- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 115字
- 2021-06-18 18:32:33
Chapter 2: Kubernetes Networking
When thousands of microservices are running in a Kubernetes cluster, you may be curious about how these microservices communicate with each other as well as with the internet. In this chapter, we will unveil all the communication paths in a Kubernetes cluster. We want you to not only know how the communication happens but to also look into the technical details with a security mindset: a regular communication channel can always be abused as part of the kill chain.
In this chapter, we will cover the following topics:
- Overview of the Kubernetes network model
- Communicating inside a pod
- Communicating between pods
- Introducing the Kubernetes service
- Introducing the CNI and CNI plugins
推薦閱讀
- 中國(guó)國(guó)民經(jīng)濟(jì)核算體系修訂問(wèn)題研究
- 國(guó)有企業(yè)經(jīng)濟(jì)責(zé)任審計(jì)實(shí)務(wù)指南
- Citrix XenApp? 7.5 Desktop Virtualization Solutions
- 會(huì)計(jì)信息化基礎(chǔ)(金蝶版)
- Learning Informatica PowerCenter 9.x
- 項(xiàng)目管理(第二版)
- 陜西國(guó)家統(tǒng)計(jì)調(diào)查專題研究集萃(2006—2015)
- OAuth 2.0 Identity and Access Management Patterns
- 審計(jì)基礎(chǔ)
- Salesforce Essentials for Administrators
- Minitab Cookbook
- Oracle Primavera Contract Management,Business Intelligence Publisher Edition v14
- 看穿一切數(shù)字的統(tǒng)計(jì)學(xué)
- 效益實(shí)現(xiàn)管理實(shí)踐指南
- 審計(jì)學(xué)理論與實(shí)務(wù)