6

Securing and Accessing Clusters on EKS

This chapter will introduce the general concepts for authentication and authorization in Kubernetes, and will also discuss the differences between these concepts and Elastic Kubernetes Service (EKS). We will also look at how to configure EKS and client tools to securely communicate.

Authentication verifies the identity of a user or service, and authorization manages what they can do. In this chapter, we will review the mechanism used in EKS to implement authentication and authorization so you to use them to build secure clusters. Specifically, we will cover the following topics:

  • Understanding key Kubernetes concepts
  • Configuring EKS cluster access

Understanding key Kubernetes concepts

Kubernetes clusters ...

Get Mastering Elastic Kubernetes Service on AWS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.