- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 112字
- 2021-06-18 18:32:35
Summary
In this chapter, we started by discussing the typical port resource conflict problem and how the Kubernetes network model tries to avoid this while maintaining good compatibility for migrating applications from the VM to Kubernetes pods. Then, we talked about the communication inside a pod, among pods, and from external sources to pods.
Last but not least, we covered the basic concept of CNI and introduced how Calico works in the Kubernetes environment. After the first two chapters, we hope you have a basic understanding of how Kubernetes components work and how things communicate with each other.
In the next chapter, we're going to talk about threat modeling a Kubernetes cluster.