[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-05。"],[[["\u003cp\u003eThis Apigee hybrid documentation version 1.1 is end-of-life and requires an upgrade to a newer version.\u003c/p\u003e\n"],["\u003cp\u003eAn Apigee hybrid installation consists of multiple pods, each with specific port access requirements and varying communication needs.\u003c/p\u003e\n"],["\u003cp\u003eThe runtime pods can be secured and isolated by following the recommended practices such as reviewing the GKE security overview, utilizing network policies, and enabling GKE Sandbox.\u003c/p\u003e\n"],["\u003cp\u003eNetwork policies help in restricting pod-to-pod communication and controlling access outside the Kubernetes network, and they can be implemented using Container Network Interface (CNI) plugins.\u003c/p\u003e\n"],["\u003cp\u003eGKE Sandbox, based on the open-source gVisor project, provides a virtualized container environment to further enhance the security of Kubernetes clusters running Apigee hybrid.\u003c/p\u003e\n"]]],[],null,["# Securing the runtime installation\n\n| You are currently viewing version 1.1 of the Apigee hybrid documentation. **This version is end of life.** You should upgrade to a newer version. For more information, see [Supported versions](/apigee/docs/hybrid/supported-platforms#supported-versions).\nA typical Apigee hybrid installation is made of multiple pods, as listed in the following table. Each of these pods require specific access to ports, and not every pod needs to communicate with every other pod. For a detailed map of these internal connections and the security protocols they employ, see [Internal connections](/apigee/docs/hybrid/v1.1/ports#internal).\n\n\u003cbr /\u003e\n\n\nGoogle recommends that you follow these methods and best practices to harden,\nsecure, and isolate the runtime\npods:"]]