O'Reilly logo

Kubernetes for Serverless Applications by Russ McKendrick

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Serverless Considerations

At the end of the last chapter, we touched upon securing our serverless installations—and the potential lack of security you get out of the box. In this chapter, we are going to approach that subject head-on and discuss what you should be looking out for when deploying your serverless function services on Kubernetes, as well as how to best monitor your clusters.

We will be looking at:

  • Security best practices
  • How do you monitor your Kubernetes cluster?

Let's make a start by discussing security.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required