2022-12-20 ◦ Multi-tenancy - EKS Best Practices Guides
Namespaces and Role-based access controls (RBAC) can be implemented to logically isolate tenants from each other.
an attacker that manages to gain access to a host within the cluster can retrieve all Secrets, ConfigMaps, and Volumes, mounted on that host
With soft multi-tenancy, you use native Kubernetes constructs, e.g. namespaces, roles and role bindings, and network policies, to create logical separation between tenants
Namespaces are fundamental to implementing soft multi-tenancy. They allow you to divide the cluster into logical partitions. Quotas, network policies, service accounts, and other objects needed to implement multi-tenancy are scoped to a namespace.
2022-12-20 ◦ Ask HN: What is the best podcast you listened to in 2022? | Hacker News (HackerNews)
2022-12-20 ◦ Google & Apache Found Vulnerable to GitHub Environment Injection
2022-12-20 ◦ Ask HN: What is the best thing you read in 2022? | Hacker News (HackerNews)
2022-12-20 ◦ Literal.club | Track your reading and discover new books
- successor of goodreads?