Book Image

Hands-On Kubernetes on Windows

By : Piotr Tylenda
Book Image

Hands-On Kubernetes on Windows

By: Piotr Tylenda

Overview of this book

With the adoption of Windows containers in Kubernetes, you can now fully leverage the flexibility and robustness of the Kubernetes container orchestration system in the Windows ecosystem. This support will enable you to create new Windows applications and migrate existing ones to the cloud-native stack with the same ease as for Linux-oriented cloud applications. This practical guide takes you through the key concepts involved in packaging Windows-distributed applications into containers and orchestrating these using Kubernetes. You'll also understand the current limitations of Windows support in Kubernetes. As you advance, you'll gain hands-on experience deploying a fully functional hybrid Linux/Windows Kubernetes cluster for development, and explore production scenarios in on-premises and cloud environments, such as Microsoft Azure Kubernetes Service. By the end of this book, you'll be well-versed with containerization, microservices architecture, and the critical considerations for running Kubernetes in production environments successfully.
Table of Contents (23 chapters)
1
Section 1: Creating and Working with Containers
5
Section 2: Understanding Kubernetes Fundamentals
9
Section 3: Creating Windows Kubernetes Clusters
12
Section 4: Orchestrating Windows Containers Using Kubernetes

Chapter 13: Securing Kubernetes Clusters and Applications

  1. Kubernetes itself does not provide a means for managing normal external users who access the cluster. This should be delegated to an external authentication provider that can integrate with Kubernetes, for example, via Authenticating Proxy.
  2. To reduce the attack vector, the recommended practice is to never expose Kubernetes Dashboard using a LoadBalancer service and always use a kubectl proxy for accessing the page.
  3. This will provide an extra layer of security for your API resources and Secrets, which otherwise would be kept in etcd in unencrypted form.

  1. No, this feature is supported only in Linux containers.
  2. NetworkPolicy objects define how groups of Pods can communicate with each other and network endpoints in generalthink of them as a basic firewall for enforcing network segmentation at Layer 3 of the OSI...