- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 112字
- 2021-06-18 18:32:34
Summary
In this chapter, we started by discussing the typical port resource conflict problem and how the Kubernetes network model tries to avoid this while maintaining good compatibility for migrating applications from the VM to Kubernetes pods. Then, we talked about the communication inside a pod, among pods, and from external sources to pods.
Last but not least, we covered the basic concept of CNI and introduced how Calico works in the Kubernetes environment. After the first two chapters, we hope you have a basic understanding of how Kubernetes components work and how things communicate with each other.
In the next chapter, we're going to talk about threat modeling a Kubernetes cluster.
推薦閱讀
- 資本的眼睛
- 基于價值增值的治理導向型內(nèi)部審計研究
- 博弈論及其在經(jīng)濟管理中的應用
- 注冊會計師全國統(tǒng)一考試專用教材:審計
- 陜西國家統(tǒng)計調(diào)查專題研究集萃(2006—2015)
- 審計基礎
- AO2011實用手冊
- Tableau:Creating Interactive Data Visualizations
- Getting Started with Microsoft Lync Server 2013
- 下一場全球金融危機的到來:明斯基與金融不穩(wěn)定
- 政策建模技術:CGE模型的理論與實現(xiàn)
- Oracle Primavera Contract Management,Business Intelligence Publisher Edition v14
- 中國國內(nèi)生產(chǎn)總值核算問題研究
- Microsoft Dynamics CRM 2016 Customization(Second Edition)
- 2014年注冊會計師(CPA)全國統(tǒng)考專用輔導教材系列:審計(名師解讀版)