Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Kubernetes on Windows

You're reading from   Hands-On Kubernetes on Windows Effectively orchestrate Windows container workloads using Kubernetes

Arrow left icon
Product type Paperback
Published in Mar 2020
Publisher Packt
ISBN-13 9781838821562
Length 592 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Piotr Tylenda Piotr Tylenda
Author Profile Icon Piotr Tylenda
Piotr Tylenda
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Section 1: Creating and Working with Containers
2. Creating Containers FREE CHAPTER 3. Managing State in Containers 4. Working with Container Images 5. Section 2: Understanding Kubernetes Fundamentals
6. Kubernetes Concepts and Windows Support 7. Kubernetes Networking 8. Interacting with Kubernetes Clusters 9. Section 3: Creating Windows Kubernetes Clusters
10. Deploying a Hybrid On-Premises Kubernetes Cluster 11. Deploying a Hybrid Azure Kubernetes Service Engine Cluster 12. Section 4: Orchestrating Windows Containers Using Kubernetes
13. Deploying Your First Application 14. Deploying Microsoft SQL Server 2019 and a ASP.NET MVC Application 15. Configuring Applications to Use Kubernetes Features 16. Development Workflow with Kubernetes 17. Securing Kubernetes Clusters and Applications 18. Monitoring Kubernetes Applications Using Prometheus 19. Disaster Recovery 20. Production Considerations for Running Kubernetes 21. Assessments 22. Other Books You May Enjoy

Securing Kubernetes Clusters and Applications

The topic of security deserves special attention—Kubernetes is a huge and complex system where security is not obvious and potential attack vectors are not immediately visible. Thinking about security in Kubernetes is even more important if you consider the powerful operations that this system can perform and how deeply it integrates with the operating system internals. Just to shed some light on how things may go south if you overlook configuration details, take a look at an article on how Tesla got cryptojacked because of a public, unauthenticated endpoint for Kubernetes Dashboard (https://blog.heptio.com/on-securing-the-kubernetes-dashboard-16b09b1b7aca).

In this chapter, we are going to provide you with the general best practices for securing Kubernetes clusters, including the Windows workloads perspective. Windows nodes...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime