How to Run Kubernetes Securely and Efficiently

How to Run Kubernetes Securely and Efficiently

CNCF [Cloud Native Computing Foundation] via YouTube Direct link

Business benefits of Configuration Validation

22 of 23

22 of 23

Business benefits of Configuration Validation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Run Kubernetes Securely and Efficiently

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Today's agenda
  3. 3 Containers change how software is developed
  4. 4 Containers and Kubernetes enable teams to ship faster
  5. 5 Challenges with containers
  6. 6 Cultural shift: Changes to the development pipeline
  7. 7 Where security and efficiency challenges emerge
  8. 8 Workload Security: What are containers & kubernetes configurations?
  9. 9 Example: Container vulnerabilities
  10. 10 Example: Over-permissioned containers
  11. 11 Example: Health probes
  12. 12 Example: Inappropriate resource requests and limits
  13. 13 Let's recap
  14. 14 Why Configuration Validation?
  15. 15 Steps for implementing configuration validation
  16. 16 Ways to implement Configuration Validation
  17. 17 Build your own tools
  18. 18 Use open source tools
  19. 19 Use a Purpose-built Platform
  20. 20 Things to look for in a Purpose-built Platform
  21. 21 Where should you implement Configuration Validation?
  22. 22 Business benefits of Configuration Validation
  23. 23 Fairwinds Guide to Managing Kubernetes Configuration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.