned when they are brought into the disconnected environment.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: