Book Image

The Kubernetes Workshop

By : Zachary Arnold, Sahil Dua, Wei Huang, Faisal Masood, Mélony Qin, Mohammed Abu Taleb
Book Image

The Kubernetes Workshop

By: Zachary Arnold, Sahil Dua, Wei Huang, Faisal Masood, Mélony Qin, Mohammed Abu Taleb

Overview of this book

Thanks to its extensive support for managing hundreds of containers that run cloud-native applications, Kubernetes is the most popular open source container orchestration platform that makes cluster management easy. This workshop adopts a practical approach to get you acquainted with the Kubernetes environment and its applications. Starting with an introduction to the fundamentals of Kubernetes, you’ll install and set up your Kubernetes environment. You’ll understand how to write YAML files and deploy your first simple web application container using Pod. You’ll then assign human-friendly names to Pods, explore various Kubernetes entities and functions, and discover when to use them. As you work through the chapters, this Kubernetes book will show you how you can make full-scale use of Kubernetes by applying a variety of techniques for designing components and deploying clusters. You’ll also get to grips with security policies for limiting access to certain functions inside the cluster. Toward the end of the book, you’ll get a rundown of Kubernetes advanced features for building your own controller and upgrading to a Kubernetes cluster without downtime. By the end of this workshop, you’ll be able to manage containers and run cloud-based applications efficiently using Kubernetes.
Table of Contents (20 chapters)
Preface

Introduction

In the last couple of chapters, we had our DevOps hat on and learned how to set up a cluster, as well as how to roll out new application versions safely and without downtime in Kubernetes.

Now, it's time to switch gears a bit, take our DevOps hat off, and put on our security analyst hat. First, we will look at where someone might attack our Kubernetes cluster and how an unauthorized user could potentially wreak havoc in our cluster. After that, we're going to introduce a few of the security primitives of Kubernetes and how we can combat the most common forms of attack. Finally, we'll further modify our application and demonstrate how some of these security primitives work.

But before we get to any of it, let's begin by taking a brief look at the various areas of concern for security in a modern web application, as well as a basic paradigm for implementing effective security for our cluster. We'll start by examining what we call the &quot...