Hands-on Kubernetes on Azure, Third Edition - Third Edition
By :
Hands-on Kubernetes on Azure, Third Edition - Third Edition
By:
Overview of this book
Containers and Kubernetes containers facilitate cloud deployments and application development by enabling efficient versioning with improved security and portability.
With updated chapters on role-based access control, pod identity, storing secrets, and network security in AKS, this third edition begins by introducing you to containers, Kubernetes, and Azure Kubernetes Service (AKS), and guides you through deploying an AKS cluster in different ways. You will then delve into the specifics of Kubernetes by deploying a sample guestbook application on AKS and installing complex Kubernetes apps using Helm. With the help of real-world examples, you'll also get to grips with scaling your applications and clusters.
As you advance, you'll learn how to overcome common challenges in AKS and secure your applications with HTTPS. You will also learn how to secure your clusters and applications in a dedicated section on security. In the final section, you’ll learn about advanced integrations, which give you the ability to create Azure databases and run serverless functions on AKS as well as the ability to integrate AKS with a continuous integration and continuous delivery (CI/CD) pipeline using GitHub Actions.
By the end of this Kubernetes book, you will be proficient in deploying containerized workloads on Microsoft Azure with minimal management overhead.
Table of Contents (22 chapters)
Foreword
1. Introduction to containers and Kubernetes
2. Getting started with Azure Kubernetes Service
Section 2: Deploying on AKS
3. Application deployment on AKS
4. Building scalable applications
5. Handling common failures in AKS
6. Securing your application with HTTPS
7. Monitoring the AKS cluster and the application
Section 3: Securing your AKS cluster and workloads
8. Role-based access control in AKS
9. Azure Active Directory pod‑managed identities in AKS
10. Storing secrets in AKS
11. Network security in AKS
Section 4: Integrating with Azure managed services
12. Connecting an application to an Azure database
13. Azure Security Center for Kubernetes
14. Serverless functions
15. Continuous integration and continuous deployment for AKS
Index
Customer Reviews