How to Run Kubernetes Securely and Efficiently
Offered By: CNCF [Cloud Native Computing Foundation] via YouTube
Course Description
Overview
Syllabus
Intro
Today's agenda
Containers change how software is developed
Containers and Kubernetes enable teams to ship faster
Challenges with containers
Cultural shift: Changes to the development pipeline
Where security and efficiency challenges emerge
Workload Security: What are containers & kubernetes configurations?
Example: Container vulnerabilities
Example: Over-permissioned containers
Example: Health probes
Example: Inappropriate resource requests and limits
Let's recap
Why Configuration Validation?
Steps for implementing configuration validation
Ways to implement Configuration Validation
Build your own tools
Use open source tools
Use a Purpose-built Platform
Things to look for in a Purpose-built Platform
Where should you implement Configuration Validation?
Business benefits of Configuration Validation
Fairwinds Guide to Managing Kubernetes Configuration
Taught by
CNCF [Cloud Native Computing Foundation]
Related Courses
Financial Sustainability: The Numbers side of Social Enterprise+Acumen via NovoEd Cloud Computing Concepts: Part 2
University of Illinois at Urbana-Champaign via Coursera Developing Repeatable ModelsĀ® to Scale Your Impact
+Acumen via Independent Managing Microsoft Windows Server Active Directory Domain Services
Microsoft via edX Introduction aux conteneurs
Microsoft Virtual Academy via OpenClassrooms