Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Kubernetes – An Enterprise Guide - Second Edition

You're reading from  Kubernetes – An Enterprise Guide - Second Edition

Product type Book
Published in Dec 2021
Publisher Packt
ISBN-13 9781803230030
Pages 578 pages
Edition 2nd Edition
Languages
Authors (2):
Marc Boorshtein Marc Boorshtein
Profile icon Marc Boorshtein
Scott Surovich Scott Surovich
Profile icon Scott Surovich
View More author details

Table of Contents (17) Chapters

Preface 1. Docker and Container Essentials 2. Deploying Kubernetes Using KinD 3. Kubernetes Bootcamp 4. Services, Load Balancing, ExternalDNS, and Global Balancing 5. Integrating Authentication into Your Cluster 6. RBAC Policies and Auditing 7. Deploying a Secured Kubernetes Dashboard 8. Extending Security Using Open Policy Agent 9. Node Security with GateKeeper 10. Auditing Using Falco, DevOps AI, and ECK 11. Backing Up Workloads 12. An Introduction to Istio 13. Building and Deploying Applications on Istio 14. Provisioning a Platform 15. Other Books You May Enjoy
16. Index

Introducing Istio resources

Once you deploy Istio, you will have additional custom resources that provide the Istio features. Each of these resources provides powerful features and each one could be a chapter by itself. In this section, we want to provide enough details so you will have a strong understanding of each object. In the next section, we will deploy a basic application that will explain many of the objects in a real-world application example.

Authorization policies

Authorization policies are used to control access to the deployments in the service mesh. They provide developers with the ability to control access to workloads based on actions including deny, allow, and custom.

Policies are applied in a certain order. Istio will apply custom policies first, then deny policies, and finally, any allow policies.

Understanding how a policy's actions are evaluated is very important, since a misconfigured policy may not provide the expected results. The high...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}