Exploring container security: Performing forensics on your GKE environment