Skip to content

Commit

Permalink
CKS Course Notes - Day 1
Browse files Browse the repository at this point in the history
  • Loading branch information
Pratik Patel committed Feb 19, 2021
1 parent e6e1540 commit e8d3717
Show file tree
Hide file tree
Showing 2 changed files with 50 additions and 2 deletions.
52 changes: 50 additions & 2 deletions CKS/Course_Notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,8 +32,10 @@
- Vulnerability Scan
- mTLS / ServiceMesh

- https://www.youtube.com/watch?v=wqsUfvRyYpw

-------------------------
### Architecture
### Certificate Architecture
-------------------------

- CA (Certificate Authority)
Expand Down Expand Up @@ -65,6 +67,7 @@
- front-proxy-client.key
- Used by API Server to communicate to kube-proxy
- sa.key
-
- sa.pub

- etcd/
Expand All @@ -84,4 +87,49 @@
- server.crt
- ETCD Server Certificate
- server.key
- ETCD Server key
- ETCD Server key

- Scheduler
- Certificate used by Scheduler to connect Kube-API certificate, can be found inside
- /etc/kubernetes/scheduler.conf file
- Look for
- "client-certificate-data" for certificate
- "client-certificate-key" for key

- Controller-Manager
- Certificate used by Controller-Manager to connect Kube-API certificate, can be found inside
- /etc/kubernetes/controller-manager.conf file
- Look for
- "client-certificate-data" for certificate
- "client-certificate-key" for key

- Kubelet
- Certificate used by kubelet to connect Kube-API certificate, can be found inside
- /etc/kubernetes/kubelet.conf file
- Look for
- "client-certificate" for certificate
- "client-key" for key
- Kubelet Server
- /var/lib/kubelet/pki/
- kubelet.crt
- kubelet server certificate
- kubelet.key
- kubelet server key

- https://www.youtube.com/watch?v=gXz4cq3PKdg
- https://kubernetes.io/docs/concepts/overview/components
- https://kubernetes.io/docs/setup/best-practices/certificates

-------------------------
### Containers
-------------------------
- Container Isolation
- Linux Namespaces - Restrict what processes can see (Other process/user/filesystem)
- CGroups - Restrict the resource usage of a process (cpu/memory/disk)

- To create docker container with shared pid namespace
- $ docker run --name c2 --pid=container:c1 -d ubuntu sh -c 'sleep 999d'
- It will use container c1's namespace for processes

- https://www.youtube.com/watch?v=MHv6cWjvQjM

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit e8d3717

Please sign in to comment.