- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 115字
- 2021-06-18 18:32:33
Chapter 2: Kubernetes Networking
When thousands of microservices are running in a Kubernetes cluster, you may be curious about how these microservices communicate with each other as well as with the internet. In this chapter, we will unveil all the communication paths in a Kubernetes cluster. We want you to not only know how the communication happens but to also look into the technical details with a security mindset: a regular communication channel can always be abused as part of the kill chain.
In this chapter, we will cover the following topics:
- Overview of the Kubernetes network model
- Communicating inside a pod
- Communicating between pods
- Introducing the Kubernetes service
- Introducing the CNI and CNI plugins
推薦閱讀
- 中國新股民必讀手冊(2015年最新版)
- 基于價值增值的治理導向型內部審計研究
- 讓財報說話:世界500強CFO帶你輕松讀財報(鮮讀版)
- Citrix? XenMobile? Mobile Device Management
- Big Data Visualization
- Business Intelligence with MicroStrategy Cookbook
- 大數據搜索與挖掘及可視化管理方案 :Elastic Stack 5:Elasticsearch、Logstash、Kibana、X-Pack、Beats (第3版)
- OAuth 2.0 Identity and Access Management Patterns
- vSphere Design Best Practices
- Programming Microsoft Dynamics NAV(Fifth Edition)
- 高級計量經濟分析及Stata應用
- Oracle Primavera Contract Management,Business Intelligence Publisher Edition v14
- Getting Started with Oracle Tuxedo
- Business Intelligence Cookbook:A Project Lifecycle Approach Using Oracle Technology
- Microsoft Dynamics CRM 2016 Customization(Second Edition)