We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Kubelet Istio: Kubernetes Network Security Demystified

Formal Metadata

Title
Kubelet Istio: Kubernetes Network Security Demystified
Title of Series
Number of Parts
561
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Kubernetes provides multiple layers of network security including the control plane, etcd, the CNI network, network policies, and - with Istio on top - the requests between applications themselves. In this talk we explore the underlying technologies on which these layers are built using approachable examples and demonstrations. Attendees can expect to gain an understanding of these implementations and the principles behind encryption, identity, and trust in Kubernetes. What are TLS, X.509, and mutual authentication? Why cloud native communication should be encrypted by default Kubernetes component intercommunication CNI and network policy for applications Bootstrapping identity with SPIFFE Mutual TLS, route rules, and destination policies in Istio