Completed
Ways to implement Configuration Validation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Run Kubernetes Securely and Efficiently
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Today's agenda
- 3 Containers change how software is developed
- 4 Containers and Kubernetes enable teams to ship faster
- 5 Challenges with containers
- 6 Cultural shift: Changes to the development pipeline
- 7 Where security and efficiency challenges emerge
- 8 Workload Security: What are containers & kubernetes configurations?
- 9 Example: Container vulnerabilities
- 10 Example: Over-permissioned containers
- 11 Example: Health probes
- 12 Example: Inappropriate resource requests and limits
- 13 Let's recap
- 14 Why Configuration Validation?
- 15 Steps for implementing configuration validation
- 16 Ways to implement Configuration Validation
- 17 Build your own tools
- 18 Use open source tools
- 19 Use a Purpose-built Platform
- 20 Things to look for in a Purpose-built Platform
- 21 Where should you implement Configuration Validation?
- 22 Business benefits of Configuration Validation
- 23 Fairwinds Guide to Managing Kubernetes Configuration