Book Image

Google Cloud for DevOps Engineers

By : Sandeep Madamanchi
Book Image

Google Cloud for DevOps Engineers

By: Sandeep Madamanchi

Overview of this book

DevOps is a set of practices that help remove barriers between developers and system administrators, and is implemented by Google through site reliability engineering (SRE). With the help of this book, you'll explore the evolution of DevOps and SRE, before delving into SRE technical practices such as SLA, SLO, SLI, and error budgets that are critical to building reliable software faster and balance new feature deployment with system reliability. You'll then explore SRE cultural practices such as incident management and being on-call, and learn the building blocks to form SRE teams. The second part of the book focuses on Google Cloud services to implement DevOps via continuous integration and continuous delivery (CI/CD). You'll learn how to add source code via Cloud Source Repositories, build code to create deployment artifacts via Cloud Build, and push it to Container Registry. Moving on, you'll understand the need for container orchestration via Kubernetes, comprehend Kubernetes essentials, apply via Google Kubernetes Engine (GKE), and secure the GKE cluster. Finally, you'll explore Cloud Operations to monitor, alert, debug, trace, and profile deployed applications. By the end of this SRE book, you'll be well-versed with the key concepts necessary for gaining Professional Cloud DevOps Engineer certification with the help of mock tests.
Table of Contents (17 chapters)
1
Section 1: Site Reliability Engineering – A Prescriptive Way to Implement DevOps
6
Section 2: Google Cloud Services to Implement DevOps via CI/CD
Appendix: Getting Ready for Professional Cloud DevOps Engineer Certification

Essential security patterns in Kubernetes

A Kubernetes cluster can run multiple types of workloads. This includes stateful applications, stateless applications, jobs, and DaemonSets. However, it is critical to secure these workloads from potential security attacks. Native Kubernetes provides some essential security constructs that focus on the fundamentals, including a request being sent to the cluster and how the request is authenticated and authorized. Additionally, it is important to understand how the master plane components are secured and how the pods running the applications can also be secured. We will cover these from a native Kubernetes standpoint, but their implementation in GKE will also be discussed. The first such security construct we will deep dive into is authentication.

Authentication

Authentication is the process of determining the identity of the user. It essentially confirms that the user is who they say they are and eventually provides access to eligible...