Google Kubernetes Engine Best Practices: Security
Advanced 6 etapas 7 horas 44 créditos
Get Anthos Ready. This second Google Kubernetes Engine-centric Quest of best practices hands-on labs focuses on security at scale when deploying and managing production GKE environments -- specifically role-based access control, hardening, VPC networking, and binary authorization.
Pré-requisitos:It is recommended that students have completed the first Quest in this series Google Kubernetes Best Practices before attempting these labs.
Neste laboratório, você aprenderá a migrar um aplicativo sem estado em execução em uma VM para ser executado no Kubernetes Engine (GKE). Você verá o ciclo de vida de um aplicativo migrado de uma implantação comum em VM/SO para três plataformas de infraestrutura em nuvem com contêineres.
In this lab you learn how to improve the security of your Kubernetes Engine by applying fine-grained restrictions to limit intra-cluster network communication.
After provisioning two service accounts to represent user personas and three namespaces: dev, test, and prod, you will test the access controls of the personals in each namespace.
This lab deploys a Kubernetes Engine Cluster with the Binary Authorization feature enabled; you'll learn how to whitelist approved container registries and the process of creating and running a signed container.
In this lab you will learn how Kubernetes Engine security features can be used to grant varying levels of privilege to applications based on their particular requirements
This lab demonstrates some of the security concerns of a default GKE cluster configuration and the corresponding hardening measures to prevent multiple paths of pod escape and cluster privilege escalation