The Learning Channel
The Learning Channel
  • Видео 38
  • Просмотров 358 990
Setup Azure Kubernetes Private Clusters with API Server Vnet Integration
Many companies strive to extend their data centers to the cloud to take advantage of the cloud providers’ enormous resource capacities. For some this is a short-term expansion due to business peak seasons, for others, it is a permanent need. Regardless, they would want to maintain the privacy and security that their private clouds and data centers provide. This means they would like to avoid exposure to the public internet as much as possible. In this video, we will discuss hybrid and cross-premises cloud concepts and how Azure’s private networks provide network isolation on the Azure cloud. In this video, we will help a fictitious Acme Corporation set up a private Kubernetes AKS cluster ...
Просмотров: 448

Видео

Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE
Просмотров 7868 месяцев назад
The classic mTLS implementation using sidecars is resource-intensive, slow, and poorly suited to microservices. The Cilium’s approach is to do away with sidecars and instead leverage eBPF which provides native performance. It has also split mTLS’s traditional mutual authentication and encryption into separate features that users can opt-in individually based on their requirements. To manage wor...
Workload Identity Part 1: Introduction to SPIFFE and SPIRE
Просмотров 2 тыс.10 месяцев назад
A workload is a single piece of software, deployed with a particular configuration for a single purpose; it may comprise multiple running instances of software, all of which perform the same task. A workload identity is a way for a workload to prove who it is and prove its authenticity to other workloads. Historically IP addresses were the standard way to identify workloads, however, in the mod...
Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
Просмотров 85811 месяцев назад
By default, client communication to Kubernetes services is in HTTP plain text. This is not desirable in a production environment, especially for clients outside the Kubernetes cluster. In this video, we’ll discuss how to encrypt this communication leveraging Kubernetes TLS ingress, Cert-Manager, and Let’s Encrypt certificate. We’ll start with a quick overview of Kubernetes services and why Kube...
Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
Просмотров 979Год назад
In this video, we will discuss the Open ID Connect (OIDC) authentication method for Kubernetes. Although the default X509 client certificate authentication works for small Kubernetes environments, for large organizations, it is not the best method. We will start off by reviewing Kubernetes’ X509 client authentication and how clients are created and then discuss its shortcomings. We will then lo...
Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
Просмотров 1 тыс.Год назад
In this video, we will start by taking a look at Kubernetes authentication architecture and the authentication options it provides. We then dive into the default client authentication method (X509 client certificates). We will learn about Kubernetes’ PKI infrastructure and how certificates are organized. We will then visually walk through the process of generating client certificates and user a...
Kubernetes Security, Part 2: Managing POD Run Time Security
Просмотров 1,5 тыс.Год назад
Kubernetes Security, Part 2: Managing POD Run Time Security In this video, we will examine POD security settings (SecurityContext object), how to manipulate them, and why a misconfigured POD could pose a severe security threat. We will then look at ways to secure the PODs through Kubernetes’ POD “Security Admission” policies which provide a good security foundation for most projects. There will...
Istio Ambient Service Mesh
Просмотров 923Год назад
This video will explore Istio’s Ambient Service Mesh in great detail. This is the new version of Istio’s Service Mesh which is still in development. Its most important feature is that it doesn’t use sidecars to implement mesh functionality. We will start by describing what Service Mesh is, followed by a detailed discussion of Istio’s sidecar-based Service Mesh architecture. We will then dive in...
Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC)
Просмотров 3,6 тыс.Год назад
In this video, we will explore Kubernetes Role Based Access Control (RBAC) to provide fine-grain access to users and service accounts. We will start off by taking a quick look at Kubernetes overall authentication and authorization and will discuss some security best practices. We will then dive deep into RBAC, its architecture, and its tenants (Subjects, (Cluster)Role, and (Cluster)Bindings). I...
Cilium Service Mesh
Просмотров 2,1 тыс.Год назад
In this video, we will explore Cilium’s, Service Mesh. We will start by defining a Service Mesh and then review an older and established Service Mesh provider Istio’s architecture. We will then dive into Cilium’s Service Mesh architecture to contrast the two and what advantages Cilium brings to the table. We will also discuss Cilium’s various new Mesh offering such as ingress (including TLS ter...
Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
Просмотров 3,5 тыс.2 года назад
In this episode, we will learn about Cilium’s supported IP routing modes. IP routing essentially means how the PODs on one node communicate with PODs on other nodes. To start with, we will discuss the default mode which uses L2 VXLAN encapsulation. We will then discuss situations where all nodes are on the same subnet, and how to set up Direct routing (no encapsulation). Next, we will discuss h...
Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
Просмотров 3,6 тыс.2 года назад
In this episode, we will learn about Cilium’s “Cluster Mesh”, its architecture, how to set it up, and will also discuss some use case scenarios such as load balancing/high availability, and shared services hosting. Links: Demo scripts: github.com/gary-RR/myRUclips_cilium_service_mesh/tree/main My Other Videos: ► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated) ...
Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
Просмотров 4,7 тыс.2 года назад
In this multi-part series, we will take a look at Cilium. In part 2, we will take a look at some Cilium constructs such as “endpoints” and endpoint “identity” and then will examine how Cilium could apply L3, L4, and L7 network policies to Kubernetes workloads. We will also take a look at Cilium CLI and Hubble CLI and UI. Links: Demo scripts: gary-RR/myRUclips_cilium_part1 (github.com) My Other ...
Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process
Просмотров 18 тыс.2 года назад
In this multi-part series, we will take a look at Cilium. In part 1, we will learn what Cilium is and how it leverages a key technology called “eBPF” to provide load balancing, observability, and security. We will also take a look at what eBPF is and conceptually walk through how a simple eBPF program can be organized and loaded into Kernel. We will wrap this episode up by going through a compl...
What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
Просмотров 10 тыс.2 года назад
In this episode, we will learn what VXLAN is and how it can be leveraged as an overlay network to manage Kubernetes POD networks. We will start off by getting a crash course on the networking Open Systems Interconnect (OSI) model, followed by an overview of overlay networks. In the following section, we will discuss what VXLAN is and go over its architecture, encapsulation model, and how it can...
Managing Linux Logins, Users, and Machines in AD: Part 2- Join Linux Machines to AD
Просмотров 7512 года назад
Managing Linux Logins, Users, and Machines in AD: Part 2- Join Linux Machines to AD
Managing Linux Logins, Users, and Machines in AD: Part 1- Setup AD
Просмотров 1,8 тыс.2 года назад
Managing Linux Logins, Users, and Machines in AD: Part 1- Setup AD
Sharing Resources between Windows and Linux
Просмотров 7672 года назад
Sharing Resources between Windows and Linux
Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive
Просмотров 16 тыс.2 года назад
Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive
Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets
Просмотров 3,8 тыс.2 года назад
Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets
Configuring and Managing Storage (volumes) in Kubernetes
Просмотров 7 тыс.2 года назад
Configuring and Managing Storage (volumes) in Kubernetes
Istio Service Mesh - Securing Kubernetes Workloads
Просмотров 3 тыс.2 года назад
Istio Service Mesh - Securing Kubernetes Workloads
Istio Service Mesh (sidecar-based)- Intro
Просмотров 7 тыс.2 года назад
Istio Service Mesh (sidecar-based)- Intro
Understanding Kubernetes Networking. Part 6: Calico Network Policies
Просмотров 7 тыс.2 года назад
Understanding Kubernetes Networking. Part 6: Calico Network Policies
Understanding Kubernetes Networking. Part 5: Kubernetes Network Policies intro
Просмотров 9 тыс.3 года назад
Understanding Kubernetes Networking. Part 5: Kubernetes Network Policies intro
Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host Windows Containers.
Просмотров 5 тыс.3 года назад
Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host Windows Containers.
A Docker and Kubernetes tutorial for beginners
Просмотров 2,8 тыс.3 года назад
A Docker and Kubernetes tutorial for beginners
Kubernetes services - (Understanding Kubernetes Networking Part 4)
Просмотров 20 тыс.3 года назад
Kubernetes services - (Understanding Kubernetes Networking Part 4)
Setup a "Docker-less" Multi-node Kubernetes Cluster On Ubuntu Server.
Просмотров 2,8 тыс.3 года назад
Setup a "Docker-less" Multi-node Kubernetes Cluster On Ubuntu Server.
Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth.
Просмотров 44 тыс.3 года назад
Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth.

Комментарии

  • @juliopedrosa2831
    @juliopedrosa2831 День назад

    Amazing!

  • @rktech8157
    @rktech8157 5 дней назад

    Thanks for another amazing content. Do you have github repo?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 4 дня назад

      Hi and thank you for your kind feedback! The scripts are stored here: github.com/gary-RR/myRUclips_video_AKS_private_clusters_part1

    • @rktech8157
      @rktech8157 4 дня назад

      @@TheLearningChannel-Tech ❤

  • @violinalauradragan7001
    @violinalauradragan7001 23 дня назад

    I love all your videos. extremly educational. do you plan to release more content please?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 22 дня назад

      Hi, many thanks for your kind words! Yes, I will be adding more content later in the summer, just have been busy. Any particular topic you are interested in? Thanks!

    • @violinalauradragan7001
      @violinalauradragan7001 21 день назад

      @@TheLearningChannel-Tech I apreaciate your reply so much. on top of my head I am thinking intro to microservices, or baremetal and k8s, monitoring and observabiities, k8s on prem, etc. I hope you know how valuable your videos are.

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 20 дней назад

      @@violinalauradragan7001 I'm really humbled by your kind comments. I'm planning for a few Azure cloud-centric videos next but I will return to Kubernetes and consider your great suggestions, especially an intro to microservices and monitoring. Most of my Kubernetes thus far (except the last one) apply to both on-prem and cloud situations and the instructions to set up clusters from scratch apply to both VMs and bare-metal. If you have any questions about any of the videos or have questions/issues with the labs please post them and I will be more than happy to help if I can. Again, thank you very much for your very motivating kind words! Please take care!

  • @balajir6670
    @balajir6670 Месяц назад

    Just halfway through the first video and i can say the type of presentation and knowledge in here is very easy to understand and covers every basic concept. Thanks so much for making this video ❤

  • @user-bf9ic4yd7d
    @user-bf9ic4yd7d Месяц назад

    wow thanks for this amazing viedo and powerful samples... really helped me alot .. and i got one question in video 25.13 between udp tunnel and vtep , is there some kind of running process(user space) that have udp port and listening so it get packet from other node ? and if it is how does it communicate with vtep interface? thank you! and is there any chance that you could cover about tun , vtep , vtun interfaces?? i know it's lot to ask but no one can deliver the information like you again really appreciate for your works! and sorry for my poor english..

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech Месяц назад

      Hi, thanks for your feedback. The tunnel is not a permanent construct and is only started any time when the two sides need to communicate and is shut down once the communication is completed. I'm currently planning other topics but if I get around it will consider your request. Thanks.

    • @user-bf9ic4yd7d
      @user-bf9ic4yd7d Месяц назад

      @@TheLearningChannel-Tech thanks!!

  • @evangelossyrmos9576
    @evangelossyrmos9576 Месяц назад

    Very nice presentation, that should be done in University classes! Your explanations made everything clear in the networking domain, these lectures are TOP!!! Keep up the good work!

  • @carlche647
    @carlche647 Месяц назад

    There are something, I did not quite get it. At the 39:46, about about access $ProductsDBClusterIP:8080 from two container in products-stage name space, your labeled the products-stage namespace, the two pods in stage namespace are both labled? just just one is labled?, thanks.

    • @carlche647
      @carlche647 Месяц назад

      I think I got it, the condition limited is two, both app and namespace match at the same time. - podSelector: matchLabels: app: products-business namespaceSelector: matchLabels: porducts-prod-db-access: allow

  • @sanjeethg4958
    @sanjeethg4958 Месяц назад

    amazing video. very useful to understand the concept

  • @carlche647
    @carlche647 Месяц назад

    This is really grate demo of k8s network in-depth.

  • @trucvuongvan554
    @trucvuongvan554 Месяц назад

    This video series is good. Nice work! I hope that you can make more.

  • @gsmurugaraja
    @gsmurugaraja Месяц назад

    Amazing explanation

  • @ravipillai7662
    @ravipillai7662 2 месяца назад

    Absolutely the best series on K8s working principles and scenarios on the internet!

  • @ashishnair4630
    @ashishnair4630 2 месяца назад

    Can u make a video on operators ?

  • @Techtips200
    @Techtips200 2 месяца назад

    These are great videos ....no one covers k8 networking deeper than you.

  • @efaruk
    @efaruk 2 месяца назад

    Most comprehensive tutorial I've ever see, thank you mate...

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      Glad you liked it!

    • @efaruk
      @efaruk 2 месяца назад

      @@TheLearningChannel-Tech If you are someone who really likes learning fundamentals of things, how you can't like it 😉

  • @karteekchalla7451
    @karteekchalla7451 2 месяца назад

    Very good informative video! Have a question. At the time stamp 17:00, you mentioned that the tunnel interface will masquerade the actual source IP of the pod and the source IP in the inner IP header changes to tunl0's IP. But why is this required? Technically, even with keeping the actual IP address of the source pod in the traffic and then adding the outer IP header with the source IP as the eth0 of kube-node1-cal's eth0 and with destination IP as the eth0 of the destination node kube-master-cal , the return traffic can still reach the pod in kube-node1-cal, as the destination node will have the bgp route towards the entire pod subnet that is used in the source node kube-node1-cal.

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      Hi, the reason is that these pods are not routable outside their host worker nodes. If the destination pod tries to send the response directly to the source pod, its host wouldn't know how to send it as there are no entries in the route table to assist it, so the tunnels play the middleman role facilitating this communication.

  • @vipinchawria
    @vipinchawria 2 месяца назад

    Thank you !! One quick question - when UDP pipe is setup between two VMs hosting containers, how is destination VM's IP determined? For example - when we did a curl to hello word service IP from master to node1, to setup the UDP pipe, node1's IP needed to be known. Is calico doing some magic under the hood for this?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      Hi, yes when the source pod issues an ARP request, the Calico VTEP forwards it to the other node where the other pod responds, similar to the discussion of VXLAN overview discussion.

    • @vipinchawria
      @vipinchawria 2 месяца назад

      @@TheLearningChannel-Tech Thanks for the response. So basically when the ARP response comes back from destination VTEP, source VTEP being a switch will remember that certain MAC lives on this VTEP. So after ARP, when ping packet is sent, source VTEP will establish the UDP pipe between source and destination VTEPs. Does this seem like correct understanding?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      @@vipinchawria Close, Calico is a CNI provider responsible for creating pods. It knows what pod (and its IP address) is assigned to what worker node. When the source pod issues an ARP, it basically says I'm looking for the MAC address of the pod that has this IP address. Calico VTEP examines the destination IP address and forwards it to the worker node that hosts that pod.

  • @simo47768
    @simo47768 2 месяца назад

    Hi Can you please do a serie about ebpf? Something easy to follow.

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      Hi, this provides an overview of ebpf: ruclips.net/video/aLq3O3l2LF4/видео.html

  • @eldarmustafayev7782
    @eldarmustafayev7782 2 месяца назад

    amazing. thank you

  • @simo47768
    @simo47768 2 месяца назад

    Wow. Amazing content. The best

  • @omega1962
    @omega1962 2 месяца назад

    All of your vidoes are very informative and great for learning. Can you please explain how Networking works in AKS?

  • @ManiBalajiC
    @ManiBalajiC 2 месяца назад

    I am still learning your CILIUM Networking Videos for the AWS , let me comeback when i switched to AZURE...

  • @vamshikrishna4579
    @vamshikrishna4579 2 месяца назад

    Vedio after a long time..thank you

  • @oceanmih2646
    @oceanmih2646 2 месяца назад

    Great video, thanx for your kindness and effort

  • @oceanmih2646
    @oceanmih2646 2 месяца назад

    Great tutorial

  • @rahulsawant485
    @rahulsawant485 2 месяца назад

    Please can you explain the part how the packet is routed in the case where we get response from the pod on master having destination ip of the tunnel. how the response is sent from tunnel to the respective pod on the worker node

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      I'm trying to understand your question but if you are asking how a call from a pod on master is routed to a pod on node 1, it is done exactly like the scenario I explained in the video but is routed through the tunnel on node 1. Nothing is different.

    • @rahulsawant485
      @rahulsawant485 2 месяца назад

      @@TheLearningChannel-Tech correct but as soon as it reached tunnel on node 1 how it knows to which pod it needs to send the response as in the IP header which we captured on master there was no information (IP) about the pod on node 1 as it was NAT to node 1 tunnel IP address. I am trying to understand how the packet is routed from node 1 tunnel to pod on node 1 as the response arrives

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      @@rahulsawant485 This is a call/response situation. The tunnel on the callin server masqurates the calling pod's IP address and sends the request to ther side. The pod on the other side (server) thinks the tunnel on the other side made the call and sends the responds back to the tunnel on the other side. That tunnel is sitting there waiting for the results and as soon as it gets it, it simplay forward it to the pod.

    • @rahulsawant485
      @rahulsawant485 2 месяца назад

      Thank you. This statement "That tunnel is sitting there waiting for the results and as soon as it gets it, it simplay forward it to the pod." makes it clear

  • @oceanmih2646
    @oceanmih2646 2 месяца назад

    great tutorias ever I have seen

  • @mariuscristian7617
    @mariuscristian7617 3 месяца назад

    I have a question here. We have a datacenter with few VXLANs, one is for load web load balancers and one is for production servers. The K8S vxlan overlay can work on the top of existing VXLANs overlays? Thank you

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 2 месяца назад

      Hi, the VXLAN implementation is internal to Kubernetes and is used to provide connectivity among pods within the Kubernetes cluster.

  • @geetikabatra
    @geetikabatra 3 месяца назад

    This is great! For so many years every book and folks used to refer switch as a layer 2 device, nobody explained it in terms of subnets. Now I am actually able to distinguish between Data layer anf Network layer.

  • @geetikabatra
    @geetikabatra 3 месяца назад

    Hey! Great video. A quick question about the daigram at 20:40, is NAT part of the router if we everything is a physical device?

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 3 месяца назад

      Hi, yes, the NAT translation is done within the physical router. I just showed it outside the router for clarity.

    • @geetikabatra
      @geetikabatra 2 месяца назад

      @@TheLearningChannel-Tech Thanks a lot for clarification.

  • @JunLee-cj7nk
    @JunLee-cj7nk 3 месяца назад

    sudo nano /etc/yum.repos.d/kubernetes.repo no longer works

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 3 месяца назад

      Thanks for letting for your feedback. This video was created three years ago before CentOS was discontinued.

  • @JunLee-cj7nk
    @JunLee-cj7nk 3 месяца назад

    sudo nano /etc/yum.repos.d/kubernetes.repo no longer works

  • @oceanmih2646
    @oceanmih2646 3 месяца назад

    I just downloaded the shell script from your github repository, and tried it, but the ping only works for the namespace in the same node, failed to namespace of the other node I am confused a lot. I really appreciate if you can help.

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 3 месяца назад

      Make sure you follow the instructions below and change the IP addresses to match your environment: # ------------------- Overlay setup --------------------- # To establish the udp tunnel (make sure to run these as root (sudo -i)): 1- On "ubuntu1" run: socat UDP:192.168.0.11:9000,bind=192.168.0.10:9000 TUN:172.16.0.100/16,tun-name=tundudp,iff-no-pi,tun-type=tun & #***Note that I removed "iff-up" switch from command on "ubuntu1" because I was getting an error. 2- On "ubuntu2" run: socat UDP:192.168.0.10:9000,bind=192.168.0.11:9000 TUN:172.16.1.100/16,tun-name=tundudp,iff-no-pi,tun-type=tun,iff-up & 3- Return to "ubuntu1" and run ip link set dev tundudp up #echo "Disables reverse path filtering" #sudo bash -c 'echo 0 > /proc/sys/net/ipv4/conf/all/rp_filter' #sudo bash -c 'echo 0 > /proc/sys/net/ipv4/conf/eth0/rp_filter' #sudo bash -c 'echo 0 > /proc/sys/net/ipv4/conf/br0/rp_filter' #sudo bash -c 'echo 0 > /proc/sys/net/ipv4/conf/tundudp/rp_filter

    • @oceanmih2646
      @oceanmih2646 2 месяца назад

      @@TheLearningChannel-Tech The ubuntu1 and ubuntu2 are on the same subnet, is it necessary to set up the UDP tunnel?

  • @oceanmih2646
    @oceanmih2646 3 месяца назад

    awesome useful ,really really awesome video

  • @liangl4537
    @liangl4537 3 месяца назад

    Grate work

  • @pankpunk1
    @pankpunk1 3 месяца назад

    thanks a lot for posting this; I have one question related to setting up network policies; we have a use case wherein multiple applications are sitting in their own namespaces and these applications are accessible through the ingress controller using ingress; we want to whitelist traffic coming to each namespace using tools like calico; I found that although we are able to get the source ip of the client visible in the ingress controller, the application pods only receive the source ip of the ingress controller; I did manage to get the source ips in the request headers and looks like I will have to try istio for further traffic whitelisting on the basis of the headers; my question is, is this approach good or is there a better way to achieve what I want to achieve.

    • @pankpunk1
      @pankpunk1 3 месяца назад

      so suppose I want client A to access application in namespace X but not application in namespace Y; how to whitelist this at the namespace level when this client is coming from outside the cluster using the ingress controller

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 3 месяца назад

      Hi, Which IPs are you referring to? The IP addresses of clients that are calling from outside the cluster? In that case, you'll need to leverage a firewall that sits before the external load balancer and ingress controller. This is because as you noticed the client IPs are natted.

    • @pankpunk1
      @pankpunk1 3 месяца назад

      @@TheLearningChannel-Tech yes, want to whitelist address of clients calling from outside the cluster; after using proxy protocol feature of the ingress controller, am able to see the actual client ips in the ingress controller; but am still trying to figure out how to get these ips whitelisted in the application pods which are reached through the ingress and are sitting in different namespaces per application

    • @pankpunk1
      @pankpunk1 3 месяца назад

      so the intention is to filter at the namespace level with each namespace allowing a different set of ips to access the application it contains;

    • @pankpunk1
      @pankpunk1 3 месяца назад

      I am coming to think that istio might be the solution here and will try that out; I don't think calico can help here. I read about the calico eBPF dataplane but not sure on it.

  • @atmajakota7348
    @atmajakota7348 3 месяца назад

    Best thing found on internet.... Kudos to the efforts 😃

  • @DecodingGermany
    @DecodingGermany 3 месяца назад

    thanks for such detailed video.

  • @rafazmyslony5819
    @rafazmyslony5819 3 месяца назад

    Really, it's the best kubernetes networking explanation on entire internet. Believe me, I've seen many, even in diffrent languages:D

  • @adeshkashyap1703
    @adeshkashyap1703 3 месяца назад

    Being K8S Admin guy .. here I found the best on K8S networking .. Liking your videos too much .. Thanks for this great work

  • @benmoody9334
    @benmoody9334 3 месяца назад

    Great content, very helpful and gave me a good bit of clarity on some things.. some bits have still gone over my head but still great stuff.

  • @extde
    @extde 3 месяца назад

    You may use following commands in WindowsTerminal/PowerShell (on windows host). You need to create ".kube" directory before: cd ~\.kube\ microk8s config > config Then use kubectl directly without microk8s "prefix" Also you may use this config to login to kubernetes dashboard.

  • @vitusyu9583
    @vitusyu9583 3 месяца назад

    What is the content of terry.jones.conf file?

  • @tnacav1
    @tnacav1 4 месяца назад

    This is very well explained, the official documentation is very confusing

  • @spiraldynamics6008
    @spiraldynamics6008 4 месяца назад

    Thank you ❤

  • @tnacav1
    @tnacav1 4 месяца назад

    This is great!

  • @alexs4112
    @alexs4112 4 месяца назад

    I finally understand how BGP works, thanks for explaining!

  • @darahaskopparapu
    @darahaskopparapu 4 месяца назад

    Hi, Could you briefly explain how packets are forwarded from load balancer to ingress to services? where do these load balancer and ingress controller run? on master node? i basically didnt understand how ip addr are assigned to these... Thank You!

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 4 месяца назад

      Hi, Looks like you have skipped a lot of stuff in the presentation. I suggest you watch those discussions that start from the following URL that talks introduces the ingress concept, followed by how the load balancer and the ingress are related, and finally walks through setting up an ingress controller, the load balancer and some test service: ruclips.net/video/pXEFZYl2Gu0/видео.html

  • @karpfenboy
    @karpfenboy 4 месяца назад

    Great presentation, thanks!

  • @sriharsha1162
    @sriharsha1162 4 месяца назад

    Hi Gary . I am a beginner in kubernetes. i see a lot of kubernetes related playlists in your channel but bit confused from where i need to start . could tell the sequence of playlists i should watch Thanks for all the videos

    • @TheLearningChannel-Tech
      @TheLearningChannel-Tech 4 месяца назад

      Hi, You can start with these: Docker and Kubernetes Intro ruclips.net/p/PLSAko72nKb8RZp3SH0KAZNCPvF71rqU7- Kubernetes Networking Series ruclips.net/p/PLSAko72nKb8QWsfPpBlsw-kOdMBD7sra-