Book Image

Hands-On Kubernetes on Windows

By : Piotr Tylenda
Book Image

Hands-On Kubernetes on Windows

By: Piotr Tylenda

Overview of this book

With the adoption of Windows containers in Kubernetes, you can now fully leverage the flexibility and robustness of the Kubernetes container orchestration system in the Windows ecosystem. This support will enable you to create new Windows applications and migrate existing ones to the cloud-native stack with the same ease as for Linux-oriented cloud applications. This practical guide takes you through the key concepts involved in packaging Windows-distributed applications into containers and orchestrating these using Kubernetes. You'll also understand the current limitations of Windows support in Kubernetes. As you advance, you'll gain hands-on experience deploying a fully functional hybrid Linux/Windows Kubernetes cluster for development, and explore production scenarios in on-premises and cloud environments, such as Microsoft Azure Kubernetes Service. By the end of this book, you'll be well-versed with containerization, microservices architecture, and the critical considerations for running Kubernetes in production environments successfully.
Table of Contents (23 chapters)
1
Section 1: Creating and Working with Containers
5
Section 2: Understanding Kubernetes Fundamentals
9
Section 3: Creating Windows Kubernetes Clusters
12
Section 4: Orchestrating Windows Containers Using Kubernetes

Kubernetes secrets on Windows machines

In Chapter 4, Kubernetes Concepts and Windows Support, we mentioned that one of Windows's node support limitations is that Kubernetes secrets that are mounted to pods as volumes are written in clear-text on node disk storage (not RAM memory). The reason for this is that Windows currently does not support mounting in-memory filesystems to pod containers. This may pose security risks, and needs additional actions to secure the cluster. At the same time, mounting secrets as environment variables has its own security risks—you can enumerate environment variables for processes if you have access to the system. Until it is possible to mount secrets as volumes from in-memory filesystems, there is no completely secure solution for injecting secrets for Windows containers apart from using third-party providers, such as Azure Key Vault...