Kubernetes Deep Dive

Sign Up Free or Log In to participate!

Expose K8s apis or auth behind a VPN

Hi all,

as the title suggests I’ve reached the way to secure a k8s cluster behind a VPN.
Yep, there is not strictly connected with the course, but how Nigel said in the last parts, we need to see more case studies before to go in production. You guys have some materials/books or articles can explode the argument? (every security practices linked are welcome).
Thanks a lot for your time!

0 Answers

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?