Advanced Kubernetes/AKS Network & Infrastructure – (Free Course)

0
229
Advertisement

What you’ll learn

  • Learn AKS and Kubernetes network best practices
  • Learn how to securely expose services in Kubernetes
  • Learn how to secure pod to pod communication
  • Learn to setup TLS certificates for pods and ingress

Description

You started your journey learning Kubernetes ?

You have been learning the fundamentals of a Kubernetes cluster ?

Advertisement

And now you want to make sure your cluster is production ready in terms of security ?

If you are looking for how to secure your Kubernetes cluster then this course is for you.

Let us face it, security is not an easy task. And Kubernetes is not an exception.

Securing a Kubernetes cluster requires thinking about all these aspects:

  1. Network security: through private cluster access to API Server with Private Endpoint.
  2. Secure egress traffic: all egress traffic should be filtered using Firewall.
  3. Secure ingress traffic: using TLS and HTTPS on the ingress controller.
  4. Secure inter-pod communication: secure traffic between pods using TLS or mTLS.
  5. Controlling traffic between pods: using Network Policy tools like Calico.
  6. Securing access to Managed Identities: by restricting access to IMDS endpoint (169.254.169.254).

Microsoft provides the following recommendations to secure an AKS cluster and this course will try to go deeper with demonstration.

Recommendation 1: To distribute HTTP or HTTPS traffic to your applications, use ingress resources and controllers. Compared to an Azure load balancer, ingress controllers provide extra features and can be managed as native Kubernetes resources.

Recommendation 2: To scan incoming traffic for potential attacks, use a web application firewall (WAF) such as Barracuda WAF for Azure or Azure Application Gateway. These more advanced network resources can also route traffic beyond just HTTP and HTTPS connections or basic TLS termination.

Recommendation 3: Use network policies to allow or deny traffic to pods. By default, all traffic is allowed between pods within a cluster. For improved security, define rules that limit pod communication.

Recommendation 4: Don’t expose remote connectivity to your AKS nodes. Create a bastion host, or jump box, in a management virtual network. Use the bastion host to securely route traffic into your AKS cluster to remote management tasks.

Disclaimer: This course uses Azure Kubernetes Service (AKS) for demonstrations. But most of the content is applicable to any Kubernetes cluster on any environment.

Who this course is for:

  • This course is for platform teams that needs to manage Kubernetes cluster and securely deploy apps.

How to Get this course FREE?

Apply this Coupon: AKS-ADVANCED-1220 (For 100% Discount)

For Latest Udemy Courses Coupon, Join Our Official Free Telegram Group : https://t.me/coursejoiner

Note: The udemy Courses Will be free for a Maximum of 1000 Learners can use the promo code AND Get this course 100% Free. After that, you will get this course at a discounted price. (Still, It’s a good deal for you to get this course at a discounted price).

External links may contain affiliate links, meaning we get a commission if you decide to make a purchase. Read our disclosure.

LEAVE A REPLY

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!