Section 3: Running Kubernetes in the Enterprise
In this last section, we will dive into the add-on components that a cluster requires for the enterprise. The first topic will explain how to integrate identity and access management using an enterprise directory. We will then focus on securing a cluster, starting with how to deploy a secure Kubernetes dashboard, which is commonly viewed as a security issue. Using the dashboard as an example, we will explain how to use an identity provider to secure a cluster using role-based access control (RBAC).
Going beyond basic RBAC, we will then see how to secure a cluster by using Pod Security Policies and Open Policy Agent. Finally, we will expain how to close a commonly overlooked audit point in a cluster, pod-level auditing, by implementing Falco and EFK.
The last part of this section will provide details on how to back up workloads for disaster recovery and cluster migrations. Finally, we will close out the book by creating a new cluster...