Kubernetes Assignment
Limited Time Offer!
For Less Than the Cost of a Starbucks Coffee, Access All DevOpsSchool Videos on YouTube Unlimitedly.
Master DevOps, SRE, DevSecOps Skills!
- Top 10 k8 API Resources which is being by Kubernetes Admin
kubectl config get-contexts
kubectl cluster-info
kubernetes-admin@kubernetes
kubectl explain
kubectl delete
kubectl get
kubectl api-resources -o wide
kubectl api-resources –sort-by=name
kubectl api-resources –namespaced=true
kubectl api-resources –api-group=extensions
2.Top 10 kubectl commands to troubleshoot Kubernetes
describe
logs
attach
exec
port-forward
proxy
cp
auth
debug
- Top 15 commands which is being used by Kubernetes Administrator
kubeadm token list
Kubectl
certificate
cluster-info
top
cordon
uncordon
drain
taint
Kubeadm
init
certs
completion
config
help
join
kubeconfig
reset
token
upgrade
version
Linux :
sudo -s
echo $PATH
wget
curl
rm
tar
vi
export
4.Top Tools for Monitoring, Logging and Tracing Kubernetes & Apps
jaeger
Newrelic
Datadog
Dynatrace
AppDynamics
Splunk APM
Elastic APM
Grafana APM
logstash
5.Top 10 Practices for Securing Kubernetes
- Secure application code.
- Secure container images and workloads.
- Secure Kubernetes clusters.
- Secure Kubernetes infrastructure in the cloud.
- A multi-layered approach to securing Kubernetes applications.
- Audit logging
- forward your audit logs to Datadog SIEM, which provides detection rules that help you automatically flag potential threats
- Limit access to the Kubernetes API9
- role-based access control (RBAC)
- Use key management service (KMS)