Skip to content

Commit 24dffba

Browse files
committed
inits MkDocs site
Signed-off-by: Michael Hausenblas <hausenbl@amazon.com>
1 parent 2af3d0e commit 24dffba

File tree

8 files changed

+57
-0
lines changed

8 files changed

+57
-0
lines changed

.gitignore

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
.DS_Store
2+
/site

docs/CNAME

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
tutorial.kubernetes-security.info

docs/fundamental.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
# Using secure Kubernetes settings

docs/gitops.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# GitOps
2+
3+
## Concept
4+
5+
## Using Flux
6+
7+
## Using ArgoCD

docs/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
This KubeCon EU 2020 tutorial will get you off the ground with Kubernetes security basics, using live demos and examples to work through yourself. We’ll start with possible attack vectors, to help you map out the threat model that applies to your cluster, so you can figure out where you need to focus your efforts for security. We’ll show you how to compromise a deployment with a pod running with a known vulnerability. Once you’ve had the attacker’s eye-view, we’ll walk you through the most important techniques and open source tools to prevent compromise.
2+
3+
[Sign up](https://sched.co/Zekj) now!

docs/policies.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Configuring pods to run securely
2+
3+
## Least privileges
4+
5+
## Network policies
6+
7+
## OPA in action

docs/scanning.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
# Including vulnerability scanning in your workflow

mkdocs.yml

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
site_name: 'Cloud Native Security Tutorial'
2+
site_description: 'Getting started with cloud native security'
3+
site_author: 'Liz Rice and Michael Hausenblas'
4+
repo_name: 'k8s-sec/cloud-native-security-tutorial'
5+
repo_url: 'https://github.com/k8s-sec/cloud-native-security-tutorial'
6+
copyright: 'Copyright &copy; Liz Rice and Michael Hausenblas'
7+
nav:
8+
- Overview: index.md
9+
- Foundations: fundamental.md
10+
- Scanning: scanning.md
11+
- Policies: policies.md
12+
- GitOps: gitops.md
13+
theme:
14+
name: 'material'
15+
logo:
16+
icon: 'lock'
17+
font:
18+
text: 'Lato'
19+
code: 'PT Mono'
20+
palette:
21+
primary: 'blue'
22+
accent: 'orange'
23+
highlightjs: true
24+
hljs_languages:
25+
- yaml
26+
- json
27+
- bash
28+
markdown_extensions:
29+
- toc:
30+
permalink: true
31+
- admonition
32+
- codehilite:
33+
linenums: true
34+
- pymdownx.details
35+
- pymdownx.superfences

0 commit comments

Comments
 (0)