SECURE KUBERNETES LIKE A PRO | HOW DEVSECOPS ENGINEERS SECURE Kubernetes ?

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ธ.ค. 2024

ความคิดเห็น • 104

  • @samikshasharma3544
    @samikshasharma3544 11 หลายเดือนก่อน +2

    Thanks!

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  11 หลายเดือนก่อน +1

      Thanks for supporting the channel 😍

  • @kiranamazon9610
    @kiranamazon9610 27 วันที่ผ่านมา

    Thank you for sharing knowledge

  • @kaverichowdary6637
    @kaverichowdary6637 ปีที่แล้ว +8

    East are West abhishek anna is best 😊

  • @lakshmanababu4279
    @lakshmanababu4279 7 หลายเดือนก่อน +1

    Thanks

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  7 หลายเดือนก่อน

      Thanks for contributing to the channel

  • @bharathkumar2007
    @bharathkumar2007 หลายเดือนก่อน

    You are one of the best. Thank you sir. wonderful video.

  • @SivakumarA-lx5dj
    @SivakumarA-lx5dj ปีที่แล้ว +2

    @Abhishek, Thanks a lot for your video on most awaited topic

  • @VikramSharvansh
    @VikramSharvansh ปีที่แล้ว +1

    Great efforts abhishek👏👏
    Each & every video of u making the devops/Kubernetes learning journey simple & interesting.
    Thanks once again.

  • @anjaliranot897
    @anjaliranot897 ปีที่แล้ว

    you have so muck knowlegde and patience to explain all concept so nicely

  • @akhilc8211
    @akhilc8211 ปีที่แล้ว +1

    thank you anna my day finishes with your videos......

  • @evansdanso2374
    @evansdanso2374 ปีที่แล้ว +2

    Abhishek, you're great!!! I have taken full DevOps classes but never understood a lot until I started following you! I came into Devops with a little IT background as a data analyst.
    Thank a lot!!!
    Can you do a short video to explain various web applications( Nginx, apache tomcat, etc) and how often DevOps Engineer encounter them..and other applications that DevOps Engineers most often deploy. Please 🙏...

  • @princeraghu3807
    @princeraghu3807 ปีที่แล้ว +2

    Its very quality & valuable content brother😊

  • @rohita9689
    @rohita9689 ปีที่แล้ว +3

    Papa you are giving such gifts that i can't even explain.. Thank you ❤

  • @nikhilmeshram4376
    @nikhilmeshram4376 ปีที่แล้ว +1

    beautiful explanation sir....... thank you so much....👌👌👌👌👌

  • @sonalimohapatra880
    @sonalimohapatra880 ปีที่แล้ว +1

    Yeah Abhishek bro is the best ❤❤

  • @VaibhavSupe
    @VaibhavSupe ปีที่แล้ว +1

    Hello Abhishek. Thank you so much….really hat’s off you for such an amazing content with easily understandable language & your dedication🤩🤩🤩
    If possible please make more such videos on Security / DevSecOps related topics.
    Thanks a lot 🤩🤩🤩

  • @jackayuk424
    @jackayuk424 7 หลายเดือนก่อน

    The best one best this space thanks a million sir ❤

  • @mohammedsuhailbasha4860
    @mohammedsuhailbasha4860 2 หลายเดือนก่อน

    Please make and upload videos with practical examples on these topics what you have mentioned in this video. It will be very helpful for us.

  • @haroon.niamat
    @haroon.niamat ปีที่แล้ว +2

    Informative..!!👍

  • @phaneerameswarareddychilum7189
    @phaneerameswarareddychilum7189 ปีที่แล้ว +2

    Abhisek your content is great and the way you teach is really superb. only one correction, I guess the image scan command is docker snyk not docker synk if I am correct. please correct me if I am wrong

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว

      U r correct .. sorry for the typo and mispronunciation

  • @gouravchhabra6142
    @gouravchhabra6142 ปีที่แล้ว +5

    Would like to add few security aspects which I have been using so hope others can also take them into consideration:
    1. Applying k8s policies using KYVERNO to restrict security policies in k8s resources.
    2. Using Manifest/Helm scanners tools like CHECKOV or DATREE to avoid any misconfigurations or vulnerabilities in them.
    3. Using cluster scanners or RBAC Visulizers like KUBESCAPE.
    4. Using Docker image signing and attestation tool like COSIGN.
    5. Following CIS benchmarks for K8s or Cloud on which k8s hosted.
    6. Securing Ingress using TLS.
    7. Secrets Encryption using sealed secrets or external secret operator.
    8. Using Distroless images for building containers.

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว +1

      1st point is covered in latest video
      Will do others soon. Thanks for sharing Gourav

  • @nishanthhg6437
    @nishanthhg6437 ปีที่แล้ว +1

    Thank you for all the contents

  • @pjj7466
    @pjj7466 7 หลายเดือนก่อน

    Fantastic session bro.

  • @saswatpriyabrat
    @saswatpriyabrat ปีที่แล้ว +1

    This is an excellent Video with a bundles of Knowledge....Thanks for this awesome Video ❤

  • @tanayabanerjee2380
    @tanayabanerjee2380 ปีที่แล้ว +1

    Hi,,, Please make the demo part on Rbac , Network policy and rest of the topics ...it will be very helpful 🙏🙏

  • @sth5287
    @sth5287 ปีที่แล้ว +1

    Hi abhishek, i love your content.. Can you please make a series on azure devops ??? Please.... Please...

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว +1

      Noted

    • @sth5287
      @sth5287 ปีที่แล้ว

      @@AbhishekVeeramalla thank you abhishek ♥️♥️

  • @motivation2change754
    @motivation2change754 4 หลายเดือนก่อน

    snyk and sysdig are the tool to scan images

  • @yuvichh
    @yuvichh ปีที่แล้ว +1

    31:00, is it Docker scout or Synk. I mean sync is another project and I can see the Docker Scout!

  • @ketanmorey1953
    @ketanmorey1953 ปีที่แล้ว +1

    Abhishek bhai❤

  • @rohithreddy6853
    @rohithreddy6853 ปีที่แล้ว +1

    Thnx anna
    If possible please do a video on how to make ATS resume for freshers on AWS with DevOps please anna

  • @kundalakshmidevi4449
    @kundalakshmidevi4449 ปีที่แล้ว +1

    very nice explanation abhi sir but i have a doubt here you have mentioned docker scan in github repo but in video you said docker sync .
    Is it docker scan or docker sync??????

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว

      synk is a tool that performs scanning on docker images. docker scan internally uses synk.

  • @KhanVit
    @KhanVit 3 หลายเดือนก่อน

    Great video! Please I have a quick question: Why do DevOps engineers need to secure etcd and the API server when using EKS, AKS, or GKE? Isn't that the responsibility of the cloud provider?

  • @krishnakumarkumar5710
    @krishnakumarkumar5710 ปีที่แล้ว +2

    Good content for free is dream in this selfish world. But some worriers like Abhishek prove it wrong...

  • @ganeshgoudru8444
    @ganeshgoudru8444 ปีที่แล้ว +1

    Hi Abhishek thanks for the video...one doubt the command is snyk or synk?

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว +1

      snyk , sorry for the typo

    • @ganeshgoudru8444
      @ganeshgoudru8444 ปีที่แล้ว

      @@AbhishekVeeramalla thanks Abhishek. Just wanted to clarify 😊

  • @twizzoe
    @twizzoe ปีที่แล้ว +2

    @Abhishek, thanks for this detailed lecture. I need clarification on securing the API-SERVER. If we are using Amazon EKS, I thought since Amazon handles the control plane where the API-SERVER is located, it handles the security of every component involved. With this video, I am assuming we still need to take an extra step to secure it

  • @napoleanbonaparte9225
    @napoleanbonaparte9225 ปีที่แล้ว +1

    Pod container security kuda adutunaaru anna

  • @ifirefox1
    @ifirefox1 10 หลายเดือนก่อน +1

    Hi Abhishek, thank you so much for content, i am more focussed towards devsecops, should i finish your zero to hero kubernetes coarse before i start this video?

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  10 หลายเดือนก่อน

      If u don’t have understanding of k8s yes

  • @khagolakalyan
    @khagolakalyan ปีที่แล้ว +2

    Nice Video...Can you Please explain the link between Google optimize and A/B testing with Kubernetes cluster and One more Keycloak.link.woth oidc..What's the link between these two..I m getting confused..

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว

      Ok noted

    • @khagolakalyan
      @khagolakalyan ปีที่แล้ว

      Thanks for your reply@@AbhishekVeeramalla ... Eagerly Waiting for your Video...😍😍

  • @twizzoe
    @twizzoe ปีที่แล้ว +1

    I would like to inquire if Vault can be used for encryption of the ETCD

  • @ThecookBoy
    @ThecookBoy ปีที่แล้ว +1

    Hai Abhishek. Verramalla can we expect this in the practical video it might be helpful for a better understanding

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว

      It will be too lengthy .. I will think of something

  • @ganeshgoudru8444
    @ganeshgoudru8444 ปีที่แล้ว

    Hi Abhishek, is it possible to make hands on in this video? Bcz usually in EKS we won’t be maintaining control plane right so how to implement security for eks clusters?

  • @RakeshHPatil
    @RakeshHPatil หลายเดือนก่อน

    Hi Abhishek i have been following all your videos from long time and they are very helpful, ,,,, but after watching this "secure k8 videos like a pro" which video i have to watch next since i am bit confused pls help me and suggest because in this video you have exlained securing k8 with 7 points and from the begining i would like to see the practical for all thse points which you have explained , please tell me where you have done the Practical video for these points mentioned in the video so that i can go through them .

  • @senthilkumar5129
    @senthilkumar5129 ปีที่แล้ว +1

    Thank you

  • @techairenglish1357
    @techairenglish1357 ปีที่แล้ว

    If I am using AKS, then is the API server is already secured since master node is managed by Azure or it is not required?

  • @shalubajpai4225
    @shalubajpai4225 ปีที่แล้ว +1

    Great videos Abhishek!
    Can you plz make videos on how to handle volume in kubernetes?

  • @kodjoviamedimele3066
    @kodjoviamedimele3066 ปีที่แล้ว +1

    Hi sir. First of all thank you for the quality of your contents. I have an issue when implementing the cicd with Argo. I import the repo and when it comes to the Jenkins file I am lost. Wondering if you can go over how you configure it ?

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว

      Please watch the ultimate cicd pipeline viceo

    • @kodjoviamedimele3066
      @kodjoviamedimele3066 ปีที่แล้ว

      @@AbhishekVeeramalla I was doing it with the video but I didn’t see the part where you went through the Jenkins file configuration. I tried to figure out but with no success. I will try again today.

    • @jaganarumugam8527
      @jaganarumugam8527 ปีที่แล้ว

      Which part you faced issue..

  • @tarunmeher5464
    @tarunmeher5464 ปีที่แล้ว

    Hey Abhishek.. Can you give us a trick or any plan that we can remember all these aws service, kubernetes topic so that it will be easy for the interview,, because there are so many topic on devops and not every one have sharp minded.. so hope you understand and give us a solution for this.. Thank you❤

  • @delengr1026
    @delengr1026 ปีที่แล้ว +1

    Thanks

  • @averagebadmin10player
    @averagebadmin10player ปีที่แล้ว

    Cluster monitoring can't be done by Prometheus or grafana ?

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว

      For example ?

    • @averagebadmin10player
      @averagebadmin10player ปีที่แล้ว

      @@AbhishekVeeramalla 6th point of this video you told Sysdig works like a deamon set if some hacker is attacking in that way can't be done by prometheus and grafana ?

  • @DanielSmith-hd9iq
    @DanielSmith-hd9iq ปีที่แล้ว

    do you mean docker snyk here?

  • @ashuofficial28
    @ashuofficial28 ปีที่แล้ว +1

    Ingress graphana prompetus those all use in Aks na not in use those all in eks.

  • @lakshmisucharitha3529
    @lakshmisucharitha3529 ปีที่แล้ว

    where is the practical sesion video for all these 7 security steps ? Can any one ping here the link

  • @kishorkhilare6375
    @kishorkhilare6375 ปีที่แล้ว +2

    Sir,
    Can you explain in hindi also

  • @nishanthhg6437
    @nishanthhg6437 ปีที่แล้ว +1

    First view sir

  • @udaykumar-tb5kn
    @udaykumar-tb5kn ปีที่แล้ว

    Bro. This security of kubernetes playliat or devops hero zero playlist confused with which playlist and what order should be flowed pls tell

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  ปีที่แล้ว +1

      This video is not part of devops zero to hero. Please check again.
      This is only part of kubernetes playlist and if u want to learn kubernetes advanced u need to
      Learn this

    • @udaykumar-tb5kn
      @udaykumar-tb5kn ปีที่แล้ว

      @@AbhishekVeeramalla understood bro thanks lot for detailed explanation