Product videos icon

Interactive Training

In-depth product feature demonstrations showcasing Calico capabilities for Kubernetes networking and security use-cases
Connect to Staged Demo Environment >

Calico Policy Introduction

Try this for yourself with our hands-on lab series. Click here to get started.

Calico Policy Introduction
10 MIN
Example 01 - Denylist Policy
9 MIN
Example 02 - Namespace Isolation
10 MIN
Example 03 - Workload Isolation
9 MIN
Summary
4 MIN

Scalable Security & DevSecOps with Calico’s Network Policy Model for Microsegmentation

Why Implement Microsegmentation
15 MIN
Challenges Implementing Microsegmentation
4 MIN
A Hierarchical Policy Model for Microsegmentation in Kubernetes - Part 1
23 MIN
A Hierarchical Policy Model for Microsegmentation in Kubernetes - Part 2
21 MIN
Building a Policy Model
2 MIN
Deploying the Demo Applications
9 MIN
Implementing the Tiers
12 MIN
Policy Example 1 - Cluster-wide Policy
9 MIN
Policy Example 2 - Tenant-isolation Policy
18 MIN
Policy Example 3 - Platform Policy
16 MIN
Policy Example 4 - Namespace-isolation Policy
13 MIN
Policy Example 5 - Workload-isolation Policy
12 MIN
Policy Example 6 - Deny Policy
11 MIN
Learning Track Summary
7 MIN

Policy Management using the Policy Board

Identify Endpoints Scoped in a Policy
4 MIN
Identify Policies Denying Flows
3 MIN
Policy Metrics
4 MIN
Identify Flows Matching Policies and Endpoints
6 MIN
Download Policies from the Policy Board
3 MIN
Create Policies in the Policy Board
8 MIN
Audit Policies
7 MIN
Identify All Policies Applied to an Endpoint
9 MIN
Using the Policy Recommender
8 MIN
Working with Tiers in the Policy Board
5 MIN

Service Graph & Flow Visualization

Service Graph Overview
12 MIN
Service Graph - Navigating Through Namespaces
3 MIN
Service Graph - Alerts
5 MIN
Service Graph - Identify Policies Denying Traffic
6 MIN
Service Graph - Creating Custom Views
5 MIN
Service Graph - Packet Capture
8 MIN

Flow Log Observability & Troubleshooting

Flow Log Dashboard Introduction
13 MIN
Example 01 - Identify “deny” flows
6 MIN
Example 02 - Inbound and Outbound bytes
8 MIN
Example 03 - Identify flows with “bytes_in : 0”
6 MIN
Example 04 - Identify Flows to and from Specific Process with eBPF Probes
7 MIN
Example 05 - Identify Traffic to Specific Service Ports
5 MIN
Example 06 - Identify Traffic to Specific FQDNs
7 MIN
Example 07 - Identify Traffic to Specific Destination IPs
5 MIN
Example 08 - Identify Flows Denied by a Policy
12 MIN
Example 09 - Identify All Egress Connections from a Workload
7 MIN
Example 10 - Filter based on IP Range
5 MIN

DNS Observability & Troubleshooting

01. Introduction to DNS Observability Challenges
6 MIN
02. Calico DNS Observability
5 MIN
03. Troubleshooting DNS traffic deny
5 MIN
04. Troubleshooting DNS “SERVFAIL” errors
7 MIN
05. Troubleshooting DNS "NXDOMAIN" errors
8 MIN
06. Troubleshooting Missing DNS Resource Records
17 MIN

TCP Performance Monitoring and Troubleshooting

TCP Performance Dashboard
8 MIN
Troubleshooting Node Specific TCP Performance Issues
13 MIN
Troubleshooting Pod Specific TCP Performance Issues
12 MIN
TCP Performance Troubleshooting for Churned Nodes and Pods
7 MIN
Troubleshoot - Random flow denies
4 MIN

Web Application Firewall

Investigate WAF events and enable WAF blocking mode
7 MIN
Enable & Leverage Calico WAF
4 MIN
Enable WAF in the Calico UI
2 MIN

Miscellaneous

Kibana - How to retrieve a list of namespaces
1 MIN
AKS-Calico-CNI
4 MIN
Egress Gateway
2 MIN
Egress Access Control
3 MIN
Trace & Block Flows to Suspicious Destinations with Calico ThreatFeeds
10 MIN
Enhance Vulnerability Management with Calico Security Dashboards
9 MIN
Quarantine compromised pods
7 MIN
X