Security Context in Kubernetes: A Step-by-Step Demo | Kubernetes Tutorials in Hindi

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 พ.ย. 2024

ความคิดเห็น • 94

  • @DevOpsPro
    @DevOpsPro  ปีที่แล้ว

    Please help us with your valuable feedback - forms.gle/E9r3xvTxnLPKz9Hw9

  • @harshdwivedi5287
    @harshdwivedi5287 2 หลายเดือนก่อน

    Aapke concepts bohot crisp and clear hai, maine youtube me Kubernetes kaa isse achee lecture kahi nahi dekha.
    Hats off to your hard work🫡

  • @worldsofgalaxy
    @worldsofgalaxy 9 หลายเดือนก่อน +3

    Superb i recommend everyone she is great teacher of kubernetes awesome explanation mam 👍👍

    • @DevOpsPro
      @DevOpsPro  8 หลายเดือนก่อน

      Thank you for the kind words and recommendation! I appreciate your support

  • @rutikdhumal6520
    @rutikdhumal6520 หลายเดือนก่อน +1

    could you pls make video on istio and grpc , it would be great help for us . the way you explaining topics with crispy and animated way its really help for understanding

  • @shambhunathsahani6505
    @shambhunathsahani6505 ปีที่แล้ว +1

    the animation used very useful to understand conecpts

  • @girishfury2630
    @girishfury2630 ปีที่แล้ว +1

    please bring more videos like this because these videos are the main game

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Thank you for your feedback and support! More videos like this are on the way! 🎉

  • @nareshv7797
    @nareshv7797 ปีที่แล้ว +1

    This series is making everyone easy for k8s ... thanks for updating new concept

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Glad to hear that

  • @mohammedsuhailbasha4860
    @mohammedsuhailbasha4860 3 หลายเดือนก่อน +1

    Nice. Please make and upload more videos on kubernetes networking part.

  • @awssoorinje747
    @awssoorinje747 ปีที่แล้ว +1

    Thank you for your excellent teaching skills and the valuable visuals that greatly enhance the learning experience. Looking forward to future topics like Kubernetes network CNI, kube-dns, and an end-to-end project.

  • @KRISHNAKUMAR-yj3dx
    @KRISHNAKUMAR-yj3dx 2 หลายเดือนก่อน

    Wow!!!
    Best explanation!!!!!

  • @KRISHNAKUMAR-yj3dx
    @KRISHNAKUMAR-yj3dx 2 หลายเดือนก่อน

    Please keep making such videos!!!!!!!!

  • @Tanzeerahamed047
    @Tanzeerahamed047 ปีที่แล้ว +1

    The best way of explanation I have seen....awesome

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Appreciate your kind words! 🙏

  • @harshvardhansinghjadon6927
    @harshvardhansinghjadon6927 ปีที่แล้ว +1

    Such a nice leacture, really thankfull!!
    Please create an tutorial on HPA, metrics servers and monitoring.

    • @DevOpsPro
      @DevOpsPro  11 หลายเดือนก่อน

      Sure, will create!

  • @KRISHNAKUMAR-yj3dx
    @KRISHNAKUMAR-yj3dx 2 หลายเดือนก่อน

    Awesome explaination!!!!!

  • @anoopkathait0722
    @anoopkathait0722 3 หลายเดือนก่อน +1

    thanks for this video mam

  • @SarthakSourav-e8s
    @SarthakSourav-e8s 3 หลายเดือนก่อน

    Very will explained 👌

  • @abrarsyed7177
    @abrarsyed7177 ปีที่แล้ว +2

    Very informative content

  • @satishp351
    @satishp351 7 หลายเดือนก่อน

    best k8 playlist . please frequently post the videos. next helmchart and real time scenarios.

    • @DevOpsPro
      @DevOpsPro  6 หลายเดือนก่อน

      Noted

  • @SandeepSaini-mt3yl
    @SandeepSaini-mt3yl ปีที่แล้ว +1

    Very very important
    Thanku so much!!

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Thanks Sandeep

  • @mdsaifuddin7272
    @mdsaifuddin7272 11 หลายเดือนก่อน +2

    Mam please istio service mesh bhi ek video banado na

    • @DevOpsPro
      @DevOpsPro  11 หลายเดือนก่อน

      Will consider your suggestion for future content. Stay tuned!

    • @mdsaifuddin7272
      @mdsaifuddin7272 11 หลายเดือนก่อน

      @@DevOpsPro thank you for replying... truly ur way of teaching and the topics u have covered are just awesome

  • @sudheersen8227
    @sudheersen8227 2 หลายเดือนก่อน

    please upload more video about kubernetes

  • @shambhunathsahani6505
    @shambhunathsahani6505 ปีที่แล้ว +1

    Very useful information.please add troubleshooting steps

  • @Cloudnp9458
    @Cloudnp9458 7 หลายเดือนก่อน +1

    Security context:
    runasuser, runasgroup, fsgroup, capabilities: - to add linux capabilities: add or drop: like Linux_ADMIN
    Can be at pod level or container level

    • @DevOpsPro
      @DevOpsPro  6 หลายเดือนก่อน

      All mentioned can apply at both levels except capabilities, capabilities setting can only be applied at the container level, not at the pod level.

  • @biswajitmohapatra2172
    @biswajitmohapatra2172 ปีที่แล้ว +1

    Please make a detailed video on k8s networking

  • @sagarahire-ys3uj
    @sagarahire-ys3uj ปีที่แล้ว

    doing gr8 job..u deserve more subs...u handled such complex topic with ease..nicely done

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว +1

      Thank you so much! Your support means a lot. I'm glad you found the channel helpful. 😊

  • @iamthecloudbuddy
    @iamthecloudbuddy ปีที่แล้ว

    immensely way to explain. SUPERB👍

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Thank you so much 😀

  • @PushpenduPaul-k3l
    @PushpenduPaul-k3l ปีที่แล้ว +1

    excellent tutorials....Thank you so much. Please make similar in detail videos for terraform, Ansible, Helm charts, Github Actions Ci/CD, Jenkins Ci/CD :)

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Very soon and Thank you so much for your kind words.

  • @SanjayYadav-xj6nr
    @SanjayYadav-xj6nr 10 หลายเดือนก่อน +2

    Mam helm par video banye

  • @devopswala798
    @devopswala798 7 หลายเดือนก่อน

    superb animation, best explanation keep it up.

    • @DevOpsPro
      @DevOpsPro  6 หลายเดือนก่อน

      Thanks

  • @iSalmaniac_
    @iSalmaniac_ ปีที่แล้ว +1

    Your Videos Were very helpful , but you didn't covered various topics such as Hpa and all. it would be very helpful if you make videos on same.

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Thank you for the feedback! Will consider covering HPA in future videos.

  • @krishnamurty2501
    @krishnamurty2501 10 หลายเดือนก่อน +1

    Great

  • @HappiestMindSet
    @HappiestMindSet ปีที่แล้ว

    Very Good

  • @Cloudnp9458
    @Cloudnp9458 7 หลายเดือนก่อน

    Security context give container only those capabilities access , required only to run the application tasks. That's how you increase it's security.
    Pod security context will inherit to all containers of multi container pod.
    container level security is higher priority. It will be preferred.

  • @cyber-ops
    @cyber-ops ปีที่แล้ว +1

    ma'am more security realted videos please

  • @rahulsoni.20
    @rahulsoni.20 ปีที่แล้ว +1

    Great Content , Mam is this series complete, is it enough to crack cka exam

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว +1

      Thank you! This series covers almost all the topics required for the CKA exam, providing a solid foundation. However, I recommend supplementing it with additional practice and hands-on experience to maximise your chances of success in the exam.

  • @rohitgaikwad2848
    @rohitgaikwad2848 10 หลายเดือนก่อน +1

    @DevOpsPro please make video on kubernetes cluster autoscaling

    • @DevOpsPro
      @DevOpsPro  8 หลายเดือนก่อน

      Thanks for your request! I'll definitely create a video on Kubernetes cluster autoscaling. Stay tuned for the upcoming tutorial!

  • @meemaansa
    @meemaansa ปีที่แล้ว +1

    Can you please make a video on k8s operators and CRD

  • @waseemwasi6520
    @waseemwasi6520 ปีที่แล้ว +1

    Maim m from pakistan exlent ap ny explain kya h but i hv a question userID or other ID,s jo ap ny mention ki hain ya user create hony chahya pehly sy or ya ID apny suppose kr k dali h??

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Thank you for your positive feedback! In the video, I mentioned the userID and other IDs as examples for demonstrating the implementation of security context in Kubernetes. These IDs can be customized based on your specific requirements. They don't necessarily have to be pre-existing user IDs, but you can choose appropriate values for them. The purpose is to showcase how security context can be applied at the pod and container levels to ensure secure deployments of your applications. I hope this clarifies your question. If you have any further inquiries, feel free to ask!

  • @BuraqQureshi
    @BuraqQureshi ปีที่แล้ว +2

    Hi Riya, I have just cleared CKA with 74% in my frst attempt itself

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Congratulations on clearing the CKA, Achieving a 74% score in your first attempt is commendable. Well done on your hard work and dedication. Keep up the excellent work, and may you continue to achieve great success in your future endeavours!

    • @Cloudnp9458
      @Cloudnp9458 7 หลายเดือนก่อน

      Me - 96%😅

  • @Nikhilg27
    @Nikhilg27 5 หลายเดือนก่อน

    Could you please make video on istio and complete process how we are using it end to end in kubernetes, still waiting for this

    • @DevOpsPro
      @DevOpsPro  5 หลายเดือนก่อน

      Thanks for your suggestion! I'll definitely consider creating videos on Istio. Stay tuned for updates!

  • @rohita9689
    @rohita9689 ปีที่แล้ว

    mam please ek video banado kubeadm say aws ec2 instances par cluster setup krna. Please step by step guide bnado I mean kha kha say cheeza search kara and eksa setup kara sabkuch. Master and worker nodes kesa bnaya etc

  • @awssoorinje747
    @awssoorinje747 ปีที่แล้ว +1

    Ma'am, Could you please provide some clarity on how RBAC authorization and Security Contexts differ in their functions within a Kubernetes cluster? Any examples or use-cases would be greatly appreciated to help enhance my understanding.

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      RBAC authorization in Kubernetes controls access to cluster resources based on user roles and permissions, while Security Contexts define security settings at the pod or container level, such as user IDs, group IDs, and privileges. An example use-case could be granting a user read-only access (RBAC) while ensuring their containers run with non-root privileges (Security Context).

  • @poojaselvaraj7959
    @poojaselvaraj7959 4 หลายเดือนก่อน

    Please can you explain what is oAuth and oidc ?

  • @WM-fz5si
    @WM-fz5si ปีที่แล้ว +1

    Hi it's an informative video. Also please can you make video on multiple ingress controllers for multiple application on multiple namespace. That will be helpful 👍

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว +1

      Sure I will

    • @WM-fz5si
      @WM-fz5si ปีที่แล้ว +1

      @@DevOpsPro Yes looking for it asap.Thank you!

    • @WM-fz5si
      @WM-fz5si ปีที่แล้ว

      Hey hi, When can we expect the above mentioned related topic video?

    • @samikshasharma3544
      @samikshasharma3544 ปีที่แล้ว

      ​@@DevOpsProwaiting for the requested video

    • @harshvardhansinghjadon6927
      @harshvardhansinghjadon6927 ปีที่แล้ว

      I am also waiting for above mentioned topic videos.

  • @GauravSharma-os6ds
    @GauravSharma-os6ds ปีที่แล้ว +1

    Hey Riya,
    Was this the last video of kuberntes.
    Any other topics are remaining ?

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      We've covered almost all topics except troubleshooting. We're now focusing on creating videos on different tools. If you have any specific topics in mind, let us know!

  • @Nikhilg27
    @Nikhilg27 ปีที่แล้ว +1

    Can you make videos on istio with kubernetes

    • @DevOpsPro
      @DevOpsPro  11 หลายเดือนก่อน

      Sure, I'll consider it for future content. Thanks for the suggestion!

    • @Nikhilg27
      @Nikhilg27 11 หลายเดือนก่อน

      Also is this series completed ?

  • @Learner-hg4hj
    @Learner-hg4hj ปีที่แล้ว

    Thanks madam

  • @Kk-rl7nv
    @Kk-rl7nv ปีที่แล้ว +1

    Hi Riya,
    Can you please let me know when we add another ip in eth0 inside a container then can we access the same container via 2nd ip ie at that moment we have 2 IPs for same container.
    Can we add security context in case of deployment?

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      When you add another IP address to the eth0 network interface inside a container, you can indeed access the container using both IP addresses. Each IP address will be associated with the container's network interface, allowing incoming connections on both IPs.
      Regarding your second question, yes, security context can also be applied in the case of deployments. I hope this clarifies your doubts.

    • @Kk-rl7nv
      @Kk-rl7nv ปีที่แล้ว

      I have 2 more doubts when the POD died and recreate then is there any way to configure 2 IPs which can communicate with related service.
      2: is it possible security context can apply on cluster level if yes then can you make a video where we can practically see how to protect the cluster from intruders.

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      1. When a Pod dies and is recreated, the IP address associated with it may change. Kubernetes assigns IP addresses dynamically to Pods, so there's no direct way to configure specific IP addresses for a Pod to communicate with related services after recreation. However, you can use services in Kubernetes, such as ClusterIP or NodePort, which provide stable endpoints for communication with Pods.
      2. Security context can be applied at both the Pod and container level. However, applying security context at the cluster level is not possible.

  • @lyriking_1
    @lyriking_1 11 หลายเดือนก่อน

    Is UserId 1000 created initially?
    how it is created
    and also group id
    im confused with those ids
    please explain

  • @amitverma7545
    @amitverma7545 ปีที่แล้ว +1

    Mam kubernetes autoscaling concept missing hn is series mai plz add

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      Sure, will consider adding Kubernetes autoscaling in future content. Thanks for the suggestion! 🙏

  • @amitkumarmeshram3252
    @amitkumarmeshram3252 ปีที่แล้ว +1

    Hello Can we say everything in Kubernetes is a POD. I was asked this question in an interview, Not sure how to answer this.

    • @DevOpsPro
      @DevOpsPro  ปีที่แล้ว

      In Kubernetes, not everything is a POD. While PODs are like the basic building blocks, there are also other important things like Services, Deployments, and ConfigMaps. These help manage different parts of your apps running in containers. Each of these does a specific job in making sure your apps run well together.

  • @_man.on.strings__
    @_man.on.strings__ ปีที่แล้ว +1

    HPA m video bnao 🦋🫂🥰

  • @vinaykaushikinvisble
    @vinaykaushikinvisble ปีที่แล้ว

    ye hacker ko access kaise mil sakta h, you mean ki us cluster ka master node ssh pe hacker ne access kar lia or wo kubectl command run kar skta tha?

  • @mavkrishna5236
    @mavkrishna5236 9 หลายเดือนก่อน +1

    Hi
    Please make istio vedio

    • @DevOpsPro
      @DevOpsPro  8 หลายเดือนก่อน

      Absolutely! Thanks for your suggestion! I'll definitely consider creating videos on Istio.

    • @Nikhilg27
      @Nikhilg27 8 หลายเดือนก่อน

      Yes please make video on istio with kubernetes