- Mastering Kubernetes
- Gigi Sayfan
- 213字
- 2021-06-18 18:37:01
4 Securing Kubernetes
In Chapter 3, High Availability and Reliability, we looked at reliable and highly available Kubernetes clusters, the basic concepts, the best practices, how to do live updates, and the many design trade-offs regarding performance and cost.
In this chapter, we will explore the important topic of security. Kubernetes clusters are complicated systems composed of multiple layers of interacting components. Isolation and compartmentalization of different layers is very important when running critical applications. To secure the system and ensure proper access to resources, capabilities, and data, we must first understand the unique challenges facing Kubernetes as a general-purpose orchestration platform that runs unknown workloads. Then we can take advantage of various securities, isolation, and access control mechanisms to make sure the cluster, the applications running on it, and the data are all safe. We will discuss various best practices and when it is appropriate to use each mechanism.
At the end of this chapter, you will have a good understanding of Kubernetes security challenges. You will gain practical knowledge of how to harden Kubernetes against various potential attacks, establishing defense in depth, and will even be able to safely run a multi-tenant cluster while providing different users full isolation as well as full control over their part of the cluster.
- PPT,要你好看
- 構(gòu)建高質(zhì)量的C#代碼
- Deep Learning Quick Reference
- 圖解PLC控制系統(tǒng)梯形圖和語句表
- Zabbix Network Monitoring(Second Edition)
- 可編程序控制器應(yīng)用實(shí)訓(xùn)(三菱機(jī)型)
- 人工智能實(shí)踐錄
- 軟件構(gòu)件技術(shù)
- Mastering Text Mining with R
- 筆記本電腦電路分析與故障診斷
- 數(shù)字多媒體技術(shù)基礎(chǔ)
- 電氣控制及Micro800 PLC程序設(shè)計
- Access 2007數(shù)據(jù)庫入門與實(shí)例應(yīng)用金典
- Raspberry Pi 3 Projects for Java Programmers
- 單片機(jī)硬件接口電路及實(shí)例解析