Kubernetes Security - Disable Automount Service Account Token - 7

แชร์
ฝัง
  • เผยแพร่เมื่อ 8 ม.ค. 2025

ความคิดเห็น • 19

  • @satheeshkumarvaratharaj4256
    @satheeshkumarvaratharaj4256 2 ปีที่แล้ว

    Marvellous !! Excellent !! Never saw this much clear explanation.. Great effort.. Thank you so much

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว

      Thanks a lot Satheesh Kumar. Please do subscribe, share & keep learning

  • @sofi6463
    @sofi6463 ปีที่แล้ว

    This is awesome I have done lot of lab and after a video I am surely understand what I do

    • @learnwithgvr
      @learnwithgvr  ปีที่แล้ว

      Glad to hear about its helpful. Cheers and keep learning

  • @SanchitPanchwatikar
    @SanchitPanchwatikar ปีที่แล้ว

    Thanks I learned a lot today ☺️

    • @learnwithgvr
      @learnwithgvr  ปีที่แล้ว

      Thank you Sanchit for the feedback. Keep Learning

  • @JoseCastro-ql1yl
    @JoseCastro-ql1yl หลายเดือนก่อน

    Awesome

    • @learnwithgvr
      @learnwithgvr  หลายเดือนก่อน

      Thanks for watching and keep learning

  • @habibverse
    @habibverse 2 ปีที่แล้ว

    you are the best

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว

      Thank you for the feedback. Please have look at other video's too. Keep learning

  • @humayunsabid3188
    @humayunsabid3188 ปีที่แล้ว

    hello Sir, in the latest version of K8s, the automatic secret creation along with the service account creation does not exist, right? thanks in advance!

    • @learnwithgvr
      @learnwithgvr  ปีที่แล้ว

      Yes correct In most recent versions, including Kubernetes v1.28, API credentials are obtained directly by using the TokenRequest API instead of secret

  • @samsulhaque8064
    @samsulhaque8064 ปีที่แล้ว

    Hi Sir , your video is very helpful to learn CKS , but one thing in version Kubernetes 1.26 we did not find any tokens and secrets in the default service account, can you please make one video about secrets,token,service account for the Kubernetes version 1.26 ..

    • @learnwithgvr
      @learnwithgvr  ปีที่แล้ว

      Check #14 secret types videos, i have covered that topic
      th-cam.com/video/qoO8_WR8BpI/w-d-xo.html

  • @amit00253
    @amit00253 ปีที่แล้ว

    If manging Pods through deploymets, then deplyment should be updated for automounting?

  • @riyashussain7406
    @riyashussain7406 2 ปีที่แล้ว

    As always thanks! :) Que: If the preferred/secure way by k8s is to have automount false, why doesn't k8s by default create (sa, and) pods without mounting the secrets. In other words, what is the adv. of pods having the (sa) secrets mounted to the pods? (Or, if automount set as false, then what is after-effect of pod not having access to (sa) secrets?)

    • @learnwithgvr
      @learnwithgvr  2 ปีที่แล้ว +1

      If disableautomoubt (DAM) set to false, levereging abstraction, pod will not mount but call internally underlying secret by its reference. By default DAM set to true by nature bcas considering container can make api calls if needed. set DAM to false in service account level & restrict to read secrets. Agree with you on point and make sense. Thanks for discussing

    • @brahmadarapaneni4561
      @brahmadarapaneni4561 ปีที่แล้ว

      @@learnwithgvr if the token is not mounted then how pos will speak to api server