Following Kubernetes Best Practices
We have finally reached the last chapter of the Kubernetes part! Congrats on making it here—you’re now more than halfway through becoming Kubernetes and Cloud Native Associate (KCNA) certified!
In this chapter, we are going to discuss some of the best practices for operating Kubernetes and some of the security gaps and ways to address those.
We’ll learn about Kubernetes networking and network policies for traffic control; restricting access with role-based access control (RBAC); using Helm as a K8s package manager, and more. As before, we’ll need the minikube setup from the previous chapters to perform a few hands-on exercises.
The topics of this chapter include the following:
- Kubernetes networking essentials
- RBAC
- Helm—the package manager for K8s
- Kubernetes best practices
Let’s get started!