At the end of the last chapter, we touched upon securing our serverless installations—and the potential lack of security you get out of the box. In this chapter, we are going to approach that subject head-on and discuss what you should be looking out for when deploying your serverless function services on Kubernetes, as well as how to best monitor your clusters.
We will be looking at:
- Security best practices
- How do you monitor your Kubernetes cluster?
Let's make a start by discussing security.