This article explains and analyzes the operating principles of authentication and scheduling algorithms of a Kubernetes cluster.