Chapter 12: Securing Kubernetes

View in the book. Buy the book.

Keeping your cluster up to date, handling disruption, deploying node agents, and building non-root containers. Plus the process of creating a dedicated namespace for a team of developers and how access can be granted specifically to that namespace. This is a pretty common pattern I’ve observed in companies where several teams share clusters.

12.1.3 Handling disruptions

12.2 Deploying node agents with DaemonSet

12.3 Pod security context

12.4 Non-root containers

12.5 Admission controllers

12.6 Role-based access control