March 2017
Beginner to intermediate
925 pages
18h 11m
English
In order to use more advanced management, we can add permission rules to the Kubernetes system. Two permission types could be generated in our cluster: one is between the machines. Nodes having authentication can contact the controlling node. For example, the master who owns certification with the etcd server can store data in etcd. The other permission rule is inside the Kubernetes master. Users can be given authorization for checking and creating the resources. Applying authentication and authorization is a secure solution to prevent your data or status being accessed by others.
Before you start configuring your cluster with some permissions, please have your cluster installed. Nevertheless, stop ...
Read now
Unlock full access