Kubernetes - Section 2: Configuration
βοΈ
Description π
Configuration is the process of setting up your application so that it can run in a Kubernetes
cluster.
-
Kubernetes does not manage users natively, it relies on external authentication providers.
- Authentication
- Who can access?
- Files - Username and Password
- Files - Username and Tokens
- Certificates
- External Authentication Providers (LDAP, OAuth, etc.)
- Who can access?
- Authorization
- What can they do?
- RBAC Authorization (Role-Based Access Control)
- ABAC Authorization (Attribute-Based Access Control)
- Node Authorization
- Webhook Authorization
- What can they do?
Table of Contents
π
- π£ container arguments
- πΊοΈ configmaps
- π΅οΈ secrets
- π service accounts
- πΎ resource requirements
- β’οΈ taints and tolerations
- π node selectors and affinity