Secret Store CSI Driver Tutorial | Kubernetes Secrets | AWS Secrets Manager | KodeKloud

Поделиться
HTML-код
  • Опубликовано: 2 окт 2024

Комментарии • 31

  • @HadiAl-Atally
    @HadiAl-Atally 3 месяца назад

    That was one fantastic demo, many thanks.

  • @ChiruMegs
    @ChiruMegs 5 месяцев назад +5

    Looked at many videos to understand AWS Secrets, CSI drivers and Storage Class. This is the Best tutorial on this topic I had found till date.

  • @pradippipaliya9675
    @pradippipaliya9675 17 дней назад

    @kodeKloud, How can we use secrets from secret manager into our on-premise kubernetes cluster which is setup using kubeadm?? We want to use Secret store CSI Driver to inject secret into pod from secret manager. I have find a lot but not getting anything, please help.

  • @subithalsubbaiah7004
    @subithalsubbaiah7004 5 месяцев назад +3

    @kodeKloud , I'm wondering, How is it safe when the password is saved in plain text inside the pod. Anyone with read access , who can read the k8s secret can also read the pod's volume. Correct me if I'm wrong.

    • @ofirfr4804
      @ofirfr4804 3 месяца назад

      The pod has to have the credentials / authorization in order to connect to other services, a DB for an instance.
      So, if you have access to the pod which connects to a DB, you have access to the DB, with the same privileges given to the pod.

  • @sagarinfomode
    @sagarinfomode Месяц назад

    link for all yaml files

  • @erodotosdemetriou6506
    @erodotosdemetriou6506 День назад

    Perfect. Kudos sir!

  • @nforlife
    @nforlife 6 месяцев назад +1

    What a great demo and some troubleshooting
    My fav is Hashicorp vault!

  • @manuv2u
    @manuv2u Месяц назад

    I have done as it is it worked 🎉, but I have try with multiple node group in same cluster like node-dev and node-qa, with different secret manager but iam not able to access in one node, in node-dev group instance are running.. but in node-qa group instance are not running.. with same configuration ( I have cross check twice)
    Check with secret store log that are not mounted, it's not able to retrieve secret from Secret manager error like "Failed to fetch secret from all regions"

  • @rajenderprasad1193
    @rajenderprasad1193 3 месяца назад

    This is great demo.. I have a question. Is there any way to create configMap instead of secret..

    • @sagarhm2237
      @sagarhm2237 3 месяца назад

      yes good question , Curenntly agrocd supports with restarts pods .

  • @omega1962
    @omega1962 5 месяцев назад +1

    Excellent Excellent Excellent.....simply excellent....thanks a lot Sir.....

  • @pradippipaliya9675
    @pradippipaliya9675 3 месяца назад

    Is there any way to inject secret value as env variable inside the pod without creating kubernetes secrets??

  • @fabrizzio_aranda
    @fabrizzio_aranda 5 месяцев назад

    Great information, looks like with this implementation it won't be possible to use the secrets as env variables, instead I will need to indicate my app to fetch the secrets from a file, and monitor when the secret's value changes, correct?

  • @rishisharath6668
    @rishisharath6668 3 месяца назад

    Thank you so much for making this, its been really helpful, also just to add to anyone wondering, if ur creating ur application in a seperate namespace make sure u create the service account in that particular namespace too and not in defualt namespace.

  • @arunshankar1987
    @arunshankar1987 6 месяцев назад +1

    Helpful video. Saved my day

  • @vladimirsiman8838
    @vladimirsiman8838 Месяц назад

    this video is a high quality stuff, thanks a lot, great !

  • @CarlosMarin-lp9xe
    @CarlosMarin-lp9xe 27 дней назад

    Excellent video!!!

  • @wenjieyang2226
    @wenjieyang2226 5 месяцев назад

    Nice video!!! Thanks Sanjeev

  • @tonychia2227
    @tonychia2227 2 месяца назад

    sealed secret is my favorite since the secret is never stored in plain text on a file system.

    • @TheRealZauriel
      @TheRealZauriel 2 месяца назад

      I think you should re-read the documentation. I'm pretty sure once a sealed-secret is applied to a cluster, it's stored as a regular k8s secret that's base64 encoded. Sealed-secrets is just for securely storing the secret in a git repo.

  • @Tester-f6j
    @Tester-f6j 6 месяцев назад

    Hi you'r video looks great
    can you please explain how can i use the value in the pod env section ?
    Thank you

    • @SoulJah876
      @SoulJah876 6 месяцев назад

      Maybe it would be only possible set a secret from the mounted file as an env variable within pod's container(s).

    • @chrisbecke2793
      @chrisbecke2793 5 месяцев назад +1

      This is one of the reasons to sync as a kubernetes secret.

  • @ash3rr
    @ash3rr 4 месяца назад +2

    who are you? you're not even a real person, it's like you created an AI instead of hiring someone to make this video.

    • @rajasekharb7901
      @rajasekharb7901 17 дней назад

      haha.. 😄he is co-tutor of kodeCloud and he works with Mumshad Mannambeth

  • @dsosys
    @dsosys 6 месяцев назад

    Great....

  • @ferhatcan5262
    @ferhatcan5262 6 месяцев назад

    So helpfull

  • @ajaychavda2826
    @ajaychavda2826 2 месяца назад

    Nice one !

    • @KodeKloud
      @KodeKloud  2 месяца назад

      We are glad that you have enjoyed your learning experience with us : )