The Learning Channel
The Learning Channel
  • 38
  • 399 428
Setup Azure Kubernetes Private Clusters with API Server Vnet Integration
Many companies strive to extend their data centers to the cloud to take advantage of the cloud providers’ enormous resource capacities. For some this is a short-term expansion due to business peak seasons, for others, it is a permanent need. Regardless, they would want to maintain the privacy and security that their private clouds and data centers provide. This means they would like to avoid exposure to the public internet as much as possible. In this video, we will discuss hybrid and cross-premises cloud concepts and how Azure’s private networks provide network isolation on the Azure cloud. In this video, we will help a fictitious Acme Corporation set up a private Kubernetes AKS cluster in Azure without exposing the API server or Kubernetes services’ DNS name/IP addresses. We will introduce the “Azure Kubernetes Service cluster with API Server VNet Integration” and VPN gateways to achieve our task. We will also discuss some of Azure's fundamental concepts such as tenants, subscriptions, resource groups, and management groups.
Lab's prerequisite:
- An Azure subscription. You can get a free 30 day trial license @ azure.microsoft.com
- Bicep VS extension tools @ learn.microsoft.com/en-us/azure/azure-resource-manager/bicep/install
- VPN Client Entra ID Auth:
Configure a P2S VPN gateway for Microsoft Entra ID (Sections: “Prerequisites”, “Create Microsoft Entra tenant users”, and “Authorize the Azure VPN application” @
authenticationlearn.microsoft.com/en-us/azure/vpn-gateway/openvpn-azure-ad-tenant
OR:
- VPN Client Cert Auth:
Configure server settings for P2S VPN Gateway connections - certificate authentication - Azure portal @ learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal
Point-to-site VPN client configuration workflow: Certificate authentication - Windows @ learn.microsoft.com/en-us/azure/vpn-gateway/point-to-site-vpn-client-cert- windows
- VPN Client app:
Windows: @ apps.microsoft.com/detail/9np355qt2sqb?hl=en-US&gl=US
Mac: @ apps.apple.com/us/app/azure-vpn-client/id1553936137?mt=12
My other videos:
►Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE:
th-cam.com/video/O3C9F3U7AV8/w-d-xo.html
►Workload Identity part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE
Workload Identity Part 1: Introduction to SPIFFE and SPIRE - TH-cam
► Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
th-cam.com/video/pXEFZYl2Gu0/w-d-xo.html
►Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
th-cam.com/video/M9KABid_sCY/w-d-xo.html
►Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
th-cam.com/video/WZvPIoUyErM/w-d-xo.html
►Kubernetes Security, Part 2: Managing POD Run Time Security
th-cam.com/video/NNE9whCTp0g/w-d-xo.html
► Istio Ambient Service Mesh
th-cam.com/video/WPLVvwPGJvw/w-d-xo.html
► Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC) in Detail
th-cam.com/video/Qwkix9z8ywU/w-d-xo.html
► Cilium Service Mesh
th-cam.com/video/-o6E8bYj-xw/w-d-xo.html
► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
th-cam.com/video/j2aox7K-7wU/w-d-xo.html
► Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
th-cam.com/video/gkrPt0ZcCfo/w-d-xo.html
►Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
th-cam.com/video/5EcVrm01rAU/w-d-xo.html
► Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process th-cam.com/video/aLq3O3l2LF4/w-d-xo.html
► What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
th-cam.com/video/WMLSD2y2Ig4/w-d-xo.html
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 2- Join Linux Machines to AD:
th-cam.com/video/1tgqdz3lw-k/w-d-xo.html
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 1- Setup AD:
th-cam.com/video/ftxxO381-_Q/w-d-xo.html
► Sharing Resources between Windows and Linux:
th-cam.com/video/MzHX6eUlZfs/w-d-xo.html
► Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive:
th-cam.com/video/lkXLsD6-4jA/w-d-xo.html
►Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets:
th-cam.com/video/mjcNIaRDAsc/w-d-xo.html
►Configuring and Managing Storage in Kubernetes:
th-cam.com/video/U11YjaRvCd4/w-d-xo.html
► Istio Service Mesh - Securing Kubernetes Workloads:
th-cam.com/video/GFXjlPBsykM/w-d-xo.html
► Istio Service Mesh - Intro
th-cam.com/video/x_HRl-Ehvb8/w-d-xo.html
► Understanding Kubernetes Networking. Part 6: Calico Network Policies:
th-cam.com/video/sxB9-td1-F8/w-d-xo.html
► Understanding Kubernetes Networking. Part 5: Intro to Kubernetes Network Policies:
th-cam.com/video/vjhA9TJWw-k/w-d-xo.html
► Understanding Kubernetes Networking. Part 4: Kubernetes Services:
th-cam.com/video/BZk2HUKsxAQ/w-d-xo.html
► Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth:
th-cam.com/video/vOo__3GqyxM/w-d-xo.html
มุมมอง: 777

วีดีโอ

Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE
มุมมอง 1Kปีที่แล้ว
The classic mTLS implementation using sidecars is resource-intensive, slow, and poorly suited to microservices. The Cilium’s approach is to do away with sidecars and instead leverage eBPF which provides native performance. It has also split mTLS’s traditional mutual authentication and encryption into separate features that users can opt-in individually based on their requirements. To manage wor...
Workload Identity Part 1: Introduction to SPIFFE and SPIRE
มุมมอง 2.7Kปีที่แล้ว
A workload is a single piece of software, deployed with a particular configuration for a single purpose; it may comprise multiple running instances of software, all of which perform the same task. A workload identity is a way for a workload to prove who it is and prove its authenticity to other workloads. Historically IP addresses were the standard way to identify workloads, however, in the mod...
Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
มุมมอง 978ปีที่แล้ว
By default, client communication to Kubernetes services is in HTTP plain text. This is not desirable in a production environment, especially for clients outside the Kubernetes cluster. In this video, we’ll discuss how to encrypt this communication leveraging Kubernetes TLS ingress, Cert-Manager, and Let’s Encrypt certificate. We’ll start with a quick overview of Kubernetes services and why Kube...
Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
มุมมอง 1.1Kปีที่แล้ว
In this video, we will discuss the Open ID Connect (OIDC) authentication method for Kubernetes. Although the default X509 client certificate authentication works for small Kubernetes environments, for large organizations, it is not the best method. We will start off by reviewing Kubernetes’ X509 client authentication and how clients are created and then discuss its shortcomings. We will then lo...
Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
มุมมอง 1.2Kปีที่แล้ว
In this video, we will start by taking a look at Kubernetes authentication architecture and the authentication options it provides. We then dive into the default client authentication method (X509 client certificates). We will learn about Kubernetes’ PKI infrastructure and how certificates are organized. We will then visually walk through the process of generating client certificates and user a...
Kubernetes Security, Part 2: Managing POD Run Time Security
มุมมอง 1.7Kปีที่แล้ว
Kubernetes Security, Part 2: Managing POD Run Time Security In this video, we will examine POD security settings (SecurityContext object), how to manipulate them, and why a misconfigured POD could pose a severe security threat. We will then look at ways to secure the PODs through Kubernetes’ POD “Security Admission” policies which provide a good security foundation for most projects. There will...
Istio Ambient Service Mesh
มุมมอง 1.1Kปีที่แล้ว
This video will explore Istio’s Ambient Service Mesh in great detail. This is the new version of Istio’s Service Mesh which is still in development. Its most important feature is that it doesn’t use sidecars to implement mesh functionality. We will start by describing what Service Mesh is, followed by a detailed discussion of Istio’s sidecar-based Service Mesh architecture. We will then dive in...
Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC)
มุมมอง 4.2Kปีที่แล้ว
In this video, we will explore Kubernetes Role Based Access Control (RBAC) to provide fine-grain access to users and service accounts. We will start off by taking a quick look at Kubernetes overall authentication and authorization and will discuss some security best practices. We will then dive deep into RBAC, its architecture, and its tenants (Subjects, (Cluster)Role, and (Cluster)Bindings). I...
Cilium Service Mesh
มุมมอง 2.3Kปีที่แล้ว
In this video, we will explore Cilium’s, Service Mesh. We will start by defining a Service Mesh and then review an older and established Service Mesh provider Istio’s architecture. We will then dive into Cilium’s Service Mesh architecture to contrast the two and what advantages Cilium brings to the table. We will also discuss Cilium’s various new Mesh offering such as ingress (including TLS ter...
Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
มุมมอง 3.8K2 ปีที่แล้ว
In this episode, we will learn about Cilium’s supported IP routing modes. IP routing essentially means how the PODs on one node communicate with PODs on other nodes. To start with, we will discuss the default mode which uses L2 VXLAN encapsulation. We will then discuss situations where all nodes are on the same subnet, and how to set up Direct routing (no encapsulation). Next, we will discuss h...
Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
มุมมอง 4K2 ปีที่แล้ว
In this episode, we will learn about Cilium’s “Cluster Mesh”, its architecture, how to set it up, and will also discuss some use case scenarios such as load balancing/high availability, and shared services hosting. Links: Demo scripts: github.com/gary-RR/myTH-cam_cilium_service_mesh/tree/main My Other Videos: ► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated) t...
Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
มุมมอง 5K2 ปีที่แล้ว
In this multi-part series, we will take a look at Cilium. In part 2, we will take a look at some Cilium constructs such as “endpoints” and endpoint “identity” and then will examine how Cilium could apply L3, L4, and L7 network policies to Kubernetes workloads. We will also take a look at Cilium CLI and Hubble CLI and UI. Links: Demo scripts: gary-RR/myTH-cam_cilium_part1 (github.com) My Other V...
Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process
มุมมอง 20K2 ปีที่แล้ว
In this multi-part series, we will take a look at Cilium. In part 1, we will learn what Cilium is and how it leverages a key technology called “eBPF” to provide load balancing, observability, and security. We will also take a look at what eBPF is and conceptually walk through how a simple eBPF program can be organized and loaded into Kernel. We will wrap this episode up by going through a compl...
What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
มุมมอง 12K2 ปีที่แล้ว
In this episode, we will learn what VXLAN is and how it can be leveraged as an overlay network to manage Kubernetes POD networks. We will start off by getting a crash course on the networking Open Systems Interconnect (OSI) model, followed by an overview of overlay networks. In the following section, we will discuss what VXLAN is and go over its architecture, encapsulation model, and how it can...
Managing Linux Logins, Users, and Machines in AD: Part 2- Join Linux Machines to AD
มุมมอง 8232 ปีที่แล้ว
Managing Linux Logins, Users, and Machines in AD: Part 2- Join Linux Machines to AD
Managing Linux Logins, Users, and Machines in AD: Part 1- Setup AD
มุมมอง 2K2 ปีที่แล้ว
Managing Linux Logins, Users, and Machines in AD: Part 1- Setup AD
Sharing Resources between Windows and Linux
มุมมอง 1K3 ปีที่แล้ว
Sharing Resources between Windows and Linux
Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive
มุมมอง 18K3 ปีที่แล้ว
Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive
Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets
มุมมอง 3.9K3 ปีที่แล้ว
Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets
Configuring and Managing Storage (volumes) in Kubernetes
มุมมอง 8K3 ปีที่แล้ว
Configuring and Managing Storage (volumes) in Kubernetes
Istio Service Mesh - Securing Kubernetes Workloads
มุมมอง 3.2K3 ปีที่แล้ว
Istio Service Mesh - Securing Kubernetes Workloads
Istio Service Mesh (sidecar-based)- Intro
มุมมอง 8K3 ปีที่แล้ว
Istio Service Mesh (sidecar-based)- Intro
Understanding Kubernetes Networking. Part 6: Calico Network Policies
มุมมอง 7K3 ปีที่แล้ว
Understanding Kubernetes Networking. Part 6: Calico Network Policies
Understanding Kubernetes Networking. Part 5: Kubernetes Network Policies intro
มุมมอง 10K3 ปีที่แล้ว
Understanding Kubernetes Networking. Part 5: Kubernetes Network Policies intro
Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host Windows Containers.
มุมมอง 6K3 ปีที่แล้ว
Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host Windows Containers.
A Docker and Kubernetes tutorial for beginners
มุมมอง 3K3 ปีที่แล้ว
A Docker and Kubernetes tutorial for beginners
Kubernetes services - (Understanding Kubernetes Networking Part 4)
มุมมอง 22K3 ปีที่แล้ว
Kubernetes services - (Understanding Kubernetes Networking Part 4)
Setup a "Docker-less" Multi-node Kubernetes Cluster On Ubuntu Server.
มุมมอง 3K3 ปีที่แล้ว
Setup a "Docker-less" Multi-node Kubernetes Cluster On Ubuntu Server.
Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth.
มุมมอง 49K3 ปีที่แล้ว
Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth.

ความคิดเห็น

  • @qxgqxg
    @qxgqxg วันที่ผ่านมา

    I learned a lot from your series even after 3 years. But I have one question when comparing this episode and Step by Step Instructions on Setting up a Multi Node Kubernetes Cluster on CentOS 8 (th-cam.com/video/2Tr7hNW02fg/w-d-xo.html&ab_channel=TheLearningChannel). After executing this line: kubectl scale --replicas=2 deployment/hello-world, why the two pods are running on server 2 in this video, but the 2 pods are running on master and the worker node separately in the video of multi-node kubernetes cluster on centos 8. Thanks

  • @manojchauhan2633
    @manojchauhan2633 2 วันที่ผ่านมา

    The Best Video, hats off!

  • @grjesus9979
    @grjesus9979 5 วันที่ผ่านมา

    When you show interfaces attached to the bridge where is 10.244.1.1?? As in the diagram it should be mentioned, yet it is not. I think it is because bridge creates a local network for pods within the node. To access the internet and pods in other nodes kubernetes services are required.

  • @uncivilizedengineer
    @uncivilizedengineer 12 วันที่ผ่านมา

    Some great content is hidden here :) thanks for sharing

  • @OffiziereDann
    @OffiziereDann 21 วันที่ผ่านมา

    what ip address do i put bro

  • @tolgayucel1442
    @tolgayucel1442 23 วันที่ผ่านมา

    Dude, you're great

  • @javagamesfanclub5650
    @javagamesfanclub5650 27 วันที่ผ่านมา

    What to do if I'm setting up a malware testing lab

  • @akashanand3466
    @akashanand3466 หลายเดือนก่อน

    Really Great Work. So grateful I watched this on. Cleared everything for me. All my confusion and doubt's are gone related to networking. Thank you so much 🙏 I would recommend my peers to watch this.

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech หลายเดือนก่อน

      I'm very glad that this video helped clear up your confusion. Thank you for the recommendation!

  • @RaahilBadiani
    @RaahilBadiani หลายเดือนก่อน

    1 question here. You setup both bridges in ubuntu1 and ubuntu2 to have different ips here. But since the bridges are in different vms they could have had same ip. In that case when we ping from namespace1 how will it be able to reach namespace2's bridge ?

  • @nestorfeng2143
    @nestorfeng2143 หลายเดือนก่อน

    exellent!

  • @monceflaraki9437
    @monceflaraki9437 หลายเดือนก่อน

    This video helped me 1000%. Explanation is very clear, Thank you.

  • @AnkushSharma-xj2ng
    @AnkushSharma-xj2ng หลายเดือนก่อน

    @TheLearningChannel-Tech Could you please clarify why the inner IP header contains the tunnel IP address (172.23.94.0) instead of the pod IP address (172.23.94.6)? For the response packet from the pod (172.23.61.206), it correctly uses the pod IP as the source IP (172.23.61.206, response packet doesn't have source ip as tun ip), which seems to align with Kubernetes documentation suggesting that pod-to-pod communication should avoid NAT. Ideally, it seems that the inner IP should reflect 172.23.94.6 as the source and 172.23.61.206 as the destination. Thank you for posting such an amazing video and creating great content on Kubernetes networking.

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech หลายเดือนก่อน

      The reason why the source IP is changed to the tunnel's IP is that the pods on the other side have no idea how to get to the pod on the other side. They know however to communicate with the tunnel on the other side through their tunnel (a route is defined). When the results are reached at the tunnel on the other side, the tunnel replaces the destination back to the IP address of the pod that initiated it. This whole redirection is to provide pod-to-pod communication without having to change the underlying infrastructure. Calico uses IPinIP encapsulation, other CNIs use different methods such as overlay networks.

  • @richie3650
    @richie3650 หลายเดือนก่อน

    At 38:16, note that in Ubuntu 22.04.5 LTS, the "via" option is not available. Instead execute the command as `sudo ip route add $TO_BRIDGE_SUBNET $TO_NODE_IP dev eth0`

  • @chinwahdavidlam3506
    @chinwahdavidlam3506 หลายเดือนก่อน

    i am impressed by how concise and pretty your graphics are

    • @chinwahdavidlam3506
      @chinwahdavidlam3506 หลายเดือนก่อน

      and i love how you give a broad picture of relating everything with networking!!

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech หลายเดือนก่อน

      Thank you very much!

  • @MrDevraj119
    @MrDevraj119 หลายเดือนก่อน

    Excellent video, excellent demo, excellent way to present the whole video. Appreciate your time and efforts for creating this series. This video is unmatachable. Amazing work sir. ❤👏👏👏

  • @chinwahdavidlam3506
    @chinwahdavidlam3506 หลายเดือนก่อน

    im cka certified. it is good to have kubernetes networking knowledge that they didnt go deep into. Very good and comprehensive content

  • @ManiBalajiC
    @ManiBalajiC หลายเดือนก่อน

    My man has answers to satisfy my ADHD itch to understand something at this level of depth.

    • @ManiBalajiC
      @ManiBalajiC หลายเดือนก่อน

      If you read this Gary, I appreciate the videos very much. I have a doubt , how would the traffic be intercepted by the vxlan interface which goes to the pods on other nodes, cause I don't see any specific route pointing to the vxlan endpoint or does it check the cidr if so how come layer 2 able to see is it because it works on top of layer 3?

  • @linuxworldwithgk
    @linuxworldwithgk หลายเดือนก่อน

    I can not ping server2 containers from server1 containers. root@ip-192-168-1-141:~# sudo ip netns exec ns1 ping -W 1 -c 2 172.16.0.1 PING 172.16.0.1 (172.16.0.1) 56(84) bytes of data. --- 172.16.0.1 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 1011ms root@ip-192-168-1-141:~# ip netns exec ns1 route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface default 172.16.1.1 0.0.0.0 UG 0 0 0 veth11 172.16.1.0 0.0.0.0 255.255.255.0 U 0 0 0 veth11 192.168.1.0 172.16.1.1 255.255.255.0 UG 0 0 0 veth11

  • @NishantDeshpande-jl2ss
    @NishantDeshpande-jl2ss หลายเดือนก่อน

    Thank you for sharing such a detailed study for Kubernetes Networking. Great work!

  • @ankit7319
    @ankit7319 2 หลายเดือนก่อน

    when the vms are on different subnet, can we not add a route on the router to establish routing?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech หลายเดือนก่อน

      If the VMs are on two different subnets, a router is required.

  • @sakshisakshi832
    @sakshisakshi832 2 หลายเดือนก่อน

    Awesome video👏. Concepts Very well explained. Thanks!

  • @skinnytthealchemist6831
    @skinnytthealchemist6831 2 หลายเดือนก่อน

    38:32

  • @faizanrafiq8992
    @faizanrafiq8992 2 หลายเดือนก่อน

    I have learnt a lot from your channel. Keep generating such amazing content. It would be great, if there are more frequent videos.

  • @eldarkarimov5791
    @eldarkarimov5791 2 หลายเดือนก่อน

    hi thanks for this helpful video I have a question : How does work default route in pod and which interface this ip dedicated set up ? where send all packets this default gateway after receive packets from pod that connect throughout veth interface to the bridge ?? Could you answer my question please ?

  • @maratsagiyev2620
    @maratsagiyev2620 2 หลายเดือนก่อน

    Great content, Thank!

  • @shankarganesh5001
    @shankarganesh5001 2 หลายเดือนก่อน

    @TheLearningChannel-Tech : Thanks for your wonderful session, But I tried on my Virtual box VM's, I'm unable to ping from NS1 to NS2 itself using bridge.. Would you please help me here?

  • @shankarganesh5001
    @shankarganesh5001 2 หลายเดือนก่อน

    @The Learning Channel: Thanks a lot this video, it’s have very good explanation. My question: Is this applicable for VirtualBox VM’s ? Or only for Hyper-V? In my virtual box VM I see network adapter selected as NAT Adapter, Do you have any procedure for that? Greatly Appreciated!!

  • @kanishkverma9776
    @kanishkverma9776 2 หลายเดือนก่อน

    Finally Video with No quirky jokes instead just pure knowledge . Thank you

  • @ravipillai7662
    @ravipillai7662 2 หลายเดือนก่อน

    Whenever I face any issues with k8s networking, I come to your channel. Precise, concise and brilliant content!!!

  • @manaspecenek
    @manaspecenek 3 หลายเดือนก่อน

    one of the best Azure related contents. all important aspects are mentioned perfectly

  • @devopsjockey
    @devopsjockey 3 หลายเดือนก่อน

    can you continue kubernetes to advanced level it would be a great help

  • @firefox9110-p3i
    @firefox9110-p3i 3 หลายเดือนก่อน

    guys i think we found Jesus

  • @manaspecenek
    @manaspecenek 3 หลายเดือนก่อน

    perfect as always

  • @praneshhn1090
    @praneshhn1090 3 หลายเดือนก่อน

    Thanks for the detailed explanation.

  • @manaspecenek
    @manaspecenek 3 หลายเดือนก่อน

    perfect content

  • @manaspecenek
    @manaspecenek 3 หลายเดือนก่อน

    perfect demonstration

  • @linuxvce5845
    @linuxvce5845 3 หลายเดือนก่อน

    Hi Can you assit i have configured the cluster but pods from linux worker cant reach pods on Windows worker

  • @AnujKumar-yy1gk
    @AnujKumar-yy1gk 3 หลายเดือนก่อน

    Excellent video. Great explanation. This is the video I was looking for.

  • @qusayalghazali3151
    @qusayalghazali3151 3 หลายเดือนก่อน

    Great content! Do you have any Udemy channel or other learning platforms?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 3 หลายเดือนก่อน

      Hi and thank you! No, this is currently my only outlet.

  • @lucian1094
    @lucian1094 3 หลายเดือนก่อน

    Very nice videos sir, thank you for the content! I have a question, when we will renew kubernetes certificates, do we need to reconnect the clusters?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 3 หลายเดือนก่อน

      Hi, generally if there changes to certificates, it may require to re-mesh the clusters. If you run into communication issues between clusters, you should re-mesh them.

  • @hansrudolf5849
    @hansrudolf5849 4 หลายเดือนก่อน

    Thanks

  • @CrashLaker
    @CrashLaker 4 หลายเดือนก่อน

    most videos/blogs teach on how to install in ubuntu os. you're the first one i've seen to teach how to install on fedora like system. thank you so much

  • @Chutikate-y5t
    @Chutikate-y5t 4 หลายเดือนก่อน

    Hi, I like your video, it´s informative. I tried a lot today to implement this scenario but unfortunately i could not. I can ping in ubuntu1 machine but i cannot ping from one to another. i am describing what i did so you can understand my problem, i have created two vm machine in virtual box and i created same script in 2 machines but i have changed the ip address of ubuntu2 to 172.168.1.0. my question is, i have seen you run the command in one machine and you still can communicate both, did you skip ubuntu2 machine configuration?

  • @gill200s
    @gill200s 4 หลายเดือนก่อน

    This is the best video that explains the virtual networking concept

  • @CrashLaker
    @CrashLaker 4 หลายเดือนก่อน

    hi i followed the steps. everything is working. pod connectivity. service. clusterip. nodeport. but i cannot reach kube-dns from within a pod. do you happen to know what might be the cause?

    • @CrashLaker
      @CrashLaker 4 หลายเดือนก่อน

      actually calico was missing in the setup. the single .yaml file worked for me. i was using a 2 .yaml deploymet from the doc which was not working. could you please make a video about networking setup for production? what pod/cluster/node subnet ip pool should be considered. my cluster is a mess. nodes are 172.16.0.0/16 svc-cidr 10.96.0.0/12 pods 10.85..

  • @CrashLaker
    @CrashLaker 4 หลายเดือนก่อน

    hi. how do you higlight the line and run in the terminal in vscode?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 4 หลายเดือนก่อน

      Hi, under "File/Preferences", select "Keyboard Shortcuts" and then search for "Terminal: Run Selected Text In Active Terminal". In that window, you can associate any key like F8 with that shortcut and then when you highlight a code or a line and press F8, it will execute it in the active terminal.

  • @atulmahori2497
    @atulmahori2497 4 หลายเดือนก่อน

    I must say that this playlist is the best on Kubernetes networking, starting with the lowest layer till the highest layer.

  • @BkShort-s
    @BkShort-s 4 หลายเดือนก่อน

    Your videos are really great and very helpful, could not find any better than this on youtube to understand kubernetes networking in depth. can you please create some videos on kubernetes troubleshooting as well?

  • @josemarcelo8764
    @josemarcelo8764 4 หลายเดือนก่อน

    Thank you very much for sharing. It is really good all explanation in all series.

  • @sliddjur
    @sliddjur 4 หลายเดือนก่อน

    33:35 isnt this wrong that the response is SNAT'ed? Because traffic has already been DNAT'et, the local node will know of the connection in its conntrack table, and it does not need to SNAT... ?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 4 หลายเดือนก่อน

      Hi, the pod that made the request, it specified its IP address as the source and the IP address of the virtual IP address of ClusterIP as its destination. A DNAT was performed in the iptable and the destination IP was changed to one of the services pods (selected randomly). Once the request reaches the service pod, that pod creates a response and specifies its IP as the source and the IP of the requesting pod as its destination and sends the response back. Remember that the calling pod had the IP of the ClusterIP as its destination, if a SNAT is not performed the request will be rejected by the pod because the destination IP has changed. Hope this makes sense.

    • @soimtheowl
      @soimtheowl 2 หลายเดือนก่อน

      @@TheLearningChannel-Tech Oooooo, so it's a SNAT of the ex-destination which is now the source of the response. How does the response go through the clusterIP service tho? If the response's destination is the pod itself, won't it go straight to the pod?