Completed
Service Mesh: The Hard Way
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Stay on Top of Ongoing Kubernetes Security Hygiene
Automatically move to the next video in the Classroom when playback concludes
- 1 portshift
- 2 Discussion Points
- 3 Classical Image Scan
- 4 The Challenges of the Classical Approach
- 5 Introducing Kubei, an Open Source Runtime Scanner
- 6 CD: Advanced detection of potential risks
- 7 Example of Advanced Risk Detection
- 8 Role Based Access Control in Kubernetes
- 9 Roles: What Can Go Wrong?
- 10 Containers Attack Anatomy
- 11 Kubernetes Pod Security Context: Deep View
- 12 What Happens if Pod Security Context isn't set
- 13 Kubernetes Pod Security Policy to the rescue
- 14 Network Policies: Out of Cluster Challenges
- 15 The Life Outside the Cluster: Non Containerized
- 16 Service Mesh: The Hard Way
- 17 Service Mesh: The Intuitive Way
- 18 API Server architecture flow
- 19 The Ideal Protection Scheme
- 20 Summary
- 21 Wrap Up + Shareables