Errata

Hacking Kubernetes

Errata for Hacking Kubernetes

Submit your own errata for this product.

The errata list is a list of errors and their corrections that were found after the product was released.

The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.

Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update

Version Location Description Submitted by Date submitted
Printed Page 18
In figure 2-2

In figure 2-2 step 4. has the typo contianer.

Ben Wells  Mar 06, 2022 
Printed Page 18
In figure 2-2

In figure 2-2 step 4. has the typo contianer.

Ben Wells  Mar 06, 2022 
Printed Page 25
Figure 2-6

Figure 2-6 step 3. has the typo ccontainer.

Ben Wells  Mar 06, 2022 
Printed Page 51
Paragraph 5

The issue is with the paragraph:

The privileged flag was quoted as being "the most dangerous flag in the history of computing" by Liz Rice, ...

In the book Container Security by Liz Rice (p111) this quote is attributed to Andrew Martin. I'm sure that Liz Rice has also quoted this, but might be worth using the original source.

Ben Wells  Mar 05, 2022 
Printed Page 140
Figure 5-5

Typo in key: Extrmely essential

Ben Wells  Mar 07, 2022 
Printed Page 207
Figure 8-3

Typo in box 'Assign perm view delpoys' delpoys -> deploys

Ben Wells  Mar 12, 2022