Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Kubernetes on Windows

You're reading from   Hands-On Kubernetes on Windows Effectively orchestrate Windows container workloads using Kubernetes

Arrow left icon
Product type Paperback
Published in Mar 2020
Publisher Packt
ISBN-13 9781838821562
Length 592 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Piotr Tylenda Piotr Tylenda
Author Profile Icon Piotr Tylenda
Piotr Tylenda
Arrow right icon
View More author details
Toc

Table of Contents (23) Chapters Close

Preface 1. Section 1: Creating and Working with Containers
2. Creating Containers FREE CHAPTER 3. Managing State in Containers 4. Working with Container Images 5. Section 2: Understanding Kubernetes Fundamentals
6. Kubernetes Concepts and Windows Support 7. Kubernetes Networking 8. Interacting with Kubernetes Clusters 9. Section 3: Creating Windows Kubernetes Clusters
10. Deploying a Hybrid On-Premises Kubernetes Cluster 11. Deploying a Hybrid Azure Kubernetes Service Engine Cluster 12. Section 4: Orchestrating Windows Containers Using Kubernetes
13. Deploying Your First Application 14. Deploying Microsoft SQL Server 2019 and a ASP.NET MVC Application 15. Configuring Applications to Use Kubernetes Features 16. Development Workflow with Kubernetes 17. Securing Kubernetes Clusters and Applications 18. Monitoring Kubernetes Applications Using Prometheus 19. Disaster Recovery 20. Production Considerations for Running Kubernetes 21. Assessments 22. Other Books You May Enjoy

Chapter 13: Securing Kubernetes Clusters and Applications

  1. Kubernetes itself does not provide a means for managing normal external users who access the cluster. This should be delegated to an external authentication provider that can integrate with Kubernetes, for example, via Authenticating Proxy.
  2. To reduce the attack vector, the recommended practice is to never expose Kubernetes Dashboard using a LoadBalancer service and always use a kubectl proxy for accessing the page.
  3. This will provide an extra layer of security for your API resources and Secrets, which otherwise would be kept in etcd in unencrypted form.

  1. No, this feature is supported only in Linux containers.
  2. NetworkPolicy objects define how groups of Pods can communicate with each other and network endpoints in general—think of them as a basic firewall for enforcing network segmentation at Layer 3 of the OSI...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image