Securing Kubernetes Cluster Configuration
Securing Kubernetes Cluster Configuration
Cluster Configuration
practical-devsecops.com
CONTENT S
01 Understanding Kubernetes Cluster Architecture
CHAPTER 1
Understanding Kubernetes
Cluster Architecture
App-A.yaml
kubectl
L Loadbalancer namespace: Namespace-1
spec:
Service, Application kube- replicas: 1
kube-scheduler ...
apiserver
Pod spec:
containers:
Internet kube-controller- - name: Application-A
Container manager image: example/Image-A
...
resources:
www.my-example-app.com
requests:
memory: 250Mi
cpu: 250m
120.83.5.34:31197
limits:
Worker Node A memory: 1Gi
120.83.5.34 (external) cpu: 1
kubelet kube-proxy ...
api version: v1
kind: Service
metadata:
Namespace-1 name: Service-A
L namespace: Namespace-1
Service-A Service-B Service-C labels:
ClusterIP: 10.98.32.197 ClusterIP: 10.98.32.198 ClusterIP: 10.98.32.199 app: Application-A
31197
cluster_node_IP:31198
CHAPTER 2
Securing Kubernetes
API Server
External Entity
(User) 1 2 3
CHAPTER 3
Network Security in
Kubernetes Clusters
CHAPTER 4
CHAPTER 5
Continuous Monitoring
and Auditing of Kubernetes
Clusters
Continuous monitoring and auditing play a robust monitoring solutions and conducting
vital role in maintaining and enhancing the regular audits to detect and respond to security
security of Kubernetes clusters. This chapter incidents effectively.
focuses on the importance of implementing
10
11
Get Started