Book Image

The Kubernetes Book

By : Nigel Poulton, Pushkar Joglekar
Book Image

The Kubernetes Book

By: Nigel Poulton, Pushkar Joglekar

Overview of this book

Kubernetes is the leading orchestrator of cloud-native apps. With knowledge of how to work with Kubernetes, you can easily deploy and manage applications on the cloud or in your on-premises data center. The book begins by introducing you to Kubernetes and showing you how to install it. You’ll learn how to use Kubernetes Services and bring stable and reliable networking to apps that are deployed on Kubernetes. You'll delve deep into the powerful storage subsystem of Kubernetes and learn how to leverage the variety of external storage backends in your applications. As the book progresses, it shows you how to use features such as DaemonSets, Helm, and RBAC to enhance your Kubernetes applications. You'll explore the six categories of identifying vulnerabilities and look at a few ways to prevent and mitigate them. You'll also look at ways to secure the software delivery pipeline by discussing some image-related best practices. The book ends by sharing with you some resources that’ll help take your Kubernetes knowledge to the next level. By the end of the book, you’ll have the confidence and skills to leverage all the features of Kubernetes to develop scalable applications.
Table of Contents (23 chapters)
Free Chapter
1
Chapter 1
3
Chapter 2
5
Chapter 3
7
Chapter 4
9
Chapter 5
11
Chapter 6
13
Chapter 7
15
Chapter 8
17
Chapter 9
19
Chapter 10
21
Chapter 11

Repudiation

At a very high level, repudiation is casting doubt on something. Non-repudiation is providing proof about something. In the context of information security, non-repudiation is proving that certain actions were carried out by certain individuals.

Digging a little deeper, non-repudiation includes the ability to prove:

  • What happened
  • When it happened
  • Who made it happen
  • Where it happened
  • Why it happened
  • How it happened

Answering the last two usually requires the correlation of several events over a period of time.

Fortunately, auditing Kubernetes API server events can usually help answer these questions. The following is an example of an API server audit event (you may need to manually enable auditing on your API server).

{
  "kind":"Event",
  "apiVersion":"audit.k8s.io/v1",
  "metadata":{ "creationTimestamp":"2019-03-03T10:10:00Z" },
  "level":"Metadata...