In this hands-on lab you will learn how to use a Kubernetes cluster to orchestrate Jenkins slaves on demand, in order to improve resource utilization and scale automatically, as well as how to embed automated security controls into your pipeline using free tools, and ensure that your Kubernetes cluster is secured according to best practices.
We will cover:
- Kubernetes cluster architecture and security elements
- How to schedule Jenkins slaves in Kubernetes pods
- How to embed image security scanning into your Jenkins pipeline
- How to check your K8s cluster against best practices and pen-test it for known attack vectors