Book Image

Kubernetes in Production Best Practices

By : Aly Saleh, Murat Karslioglu
Book Image

Kubernetes in Production Best Practices

By: Aly Saleh, Murat Karslioglu

Overview of this book

Although out-of-the-box solutions can help you to get a cluster up and running quickly, running a Kubernetes cluster that is optimized for production workloads is a challenge, especially for users with basic or intermediate knowledge. With detailed coverage of cloud industry standards and best practices for achieving scalability, availability, operational excellence, and cost optimization, this Kubernetes book is a blueprint for managing applications and services in production. You'll discover the most common way to deploy and operate Kubernetes clusters, which is to use a public cloud-managed service from AWS, Azure, or Google Cloud Platform (GCP). This book explores Amazon Elastic Kubernetes Service (Amazon EKS), the AWS-managed version of Kubernetes, for working through practical exercises. As you get to grips with implementation details specific to AWS and EKS, you'll understand the design concepts, implementation best practices, and configuration applicable to other cloud-managed services. Throughout the book, you’ll also discover standard and cloud-agnostic tools, such as Terraform and Ansible, for provisioning and configuring infrastructure. By the end of this book, you’ll be able to leverage Kubernetes to operate and manage your production environments confidently.
Table of Contents (12 chapters)

Securing Kubernetes infrastructure

In Chapter 2, Architecting Production-Grade Kubernetes Infrastructure, we discussed the best practices for the network infrastructure for Kubernetes clusters and we proposed design guidelines that are essential for the infrastructure security of clusters. While these guidelines are essential for you to consider and follow, you still need to evaluate the entire network security requirements of your infrastructure to be sure that you have a complete and appropriate security solution for your environment and product.

Most of these security recommendations and best practices are implemented within the Terraform and Ansible configurations that we did in the previous chapters:

  • Use multiple availability zones (three or more) to deploy your Kubernetes cluster for high availability.
  • Deploy the control plane and worker nodes in private subnets only. Use the public subnets for internet-facing load balancers.
  • Do not allow public access to worker...