Skip to Content
Hands-On Microservices with Kubernetes
book

Hands-On Microservices with Kubernetes

by Gigi Sayfan
July 2019
Intermediate to advanced
502 pages
14h
English
Packt Publishing
Content preview from Hands-On Microservices with Kubernetes

Implementing security contexts

Sometimes, pods and containers need escalated privileges or access to the node. This will be very rare for your application workloads. However, when necessary, Kubernetes has the concept of a security context that encapsulates and allows you to configure multiple Linux security concepts and mechanisms. This is critical from a security perspective because you open up a tunnel out of the container world into the host machine.

Here is a list of some mechanisms that are covered by security contexts:

  • Allowing (or forbidding) privilege escalation
  • Access control via user IDs and group IDs (runAsUser, runAsGroup)
  • Capabilities as opposed to unrestricted root access
  • Using AppArmor and seccomp profiles
  • SELinux configuration ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Kubernetes Microservices

Kubernetes Microservices

Richard Chesterwood
Cloud Native DevOps with Kubernetes

Cloud Native DevOps with Kubernetes

John Arundel, Justin Domingus
Microservices: Up and Running

Microservices: Up and Running

Ronnie Mitra, Irakli Nadareishvili

Publisher Resources

ISBN: 9781789805468Supplemental Content