Kubernetes Security - Pod Security Policies (PodSecurityPolicy) - 11

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 พ.ย. 2024

ความคิดเห็น • 37

  • @shamstabrez2986
    @shamstabrez2986 2 ปีที่แล้ว

    i jst wanna say ur videos r awesome i have learn alot imprtnt imprtnt things in kubernetes which i dont know before thnk u very much for this brother keep going n do more

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว

      It's my pleasure. Thank you. Security concepts are always importent & it requires some basic knowledge. thanks for watching video's & comments etc. connect me in linkedin

  • @MrSuriyam
    @MrSuriyam ปีที่แล้ว

    Thank you so much. Sir appreciate it.

  • @dasilavanya7429
    @dasilavanya7429 2 ปีที่แล้ว

    Really awesome explonation Bro....keep going

  • @aireddy
    @aireddy 2 ปีที่แล้ว +1

    Venkat , These videos are extremely helpful to understand the concepts throughly. I am planning to attempt CKS exam right after my HashiCorp Vault. I know this is super tough exam, planning for full 1 month preparation and sit for exam end of March. Is it possible to share the slides ?

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว +1

      Thanks & All the best for your exams
      My Slides are having just one liner info from its official documentation.
      Please refer this github.com/ramanagali/Interview_Guide/blob/main/CKS_Preparation_Guide.md
      and also CKS Certification Preparation Info
      github.com/ramanagali/Interview_Guide/blob/main/Certification_Preparation.md#cks

  • @olumidealabi5923
    @olumidealabi5923 11 หลายเดือนก่อน

    Thanks. Nice Video. I just want to ask if I want to diable PSP, Do I have to always remove it on the Api Server? Some documentations say you can do pre namespace disablement.

    • @learnwithgvr
      @learnwithgvr  11 หลายเดือนก่อน

      Apologies, somehow i missed to reply. Yes PSP is Admission Controller so one way to disable permanently in API server level, alternatively disallow(authorisation )at namespace level with RBAC feature i.e., role, rolebinding

  • @nandanbetti
    @nandanbetti ปีที่แล้ว

    Thanks

  • @sumithtm
    @sumithtm 10 หลายเดือนก่อน

    Really good. Thank you

    • @learnwithgvr
      @learnwithgvr  10 หลายเดือนก่อน

      Thank you & keep learning

  • @keratishvili
    @keratishvili 2 ปีที่แล้ว +1

    great video, would ask one thing what if we want to have on some pods to have privileged true like I am on premises and I have nginx pod controllers and also using PSP, can I some how flag that pods to be ignored in PSP?

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว +1

      Thanks for feedback. In that case...
      run nginx pod controllers in different nameapace so that it will use default service account.
      2nd - for your pods to use PSP; create PSP, service account, add RBAC permissions and apply it wherever you want. Hope you understood it what i mean

  • @sanikommusivareddy7244
    @sanikommusivareddy7244 2 ปีที่แล้ว

    Great video Sir.
    I have small question regarding PDB.
    As PDB will be removed v1.25, do we have any alternative way of PDB to use ? Please reply me...

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว +2

      Thank you & are you talking abt PSP ? yes there alternative i.e.pod security admission, have a look the video
      th-cam.com/video/JYM7mSShfp0/w-d-xo.html

    • @sanikommusivareddy7244
      @sanikommusivareddy7244 2 ปีที่แล้ว

      No Sir, I talking about PodDisruptionBudget. Are both same ?

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว +1

      No its different. I have made video on PDB too th-cam.com/video/L1nCLcX5IAk/w-d-xo.html
      only PSP is depricated in 1.25 not PDB

    • @sanikommusivareddy7244
      @sanikommusivareddy7244 2 ปีที่แล้ว

      Thank you Sir for having patience and replyed back. I got the solution for my question through our conversation.

  • @vitusyu9583
    @vitusyu9583 3 หลายเดือนก่อน

    Also, could i know what terminal software you use? is it iterm2, or warp?

  • @vitusyu9583
    @vitusyu9583 3 หลายเดือนก่อน

    One question: is it possible to apply a psp to the default service account? since i think it may be more important for a pod is run under the default sa if no specific service account is specified.

    • @learnwithgvr
      @learnwithgvr  3 หลายเดือนก่อน

      Yes, we can apply and it's highly recommended for enhanced security
      By applying PSS to the default service account, you can significantly improve the security posture of your Kubernetes cluster and protect your applications and data from unauthorized access and potential vulnerabilities

  • @brahmadarapaneni4561
    @brahmadarapaneni4561 ปีที่แล้ว

    Explain in this manner
    1. What happens if we don't use pod security policy
    2.how to implement PSP

  • @jsujaykumar
    @jsujaykumar 8 หลายเดือนก่อน

    Kubernetes pod security policy is removed from CKS exam curriculum. Instead PodSecurity Standard and Pod Security admission.

    • @learnwithgvr
      @learnwithgvr  8 หลายเดือนก่อน

      thats correct, i have made detailed video on PSA th-cam.com/video/JYM7mSShfp0/w-d-xo.htmlsi=244KY5vBDSSp3l2o

  • @varunr3049
    @varunr3049 2 ปีที่แล้ว +1

    Hello sir
    If we apply psp policy to deny root privileges,will it stop already running pod with root privilege,
    Which was running before psp enable
    Please reply

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว +1

      Varun, once you create PSP, SA, cluster role, cluster role binding...finally you will attach service to pod and test right? While k apply definitely it will throw error that given yaml file does follow the rule you created using PSP.
      watch the video again from 10:66 i.e., th-cam.com/video/IQgFTNSKNv4/w-d-xo.html
      Hope this helps....

    • @varunr3049
      @varunr3049 2 ปีที่แล้ว +1

      @@learnwithgvr thank you sir
      I want to create psp policy to allow permission in kube-system namespace and
      Should deny root privilege in all other ns
      Please give Idea how to do

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว

      Its advanced topic, you need override system configurations...there are multiple ways to achieve & multiple constraints ( not straight forward way). Sorry i am unable to provide solution in one comment.
      CKS one of the security objective is to achieve .. i would suggest to reach the kubernetes official slack channels and discuss the right approach with community on your use case. I hope this will help

    • @yogeskumar7832
      @yogeskumar7832 2 ปีที่แล้ว

      hi @@varunr3049 i do have the same doubts as your questions - have u got resolution for this.
      if yes, kindly share the ideas how to do.

  • @vinayayinapurapu
    @vinayayinapurapu 2 หลายเดือนก่อน

    is this still applicable? According to latest changes this PSP has been replaced / updated with Pod Security Admissions.

    • @learnwithgvr
      @learnwithgvr  2 หลายเดือนก่อน

      In this Playlist Pod Security Admission is available

  • @ravibagul-u6i
    @ravibagul-u6i 11 หลายเดือนก่อน

    I didn't get that how can we disable the psp in existing cluster
    Now am having an warning msg for deprecated api in gke cluster
    So first i wanted to disable the psp and if you have recorded video for migration from psp to PSAC please help me with that.

    • @learnwithgvr
      @learnwithgvr  11 หลายเดือนก่อน

      If you’re running a version prior to v1.25 and want to disable PSP, you would typically remove it from the admission controller’s list in the API server configuration and restart the API server
      For clusters that still use PSP, you would need to migrate to these alternatives before upgrading to Kubernetes v1.25 to avoid interruptions to your workloads
      # Example command to check if PSPs are in use in your cluster (for versions prior to v1.25)
      kubectl get psp
      # If PSPs are in use, you'll need to migrate to alternatives like PSA
      # Refer to the Kubernetes documentation for a detailed migration guide