This blog is the fourth in our five‑part series about Kubernetes networking for Microservices March 2022:
Also be sure to download our free eBook, Managing Kubernetes Traffic with NGINX: A Practical Guide, for detailed guidance on implementing Kubernetes networking with NGINX.
Mastering your north‑south traffic is just the beginning…once your services start communicating within the cluster – a.k.a. east‑west traffic – you have a whole new set of problems! Unit 3 answers the question How do I secure my APIs and apps to be production‑ready?
Three activities guide you progressively from a high‑level overview to practical application. We suggest you complete all three to get the best experience.
Each Microservices March livestream provides a high‑level overview of the topic featuring subject matter experts from learnk8s and NGINX. If you miss the live airing on March 21 – don’t worry! You can catch it on demand.
In this episode, we cover:
We expect you’ll have more questions after the livestream – that’s why we curated a collection of relevant reading and videos. This Unit’s deep dive covers how to secure your Kubernetes apps and APIs.
At this point you’re probably also wondering about service meshes and whether they’re something your organization needs.
If you’re keen to deepen your knowledge on security and service mesh – and have more than 1–2 hours to spend – then we suggest three additional resources to get you started.
Even with all the best webinars and research, there’s nothing quite like getting your hands on the tech. The labs run you through common scenarios to reinforce your learning.
In our third self‑paced lab, Protect Kubernetes Apps from SQL Injection, you use NGINX as a sidecar to secure a pod and intercept unwanted east‑west traffic.
To access the lab, you need to register for Microservices March 2022. If you’re already registered, the email you received with the Unit 3 Learning Guide includes access instructions. Alternatively, you can try out the lab in your own environment, using NGINX Tutorial: Protect Kubernetes Apps from SQL Injection as a guide.
While some of the activities (the livestreams and blogs) are freely available, we need to collect just a little personal information to get you set up with the full experience. Registration gives you:
Unit 4: Advanced Kubernetes Deployment Strategies begins on March 28. Learn about zero‑downtime deployments using tactics such as traffic splitting, blue‑green deployments, tracing, and mapping traffic flow in real time.
For detailed guidance on implementing Kubernetes networking with NGINX, download our eBook, Managing Kubernetes Traffic with NGINX: A Practical Guide.
"This blog post may reference products that are no longer available and/or no longer supported. For the most current information about available F5 NGINX products and solutions, explore our NGINX product family. NGINX is now part of F5. All previous NGINX.com links will redirect to similar NGINX content on F5.com."