- 38
- 399 428
The Learning Channel
United States
เข้าร่วมเมื่อ 27 เม.ย. 2016
Welcome!
Dedicating this channel to help the audience learn new technologies such as Kubernetes, Linux, Docker, and Windows. I strive to provide content that is deep, analytical, and substantive. For instance, my six-part Kubernetes networking series is one of the most comprehensive anywhere on the net.
I also provide the scripts for the courses so you can set up your own environments and follow along. My goal is that my audience maximizes their learning when viewing my courses and I respond to every comment and question.
Linkedin: www.linkedin.com/in/garsha-rostami-39a2881/
Dedicating this channel to help the audience learn new technologies such as Kubernetes, Linux, Docker, and Windows. I strive to provide content that is deep, analytical, and substantive. For instance, my six-part Kubernetes networking series is one of the most comprehensive anywhere on the net.
I also provide the scripts for the courses so you can set up your own environments and follow along. My goal is that my audience maximizes their learning when viewing my courses and I respond to every comment and question.
Linkedin: www.linkedin.com/in/garsha-rostami-39a2881/
Setup Azure Kubernetes Private Clusters with API Server Vnet Integration
Many companies strive to extend their data centers to the cloud to take advantage of the cloud providers’ enormous resource capacities. For some this is a short-term expansion due to business peak seasons, for others, it is a permanent need. Regardless, they would want to maintain the privacy and security that their private clouds and data centers provide. This means they would like to avoid exposure to the public internet as much as possible. In this video, we will discuss hybrid and cross-premises cloud concepts and how Azure’s private networks provide network isolation on the Azure cloud. In this video, we will help a fictitious Acme Corporation set up a private Kubernetes AKS cluster in Azure without exposing the API server or Kubernetes services’ DNS name/IP addresses. We will introduce the “Azure Kubernetes Service cluster with API Server VNet Integration” and VPN gateways to achieve our task. We will also discuss some of Azure's fundamental concepts such as tenants, subscriptions, resource groups, and management groups.
Lab's prerequisite:
- An Azure subscription. You can get a free 30 day trial license @ azure.microsoft.com
- Bicep VS extension tools @ learn.microsoft.com/en-us/azure/azure-resource-manager/bicep/install
- VPN Client Entra ID Auth:
Configure a P2S VPN gateway for Microsoft Entra ID (Sections: “Prerequisites”, “Create Microsoft Entra tenant users”, and “Authorize the Azure VPN application” @
authenticationlearn.microsoft.com/en-us/azure/vpn-gateway/openvpn-azure-ad-tenant
OR:
- VPN Client Cert Auth:
Configure server settings for P2S VPN Gateway connections - certificate authentication - Azure portal @ learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal
Point-to-site VPN client configuration workflow: Certificate authentication - Windows @ learn.microsoft.com/en-us/azure/vpn-gateway/point-to-site-vpn-client-cert- windows
- VPN Client app:
Windows: @ apps.microsoft.com/detail/9np355qt2sqb?hl=en-US&gl=US
Mac: @ apps.apple.com/us/app/azure-vpn-client/id1553936137?mt=12
My other videos:
►Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE:
th-cam.com/video/O3C9F3U7AV8/w-d-xo.html
►Workload Identity part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE
Workload Identity Part 1: Introduction to SPIFFE and SPIRE - TH-cam
► Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
th-cam.com/video/pXEFZYl2Gu0/w-d-xo.html
►Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
th-cam.com/video/M9KABid_sCY/w-d-xo.html
►Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
th-cam.com/video/WZvPIoUyErM/w-d-xo.html
►Kubernetes Security, Part 2: Managing POD Run Time Security
th-cam.com/video/NNE9whCTp0g/w-d-xo.html
► Istio Ambient Service Mesh
th-cam.com/video/WPLVvwPGJvw/w-d-xo.html
► Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC) in Detail
th-cam.com/video/Qwkix9z8ywU/w-d-xo.html
► Cilium Service Mesh
th-cam.com/video/-o6E8bYj-xw/w-d-xo.html
► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
th-cam.com/video/j2aox7K-7wU/w-d-xo.html
► Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
th-cam.com/video/gkrPt0ZcCfo/w-d-xo.html
►Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
th-cam.com/video/5EcVrm01rAU/w-d-xo.html
► Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process th-cam.com/video/aLq3O3l2LF4/w-d-xo.html
► What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
th-cam.com/video/WMLSD2y2Ig4/w-d-xo.html
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 2- Join Linux Machines to AD:
th-cam.com/video/1tgqdz3lw-k/w-d-xo.html
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 1- Setup AD:
th-cam.com/video/ftxxO381-_Q/w-d-xo.html
► Sharing Resources between Windows and Linux:
th-cam.com/video/MzHX6eUlZfs/w-d-xo.html
► Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive:
th-cam.com/video/lkXLsD6-4jA/w-d-xo.html
►Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets:
th-cam.com/video/mjcNIaRDAsc/w-d-xo.html
►Configuring and Managing Storage in Kubernetes:
th-cam.com/video/U11YjaRvCd4/w-d-xo.html
► Istio Service Mesh - Securing Kubernetes Workloads:
th-cam.com/video/GFXjlPBsykM/w-d-xo.html
► Istio Service Mesh - Intro
th-cam.com/video/x_HRl-Ehvb8/w-d-xo.html
► Understanding Kubernetes Networking. Part 6: Calico Network Policies:
th-cam.com/video/sxB9-td1-F8/w-d-xo.html
► Understanding Kubernetes Networking. Part 5: Intro to Kubernetes Network Policies:
th-cam.com/video/vjhA9TJWw-k/w-d-xo.html
► Understanding Kubernetes Networking. Part 4: Kubernetes Services:
th-cam.com/video/BZk2HUKsxAQ/w-d-xo.html
► Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth:
th-cam.com/video/vOo__3GqyxM/w-d-xo.html
Lab's prerequisite:
- An Azure subscription. You can get a free 30 day trial license @ azure.microsoft.com
- Bicep VS extension tools @ learn.microsoft.com/en-us/azure/azure-resource-manager/bicep/install
- VPN Client Entra ID Auth:
Configure a P2S VPN gateway for Microsoft Entra ID (Sections: “Prerequisites”, “Create Microsoft Entra tenant users”, and “Authorize the Azure VPN application” @
authenticationlearn.microsoft.com/en-us/azure/vpn-gateway/openvpn-azure-ad-tenant
OR:
- VPN Client Cert Auth:
Configure server settings for P2S VPN Gateway connections - certificate authentication - Azure portal @ learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal
Point-to-site VPN client configuration workflow: Certificate authentication - Windows @ learn.microsoft.com/en-us/azure/vpn-gateway/point-to-site-vpn-client-cert- windows
- VPN Client app:
Windows: @ apps.microsoft.com/detail/9np355qt2sqb?hl=en-US&gl=US
Mac: @ apps.apple.com/us/app/azure-vpn-client/id1553936137?mt=12
My other videos:
►Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE:
th-cam.com/video/O3C9F3U7AV8/w-d-xo.html
►Workload Identity part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE
Workload Identity Part 1: Introduction to SPIFFE and SPIRE - TH-cam
► Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
th-cam.com/video/pXEFZYl2Gu0/w-d-xo.html
►Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
th-cam.com/video/M9KABid_sCY/w-d-xo.html
►Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
th-cam.com/video/WZvPIoUyErM/w-d-xo.html
►Kubernetes Security, Part 2: Managing POD Run Time Security
th-cam.com/video/NNE9whCTp0g/w-d-xo.html
► Istio Ambient Service Mesh
th-cam.com/video/WPLVvwPGJvw/w-d-xo.html
► Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC) in Detail
th-cam.com/video/Qwkix9z8ywU/w-d-xo.html
► Cilium Service Mesh
th-cam.com/video/-o6E8bYj-xw/w-d-xo.html
► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
th-cam.com/video/j2aox7K-7wU/w-d-xo.html
► Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
th-cam.com/video/gkrPt0ZcCfo/w-d-xo.html
►Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
th-cam.com/video/5EcVrm01rAU/w-d-xo.html
► Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process th-cam.com/video/aLq3O3l2LF4/w-d-xo.html
► What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
th-cam.com/video/WMLSD2y2Ig4/w-d-xo.html
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 2- Join Linux Machines to AD:
th-cam.com/video/1tgqdz3lw-k/w-d-xo.html
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 1- Setup AD:
th-cam.com/video/ftxxO381-_Q/w-d-xo.html
► Sharing Resources between Windows and Linux:
th-cam.com/video/MzHX6eUlZfs/w-d-xo.html
► Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive:
th-cam.com/video/lkXLsD6-4jA/w-d-xo.html
►Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets:
th-cam.com/video/mjcNIaRDAsc/w-d-xo.html
►Configuring and Managing Storage in Kubernetes:
th-cam.com/video/U11YjaRvCd4/w-d-xo.html
► Istio Service Mesh - Securing Kubernetes Workloads:
th-cam.com/video/GFXjlPBsykM/w-d-xo.html
► Istio Service Mesh - Intro
th-cam.com/video/x_HRl-Ehvb8/w-d-xo.html
► Understanding Kubernetes Networking. Part 6: Calico Network Policies:
th-cam.com/video/sxB9-td1-F8/w-d-xo.html
► Understanding Kubernetes Networking. Part 5: Intro to Kubernetes Network Policies:
th-cam.com/video/vjhA9TJWw-k/w-d-xo.html
► Understanding Kubernetes Networking. Part 4: Kubernetes Services:
th-cam.com/video/BZk2HUKsxAQ/w-d-xo.html
► Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth:
th-cam.com/video/vOo__3GqyxM/w-d-xo.html
มุมมอง: 777
วีดีโอ
Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE
มุมมอง 1Kปีที่แล้ว
The classic mTLS implementation using sidecars is resource-intensive, slow, and poorly suited to microservices. The Cilium’s approach is to do away with sidecars and instead leverage eBPF which provides native performance. It has also split mTLS’s traditional mutual authentication and encryption into separate features that users can opt-in individually based on their requirements. To manage wor...
Workload Identity Part 1: Introduction to SPIFFE and SPIRE
มุมมอง 2.7Kปีที่แล้ว
A workload is a single piece of software, deployed with a particular configuration for a single purpose; it may comprise multiple running instances of software, all of which perform the same task. A workload identity is a way for a workload to prove who it is and prove its authenticity to other workloads. Historically IP addresses were the standard way to identify workloads, however, in the mod...
Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
มุมมอง 978ปีที่แล้ว
By default, client communication to Kubernetes services is in HTTP plain text. This is not desirable in a production environment, especially for clients outside the Kubernetes cluster. In this video, we’ll discuss how to encrypt this communication leveraging Kubernetes TLS ingress, Cert-Manager, and Let’s Encrypt certificate. We’ll start with a quick overview of Kubernetes services and why Kube...
Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
มุมมอง 1.1Kปีที่แล้ว
In this video, we will discuss the Open ID Connect (OIDC) authentication method for Kubernetes. Although the default X509 client certificate authentication works for small Kubernetes environments, for large organizations, it is not the best method. We will start off by reviewing Kubernetes’ X509 client authentication and how clients are created and then discuss its shortcomings. We will then lo...
Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
มุมมอง 1.2Kปีที่แล้ว
In this video, we will start by taking a look at Kubernetes authentication architecture and the authentication options it provides. We then dive into the default client authentication method (X509 client certificates). We will learn about Kubernetes’ PKI infrastructure and how certificates are organized. We will then visually walk through the process of generating client certificates and user a...
Kubernetes Security, Part 2: Managing POD Run Time Security
มุมมอง 1.7Kปีที่แล้ว
Kubernetes Security, Part 2: Managing POD Run Time Security In this video, we will examine POD security settings (SecurityContext object), how to manipulate them, and why a misconfigured POD could pose a severe security threat. We will then look at ways to secure the PODs through Kubernetes’ POD “Security Admission” policies which provide a good security foundation for most projects. There will...
Istio Ambient Service Mesh
มุมมอง 1.1Kปีที่แล้ว
This video will explore Istio’s Ambient Service Mesh in great detail. This is the new version of Istio’s Service Mesh which is still in development. Its most important feature is that it doesn’t use sidecars to implement mesh functionality. We will start by describing what Service Mesh is, followed by a detailed discussion of Istio’s sidecar-based Service Mesh architecture. We will then dive in...
Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC)
มุมมอง 4.2Kปีที่แล้ว
In this video, we will explore Kubernetes Role Based Access Control (RBAC) to provide fine-grain access to users and service accounts. We will start off by taking a quick look at Kubernetes overall authentication and authorization and will discuss some security best practices. We will then dive deep into RBAC, its architecture, and its tenants (Subjects, (Cluster)Role, and (Cluster)Bindings). I...
Cilium Service Mesh
มุมมอง 2.3Kปีที่แล้ว
In this video, we will explore Cilium’s, Service Mesh. We will start by defining a Service Mesh and then review an older and established Service Mesh provider Istio’s architecture. We will then dive into Cilium’s Service Mesh architecture to contrast the two and what advantages Cilium brings to the table. We will also discuss Cilium’s various new Mesh offering such as ingress (including TLS ter...
Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
มุมมอง 3.8K2 ปีที่แล้ว
In this episode, we will learn about Cilium’s supported IP routing modes. IP routing essentially means how the PODs on one node communicate with PODs on other nodes. To start with, we will discuss the default mode which uses L2 VXLAN encapsulation. We will then discuss situations where all nodes are on the same subnet, and how to set up Direct routing (no encapsulation). Next, we will discuss h...
Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
มุมมอง 4K2 ปีที่แล้ว
In this episode, we will learn about Cilium’s “Cluster Mesh”, its architecture, how to set it up, and will also discuss some use case scenarios such as load balancing/high availability, and shared services hosting. Links: Demo scripts: github.com/gary-RR/myTH-cam_cilium_service_mesh/tree/main My Other Videos: ► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated) t...
Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
มุมมอง 5K2 ปีที่แล้ว
In this multi-part series, we will take a look at Cilium. In part 2, we will take a look at some Cilium constructs such as “endpoints” and endpoint “identity” and then will examine how Cilium could apply L3, L4, and L7 network policies to Kubernetes workloads. We will also take a look at Cilium CLI and Hubble CLI and UI. Links: Demo scripts: gary-RR/myTH-cam_cilium_part1 (github.com) My Other V...
Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process
มุมมอง 20K2 ปีที่แล้ว
In this multi-part series, we will take a look at Cilium. In part 1, we will learn what Cilium is and how it leverages a key technology called “eBPF” to provide load balancing, observability, and security. We will also take a look at what eBPF is and conceptually walk through how a simple eBPF program can be organized and loaded into Kernel. We will wrap this episode up by going through a compl...
What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
มุมมอง 12K2 ปีที่แล้ว
In this episode, we will learn what VXLAN is and how it can be leveraged as an overlay network to manage Kubernetes POD networks. We will start off by getting a crash course on the networking Open Systems Interconnect (OSI) model, followed by an overview of overlay networks. In the following section, we will discuss what VXLAN is and go over its architecture, encapsulation model, and how it can...
Managing Linux Logins, Users, and Machines in AD: Part 2- Join Linux Machines to AD
มุมมอง 8232 ปีที่แล้ว
Managing Linux Logins, Users, and Machines in AD: Part 2- Join Linux Machines to AD
Managing Linux Logins, Users, and Machines in AD: Part 1- Setup AD
มุมมอง 2K2 ปีที่แล้ว
Managing Linux Logins, Users, and Machines in AD: Part 1- Setup AD
Sharing Resources between Windows and Linux
มุมมอง 1K3 ปีที่แล้ว
Sharing Resources between Windows and Linux
Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive
มุมมอง 18K3 ปีที่แล้ว
Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive
Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets
มุมมอง 3.9K3 ปีที่แล้ว
Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets
Configuring and Managing Storage (volumes) in Kubernetes
มุมมอง 8K3 ปีที่แล้ว
Configuring and Managing Storage (volumes) in Kubernetes
Istio Service Mesh - Securing Kubernetes Workloads
มุมมอง 3.2K3 ปีที่แล้ว
Istio Service Mesh - Securing Kubernetes Workloads
Istio Service Mesh (sidecar-based)- Intro
มุมมอง 8K3 ปีที่แล้ว
Istio Service Mesh (sidecar-based)- Intro
Understanding Kubernetes Networking. Part 6: Calico Network Policies
มุมมอง 7K3 ปีที่แล้ว
Understanding Kubernetes Networking. Part 6: Calico Network Policies
Understanding Kubernetes Networking. Part 5: Kubernetes Network Policies intro
มุมมอง 10K3 ปีที่แล้ว
Understanding Kubernetes Networking. Part 5: Kubernetes Network Policies intro
Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host Windows Containers.
มุมมอง 6K3 ปีที่แล้ว
Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host Windows Containers.
A Docker and Kubernetes tutorial for beginners
มุมมอง 3K3 ปีที่แล้ว
A Docker and Kubernetes tutorial for beginners
Kubernetes services - (Understanding Kubernetes Networking Part 4)
มุมมอง 22K3 ปีที่แล้ว
Kubernetes services - (Understanding Kubernetes Networking Part 4)
Setup a "Docker-less" Multi-node Kubernetes Cluster On Ubuntu Server.
มุมมอง 3K3 ปีที่แล้ว
Setup a "Docker-less" Multi-node Kubernetes Cluster On Ubuntu Server.
Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth.
มุมมอง 49K3 ปีที่แล้ว
Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth.
I learned a lot from your series even after 3 years. But I have one question when comparing this episode and Step by Step Instructions on Setting up a Multi Node Kubernetes Cluster on CentOS 8 (th-cam.com/video/2Tr7hNW02fg/w-d-xo.html&ab_channel=TheLearningChannel). After executing this line: kubectl scale --replicas=2 deployment/hello-world, why the two pods are running on server 2 in this video, but the 2 pods are running on master and the worker node separately in the video of multi-node kubernetes cluster on centos 8. Thanks
The Best Video, hats off!
When you show interfaces attached to the bridge where is 10.244.1.1?? As in the diagram it should be mentioned, yet it is not. I think it is because bridge creates a local network for pods within the node. To access the internet and pods in other nodes kubernetes services are required.
Some great content is hidden here :) thanks for sharing
what ip address do i put bro
Dude, you're great
What to do if I'm setting up a malware testing lab
Really Great Work. So grateful I watched this on. Cleared everything for me. All my confusion and doubt's are gone related to networking. Thank you so much 🙏 I would recommend my peers to watch this.
I'm very glad that this video helped clear up your confusion. Thank you for the recommendation!
1 question here. You setup both bridges in ubuntu1 and ubuntu2 to have different ips here. But since the bridges are in different vms they could have had same ip. In that case when we ping from namespace1 how will it be able to reach namespace2's bridge ?
exellent!
This video helped me 1000%. Explanation is very clear, Thank you.
@TheLearningChannel-Tech Could you please clarify why the inner IP header contains the tunnel IP address (172.23.94.0) instead of the pod IP address (172.23.94.6)? For the response packet from the pod (172.23.61.206), it correctly uses the pod IP as the source IP (172.23.61.206, response packet doesn't have source ip as tun ip), which seems to align with Kubernetes documentation suggesting that pod-to-pod communication should avoid NAT. Ideally, it seems that the inner IP should reflect 172.23.94.6 as the source and 172.23.61.206 as the destination. Thank you for posting such an amazing video and creating great content on Kubernetes networking.
The reason why the source IP is changed to the tunnel's IP is that the pods on the other side have no idea how to get to the pod on the other side. They know however to communicate with the tunnel on the other side through their tunnel (a route is defined). When the results are reached at the tunnel on the other side, the tunnel replaces the destination back to the IP address of the pod that initiated it. This whole redirection is to provide pod-to-pod communication without having to change the underlying infrastructure. Calico uses IPinIP encapsulation, other CNIs use different methods such as overlay networks.
At 38:16, note that in Ubuntu 22.04.5 LTS, the "via" option is not available. Instead execute the command as `sudo ip route add $TO_BRIDGE_SUBNET $TO_NODE_IP dev eth0`
Thanks for pointing out.
i am impressed by how concise and pretty your graphics are
and i love how you give a broad picture of relating everything with networking!!
Thank you very much!
Excellent video, excellent demo, excellent way to present the whole video. Appreciate your time and efforts for creating this series. This video is unmatachable. Amazing work sir. ❤👏👏👏
im cka certified. it is good to have kubernetes networking knowledge that they didnt go deep into. Very good and comprehensive content
My man has answers to satisfy my ADHD itch to understand something at this level of depth.
If you read this Gary, I appreciate the videos very much. I have a doubt , how would the traffic be intercepted by the vxlan interface which goes to the pods on other nodes, cause I don't see any specific route pointing to the vxlan endpoint or does it check the cidr if so how come layer 2 able to see is it because it works on top of layer 3?
I can not ping server2 containers from server1 containers. root@ip-192-168-1-141:~# sudo ip netns exec ns1 ping -W 1 -c 2 172.16.0.1 PING 172.16.0.1 (172.16.0.1) 56(84) bytes of data. --- 172.16.0.1 ping statistics --- 2 packets transmitted, 0 received, 100% packet loss, time 1011ms root@ip-192-168-1-141:~# ip netns exec ns1 route Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface default 172.16.1.1 0.0.0.0 UG 0 0 0 veth11 172.16.1.0 0.0.0.0 255.255.255.0 U 0 0 0 veth11 192.168.1.0 172.16.1.1 255.255.255.0 UG 0 0 0 veth11
Thank you for sharing such a detailed study for Kubernetes Networking. Great work!
when the vms are on different subnet, can we not add a route on the router to establish routing?
If the VMs are on two different subnets, a router is required.
Awesome video👏. Concepts Very well explained. Thanks!
38:32
I have learnt a lot from your channel. Keep generating such amazing content. It would be great, if there are more frequent videos.
hi thanks for this helpful video I have a question : How does work default route in pod and which interface this ip dedicated set up ? where send all packets this default gateway after receive packets from pod that connect throughout veth interface to the bridge ?? Could you answer my question please ?
Great content, Thank!
@TheLearningChannel-Tech : Thanks for your wonderful session, But I tried on my Virtual box VM's, I'm unable to ping from NS1 to NS2 itself using bridge.. Would you please help me here?
@The Learning Channel: Thanks a lot this video, it’s have very good explanation. My question: Is this applicable for VirtualBox VM’s ? Or only for Hyper-V? In my virtual box VM I see network adapter selected as NAT Adapter, Do you have any procedure for that? Greatly Appreciated!!
Finally Video with No quirky jokes instead just pure knowledge . Thank you
Whenever I face any issues with k8s networking, I come to your channel. Precise, concise and brilliant content!!!
one of the best Azure related contents. all important aspects are mentioned perfectly
Thank you very much!
can you continue kubernetes to advanced level it would be a great help
guys i think we found Jesus
perfect as always
Thank you very much! Glad you found it helpful.
Thanks for the detailed explanation.
perfect content
perfect demonstration
Hi Can you assit i have configured the cluster but pods from linux worker cant reach pods on Windows worker
Excellent video. Great explanation. This is the video I was looking for.
Great content! Do you have any Udemy channel or other learning platforms?
Hi and thank you! No, this is currently my only outlet.
Very nice videos sir, thank you for the content! I have a question, when we will renew kubernetes certificates, do we need to reconnect the clusters?
Hi, generally if there changes to certificates, it may require to re-mesh the clusters. If you run into communication issues between clusters, you should re-mesh them.
Thanks
most videos/blogs teach on how to install in ubuntu os. you're the first one i've seen to teach how to install on fedora like system. thank you so much
Hi, I like your video, it´s informative. I tried a lot today to implement this scenario but unfortunately i could not. I can ping in ubuntu1 machine but i cannot ping from one to another. i am describing what i did so you can understand my problem, i have created two vm machine in virtual box and i created same script in 2 machines but i have changed the ip address of ubuntu2 to 172.168.1.0. my question is, i have seen you run the command in one machine and you still can communicate both, did you skip ubuntu2 machine configuration?
This is the best video that explains the virtual networking concept
hi i followed the steps. everything is working. pod connectivity. service. clusterip. nodeport. but i cannot reach kube-dns from within a pod. do you happen to know what might be the cause?
actually calico was missing in the setup. the single .yaml file worked for me. i was using a 2 .yaml deploymet from the doc which was not working. could you please make a video about networking setup for production? what pod/cluster/node subnet ip pool should be considered. my cluster is a mess. nodes are 172.16.0.0/16 svc-cidr 10.96.0.0/12 pods 10.85..
hi. how do you higlight the line and run in the terminal in vscode?
Hi, under "File/Preferences", select "Keyboard Shortcuts" and then search for "Terminal: Run Selected Text In Active Terminal". In that window, you can associate any key like F8 with that shortcut and then when you highlight a code or a line and press F8, it will execute it in the active terminal.
I must say that this playlist is the best on Kubernetes networking, starting with the lowest layer till the highest layer.
Your videos are really great and very helpful, could not find any better than this on youtube to understand kubernetes networking in depth. can you please create some videos on kubernetes troubleshooting as well?
Thank you very much for sharing. It is really good all explanation in all series.
33:35 isnt this wrong that the response is SNAT'ed? Because traffic has already been DNAT'et, the local node will know of the connection in its conntrack table, and it does not need to SNAT... ?
Hi, the pod that made the request, it specified its IP address as the source and the IP address of the virtual IP address of ClusterIP as its destination. A DNAT was performed in the iptable and the destination IP was changed to one of the services pods (selected randomly). Once the request reaches the service pod, that pod creates a response and specifies its IP as the source and the IP of the requesting pod as its destination and sends the response back. Remember that the calling pod had the IP of the ClusterIP as its destination, if a SNAT is not performed the request will be rejected by the pod because the destination IP has changed. Hope this makes sense.
@@TheLearningChannel-Tech Oooooo, so it's a SNAT of the ex-destination which is now the source of the response. How does the response go through the clusterIP service tho? If the response's destination is the pod itself, won't it go straight to the pod?