当前位置:网站首页>Overview of CKS core knowledge points
Overview of CKS core knowledge points
2022-07-19 04:45:00 【Xin Guang XG】
CKS Overview of core knowledge points
Introduce
The author once shared a lot in this column CKA & CKS Content related to the examination site , For some reason jubao Off the shelf , But considering that many netizens and group friends want to know more CKS Relevant core knowledge , So here I sort out my previous records , I hope it can help you .
If you want to know more relevant knowledge , You can join K8S & Cloud native communication Q Group (284134230) Learn and improve with you …
Knowledge point
- ServiceAccount relevant
docs/tasks/configure-pod-container/configure-service-account/ - kube-bench misarrangement
github.com/aquasecurity/kube-bench
Kubernetes Documentation/Reference/Component tools/kube-apiserver
Kubernetes Documentation/Reference/Component tools/kubelet
Kubernetes Documentation/Tasks/Administer a Cluster/Operating etcd clusters for Kubernetes - Default NetworkPolicy
Kubernetes Documentation/Concepts/Services, Load Balancing, and Networking/Network Policies - Pod The security policy -PodSecurityPolicy
Configure a Security Context for a Pod or Container
Kubernetes Documentation/Concepts/Policies/Pod Security Policies - Role & RoleBinding
Kubernetes Documentation/Reference/API Access Control/Using RBAC Authorization - Log audit audit-log
Kubernetes Documentation/Tasks/Monitoring, Logging, and Debugging/Auditing - secret
Kubernetes Documentation/Concepts/Configuration/Secrets - Optimize Dockerfile and deployment.yaml
Best practices for writing Dockerfiles
Kubernetes Documentation/Concepts/Security
Kubernetes Documentation/Tasks/Configure Pods and Containers/Configure a Security Context for a Pod or Container
Dockerfile Security Best Practice
Docker Container Security 101: Risks and 33 Best Practices - RuntimeClass & gVisor
github.com/google/gvisor
Kubernetes Documentation/Concepts/Containers/Runtime Class - pod Security -stateless & immutable
Kubernetes Documentation/Tasks/Configure Pods and Containers/Configure a Security Context for a Pod or Container
Kubernetes Documentation/Concepts/Security/Pod Security Standards - modify API-Server Parameters
Kubernetes Documentation/Reference/Component tools/kube-apiserver
k8s Security 04–kube-apiserver Security configuration - ImagePolicyWebhook
Kubernetes Documentation/Reference/API Access Control/Using Admission Controllers - Trivy Detect mirror
github.com/aquasecurity/trivy
trivy/v0.21.2/getting-started/quickstart/ - AppArmor
Kubernetes file / course / colony / Use AppArmor Restrict container access to resources - sysdig & falco
docs.sysdig.com
Kubernetes blogs/Monitoring Kubernetes with Sysdig
explain
- This article only provides official document guidance related to core knowledge points , No zhenti Information , If you need to know the latest test site information, you can refer to github.com/cncf/curriculum Medium pdf .
- Please don't discuss it in the comment area of this article zhenti Information , Thank you for your cooperation !
边栏推荐
- 赚钱大师小程序【最新版5.9.9】商城/佣金即时提现/分销推广/话费充值/美团饿了么外卖
- TiDB学习笔记【初阶】
- 【FPGA教程案例27】通过Verilog实现双口RAM乒乓结构
- 谷歌浏览器截全图小技巧
- Golang reverse slice code example
- PyTorch Image Models(timm)库
- 用FastApi进行WEB开发
- Only when the data analysis report is written in this way can we really understand the data
- Eureka, take advantage of the tens of millions of daily visits!
- [Unity] Input. Index of gettouch[index]
猜你喜欢

物业小区高校水电抄表充值管理系统

手机平台上的用户空间锁概述

TiDB 性能分析和优化

Overview of Baidu map technology, and application development of basic API and webapi

On the third day of security, iptables prevents nmap scanning and binlog

Unit UMP Packaging Black Screen issue Summary

MySQL InnoDB transaction related records

数据库与开源的未来

异或和加密方式的解密的复现

Unity UMP打包黑屏问题总结
随机推荐
[FPGA tutorial case 27] realize dual port RAM ping-pong structure through Verilog
Real time Bi (IV) low cost data quasi real time processing idea
[vuforia] simple logic of image recognition
项目组暑假总结01
Redis 集群面试题
Advanced query of MySQL table
Common errors in golang compilation
Multiple connections will be maintained for each provider instance
Problems encountered by Sphinx
Constraints on MySQL tables (Basics)
【TA-霜狼_may-《百人计划》】图形2.5 Bump Mapping
Policy mode replaces if else
Expected to replace deepfake? Uncover this year's super popular nerf Technology
PY3 redis general call
Challenges and Countermeasures of deep forgery to national security
有望取代Deepfake?揭秘今年超火的NeRF技
Pytorch image models (Timm) library
TiDB 性能优化概述
Cannot find module ‘process‘ or its corresponding type declarations.
Architecture and application of secure multiparty computing