Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
The Complete Kubernetes Guide

You're reading from   The Complete Kubernetes Guide Become an expert in container management with the power of Kubernetes

Arrow left icon
Product type Course
Published in May 2019
Publisher Packt
ISBN-13 9781838647346
Length 628 pages
Edition 1st Edition
Arrow right icon
Authors (3):
Arrow left icon
Jesse White Jesse White
Author Profile Icon Jesse White
Jesse White
Gigi Sayfan Gigi Sayfan
Author Profile Icon Gigi Sayfan
Gigi Sayfan
Jonathan Baier Jonathan Baier
Author Profile Icon Jonathan Baier
Jonathan Baier
Arrow right icon
View More author details
Toc

Table of Contents (26) Chapters Close

Title Page
Copyright and Credits
About Packt
Contributors
Preface
1. Introduction to Kubernetes FREE CHAPTER 2. Understanding Kubernetes Architecture 3. Building a Foundation with Core Kubernetes Constructs 4. Working with Networking, Load Balancers, and Ingress 5. Using Critical Kubernetes Resources 6. Exploring Kubernetes Storage Concepts 7. Monitoring and Logging 8. Monitoring, Logging, and Troubleshooting 9. Operating Systems, Platforms, and Cloud and Local Providers 10. Creating Kubernetes Clusters 11. Cluster Federation and Multi-Tenancy 12. Cluster Authentication, Authorization, and Container Security 13. Running Stateful Applications with Kubernetes 14. Rolling Updates, Scalability, and Quotas 15. Advanced Kubernetes Networking 16. Kubernetes Infrastructure Management 17. Customizing Kubernetes - API and Plugins 18. Handling the Kubernetes Package Manager 19. The Future of Kubernetes 1. Other Books You May Enjoy Index

Using network policies effectively


The Kubernetes network policy is about managing network traffic to selected pods and namespaces. In a world of hundreds of deployed and orchestrated microservices, as is often the case with Kubernetes, managing networking and connectivity between pods is essential. It's important to understand that it is not primarily a security mechanism. If an attacker can reach the internal network, they will probably be able to create their own pods that comply with the network policy in place and communicate freely with other pods. In the previous section, we looked at different Kubernetes networking solutions and focused on the container networking interface. In this section, the focus is on network policy, although there are strong connections between the networking solution and how network policy is implemented on top of it.

Understanding the Kubernetes network policy design

A network policy is a specification of how selections of pods can communicate with each other...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime