Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Kubernetes – An Enterprise Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
Kubernetes – An Enterprise Guide

Kubernetes – An Enterprise Guide

By : Marc Boorshtein, Scott Surovich
4.8 (13)
close
close
Kubernetes – An Enterprise Guide

Kubernetes – An Enterprise Guide

4.8 (13)
By: Marc Boorshtein, Scott Surovich

Overview of this book

Stay at the forefront of cloud-native technologies with the eagerly awaited Kubernetes – An Enterprise Guide, Third Edition. Delve deep into Kubernetes and emerge with the latest insights to conquer today's dynamic enterprise challenges. This meticulously crafted edition equips you with the latest insights to skillfully navigate the twists and turns of ever-evolving cloud technology. Experience a more profound exploration of advanced Kubernetes deployments, revolutionary techniques, and expert strategies that redefine your cloud-native skill set. Discover cutting-edge topics reshaping the technological frontier like virtual clusters, container security, and secrets management. Gain an edge by mastering these critical aspects of Kubernetes and propelling your enterprise to new heights. Expertly harness Kubernetes' power for business-critical applications with insider techniques. Smoothly transition to microservices with Istio, excel at modern deployments with GitOps/CI/CD, and bolster security with OPA/Gatekeeper and KubeArmor. Integrate Kubernetes with leading tools for maximum impact in a competitive landscape. Stay ahead of the technology curve with cutting-edge strategies for innovation and growth. Redefine cloud-native excellence with this definitive guide to leveraging Kubernetes.
Table of Contents (22 chapters)
close
close
20
Other Books You May Enjoy
21
Index

Privileged Access to Clusters

In addition to managing authentication, most enterprises require a concept of “privileged access management”, where not only is access limited by user but by time as well. Most enterprises require a change control process of some kind to ensure that changes to production systems are tracked and approved. This requirement generally comes from any of the various compliance and regulatory frameworks needed in large enterprises.

There are generally three ways to manage privileged access in Kubernetes, and we’ll cover all three with their benefits and drawbacks.

Using a Privileged User Account

It is common for enterprises to require that administrators have two accounts, one for day-to-day tasks and one for making administrative changes. This approach is generally implemented using a Privilege Access Manager (PAM) that generates a new password for the user when they’re authorized to do their work. This approach enables compliance with...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY